tccli-intl-en 3.0.1188.1__py2.py3-none-any.whl → 3.1.28.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/plugins/sso/__init__.py +14 -0
- tccli/plugins/sso/login.py +23 -6
- tccli/plugins/sso/texts.py +4 -0
- tccli/services/__init__.py +46 -2
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +341 -114
- tccli/services/autoscaling/v20180419/api.json +444 -272
- tccli/services/autoscaling/v20180419/examples.json +46 -38
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/__init__.py +4 -0
- tccli/services/bi/bi_client.py +1498 -0
- tccli/services/bi/v20220105/api.json +5769 -0
- tccli/services/bi/v20220105/examples.json +215 -0
- tccli/services/billing/billing_client.py +1007 -139
- tccli/services/billing/v20180709/api.json +1707 -429
- tccli/services/billing/v20180709/examples.json +161 -25
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/captcha/v20190722/api.json +16 -6
- tccli/services/captcha/v20190722/examples.json +3 -3
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +1167 -268
- tccli/services/ccc/v20200210/api.json +2263 -202
- tccli/services/ccc/v20200210/examples.json +116 -12
- tccli/services/cdb/cdb_client.py +665 -266
- tccli/services/cdb/v20170320/api.json +463 -208
- tccli/services/cdb/v20170320/examples.json +8 -8
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdn/v20180606/api.json +22 -22
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfg/v20210820/api.json +30 -10
- tccli/services/cfg/v20210820/examples.json +1 -1
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1149 -259
- tccli/services/ckafka/v20190819/api.json +3738 -1696
- tccli/services/ckafka/v20190819/examples.json +266 -162
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2273 -1020
- tccli/services/clb/v20180317/examples.json +184 -124
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +339 -78
- tccli/services/csip/v20221121/api.json +1011 -38
- tccli/services/csip/v20221121/examples.json +24 -0
- tccli/services/ctsdb/__init__.py +4 -0
- tccli/services/ctsdb/ctsdb_client.py +266 -0
- tccli/services/ctsdb/v20230202/api.json +677 -0
- tccli/services/ctsdb/v20230202/examples.json +20 -0
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +1003 -453
- tccli/services/cvm/v20170312/examples.json +176 -130
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +2272 -591
- tccli/services/cynosdb/v20190107/api.json +12480 -7740
- tccli/services/cynosdb/v20190107/examples.json +193 -9
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +390 -111
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +3104 -117
- tccli/services/emr/v20190103/api.json +15311 -4361
- tccli/services/emr/v20190103/examples.json +452 -42
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +172 -45
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +490 -0
- tccli/services/hunyuan/v20230901/api.json +566 -0
- tccli/services/hunyuan/v20230901/examples.json +52 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iai/v20200303/api.json +187 -51
- tccli/services/iai/v20200303/examples.json +30 -12
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/ims/v20201229/api.json +133 -141
- tccli/services/ims/v20201229/examples.json +3 -3
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +363 -78
- tccli/services/intlpartnersmgt/v20220928/api.json +513 -22
- tccli/services/intlpartnersmgt/v20220928/examples.json +24 -0
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/iotcloud/v20210408/api.json +216 -107
- tccli/services/iotcloud/v20210408/examples.json +9 -9
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +1226 -227
- tccli/services/kms/v20190118/api.json +1465 -123
- tccli/services/kms/v20190118/examples.json +129 -3
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +730 -172
- tccli/services/lighthouse/v20200324/api.json +502 -14
- tccli/services/lighthouse/v20200324/examples.json +59 -5
- tccli/services/live/live_client.py +804 -232
- tccli/services/live/v20180801/api.json +272 -0
- tccli/services/live/v20180801/examples.json +32 -0
- tccli/services/lke/__init__.py +4 -0
- tccli/services/lke/lke_client.py +5194 -0
- tccli/services/lke/v20231130/api.json +14803 -0
- tccli/services/lke/v20231130/examples.json +736 -0
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +989 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +402 -82
- tccli/services/mdl/v20200326/api.json +1437 -100
- tccli/services/mdl/v20200326/examples.json +48 -16
- tccli/services/mdp/mdp_client.py +785 -122
- tccli/services/mdp/v20200527/api.json +1336 -49
- tccli/services/mdp/v20200527/examples.json +151 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1452 -136
- tccli/services/mongodb/v20190725/api.json +4393 -1462
- tccli/services/mongodb/v20190725/examples.json +265 -71
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +664 -15
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1878 -379
- tccli/services/mps/v20190612/api.json +7473 -1626
- tccli/services/mps/v20190612/examples.json +276 -82
- tccli/services/mqtt/__init__.py +4 -0
- tccli/services/mqtt/mqtt_client.py +1610 -0
- tccli/services/mqtt/v20240516/api.json +3057 -0
- tccli/services/mqtt/v20240516/examples.json +213 -0
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +515 -74
- tccli/services/ocr/v20181119/api.json +1991 -168
- tccli/services/ocr/v20181119/examples.json +58 -4
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +206 -60
- tccli/services/privatedns/v20201028/api.json +179 -0
- tccli/services/privatedns/v20201028/examples.json +8 -0
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +698 -212
- tccli/services/redis/v20180412/api.json +968 -563
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/__init__.py +4 -0
- tccli/services/region/region_client.py +322 -0
- tccli/services/region/v20220627/api.json +399 -0
- tccli/services/region/v20220627/examples.json +29 -0
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +368 -69
- tccli/services/ses/v20201002/api.json +240 -0
- tccli/services/ses/v20201002/examples.json +32 -0
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3855 -470
- tccli/services/sqlserver/v20180328/api.json +9757 -3347
- tccli/services/sqlserver/v20180328/examples.json +480 -20
- tccli/services/ssl/ssl_client.py +504 -72
- tccli/services/ssl/v20191205/api.json +789 -21
- tccli/services/ssl/v20191205/examples.json +54 -0
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +295 -118
- tccli/services/tcsas/v20250106/api.json +1084 -980
- tccli/services/tcsas/v20250106/examples.json +15 -15
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +4507 -966
- tccli/services/teo/v20220901/api.json +7341 -1405
- tccli/services/teo/v20220901/examples.json +679 -99
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +858 -276
- tccli/services/tke/v20180525/api.json +227 -0
- tccli/services/tke/v20180525/examples.json +24 -0
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tms/v20201229/api.json +91 -100
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +928 -192
- tccli/services/trtc/v20190722/api.json +1810 -256
- tccli/services/trtc/v20190722/examples.json +100 -6
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/v20210922/api.json +61 -30
- tccli/services/vm/v20210922/examples.json +0 -12
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +531 -54
- tccli/services/vod/v20180717/examples.json +25 -7
- tccli/services/vod/v20240718/api.json +1105 -0
- tccli/services/vod/v20240718/examples.json +97 -0
- tccli/services/vod/vod_client.py +1428 -350
- tccli/services/vpc/v20170312/api.json +1031 -133
- tccli/services/vpc/v20170312/examples.json +119 -23
- tccli/services/vpc/vpc_client.py +2159 -644
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/RECORD +292 -232
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/top_level.txt +0 -0
|
@@ -27,7 +27,10 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doCreateAcl(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -225,7 +237,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doDescribeTypeInstances(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doCreateInstancePost(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,18 +262,73 @@ def doCreateInstancePost(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
269
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.DescribeTypeInstancesRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.DescribeTypeInstances(model)
|
|
277
|
+
result = rsp.to_json_string()
|
|
278
|
+
try:
|
|
279
|
+
json_obj = json.loads(result)
|
|
280
|
+
except TypeError as e:
|
|
281
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
282
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
283
|
+
break
|
|
284
|
+
cur_time = time.time()
|
|
285
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
286
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
287
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
288
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
289
|
+
else:
|
|
290
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
291
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
292
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
293
|
+
|
|
294
|
+
|
|
295
|
+
def doDescribeDatahubTopics(args, parsed_globals):
|
|
296
|
+
g_param = parse_global_arg(parsed_globals)
|
|
297
|
+
|
|
298
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
299
|
+
cred = credential.CVMRoleCredential()
|
|
300
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
301
|
+
cred = credential.STSAssumeRoleCredential(
|
|
302
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
303
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
304
|
+
)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
309
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
310
|
+
else:
|
|
311
|
+
cred = credential.Credential(
|
|
312
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
313
|
+
)
|
|
314
|
+
http_profile = HttpProfile(
|
|
315
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
316
|
+
reqMethod="POST",
|
|
317
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
318
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
319
|
+
)
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
321
|
+
if g_param[OptionsDefine.Language]:
|
|
322
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
323
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
324
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
325
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
326
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
327
|
+
model = models.DescribeDatahubTopicsRequest()
|
|
328
|
+
model.from_json_string(json.dumps(args))
|
|
329
|
+
start_time = time.time()
|
|
330
|
+
while True:
|
|
331
|
+
rsp = client.DescribeDatahubTopics(model)
|
|
262
332
|
result = rsp.to_json_string()
|
|
263
333
|
try:
|
|
264
334
|
json_obj = json.loads(result)
|
|
@@ -287,7 +357,670 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
287
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
359
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
364
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
365
|
+
else:
|
|
366
|
+
cred = credential.Credential(
|
|
367
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
368
|
+
)
|
|
369
|
+
http_profile = HttpProfile(
|
|
370
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
371
|
+
reqMethod="POST",
|
|
372
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
373
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
374
|
+
)
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
376
|
+
if g_param[OptionsDefine.Language]:
|
|
377
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
378
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
379
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
380
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
381
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
382
|
+
model = models.DescribeAclRuleRequest()
|
|
383
|
+
model.from_json_string(json.dumps(args))
|
|
384
|
+
start_time = time.time()
|
|
385
|
+
while True:
|
|
386
|
+
rsp = client.DescribeAclRule(model)
|
|
387
|
+
result = rsp.to_json_string()
|
|
388
|
+
try:
|
|
389
|
+
json_obj = json.loads(result)
|
|
390
|
+
except TypeError as e:
|
|
391
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
392
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
393
|
+
break
|
|
394
|
+
cur_time = time.time()
|
|
395
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
396
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
397
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
398
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
399
|
+
else:
|
|
400
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
401
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
402
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
403
|
+
|
|
404
|
+
|
|
405
|
+
def doCreateTopic(args, parsed_globals):
|
|
406
|
+
g_param = parse_global_arg(parsed_globals)
|
|
407
|
+
|
|
408
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
409
|
+
cred = credential.CVMRoleCredential()
|
|
410
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
411
|
+
cred = credential.STSAssumeRoleCredential(
|
|
412
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
413
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
414
|
+
)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
419
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
420
|
+
else:
|
|
421
|
+
cred = credential.Credential(
|
|
422
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
423
|
+
)
|
|
424
|
+
http_profile = HttpProfile(
|
|
425
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
426
|
+
reqMethod="POST",
|
|
427
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
428
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
429
|
+
)
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
431
|
+
if g_param[OptionsDefine.Language]:
|
|
432
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
433
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
434
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
435
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
436
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
437
|
+
model = models.CreateTopicRequest()
|
|
438
|
+
model.from_json_string(json.dumps(args))
|
|
439
|
+
start_time = time.time()
|
|
440
|
+
while True:
|
|
441
|
+
rsp = client.CreateTopic(model)
|
|
442
|
+
result = rsp.to_json_string()
|
|
443
|
+
try:
|
|
444
|
+
json_obj = json.loads(result)
|
|
445
|
+
except TypeError as e:
|
|
446
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
447
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
448
|
+
break
|
|
449
|
+
cur_time = time.time()
|
|
450
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
451
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
452
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
453
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
454
|
+
else:
|
|
455
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
456
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
457
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
458
|
+
|
|
459
|
+
|
|
460
|
+
def doDescribeSecurityGroupRoutes(args, parsed_globals):
|
|
461
|
+
g_param = parse_global_arg(parsed_globals)
|
|
462
|
+
|
|
463
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
464
|
+
cred = credential.CVMRoleCredential()
|
|
465
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
466
|
+
cred = credential.STSAssumeRoleCredential(
|
|
467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
468
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
469
|
+
)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
474
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
475
|
+
else:
|
|
476
|
+
cred = credential.Credential(
|
|
477
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
478
|
+
)
|
|
479
|
+
http_profile = HttpProfile(
|
|
480
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
481
|
+
reqMethod="POST",
|
|
482
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
483
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
484
|
+
)
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
486
|
+
if g_param[OptionsDefine.Language]:
|
|
487
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
488
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
489
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
490
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
491
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
492
|
+
model = models.DescribeSecurityGroupRoutesRequest()
|
|
493
|
+
model.from_json_string(json.dumps(args))
|
|
494
|
+
start_time = time.time()
|
|
495
|
+
while True:
|
|
496
|
+
rsp = client.DescribeSecurityGroupRoutes(model)
|
|
497
|
+
result = rsp.to_json_string()
|
|
498
|
+
try:
|
|
499
|
+
json_obj = json.loads(result)
|
|
500
|
+
except TypeError as e:
|
|
501
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
502
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
503
|
+
break
|
|
504
|
+
cur_time = time.time()
|
|
505
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
506
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
507
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
508
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
509
|
+
else:
|
|
510
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
511
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
512
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
513
|
+
|
|
514
|
+
|
|
515
|
+
def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
516
|
+
g_param = parse_global_arg(parsed_globals)
|
|
517
|
+
|
|
518
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
519
|
+
cred = credential.CVMRoleCredential()
|
|
520
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
521
|
+
cred = credential.STSAssumeRoleCredential(
|
|
522
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
523
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
524
|
+
)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
529
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
530
|
+
else:
|
|
531
|
+
cred = credential.Credential(
|
|
532
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
533
|
+
)
|
|
534
|
+
http_profile = HttpProfile(
|
|
535
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
536
|
+
reqMethod="POST",
|
|
537
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
538
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
539
|
+
)
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
541
|
+
if g_param[OptionsDefine.Language]:
|
|
542
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
543
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
544
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
545
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
546
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
547
|
+
model = models.BatchModifyTopicAttributesRequest()
|
|
548
|
+
model.from_json_string(json.dumps(args))
|
|
549
|
+
start_time = time.time()
|
|
550
|
+
while True:
|
|
551
|
+
rsp = client.BatchModifyTopicAttributes(model)
|
|
552
|
+
result = rsp.to_json_string()
|
|
553
|
+
try:
|
|
554
|
+
json_obj = json.loads(result)
|
|
555
|
+
except TypeError as e:
|
|
556
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
557
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
558
|
+
break
|
|
559
|
+
cur_time = time.time()
|
|
560
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
561
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
562
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
563
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
564
|
+
else:
|
|
565
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
566
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
567
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
568
|
+
|
|
569
|
+
|
|
570
|
+
def doDeleteRoute(args, parsed_globals):
|
|
571
|
+
g_param = parse_global_arg(parsed_globals)
|
|
572
|
+
|
|
573
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
574
|
+
cred = credential.CVMRoleCredential()
|
|
575
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
576
|
+
cred = credential.STSAssumeRoleCredential(
|
|
577
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
578
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
579
|
+
)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
584
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
585
|
+
else:
|
|
586
|
+
cred = credential.Credential(
|
|
587
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
588
|
+
)
|
|
589
|
+
http_profile = HttpProfile(
|
|
590
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
591
|
+
reqMethod="POST",
|
|
592
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
593
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
594
|
+
)
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
596
|
+
if g_param[OptionsDefine.Language]:
|
|
597
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
598
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
599
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
600
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
601
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
602
|
+
model = models.DeleteRouteRequest()
|
|
603
|
+
model.from_json_string(json.dumps(args))
|
|
604
|
+
start_time = time.time()
|
|
605
|
+
while True:
|
|
606
|
+
rsp = client.DeleteRoute(model)
|
|
607
|
+
result = rsp.to_json_string()
|
|
608
|
+
try:
|
|
609
|
+
json_obj = json.loads(result)
|
|
610
|
+
except TypeError as e:
|
|
611
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
612
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
613
|
+
break
|
|
614
|
+
cur_time = time.time()
|
|
615
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
616
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
617
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
618
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
619
|
+
else:
|
|
620
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
621
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
622
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
623
|
+
|
|
624
|
+
|
|
625
|
+
def doSendMessage(args, parsed_globals):
|
|
626
|
+
g_param = parse_global_arg(parsed_globals)
|
|
627
|
+
|
|
628
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
629
|
+
cred = credential.CVMRoleCredential()
|
|
630
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
631
|
+
cred = credential.STSAssumeRoleCredential(
|
|
632
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
633
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
634
|
+
)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
639
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
640
|
+
else:
|
|
641
|
+
cred = credential.Credential(
|
|
642
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
643
|
+
)
|
|
644
|
+
http_profile = HttpProfile(
|
|
645
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
646
|
+
reqMethod="POST",
|
|
647
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
648
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
649
|
+
)
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
651
|
+
if g_param[OptionsDefine.Language]:
|
|
652
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
653
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
654
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
655
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
656
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
657
|
+
model = models.SendMessageRequest()
|
|
658
|
+
model.from_json_string(json.dumps(args))
|
|
659
|
+
start_time = time.time()
|
|
660
|
+
while True:
|
|
661
|
+
rsp = client.SendMessage(model)
|
|
662
|
+
result = rsp.to_json_string()
|
|
663
|
+
try:
|
|
664
|
+
json_obj = json.loads(result)
|
|
665
|
+
except TypeError as e:
|
|
666
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
667
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
668
|
+
break
|
|
669
|
+
cur_time = time.time()
|
|
670
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
671
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
672
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
673
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
674
|
+
else:
|
|
675
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
676
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
677
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
678
|
+
|
|
679
|
+
|
|
680
|
+
def doDescribeUser(args, parsed_globals):
|
|
681
|
+
g_param = parse_global_arg(parsed_globals)
|
|
682
|
+
|
|
683
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
684
|
+
cred = credential.CVMRoleCredential()
|
|
685
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
686
|
+
cred = credential.STSAssumeRoleCredential(
|
|
687
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
688
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
689
|
+
)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
694
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
695
|
+
else:
|
|
696
|
+
cred = credential.Credential(
|
|
697
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
698
|
+
)
|
|
699
|
+
http_profile = HttpProfile(
|
|
700
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
701
|
+
reqMethod="POST",
|
|
702
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
703
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
704
|
+
)
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
706
|
+
if g_param[OptionsDefine.Language]:
|
|
707
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
708
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
709
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
710
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
711
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
712
|
+
model = models.DescribeUserRequest()
|
|
713
|
+
model.from_json_string(json.dumps(args))
|
|
714
|
+
start_time = time.time()
|
|
715
|
+
while True:
|
|
716
|
+
rsp = client.DescribeUser(model)
|
|
717
|
+
result = rsp.to_json_string()
|
|
718
|
+
try:
|
|
719
|
+
json_obj = json.loads(result)
|
|
720
|
+
except TypeError as e:
|
|
721
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
722
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
723
|
+
break
|
|
724
|
+
cur_time = time.time()
|
|
725
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
726
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
727
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
728
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
729
|
+
else:
|
|
730
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
731
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
732
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
733
|
+
|
|
734
|
+
|
|
735
|
+
def doDescribeGroup(args, parsed_globals):
|
|
736
|
+
g_param = parse_global_arg(parsed_globals)
|
|
737
|
+
|
|
738
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
739
|
+
cred = credential.CVMRoleCredential()
|
|
740
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
741
|
+
cred = credential.STSAssumeRoleCredential(
|
|
742
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
743
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
744
|
+
)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
749
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
750
|
+
else:
|
|
751
|
+
cred = credential.Credential(
|
|
752
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
753
|
+
)
|
|
754
|
+
http_profile = HttpProfile(
|
|
755
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
756
|
+
reqMethod="POST",
|
|
757
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
758
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
759
|
+
)
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
761
|
+
if g_param[OptionsDefine.Language]:
|
|
762
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
763
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
764
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
765
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
766
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
767
|
+
model = models.DescribeGroupRequest()
|
|
768
|
+
model.from_json_string(json.dumps(args))
|
|
769
|
+
start_time = time.time()
|
|
770
|
+
while True:
|
|
771
|
+
rsp = client.DescribeGroup(model)
|
|
772
|
+
result = rsp.to_json_string()
|
|
773
|
+
try:
|
|
774
|
+
json_obj = json.loads(result)
|
|
775
|
+
except TypeError as e:
|
|
776
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
777
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
778
|
+
break
|
|
779
|
+
cur_time = time.time()
|
|
780
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
781
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
782
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
783
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
784
|
+
else:
|
|
785
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
786
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
787
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
788
|
+
|
|
789
|
+
|
|
790
|
+
def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
791
|
+
g_param = parse_global_arg(parsed_globals)
|
|
792
|
+
|
|
793
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
794
|
+
cred = credential.CVMRoleCredential()
|
|
795
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
796
|
+
cred = credential.STSAssumeRoleCredential(
|
|
797
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
798
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
799
|
+
)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
804
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
805
|
+
else:
|
|
806
|
+
cred = credential.Credential(
|
|
807
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
808
|
+
)
|
|
809
|
+
http_profile = HttpProfile(
|
|
810
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
811
|
+
reqMethod="POST",
|
|
812
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
813
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
814
|
+
)
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
816
|
+
if g_param[OptionsDefine.Language]:
|
|
817
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
818
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
819
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
820
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
821
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
822
|
+
model = models.CreateTopicIpWhiteListRequest()
|
|
823
|
+
model.from_json_string(json.dumps(args))
|
|
824
|
+
start_time = time.time()
|
|
825
|
+
while True:
|
|
826
|
+
rsp = client.CreateTopicIpWhiteList(model)
|
|
827
|
+
result = rsp.to_json_string()
|
|
828
|
+
try:
|
|
829
|
+
json_obj = json.loads(result)
|
|
830
|
+
except TypeError as e:
|
|
831
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
832
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
833
|
+
break
|
|
834
|
+
cur_time = time.time()
|
|
835
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
836
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
837
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
838
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
839
|
+
else:
|
|
840
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
841
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
842
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
843
|
+
|
|
844
|
+
|
|
845
|
+
def doDescribeCkafkaVersion(args, parsed_globals):
|
|
846
|
+
g_param = parse_global_arg(parsed_globals)
|
|
847
|
+
|
|
848
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
849
|
+
cred = credential.CVMRoleCredential()
|
|
850
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
851
|
+
cred = credential.STSAssumeRoleCredential(
|
|
852
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
853
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
854
|
+
)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
859
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
860
|
+
else:
|
|
861
|
+
cred = credential.Credential(
|
|
862
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
863
|
+
)
|
|
864
|
+
http_profile = HttpProfile(
|
|
865
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
866
|
+
reqMethod="POST",
|
|
867
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
868
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
869
|
+
)
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
871
|
+
if g_param[OptionsDefine.Language]:
|
|
872
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
873
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
874
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
875
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
876
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
877
|
+
model = models.DescribeCkafkaVersionRequest()
|
|
878
|
+
model.from_json_string(json.dumps(args))
|
|
879
|
+
start_time = time.time()
|
|
880
|
+
while True:
|
|
881
|
+
rsp = client.DescribeCkafkaVersion(model)
|
|
882
|
+
result = rsp.to_json_string()
|
|
883
|
+
try:
|
|
884
|
+
json_obj = json.loads(result)
|
|
885
|
+
except TypeError as e:
|
|
886
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
887
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
888
|
+
break
|
|
889
|
+
cur_time = time.time()
|
|
890
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
891
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
892
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
893
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
894
|
+
else:
|
|
895
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
896
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
897
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
898
|
+
|
|
899
|
+
|
|
900
|
+
def doModifyGroupOffsets(args, parsed_globals):
|
|
901
|
+
g_param = parse_global_arg(parsed_globals)
|
|
902
|
+
|
|
903
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
904
|
+
cred = credential.CVMRoleCredential()
|
|
905
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
906
|
+
cred = credential.STSAssumeRoleCredential(
|
|
907
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
908
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
909
|
+
)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
914
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
915
|
+
else:
|
|
916
|
+
cred = credential.Credential(
|
|
917
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
918
|
+
)
|
|
919
|
+
http_profile = HttpProfile(
|
|
920
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
921
|
+
reqMethod="POST",
|
|
922
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
923
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
924
|
+
)
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
926
|
+
if g_param[OptionsDefine.Language]:
|
|
927
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
928
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
929
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
930
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
931
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
932
|
+
model = models.ModifyGroupOffsetsRequest()
|
|
933
|
+
model.from_json_string(json.dumps(args))
|
|
934
|
+
start_time = time.time()
|
|
935
|
+
while True:
|
|
936
|
+
rsp = client.ModifyGroupOffsets(model)
|
|
937
|
+
result = rsp.to_json_string()
|
|
938
|
+
try:
|
|
939
|
+
json_obj = json.loads(result)
|
|
940
|
+
except TypeError as e:
|
|
941
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
942
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
943
|
+
break
|
|
944
|
+
cur_time = time.time()
|
|
945
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
946
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
947
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
948
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
949
|
+
else:
|
|
950
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
951
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
952
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
953
|
+
|
|
954
|
+
|
|
955
|
+
def doUpgradeBrokerVersion(args, parsed_globals):
|
|
956
|
+
g_param = parse_global_arg(parsed_globals)
|
|
957
|
+
|
|
958
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
959
|
+
cred = credential.CVMRoleCredential()
|
|
960
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
961
|
+
cred = credential.STSAssumeRoleCredential(
|
|
962
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
963
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
964
|
+
)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
|
+
else:
|
|
971
|
+
cred = credential.Credential(
|
|
972
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
973
|
+
)
|
|
974
|
+
http_profile = HttpProfile(
|
|
975
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
976
|
+
reqMethod="POST",
|
|
977
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
|
+
)
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
|
+
if g_param[OptionsDefine.Language]:
|
|
982
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
983
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
984
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
985
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
986
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
987
|
+
model = models.UpgradeBrokerVersionRequest()
|
|
988
|
+
model.from_json_string(json.dumps(args))
|
|
989
|
+
start_time = time.time()
|
|
990
|
+
while True:
|
|
991
|
+
rsp = client.UpgradeBrokerVersion(model)
|
|
992
|
+
result = rsp.to_json_string()
|
|
993
|
+
try:
|
|
994
|
+
json_obj = json.loads(result)
|
|
995
|
+
except TypeError as e:
|
|
996
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
997
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
998
|
+
break
|
|
999
|
+
cur_time = time.time()
|
|
1000
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1001
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1002
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1003
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1004
|
+
else:
|
|
1005
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1006
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1007
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1008
|
+
|
|
1009
|
+
|
|
1010
|
+
def doDescribeInstances(args, parsed_globals):
|
|
1011
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1012
|
+
|
|
1013
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1014
|
+
cred = credential.CVMRoleCredential()
|
|
1015
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1016
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1017
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
|
+
)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
1025
|
else:
|
|
293
1026
|
cred = credential.Credential(
|
|
@@ -299,18 +1032,18 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
299
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
1034
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
1036
|
if g_param[OptionsDefine.Language]:
|
|
304
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
306
1039
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
1042
|
+
model = models.DescribeInstancesRequest()
|
|
310
1043
|
model.from_json_string(json.dumps(args))
|
|
311
1044
|
start_time = time.time()
|
|
312
1045
|
while True:
|
|
313
|
-
rsp = client.
|
|
1046
|
+
rsp = client.DescribeInstances(model)
|
|
314
1047
|
result = rsp.to_json_string()
|
|
315
1048
|
try:
|
|
316
1049
|
json_obj = json.loads(result)
|
|
@@ -329,7 +1062,7 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
329
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
1063
|
|
|
331
1064
|
|
|
332
|
-
def
|
|
1065
|
+
def doDescribeCvmInfo(args, parsed_globals):
|
|
333
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
334
1067
|
|
|
335
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -339,7 +1072,10 @@ def doCreateTopic(args, parsed_globals):
|
|
|
339
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
1074
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
1080
|
else:
|
|
345
1081
|
cred = credential.Credential(
|
|
@@ -351,18 +1087,18 @@ def doCreateTopic(args, parsed_globals):
|
|
|
351
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
1089
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
1091
|
if g_param[OptionsDefine.Language]:
|
|
356
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
1094
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.
|
|
1097
|
+
model = models.DescribeCvmInfoRequest()
|
|
362
1098
|
model.from_json_string(json.dumps(args))
|
|
363
1099
|
start_time = time.time()
|
|
364
1100
|
while True:
|
|
365
|
-
rsp = client.
|
|
1101
|
+
rsp = client.DescribeCvmInfo(model)
|
|
366
1102
|
result = rsp.to_json_string()
|
|
367
1103
|
try:
|
|
368
1104
|
json_obj = json.loads(result)
|
|
@@ -381,7 +1117,7 @@ def doCreateTopic(args, parsed_globals):
|
|
|
381
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
1118
|
|
|
383
1119
|
|
|
384
|
-
def
|
|
1120
|
+
def doDescribeDatahubTopic(args, parsed_globals):
|
|
385
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
386
1122
|
|
|
387
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -391,7 +1127,10 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
391
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
1129
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
1135
|
else:
|
|
397
1136
|
cred = credential.Credential(
|
|
@@ -403,18 +1142,18 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
403
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
1144
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
1146
|
if g_param[OptionsDefine.Language]:
|
|
408
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
410
1149
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
1152
|
+
model = models.DescribeDatahubTopicRequest()
|
|
414
1153
|
model.from_json_string(json.dumps(args))
|
|
415
1154
|
start_time = time.time()
|
|
416
1155
|
while True:
|
|
417
|
-
rsp = client.
|
|
1156
|
+
rsp = client.DescribeDatahubTopic(model)
|
|
418
1157
|
result = rsp.to_json_string()
|
|
419
1158
|
try:
|
|
420
1159
|
json_obj = json.loads(result)
|
|
@@ -433,7 +1172,7 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
433
1172
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
1173
|
|
|
435
1174
|
|
|
436
|
-
def
|
|
1175
|
+
def doCreateRoute(args, parsed_globals):
|
|
437
1176
|
g_param = parse_global_arg(parsed_globals)
|
|
438
1177
|
|
|
439
1178
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -443,7 +1182,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
443
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
1184
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
1190
|
else:
|
|
449
1191
|
cred = credential.Credential(
|
|
@@ -455,18 +1197,18 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
455
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
1199
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
1201
|
if g_param[OptionsDefine.Language]:
|
|
460
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
462
1204
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
1205
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
1206
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
-
model = models.
|
|
1207
|
+
model = models.CreateRouteRequest()
|
|
466
1208
|
model.from_json_string(json.dumps(args))
|
|
467
1209
|
start_time = time.time()
|
|
468
1210
|
while True:
|
|
469
|
-
rsp = client.
|
|
1211
|
+
rsp = client.CreateRoute(model)
|
|
470
1212
|
result = rsp.to_json_string()
|
|
471
1213
|
try:
|
|
472
1214
|
json_obj = json.loads(result)
|
|
@@ -485,7 +1227,7 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
485
1227
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
1228
|
|
|
487
1229
|
|
|
488
|
-
def
|
|
1230
|
+
def doDeleteGroupSubscribeTopic(args, parsed_globals):
|
|
489
1231
|
g_param = parse_global_arg(parsed_globals)
|
|
490
1232
|
|
|
491
1233
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +1237,10 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
495
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
1239
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
1245
|
else:
|
|
501
1246
|
cred = credential.Credential(
|
|
@@ -507,18 +1252,18 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
507
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
1254
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
1256
|
if g_param[OptionsDefine.Language]:
|
|
512
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
1259
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
1260
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
1261
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
1262
|
+
model = models.DeleteGroupSubscribeTopicRequest()
|
|
518
1263
|
model.from_json_string(json.dumps(args))
|
|
519
1264
|
start_time = time.time()
|
|
520
1265
|
while True:
|
|
521
|
-
rsp = client.
|
|
1266
|
+
rsp = client.DeleteGroupSubscribeTopic(model)
|
|
522
1267
|
result = rsp.to_json_string()
|
|
523
1268
|
try:
|
|
524
1269
|
json_obj = json.loads(result)
|
|
@@ -537,7 +1282,7 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
537
1282
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
1283
|
|
|
539
1284
|
|
|
540
|
-
def
|
|
1285
|
+
def doDeleteGroup(args, parsed_globals):
|
|
541
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
542
1287
|
|
|
543
1288
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +1292,10 @@ def doSendMessage(args, parsed_globals):
|
|
|
547
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
1294
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
1300
|
else:
|
|
553
1301
|
cred = credential.Credential(
|
|
@@ -559,18 +1307,18 @@ def doSendMessage(args, parsed_globals):
|
|
|
559
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
1309
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
1311
|
if g_param[OptionsDefine.Language]:
|
|
564
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
1314
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
1315
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
1316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
1317
|
+
model = models.DeleteGroupRequest()
|
|
570
1318
|
model.from_json_string(json.dumps(args))
|
|
571
1319
|
start_time = time.time()
|
|
572
1320
|
while True:
|
|
573
|
-
rsp = client.
|
|
1321
|
+
rsp = client.DeleteGroup(model)
|
|
574
1322
|
result = rsp.to_json_string()
|
|
575
1323
|
try:
|
|
576
1324
|
json_obj = json.loads(result)
|
|
@@ -589,7 +1337,7 @@ def doSendMessage(args, parsed_globals):
|
|
|
589
1337
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
1338
|
|
|
591
1339
|
|
|
592
|
-
def
|
|
1340
|
+
def doModifyDatahubTopic(args, parsed_globals):
|
|
593
1341
|
g_param = parse_global_arg(parsed_globals)
|
|
594
1342
|
|
|
595
1343
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +1347,10 @@ def doDescribeUser(args, parsed_globals):
|
|
|
599
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
1349
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
1355
|
else:
|
|
605
1356
|
cred = credential.Credential(
|
|
@@ -611,18 +1362,18 @@ def doDescribeUser(args, parsed_globals):
|
|
|
611
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
1364
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
1366
|
if g_param[OptionsDefine.Language]:
|
|
616
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
1369
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
1370
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
1371
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
1372
|
+
model = models.ModifyDatahubTopicRequest()
|
|
622
1373
|
model.from_json_string(json.dumps(args))
|
|
623
1374
|
start_time = time.time()
|
|
624
1375
|
while True:
|
|
625
|
-
rsp = client.
|
|
1376
|
+
rsp = client.ModifyDatahubTopic(model)
|
|
626
1377
|
result = rsp.to_json_string()
|
|
627
1378
|
try:
|
|
628
1379
|
json_obj = json.loads(result)
|
|
@@ -641,7 +1392,7 @@ def doDescribeUser(args, parsed_globals):
|
|
|
641
1392
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
1393
|
|
|
643
1394
|
|
|
644
|
-
def
|
|
1395
|
+
def doFetchMessageListByOffset(args, parsed_globals):
|
|
645
1396
|
g_param = parse_global_arg(parsed_globals)
|
|
646
1397
|
|
|
647
1398
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -651,7 +1402,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
651
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
1404
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
1410
|
else:
|
|
657
1411
|
cred = credential.Credential(
|
|
@@ -663,18 +1417,18 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
663
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
1419
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
1421
|
if g_param[OptionsDefine.Language]:
|
|
668
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
670
1424
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
1425
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
1426
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
1427
|
+
model = models.FetchMessageListByOffsetRequest()
|
|
674
1428
|
model.from_json_string(json.dumps(args))
|
|
675
1429
|
start_time = time.time()
|
|
676
1430
|
while True:
|
|
677
|
-
rsp = client.
|
|
1431
|
+
rsp = client.FetchMessageListByOffset(model)
|
|
678
1432
|
result = rsp.to_json_string()
|
|
679
1433
|
try:
|
|
680
1434
|
json_obj = json.loads(result)
|
|
@@ -693,7 +1447,7 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
693
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
1448
|
|
|
695
1449
|
|
|
696
|
-
def
|
|
1450
|
+
def doCreateDatahubTopic(args, parsed_globals):
|
|
697
1451
|
g_param = parse_global_arg(parsed_globals)
|
|
698
1452
|
|
|
699
1453
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +1457,10 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
703
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
1459
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
1465
|
else:
|
|
709
1466
|
cred = credential.Credential(
|
|
@@ -715,18 +1472,18 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
715
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
1474
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
1476
|
if g_param[OptionsDefine.Language]:
|
|
720
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
1479
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
1480
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
1481
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
1482
|
+
model = models.CreateDatahubTopicRequest()
|
|
726
1483
|
model.from_json_string(json.dumps(args))
|
|
727
1484
|
start_time = time.time()
|
|
728
1485
|
while True:
|
|
729
|
-
rsp = client.
|
|
1486
|
+
rsp = client.CreateDatahubTopic(model)
|
|
730
1487
|
result = rsp.to_json_string()
|
|
731
1488
|
try:
|
|
732
1489
|
json_obj = json.loads(result)
|
|
@@ -745,7 +1502,7 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
745
1502
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
1503
|
|
|
747
1504
|
|
|
748
|
-
def
|
|
1505
|
+
def doDeleteInstancePost(args, parsed_globals):
|
|
749
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
750
1507
|
|
|
751
1508
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +1512,10 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
755
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
1514
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
1520
|
else:
|
|
761
1521
|
cred = credential.Credential(
|
|
@@ -767,18 +1527,18 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
767
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
1529
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
1531
|
if g_param[OptionsDefine.Language]:
|
|
772
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
1534
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
1535
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
1536
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
1537
|
+
model = models.DeleteInstancePostRequest()
|
|
778
1538
|
model.from_json_string(json.dumps(args))
|
|
779
1539
|
start_time = time.time()
|
|
780
1540
|
while True:
|
|
781
|
-
rsp = client.
|
|
1541
|
+
rsp = client.DeleteInstancePost(model)
|
|
782
1542
|
result = rsp.to_json_string()
|
|
783
1543
|
try:
|
|
784
1544
|
json_obj = json.loads(result)
|
|
@@ -797,7 +1557,7 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
797
1557
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
1558
|
|
|
799
1559
|
|
|
800
|
-
def
|
|
1560
|
+
def doDescribeACL(args, parsed_globals):
|
|
801
1561
|
g_param = parse_global_arg(parsed_globals)
|
|
802
1562
|
|
|
803
1563
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +1567,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
807
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
1569
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
1575
|
else:
|
|
813
1576
|
cred = credential.Credential(
|
|
@@ -819,18 +1582,18 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
819
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
1584
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
1586
|
if g_param[OptionsDefine.Language]:
|
|
824
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
1589
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
1590
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
1591
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
1592
|
+
model = models.DescribeACLRequest()
|
|
830
1593
|
model.from_json_string(json.dumps(args))
|
|
831
1594
|
start_time = time.time()
|
|
832
1595
|
while True:
|
|
833
|
-
rsp = client.
|
|
1596
|
+
rsp = client.DescribeACL(model)
|
|
834
1597
|
result = rsp.to_json_string()
|
|
835
1598
|
try:
|
|
836
1599
|
json_obj = json.loads(result)
|
|
@@ -849,7 +1612,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
849
1612
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
1613
|
|
|
851
1614
|
|
|
852
|
-
def
|
|
1615
|
+
def doDescribeTopicDetail(args, parsed_globals):
|
|
853
1616
|
g_param = parse_global_arg(parsed_globals)
|
|
854
1617
|
|
|
855
1618
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +1622,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
859
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1624
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1630
|
else:
|
|
865
1631
|
cred = credential.Credential(
|
|
@@ -871,18 +1637,18 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
871
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
1639
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
1641
|
if g_param[OptionsDefine.Language]:
|
|
876
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
1644
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
1645
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
1646
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
1647
|
+
model = models.DescribeTopicDetailRequest()
|
|
882
1648
|
model.from_json_string(json.dumps(args))
|
|
883
1649
|
start_time = time.time()
|
|
884
1650
|
while True:
|
|
885
|
-
rsp = client.
|
|
1651
|
+
rsp = client.DescribeTopicDetail(model)
|
|
886
1652
|
result = rsp.to_json_string()
|
|
887
1653
|
try:
|
|
888
1654
|
json_obj = json.loads(result)
|
|
@@ -901,7 +1667,7 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
901
1667
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
1668
|
|
|
903
1669
|
|
|
904
|
-
def
|
|
1670
|
+
def doCreateInstancePre(args, parsed_globals):
|
|
905
1671
|
g_param = parse_global_arg(parsed_globals)
|
|
906
1672
|
|
|
907
1673
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +1677,10 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
911
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1679
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1685
|
else:
|
|
917
1686
|
cred = credential.Credential(
|
|
@@ -923,18 +1692,18 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
923
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1694
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1696
|
if g_param[OptionsDefine.Language]:
|
|
928
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
1699
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
1700
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
1701
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
1702
|
+
model = models.CreateInstancePreRequest()
|
|
934
1703
|
model.from_json_string(json.dumps(args))
|
|
935
1704
|
start_time = time.time()
|
|
936
1705
|
while True:
|
|
937
|
-
rsp = client.
|
|
1706
|
+
rsp = client.CreateInstancePre(model)
|
|
938
1707
|
result = rsp.to_json_string()
|
|
939
1708
|
try:
|
|
940
1709
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1722,7 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
953
1722
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1723
|
|
|
955
1724
|
|
|
956
|
-
def
|
|
1725
|
+
def doFetchMessageByOffset(args, parsed_globals):
|
|
957
1726
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1727
|
|
|
959
1728
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1732,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
963
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1734
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1740
|
else:
|
|
969
1741
|
cred = credential.Credential(
|
|
@@ -975,18 +1747,18 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
975
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1749
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1751
|
if g_param[OptionsDefine.Language]:
|
|
980
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1754
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1755
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1756
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1757
|
+
model = models.FetchMessageByOffsetRequest()
|
|
986
1758
|
model.from_json_string(json.dumps(args))
|
|
987
1759
|
start_time = time.time()
|
|
988
1760
|
while True:
|
|
989
|
-
rsp = client.
|
|
1761
|
+
rsp = client.FetchMessageByOffset(model)
|
|
990
1762
|
result = rsp.to_json_string()
|
|
991
1763
|
try:
|
|
992
1764
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1777,7 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
1005
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1778
|
|
|
1007
1779
|
|
|
1008
|
-
def
|
|
1780
|
+
def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
1009
1781
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1782
|
|
|
1011
1783
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1787,10 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1015
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1789
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1795
|
else:
|
|
1021
1796
|
cred = credential.Credential(
|
|
@@ -1027,18 +1802,18 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1027
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1804
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1806
|
if g_param[OptionsDefine.Language]:
|
|
1032
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1809
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1810
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1811
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1812
|
+
model = models.DeleteTopicIpWhiteListRequest()
|
|
1038
1813
|
model.from_json_string(json.dumps(args))
|
|
1039
1814
|
start_time = time.time()
|
|
1040
1815
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1816
|
+
rsp = client.DeleteTopicIpWhiteList(model)
|
|
1042
1817
|
result = rsp.to_json_string()
|
|
1043
1818
|
try:
|
|
1044
1819
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1832,7 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1057
1832
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1833
|
|
|
1059
1834
|
|
|
1060
|
-
def
|
|
1835
|
+
def doModifyPassword(args, parsed_globals):
|
|
1061
1836
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1837
|
|
|
1063
1838
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1842,10 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1067
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1844
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1850
|
else:
|
|
1073
1851
|
cred = credential.Credential(
|
|
@@ -1079,18 +1857,18 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1079
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1859
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1861
|
if g_param[OptionsDefine.Language]:
|
|
1084
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1864
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1865
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1866
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1867
|
+
model = models.ModifyPasswordRequest()
|
|
1090
1868
|
model.from_json_string(json.dumps(args))
|
|
1091
1869
|
start_time = time.time()
|
|
1092
1870
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1871
|
+
rsp = client.ModifyPassword(model)
|
|
1094
1872
|
result = rsp.to_json_string()
|
|
1095
1873
|
try:
|
|
1096
1874
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1887,7 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1109
1887
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1888
|
|
|
1111
1889
|
|
|
1112
|
-
def
|
|
1890
|
+
def doDescribeConsumerGroup(args, parsed_globals):
|
|
1113
1891
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1892
|
|
|
1115
1893
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1119,7 +1897,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1119
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1899
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1905
|
else:
|
|
1125
1906
|
cred = credential.Credential(
|
|
@@ -1131,18 +1912,18 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1131
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1914
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1916
|
if g_param[OptionsDefine.Language]:
|
|
1136
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1138
1919
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1920
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1921
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1922
|
+
model = models.DescribeConsumerGroupRequest()
|
|
1142
1923
|
model.from_json_string(json.dumps(args))
|
|
1143
1924
|
start_time = time.time()
|
|
1144
1925
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1926
|
+
rsp = client.DescribeConsumerGroup(model)
|
|
1146
1927
|
result = rsp.to_json_string()
|
|
1147
1928
|
try:
|
|
1148
1929
|
json_obj = json.loads(result)
|
|
@@ -1161,7 +1942,7 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1161
1942
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1162
1943
|
|
|
1163
1944
|
|
|
1164
|
-
def
|
|
1945
|
+
def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
1165
1946
|
g_param = parse_global_arg(parsed_globals)
|
|
1166
1947
|
|
|
1167
1948
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1171,7 +1952,10 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1171
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1954
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1960
|
else:
|
|
1177
1961
|
cred = credential.Credential(
|
|
@@ -1183,18 +1967,18 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1183
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1969
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1971
|
if g_param[OptionsDefine.Language]:
|
|
1188
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1190
1974
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1191
1975
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1192
1976
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1193
|
-
model = models.
|
|
1977
|
+
model = models.DescribeTopicSubscribeGroupRequest()
|
|
1194
1978
|
model.from_json_string(json.dumps(args))
|
|
1195
1979
|
start_time = time.time()
|
|
1196
1980
|
while True:
|
|
1197
|
-
rsp = client.
|
|
1981
|
+
rsp = client.DescribeTopicSubscribeGroup(model)
|
|
1198
1982
|
result = rsp.to_json_string()
|
|
1199
1983
|
try:
|
|
1200
1984
|
json_obj = json.loads(result)
|
|
@@ -1213,7 +1997,7 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1213
1997
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1214
1998
|
|
|
1215
1999
|
|
|
1216
|
-
def
|
|
2000
|
+
def doModifyRoutineMaintenanceTask(args, parsed_globals):
|
|
1217
2001
|
g_param = parse_global_arg(parsed_globals)
|
|
1218
2002
|
|
|
1219
2003
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1223,7 +2007,10 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1223
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
2009
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
2015
|
else:
|
|
1229
2016
|
cred = credential.Credential(
|
|
@@ -1235,18 +2022,18 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1235
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
2024
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
2026
|
if g_param[OptionsDefine.Language]:
|
|
1240
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1242
2029
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1243
2030
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1244
2031
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1245
|
-
model = models.
|
|
2032
|
+
model = models.ModifyRoutineMaintenanceTaskRequest()
|
|
1246
2033
|
model.from_json_string(json.dumps(args))
|
|
1247
2034
|
start_time = time.time()
|
|
1248
2035
|
while True:
|
|
1249
|
-
rsp = client.
|
|
2036
|
+
rsp = client.ModifyRoutineMaintenanceTask(model)
|
|
1250
2037
|
result = rsp.to_json_string()
|
|
1251
2038
|
try:
|
|
1252
2039
|
json_obj = json.loads(result)
|
|
@@ -1265,7 +2052,7 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1265
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
2053
|
|
|
1267
2054
|
|
|
1268
|
-
def
|
|
2055
|
+
def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
1269
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
2057
|
|
|
1271
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1275,7 +2062,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1275
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
2064
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
2070
|
else:
|
|
1281
2071
|
cred = credential.Credential(
|
|
@@ -1287,18 +2077,18 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1287
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
2079
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
2081
|
if g_param[OptionsDefine.Language]:
|
|
1292
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1294
2084
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1295
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1296
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1297
|
-
model = models.
|
|
2087
|
+
model = models.DeleteRouteTriggerTimeRequest()
|
|
1298
2088
|
model.from_json_string(json.dumps(args))
|
|
1299
2089
|
start_time = time.time()
|
|
1300
2090
|
while True:
|
|
1301
|
-
rsp = client.
|
|
2091
|
+
rsp = client.DeleteRouteTriggerTime(model)
|
|
1302
2092
|
result = rsp.to_json_string()
|
|
1303
2093
|
try:
|
|
1304
2094
|
json_obj = json.loads(result)
|
|
@@ -1317,7 +2107,7 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1317
2107
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
2108
|
|
|
1319
2109
|
|
|
1320
|
-
def
|
|
2110
|
+
def doCreatePartition(args, parsed_globals):
|
|
1321
2111
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
2112
|
|
|
1323
2113
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1327,7 +2117,10 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1327
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
2119
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
2125
|
else:
|
|
1333
2126
|
cred = credential.Credential(
|
|
@@ -1339,18 +2132,18 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1339
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
2134
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
2136
|
if g_param[OptionsDefine.Language]:
|
|
1344
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1346
2139
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1347
2140
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1348
2141
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1349
|
-
model = models.
|
|
2142
|
+
model = models.CreatePartitionRequest()
|
|
1350
2143
|
model.from_json_string(json.dumps(args))
|
|
1351
2144
|
start_time = time.time()
|
|
1352
2145
|
while True:
|
|
1353
|
-
rsp = client.
|
|
2146
|
+
rsp = client.CreatePartition(model)
|
|
1354
2147
|
result = rsp.to_json_string()
|
|
1355
2148
|
try:
|
|
1356
2149
|
json_obj = json.loads(result)
|
|
@@ -1369,7 +2162,7 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1369
2162
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1370
2163
|
|
|
1371
2164
|
|
|
1372
|
-
def
|
|
2165
|
+
def doCreateUser(args, parsed_globals):
|
|
1373
2166
|
g_param = parse_global_arg(parsed_globals)
|
|
1374
2167
|
|
|
1375
2168
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1379,7 +2172,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1379
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
2174
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
2180
|
else:
|
|
1385
2181
|
cred = credential.Credential(
|
|
@@ -1391,18 +2187,18 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1391
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
2189
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
2191
|
if g_param[OptionsDefine.Language]:
|
|
1396
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1398
2194
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1399
2195
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1400
2196
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1401
|
-
model = models.
|
|
2197
|
+
model = models.CreateUserRequest()
|
|
1402
2198
|
model.from_json_string(json.dumps(args))
|
|
1403
2199
|
start_time = time.time()
|
|
1404
2200
|
while True:
|
|
1405
|
-
rsp = client.
|
|
2201
|
+
rsp = client.CreateUser(model)
|
|
1406
2202
|
result = rsp.to_json_string()
|
|
1407
2203
|
try:
|
|
1408
2204
|
json_obj = json.loads(result)
|
|
@@ -1421,7 +2217,7 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1421
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1422
2218
|
|
|
1423
2219
|
|
|
1424
|
-
def
|
|
2220
|
+
def doDescribeTaskStatus(args, parsed_globals):
|
|
1425
2221
|
g_param = parse_global_arg(parsed_globals)
|
|
1426
2222
|
|
|
1427
2223
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1431,7 +2227,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1431
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
2229
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
2235
|
else:
|
|
1437
2236
|
cred = credential.Credential(
|
|
@@ -1443,18 +2242,18 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1443
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
2244
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
2246
|
if g_param[OptionsDefine.Language]:
|
|
1448
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1450
2249
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1451
2250
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1452
2251
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1453
|
-
model = models.
|
|
2252
|
+
model = models.DescribeTaskStatusRequest()
|
|
1454
2253
|
model.from_json_string(json.dumps(args))
|
|
1455
2254
|
start_time = time.time()
|
|
1456
2255
|
while True:
|
|
1457
|
-
rsp = client.
|
|
2256
|
+
rsp = client.DescribeTaskStatus(model)
|
|
1458
2257
|
result = rsp.to_json_string()
|
|
1459
2258
|
try:
|
|
1460
2259
|
json_obj = json.loads(result)
|
|
@@ -1473,7 +2272,7 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1473
2272
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1474
2273
|
|
|
1475
2274
|
|
|
1476
|
-
def
|
|
2275
|
+
def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
1477
2276
|
g_param = parse_global_arg(parsed_globals)
|
|
1478
2277
|
|
|
1479
2278
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1483,7 +2282,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1483
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
2284
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
2290
|
else:
|
|
1489
2291
|
cred = credential.Credential(
|
|
@@ -1495,18 +2297,18 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1495
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
2299
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
2301
|
if g_param[OptionsDefine.Language]:
|
|
1500
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1502
2304
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1503
2305
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1504
2306
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1505
|
-
model = models.
|
|
2307
|
+
model = models.BatchModifyGroupOffsetsRequest()
|
|
1506
2308
|
model.from_json_string(json.dumps(args))
|
|
1507
2309
|
start_time = time.time()
|
|
1508
2310
|
while True:
|
|
1509
|
-
rsp = client.
|
|
2311
|
+
rsp = client.BatchModifyGroupOffsets(model)
|
|
1510
2312
|
result = rsp.to_json_string()
|
|
1511
2313
|
try:
|
|
1512
2314
|
json_obj = json.loads(result)
|
|
@@ -1525,7 +2327,7 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1525
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
2328
|
|
|
1527
2329
|
|
|
1528
|
-
def
|
|
2330
|
+
def doDeleteAcl(args, parsed_globals):
|
|
1529
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
1530
2332
|
|
|
1531
2333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1535,7 +2337,10 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1535
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
2339
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
2345
|
else:
|
|
1541
2346
|
cred = credential.Credential(
|
|
@@ -1547,18 +2352,18 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1547
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
2354
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
2356
|
if g_param[OptionsDefine.Language]:
|
|
1552
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1554
2359
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
2360
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
2361
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.
|
|
2362
|
+
model = models.DeleteAclRequest()
|
|
1558
2363
|
model.from_json_string(json.dumps(args))
|
|
1559
2364
|
start_time = time.time()
|
|
1560
2365
|
while True:
|
|
1561
|
-
rsp = client.
|
|
2366
|
+
rsp = client.DeleteAcl(model)
|
|
1562
2367
|
result = rsp.to_json_string()
|
|
1563
2368
|
try:
|
|
1564
2369
|
json_obj = json.loads(result)
|
|
@@ -1577,7 +2382,7 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1577
2382
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
2383
|
|
|
1579
2384
|
|
|
1580
|
-
def
|
|
2385
|
+
def doInstanceScalingDown(args, parsed_globals):
|
|
1581
2386
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
2387
|
|
|
1583
2388
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1587,7 +2392,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1587
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
2394
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
2400
|
else:
|
|
1593
2401
|
cred = credential.Credential(
|
|
@@ -1599,18 +2407,18 @@ def doCreateUser(args, parsed_globals):
|
|
|
1599
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
2409
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
2411
|
if g_param[OptionsDefine.Language]:
|
|
1604
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1606
2414
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1607
2415
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1608
2416
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1609
|
-
model = models.
|
|
2417
|
+
model = models.InstanceScalingDownRequest()
|
|
1610
2418
|
model.from_json_string(json.dumps(args))
|
|
1611
2419
|
start_time = time.time()
|
|
1612
2420
|
while True:
|
|
1613
|
-
rsp = client.
|
|
2421
|
+
rsp = client.InstanceScalingDown(model)
|
|
1614
2422
|
result = rsp.to_json_string()
|
|
1615
2423
|
try:
|
|
1616
2424
|
json_obj = json.loads(result)
|
|
@@ -1629,7 +2437,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
1629
2437
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1630
2438
|
|
|
1631
2439
|
|
|
1632
|
-
def
|
|
2440
|
+
def doDeleteTopic(args, parsed_globals):
|
|
1633
2441
|
g_param = parse_global_arg(parsed_globals)
|
|
1634
2442
|
|
|
1635
2443
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1639,7 +2447,10 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1639
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
2449
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
2455
|
else:
|
|
1645
2456
|
cred = credential.Credential(
|
|
@@ -1651,18 +2462,18 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1651
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
2464
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
2466
|
if g_param[OptionsDefine.Language]:
|
|
1656
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1658
2469
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1659
2470
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1660
2471
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1661
|
-
model = models.
|
|
2472
|
+
model = models.DeleteTopicRequest()
|
|
1662
2473
|
model.from_json_string(json.dumps(args))
|
|
1663
2474
|
start_time = time.time()
|
|
1664
2475
|
while True:
|
|
1665
|
-
rsp = client.
|
|
2476
|
+
rsp = client.DeleteTopic(model)
|
|
1666
2477
|
result = rsp.to_json_string()
|
|
1667
2478
|
try:
|
|
1668
2479
|
json_obj = json.loads(result)
|
|
@@ -1681,7 +2492,7 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1681
2492
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1682
2493
|
|
|
1683
2494
|
|
|
1684
|
-
def
|
|
2495
|
+
def doDescribeGroupOffsets(args, parsed_globals):
|
|
1685
2496
|
g_param = parse_global_arg(parsed_globals)
|
|
1686
2497
|
|
|
1687
2498
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1691,7 +2502,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1691
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
2504
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
2510
|
else:
|
|
1697
2511
|
cred = credential.Credential(
|
|
@@ -1703,18 +2517,18 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1703
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
2519
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
2521
|
if g_param[OptionsDefine.Language]:
|
|
1708
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1710
2524
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1711
2525
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1712
2526
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1713
|
-
model = models.
|
|
2527
|
+
model = models.DescribeGroupOffsetsRequest()
|
|
1714
2528
|
model.from_json_string(json.dumps(args))
|
|
1715
2529
|
start_time = time.time()
|
|
1716
2530
|
while True:
|
|
1717
|
-
rsp = client.
|
|
2531
|
+
rsp = client.DescribeGroupOffsets(model)
|
|
1718
2532
|
result = rsp.to_json_string()
|
|
1719
2533
|
try:
|
|
1720
2534
|
json_obj = json.loads(result)
|
|
@@ -1733,7 +2547,7 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1733
2547
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1734
2548
|
|
|
1735
2549
|
|
|
1736
|
-
def
|
|
2550
|
+
def doDeleteInstancePre(args, parsed_globals):
|
|
1737
2551
|
g_param = parse_global_arg(parsed_globals)
|
|
1738
2552
|
|
|
1739
2553
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1743,7 +2557,10 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1743
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2559
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2565
|
else:
|
|
1749
2566
|
cred = credential.Credential(
|
|
@@ -1755,18 +2572,18 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1755
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
2574
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
2576
|
if g_param[OptionsDefine.Language]:
|
|
1760
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1762
2579
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1763
2580
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1764
2581
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1765
|
-
model = models.
|
|
2582
|
+
model = models.DeleteInstancePreRequest()
|
|
1766
2583
|
model.from_json_string(json.dumps(args))
|
|
1767
2584
|
start_time = time.time()
|
|
1768
2585
|
while True:
|
|
1769
|
-
rsp = client.
|
|
2586
|
+
rsp = client.DeleteInstancePre(model)
|
|
1770
2587
|
result = rsp.to_json_string()
|
|
1771
2588
|
try:
|
|
1772
2589
|
json_obj = json.loads(result)
|
|
@@ -1785,7 +2602,7 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1785
2602
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1786
2603
|
|
|
1787
2604
|
|
|
1788
|
-
def
|
|
2605
|
+
def doDescribeInstanceAttributes(args, parsed_globals):
|
|
1789
2606
|
g_param = parse_global_arg(parsed_globals)
|
|
1790
2607
|
|
|
1791
2608
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1795,7 +2612,10 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1795
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2614
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2620
|
else:
|
|
1801
2621
|
cred = credential.Credential(
|
|
@@ -1807,18 +2627,18 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1807
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2629
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2631
|
if g_param[OptionsDefine.Language]:
|
|
1812
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1814
2634
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
2635
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
2636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
-
model = models.
|
|
2637
|
+
model = models.DescribeInstanceAttributesRequest()
|
|
1818
2638
|
model.from_json_string(json.dumps(args))
|
|
1819
2639
|
start_time = time.time()
|
|
1820
2640
|
while True:
|
|
1821
|
-
rsp = client.
|
|
2641
|
+
rsp = client.DescribeInstanceAttributes(model)
|
|
1822
2642
|
result = rsp.to_json_string()
|
|
1823
2643
|
try:
|
|
1824
2644
|
json_obj = json.loads(result)
|
|
@@ -1837,7 +2657,7 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1837
2657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1838
2658
|
|
|
1839
2659
|
|
|
1840
|
-
def
|
|
2660
|
+
def doDescribeInstancesDetail(args, parsed_globals):
|
|
1841
2661
|
g_param = parse_global_arg(parsed_globals)
|
|
1842
2662
|
|
|
1843
2663
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1847,7 +2667,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1847
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2669
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2675
|
else:
|
|
1853
2676
|
cred = credential.Credential(
|
|
@@ -1859,18 +2682,18 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1859
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2684
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2686
|
if g_param[OptionsDefine.Language]:
|
|
1864
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1866
2689
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1867
2690
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1868
2691
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1869
|
-
model = models.
|
|
2692
|
+
model = models.DescribeInstancesDetailRequest()
|
|
1870
2693
|
model.from_json_string(json.dumps(args))
|
|
1871
2694
|
start_time = time.time()
|
|
1872
2695
|
while True:
|
|
1873
|
-
rsp = client.
|
|
2696
|
+
rsp = client.DescribeInstancesDetail(model)
|
|
1874
2697
|
result = rsp.to_json_string()
|
|
1875
2698
|
try:
|
|
1876
2699
|
json_obj = json.loads(result)
|
|
@@ -1889,7 +2712,7 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1889
2712
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
2713
|
|
|
1891
2714
|
|
|
1892
|
-
def
|
|
2715
|
+
def doBatchCreateAcl(args, parsed_globals):
|
|
1893
2716
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2717
|
|
|
1895
2718
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1899,7 +2722,10 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1899
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2724
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2730
|
else:
|
|
1905
2731
|
cred = credential.Credential(
|
|
@@ -1911,18 +2737,18 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1911
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2739
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2741
|
if g_param[OptionsDefine.Language]:
|
|
1916
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
2744
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
2745
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
2746
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.
|
|
2747
|
+
model = models.BatchCreateAclRequest()
|
|
1922
2748
|
model.from_json_string(json.dumps(args))
|
|
1923
2749
|
start_time = time.time()
|
|
1924
2750
|
while True:
|
|
1925
|
-
rsp = client.
|
|
2751
|
+
rsp = client.BatchCreateAcl(model)
|
|
1926
2752
|
result = rsp.to_json_string()
|
|
1927
2753
|
try:
|
|
1928
2754
|
json_obj = json.loads(result)
|
|
@@ -1941,7 +2767,7 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1941
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
2768
|
|
|
1943
2769
|
|
|
1944
|
-
def
|
|
2770
|
+
def doDeleteAclRule(args, parsed_globals):
|
|
1945
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2772
|
|
|
1947
2773
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1951,7 +2777,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1951
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2779
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2785
|
else:
|
|
1957
2786
|
cred = credential.Credential(
|
|
@@ -1963,18 +2792,18 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1963
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2794
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2796
|
if g_param[OptionsDefine.Language]:
|
|
1968
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1970
2799
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1971
2800
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1972
2801
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1973
|
-
model = models.
|
|
2802
|
+
model = models.DeleteAclRuleRequest()
|
|
1974
2803
|
model.from_json_string(json.dumps(args))
|
|
1975
2804
|
start_time = time.time()
|
|
1976
2805
|
while True:
|
|
1977
|
-
rsp = client.
|
|
2806
|
+
rsp = client.DeleteAclRule(model)
|
|
1978
2807
|
result = rsp.to_json_string()
|
|
1979
2808
|
try:
|
|
1980
2809
|
json_obj = json.loads(result)
|
|
@@ -1993,7 +2822,7 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1993
2822
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1994
2823
|
|
|
1995
2824
|
|
|
1996
|
-
def
|
|
2825
|
+
def doModifyAclRule(args, parsed_globals):
|
|
1997
2826
|
g_param = parse_global_arg(parsed_globals)
|
|
1998
2827
|
|
|
1999
2828
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2003,7 +2832,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2003
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2834
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2840
|
else:
|
|
2009
2841
|
cred = credential.Credential(
|
|
@@ -2015,18 +2847,18 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2015
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2849
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2851
|
if g_param[OptionsDefine.Language]:
|
|
2020
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2022
2854
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2023
2855
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2024
2856
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2025
|
-
model = models.
|
|
2857
|
+
model = models.ModifyAclRuleRequest()
|
|
2026
2858
|
model.from_json_string(json.dumps(args))
|
|
2027
2859
|
start_time = time.time()
|
|
2028
2860
|
while True:
|
|
2029
|
-
rsp = client.
|
|
2861
|
+
rsp = client.ModifyAclRule(model)
|
|
2030
2862
|
result = rsp.to_json_string()
|
|
2031
2863
|
try:
|
|
2032
2864
|
json_obj = json.loads(result)
|
|
@@ -2045,7 +2877,7 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2045
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2046
2878
|
|
|
2047
2879
|
|
|
2048
|
-
def
|
|
2880
|
+
def doDeleteUser(args, parsed_globals):
|
|
2049
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2050
2882
|
|
|
2051
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2055,7 +2887,10 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2055
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2889
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2895
|
else:
|
|
2061
2896
|
cred = credential.Credential(
|
|
@@ -2067,18 +2902,18 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2067
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2904
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2906
|
if g_param[OptionsDefine.Language]:
|
|
2072
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2074
2909
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2075
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2076
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2077
|
-
model = models.
|
|
2912
|
+
model = models.DeleteUserRequest()
|
|
2078
2913
|
model.from_json_string(json.dumps(args))
|
|
2079
2914
|
start_time = time.time()
|
|
2080
2915
|
while True:
|
|
2081
|
-
rsp = client.
|
|
2916
|
+
rsp = client.DeleteUser(model)
|
|
2082
2917
|
result = rsp.to_json_string()
|
|
2083
2918
|
try:
|
|
2084
2919
|
json_obj = json.loads(result)
|
|
@@ -2097,7 +2932,7 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2097
2932
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2098
2933
|
|
|
2099
2934
|
|
|
2100
|
-
def
|
|
2935
|
+
def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
2101
2936
|
g_param = parse_global_arg(parsed_globals)
|
|
2102
2937
|
|
|
2103
2938
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2107,7 +2942,10 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2107
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2944
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2950
|
else:
|
|
2113
2951
|
cred = credential.Credential(
|
|
@@ -2119,18 +2957,18 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2119
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2959
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2961
|
if g_param[OptionsDefine.Language]:
|
|
2124
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2126
2964
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2127
2965
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2128
2966
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2129
|
-
model = models.
|
|
2967
|
+
model = models.DescribeTopicSyncReplicaRequest()
|
|
2130
2968
|
model.from_json_string(json.dumps(args))
|
|
2131
2969
|
start_time = time.time()
|
|
2132
2970
|
while True:
|
|
2133
|
-
rsp = client.
|
|
2971
|
+
rsp = client.DescribeTopicSyncReplica(model)
|
|
2134
2972
|
result = rsp.to_json_string()
|
|
2135
2973
|
try:
|
|
2136
2974
|
json_obj = json.loads(result)
|
|
@@ -2149,7 +2987,7 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2149
2987
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2988
|
|
|
2151
2989
|
|
|
2152
|
-
def
|
|
2990
|
+
def doDescribeTopicAttributes(args, parsed_globals):
|
|
2153
2991
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2992
|
|
|
2155
2993
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2159,7 +2997,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2159
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2999
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
3005
|
else:
|
|
2165
3006
|
cred = credential.Credential(
|
|
@@ -2171,18 +3012,18 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2171
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
3014
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
3016
|
if g_param[OptionsDefine.Language]:
|
|
2176
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2178
3019
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2179
3020
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2180
3021
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2181
|
-
model = models.
|
|
3022
|
+
model = models.DescribeTopicAttributesRequest()
|
|
2182
3023
|
model.from_json_string(json.dumps(args))
|
|
2183
3024
|
start_time = time.time()
|
|
2184
3025
|
while True:
|
|
2185
|
-
rsp = client.
|
|
3026
|
+
rsp = client.DescribeTopicAttributes(model)
|
|
2186
3027
|
result = rsp.to_json_string()
|
|
2187
3028
|
try:
|
|
2188
3029
|
json_obj = json.loads(result)
|
|
@@ -2201,7 +3042,7 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2201
3042
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2202
3043
|
|
|
2203
3044
|
|
|
2204
|
-
def
|
|
3045
|
+
def doFetchMessageListByTimestamp(args, parsed_globals):
|
|
2205
3046
|
g_param = parse_global_arg(parsed_globals)
|
|
2206
3047
|
|
|
2207
3048
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2211,7 +3052,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2211
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
3054
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
3060
|
else:
|
|
2217
3061
|
cred = credential.Credential(
|
|
@@ -2223,18 +3067,18 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2223
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
3069
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
3071
|
if g_param[OptionsDefine.Language]:
|
|
2228
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2230
3074
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2231
3075
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2232
3076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2233
|
-
model = models.
|
|
3077
|
+
model = models.FetchMessageListByTimestampRequest()
|
|
2234
3078
|
model.from_json_string(json.dumps(args))
|
|
2235
3079
|
start_time = time.time()
|
|
2236
3080
|
while True:
|
|
2237
|
-
rsp = client.
|
|
3081
|
+
rsp = client.FetchMessageListByTimestamp(model)
|
|
2238
3082
|
result = rsp.to_json_string()
|
|
2239
3083
|
try:
|
|
2240
3084
|
json_obj = json.loads(result)
|
|
@@ -2253,7 +3097,7 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2253
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2254
3098
|
|
|
2255
3099
|
|
|
2256
|
-
def
|
|
3100
|
+
def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
2257
3101
|
g_param = parse_global_arg(parsed_globals)
|
|
2258
3102
|
|
|
2259
3103
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2263,7 +3107,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2263
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
3109
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
3115
|
else:
|
|
2269
3116
|
cred = credential.Credential(
|
|
@@ -2275,18 +3122,18 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2275
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
3124
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
3126
|
if g_param[OptionsDefine.Language]:
|
|
2280
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2282
3129
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2283
3130
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2284
3131
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2285
|
-
model = models.
|
|
3132
|
+
model = models.DescribeTopicProduceConnectionRequest()
|
|
2286
3133
|
model.from_json_string(json.dumps(args))
|
|
2287
3134
|
start_time = time.time()
|
|
2288
3135
|
while True:
|
|
2289
|
-
rsp = client.
|
|
3136
|
+
rsp = client.DescribeTopicProduceConnection(model)
|
|
2290
3137
|
result = rsp.to_json_string()
|
|
2291
3138
|
try:
|
|
2292
3139
|
json_obj = json.loads(result)
|
|
@@ -2305,7 +3152,7 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2305
3152
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
3153
|
|
|
2307
3154
|
|
|
2308
|
-
def
|
|
3155
|
+
def doCreatePostPaidInstance(args, parsed_globals):
|
|
2309
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2310
3157
|
|
|
2311
3158
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2315,7 +3162,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2315
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
3164
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
3170
|
else:
|
|
2321
3171
|
cred = credential.Credential(
|
|
@@ -2327,18 +3177,18 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2327
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
3179
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
3181
|
if g_param[OptionsDefine.Language]:
|
|
2332
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2334
3184
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2335
3185
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2336
3186
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2337
|
-
model = models.
|
|
3187
|
+
model = models.CreatePostPaidInstanceRequest()
|
|
2338
3188
|
model.from_json_string(json.dumps(args))
|
|
2339
3189
|
start_time = time.time()
|
|
2340
3190
|
while True:
|
|
2341
|
-
rsp = client.
|
|
3191
|
+
rsp = client.CreatePostPaidInstance(model)
|
|
2342
3192
|
result = rsp.to_json_string()
|
|
2343
3193
|
try:
|
|
2344
3194
|
json_obj = json.loads(result)
|
|
@@ -2357,7 +3207,7 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2357
3207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
3208
|
|
|
2359
3209
|
|
|
2360
|
-
def
|
|
3210
|
+
def doCreateAclRule(args, parsed_globals):
|
|
2361
3211
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
3212
|
|
|
2363
3213
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2367,7 +3217,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2367
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
3219
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
3225
|
else:
|
|
2373
3226
|
cred = credential.Credential(
|
|
@@ -2379,18 +3232,18 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2379
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
3234
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
3236
|
if g_param[OptionsDefine.Language]:
|
|
2384
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2386
3239
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2387
3240
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2388
3241
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2389
|
-
model = models.
|
|
3242
|
+
model = models.CreateAclRuleRequest()
|
|
2390
3243
|
model.from_json_string(json.dumps(args))
|
|
2391
3244
|
start_time = time.time()
|
|
2392
3245
|
while True:
|
|
2393
|
-
rsp = client.
|
|
3246
|
+
rsp = client.CreateAclRule(model)
|
|
2394
3247
|
result = rsp.to_json_string()
|
|
2395
3248
|
try:
|
|
2396
3249
|
json_obj = json.loads(result)
|
|
@@ -2409,7 +3262,7 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2409
3262
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
3263
|
|
|
2411
3264
|
|
|
2412
|
-
def
|
|
3265
|
+
def doModifyInstanceAttributes(args, parsed_globals):
|
|
2413
3266
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
3267
|
|
|
2415
3268
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2419,7 +3272,10 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2419
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
3274
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
3280
|
else:
|
|
2425
3281
|
cred = credential.Credential(
|
|
@@ -2431,18 +3287,18 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2431
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
3289
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
3291
|
if g_param[OptionsDefine.Language]:
|
|
2436
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2438
3294
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2439
3295
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2440
3296
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2441
|
-
model = models.
|
|
3297
|
+
model = models.ModifyInstanceAttributesRequest()
|
|
2442
3298
|
model.from_json_string(json.dumps(args))
|
|
2443
3299
|
start_time = time.time()
|
|
2444
3300
|
while True:
|
|
2445
|
-
rsp = client.
|
|
3301
|
+
rsp = client.ModifyInstanceAttributes(model)
|
|
2446
3302
|
result = rsp.to_json_string()
|
|
2447
3303
|
try:
|
|
2448
3304
|
json_obj = json.loads(result)
|
|
@@ -2461,7 +3317,7 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2461
3317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
3318
|
|
|
2463
3319
|
|
|
2464
|
-
def
|
|
3320
|
+
def doDescribeCkafkaZone(args, parsed_globals):
|
|
2465
3321
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
3322
|
|
|
2467
3323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +3327,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2471
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
3329
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
3335
|
else:
|
|
2477
3336
|
cred = credential.Credential(
|
|
@@ -2483,18 +3342,18 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2483
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
3344
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
3346
|
if g_param[OptionsDefine.Language]:
|
|
2488
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2490
3349
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
3350
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
3351
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
3352
|
+
model = models.DescribeCkafkaZoneRequest()
|
|
2494
3353
|
model.from_json_string(json.dumps(args))
|
|
2495
3354
|
start_time = time.time()
|
|
2496
3355
|
while True:
|
|
2497
|
-
rsp = client.
|
|
3356
|
+
rsp = client.DescribeCkafkaZone(model)
|
|
2498
3357
|
result = rsp.to_json_string()
|
|
2499
3358
|
try:
|
|
2500
3359
|
json_obj = json.loads(result)
|
|
@@ -2513,7 +3372,7 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2513
3372
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2514
3373
|
|
|
2515
3374
|
|
|
2516
|
-
def
|
|
3375
|
+
def doDescribeRegion(args, parsed_globals):
|
|
2517
3376
|
g_param = parse_global_arg(parsed_globals)
|
|
2518
3377
|
|
|
2519
3378
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2523,7 +3382,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2523
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
3384
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
3390
|
else:
|
|
2529
3391
|
cred = credential.Credential(
|
|
@@ -2535,18 +3397,18 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2535
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
3399
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
3401
|
if g_param[OptionsDefine.Language]:
|
|
2540
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2542
3404
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2543
3405
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2544
3406
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2545
|
-
model = models.
|
|
3407
|
+
model = models.DescribeRegionRequest()
|
|
2546
3408
|
model.from_json_string(json.dumps(args))
|
|
2547
3409
|
start_time = time.time()
|
|
2548
3410
|
while True:
|
|
2549
|
-
rsp = client.
|
|
3411
|
+
rsp = client.DescribeRegion(model)
|
|
2550
3412
|
result = rsp.to_json_string()
|
|
2551
3413
|
try:
|
|
2552
3414
|
json_obj = json.loads(result)
|
|
@@ -2565,7 +3427,7 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2565
3427
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
3428
|
|
|
2567
3429
|
|
|
2568
|
-
def
|
|
3430
|
+
def doDescribeModifyType(args, parsed_globals):
|
|
2569
3431
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
3432
|
|
|
2571
3433
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2575,7 +3437,10 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2575
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
3439
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
3445
|
else:
|
|
2581
3446
|
cred = credential.Credential(
|
|
@@ -2587,18 +3452,18 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2587
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
3454
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
3456
|
if g_param[OptionsDefine.Language]:
|
|
2592
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2594
3459
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2595
3460
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2596
3461
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2597
|
-
model = models.
|
|
3462
|
+
model = models.DescribeModifyTypeRequest()
|
|
2598
3463
|
model.from_json_string(json.dumps(args))
|
|
2599
3464
|
start_time = time.time()
|
|
2600
3465
|
while True:
|
|
2601
|
-
rsp = client.
|
|
3466
|
+
rsp = client.DescribeModifyType(model)
|
|
2602
3467
|
result = rsp.to_json_string()
|
|
2603
3468
|
try:
|
|
2604
3469
|
json_obj = json.loads(result)
|
|
@@ -2617,7 +3482,7 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2617
3482
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2618
3483
|
|
|
2619
3484
|
|
|
2620
|
-
def
|
|
3485
|
+
def doModifyInstancePre(args, parsed_globals):
|
|
2621
3486
|
g_param = parse_global_arg(parsed_globals)
|
|
2622
3487
|
|
|
2623
3488
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2627,7 +3492,10 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2627
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
3494
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
3500
|
else:
|
|
2633
3501
|
cred = credential.Credential(
|
|
@@ -2639,18 +3507,18 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2639
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
3509
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
3511
|
if g_param[OptionsDefine.Language]:
|
|
2644
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2646
3514
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2647
3515
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2648
3516
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2649
|
-
model = models.
|
|
3517
|
+
model = models.ModifyInstancePreRequest()
|
|
2650
3518
|
model.from_json_string(json.dumps(args))
|
|
2651
3519
|
start_time = time.time()
|
|
2652
3520
|
while True:
|
|
2653
|
-
rsp = client.
|
|
3521
|
+
rsp = client.ModifyInstancePre(model)
|
|
2654
3522
|
result = rsp.to_json_string()
|
|
2655
3523
|
try:
|
|
2656
3524
|
json_obj = json.loads(result)
|
|
@@ -2669,7 +3537,7 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2669
3537
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2670
3538
|
|
|
2671
3539
|
|
|
2672
|
-
def
|
|
3540
|
+
def doDescribeTopic(args, parsed_globals):
|
|
2673
3541
|
g_param = parse_global_arg(parsed_globals)
|
|
2674
3542
|
|
|
2675
3543
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2679,7 +3547,10 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
2679
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
3549
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3555
|
else:
|
|
2685
3556
|
cred = credential.Credential(
|
|
@@ -2691,18 +3562,18 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
2691
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
3564
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
3566
|
if g_param[OptionsDefine.Language]:
|
|
2696
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2698
3569
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2699
3570
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2700
3571
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2701
|
-
model = models.
|
|
3572
|
+
model = models.DescribeTopicRequest()
|
|
2702
3573
|
model.from_json_string(json.dumps(args))
|
|
2703
3574
|
start_time = time.time()
|
|
2704
3575
|
while True:
|
|
2705
|
-
rsp = client.
|
|
3576
|
+
rsp = client.DescribeTopic(model)
|
|
2706
3577
|
result = rsp.to_json_string()
|
|
2707
3578
|
try:
|
|
2708
3579
|
json_obj = json.loads(result)
|
|
@@ -2731,7 +3602,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
2731
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3604
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3610
|
else:
|
|
2737
3611
|
cred = credential.Credential(
|
|
@@ -2743,7 +3617,7 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
2743
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3619
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3621
|
if g_param[OptionsDefine.Language]:
|
|
2748
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +3657,10 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2783
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3659
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3665
|
else:
|
|
2789
3666
|
cred = credential.Credential(
|
|
@@ -2795,7 +3672,7 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2795
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3674
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3676
|
if g_param[OptionsDefine.Language]:
|
|
2800
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2840,54 +3717,67 @@ ACTION_MAP = {
|
|
|
2840
3717
|
"DescribeGroupInfo": doDescribeGroupInfo,
|
|
2841
3718
|
"CreateConsumer": doCreateConsumer,
|
|
2842
3719
|
"CreateAcl": doCreateAcl,
|
|
2843
|
-
"
|
|
3720
|
+
"DescribeTypeInstances": doDescribeTypeInstances,
|
|
3721
|
+
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
2844
3722
|
"DescribeAclRule": doDescribeAclRule,
|
|
2845
3723
|
"CreateTopic": doCreateTopic,
|
|
2846
|
-
"
|
|
3724
|
+
"DescribeSecurityGroupRoutes": doDescribeSecurityGroupRoutes,
|
|
2847
3725
|
"BatchModifyTopicAttributes": doBatchModifyTopicAttributes,
|
|
2848
3726
|
"DeleteRoute": doDeleteRoute,
|
|
2849
3727
|
"SendMessage": doSendMessage,
|
|
2850
3728
|
"DescribeUser": doDescribeUser,
|
|
2851
|
-
"CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
|
|
2852
3729
|
"DescribeGroup": doDescribeGroup,
|
|
3730
|
+
"CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
|
|
3731
|
+
"DescribeCkafkaVersion": doDescribeCkafkaVersion,
|
|
2853
3732
|
"ModifyGroupOffsets": doModifyGroupOffsets,
|
|
3733
|
+
"UpgradeBrokerVersion": doUpgradeBrokerVersion,
|
|
2854
3734
|
"DescribeInstances": doDescribeInstances,
|
|
2855
|
-
"
|
|
3735
|
+
"DescribeCvmInfo": doDescribeCvmInfo,
|
|
3736
|
+
"DescribeDatahubTopic": doDescribeDatahubTopic,
|
|
3737
|
+
"CreateRoute": doCreateRoute,
|
|
3738
|
+
"DeleteGroupSubscribeTopic": doDeleteGroupSubscribeTopic,
|
|
3739
|
+
"DeleteGroup": doDeleteGroup,
|
|
2856
3740
|
"ModifyDatahubTopic": doModifyDatahubTopic,
|
|
2857
3741
|
"FetchMessageListByOffset": doFetchMessageListByOffset,
|
|
2858
3742
|
"CreateDatahubTopic": doCreateDatahubTopic,
|
|
3743
|
+
"DeleteInstancePost": doDeleteInstancePost,
|
|
2859
3744
|
"DescribeACL": doDescribeACL,
|
|
2860
|
-
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
2861
3745
|
"DescribeTopicDetail": doDescribeTopicDetail,
|
|
3746
|
+
"CreateInstancePre": doCreateInstancePre,
|
|
2862
3747
|
"FetchMessageByOffset": doFetchMessageByOffset,
|
|
2863
3748
|
"DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
|
|
2864
3749
|
"ModifyPassword": doModifyPassword,
|
|
2865
3750
|
"DescribeConsumerGroup": doDescribeConsumerGroup,
|
|
2866
3751
|
"DescribeTopicSubscribeGroup": doDescribeTopicSubscribeGroup,
|
|
3752
|
+
"ModifyRoutineMaintenanceTask": doModifyRoutineMaintenanceTask,
|
|
2867
3753
|
"DeleteRouteTriggerTime": doDeleteRouteTriggerTime,
|
|
2868
3754
|
"CreatePartition": doCreatePartition,
|
|
2869
3755
|
"CreateUser": doCreateUser,
|
|
2870
3756
|
"DescribeTaskStatus": doDescribeTaskStatus,
|
|
2871
3757
|
"BatchModifyGroupOffsets": doBatchModifyGroupOffsets,
|
|
2872
3758
|
"DeleteAcl": doDeleteAcl,
|
|
2873
|
-
"
|
|
3759
|
+
"InstanceScalingDown": doInstanceScalingDown,
|
|
3760
|
+
"DeleteTopic": doDeleteTopic,
|
|
2874
3761
|
"DescribeGroupOffsets": doDescribeGroupOffsets,
|
|
2875
3762
|
"DeleteInstancePre": doDeleteInstancePre,
|
|
2876
3763
|
"DescribeInstanceAttributes": doDescribeInstanceAttributes,
|
|
2877
3764
|
"DescribeInstancesDetail": doDescribeInstancesDetail,
|
|
2878
3765
|
"BatchCreateAcl": doBatchCreateAcl,
|
|
3766
|
+
"DeleteAclRule": doDeleteAclRule,
|
|
2879
3767
|
"ModifyAclRule": doModifyAclRule,
|
|
2880
3768
|
"DeleteUser": doDeleteUser,
|
|
2881
3769
|
"DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
|
|
2882
3770
|
"DescribeTopicAttributes": doDescribeTopicAttributes,
|
|
3771
|
+
"FetchMessageListByTimestamp": doFetchMessageListByTimestamp,
|
|
2883
3772
|
"DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
|
|
2884
3773
|
"CreatePostPaidInstance": doCreatePostPaidInstance,
|
|
2885
3774
|
"CreateAclRule": doCreateAclRule,
|
|
2886
|
-
"
|
|
3775
|
+
"ModifyInstanceAttributes": doModifyInstanceAttributes,
|
|
2887
3776
|
"DescribeCkafkaZone": doDescribeCkafkaZone,
|
|
2888
3777
|
"DescribeRegion": doDescribeRegion,
|
|
3778
|
+
"DescribeModifyType": doDescribeModifyType,
|
|
3779
|
+
"ModifyInstancePre": doModifyInstancePre,
|
|
2889
3780
|
"DescribeTopic": doDescribeTopic,
|
|
2890
|
-
"DeleteTopic": doDeleteTopic,
|
|
2891
3781
|
"InquireCkafkaPrice": doInquireCkafkaPrice,
|
|
2892
3782
|
"ModifyTopicAttributes": doModifyTopicAttributes,
|
|
2893
3783
|
|