tccli-intl-en 3.0.1188.1__py2.py3-none-any.whl → 3.1.28.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (292) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/plugins/sso/__init__.py +14 -0
  4. tccli/plugins/sso/login.py +23 -6
  5. tccli/plugins/sso/texts.py +4 -0
  6. tccli/services/__init__.py +46 -2
  7. tccli/services/advisor/advisor_client.py +10 -4
  8. tccli/services/ai3d/__init__.py +4 -0
  9. tccli/services/ai3d/ai3d_client.py +266 -0
  10. tccli/services/ai3d/v20250513/api.json +264 -0
  11. tccli/services/ai3d/v20250513/examples.json +20 -0
  12. tccli/services/aiart/aiart_client.py +5 -2
  13. tccli/services/ams/ams_client.py +20 -8
  14. tccli/services/antiddos/antiddos_client.py +350 -140
  15. tccli/services/apigateway/apigateway_client.py +465 -186
  16. tccli/services/apm/apm_client.py +835 -68
  17. tccli/services/apm/v20210622/api.json +3936 -1145
  18. tccli/services/apm/v20210622/examples.json +133 -23
  19. tccli/services/asr/asr_client.py +10 -4
  20. tccli/services/autoscaling/autoscaling_client.py +341 -114
  21. tccli/services/autoscaling/v20180419/api.json +444 -272
  22. tccli/services/autoscaling/v20180419/examples.json +46 -38
  23. tccli/services/batch/batch_client.py +140 -56
  24. tccli/services/bi/__init__.py +4 -0
  25. tccli/services/bi/bi_client.py +1498 -0
  26. tccli/services/bi/v20220105/api.json +5769 -0
  27. tccli/services/bi/v20220105/examples.json +215 -0
  28. tccli/services/billing/billing_client.py +1007 -139
  29. tccli/services/billing/v20180709/api.json +1707 -429
  30. tccli/services/billing/v20180709/examples.json +161 -25
  31. tccli/services/cam/cam_client.py +405 -162
  32. tccli/services/captcha/captcha_client.py +5 -2
  33. tccli/services/captcha/v20190722/api.json +16 -6
  34. tccli/services/captcha/v20190722/examples.json +3 -3
  35. tccli/services/car/car_client.py +165 -66
  36. tccli/services/cbs/cbs_client.py +190 -76
  37. tccli/services/ccc/ccc_client.py +1167 -268
  38. tccli/services/ccc/v20200210/api.json +2263 -202
  39. tccli/services/ccc/v20200210/examples.json +116 -12
  40. tccli/services/cdb/cdb_client.py +665 -266
  41. tccli/services/cdb/v20170320/api.json +463 -208
  42. tccli/services/cdb/v20170320/examples.json +8 -8
  43. tccli/services/cdc/cdc_client.py +100 -40
  44. tccli/services/cdc/v20201214/api.json +2 -2
  45. tccli/services/cdc/v20201214/examples.json +4 -4
  46. tccli/services/cdn/cdn_client.py +220 -88
  47. tccli/services/cdn/v20180606/api.json +22 -22
  48. tccli/services/cdn/v20180606/examples.json +1 -1
  49. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  50. tccli/services/cdwpg/cdwpg_client.py +120 -48
  51. tccli/services/cdz/__init__.py +4 -0
  52. tccli/services/cdz/cdz_client.py +210 -0
  53. tccli/services/cdz/v20221123/api.json +233 -0
  54. tccli/services/cdz/v20221123/examples.json +12 -0
  55. tccli/services/cfg/cfg_client.py +80 -32
  56. tccli/services/cfg/v20210820/api.json +30 -10
  57. tccli/services/cfg/v20210820/examples.json +1 -1
  58. tccli/services/cfs/cfs_client.py +195 -78
  59. tccli/services/cfw/cfw_client.py +330 -132
  60. tccli/services/chdfs/chdfs_client.py +145 -58
  61. tccli/services/ciam/ciam_client.py +80 -32
  62. tccli/services/ckafka/ckafka_client.py +1149 -259
  63. tccli/services/ckafka/v20190819/api.json +3738 -1696
  64. tccli/services/ckafka/v20190819/examples.json +266 -162
  65. tccli/services/clb/clb_client.py +1054 -469
  66. tccli/services/clb/v20180317/api.json +2273 -1020
  67. tccli/services/clb/v20180317/examples.json +184 -124
  68. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  69. tccli/services/cls/cls_client.py +434 -173
  70. tccli/services/cmq/cmq_client.py +14 -803
  71. tccli/services/cmq/v20190304/api.json +173 -1367
  72. tccli/services/cmq/v20190304/examples.json +0 -120
  73. tccli/services/config/config_client.py +30 -12
  74. tccli/services/controlcenter/controlcenter_client.py +229 -2
  75. tccli/services/controlcenter/v20230110/api.json +528 -5
  76. tccli/services/controlcenter/v20230110/examples.json +32 -0
  77. tccli/services/csip/csip_client.py +339 -78
  78. tccli/services/csip/v20221121/api.json +1011 -38
  79. tccli/services/csip/v20221121/examples.json +24 -0
  80. tccli/services/ctsdb/__init__.py +4 -0
  81. tccli/services/ctsdb/ctsdb_client.py +266 -0
  82. tccli/services/ctsdb/v20230202/api.json +677 -0
  83. tccli/services/ctsdb/v20230202/examples.json +20 -0
  84. tccli/services/cvm/cvm_client.py +706 -189
  85. tccli/services/cvm/v20170312/api.json +1003 -453
  86. tccli/services/cvm/v20170312/examples.json +176 -130
  87. tccli/services/cwp/cwp_client.py +2325 -930
  88. tccli/services/cynosdb/cynosdb_client.py +2272 -591
  89. tccli/services/cynosdb/v20190107/api.json +12480 -7740
  90. tccli/services/cynosdb/v20190107/examples.json +193 -9
  91. tccli/services/dataintegration/dataintegration_client.py +5 -2
  92. tccli/services/dayu/dayu_client.py +515 -206
  93. tccli/services/dbbrain/dbbrain_client.py +210 -84
  94. tccli/services/dc/dc_client.py +90 -36
  95. tccli/services/dcdb/dcdb_client.py +310 -124
  96. tccli/services/dlc/dlc_client.py +859 -214
  97. tccli/services/dlc/v20210125/api.json +637 -13
  98. tccli/services/dlc/v20210125/examples.json +48 -0
  99. tccli/services/dms/dms_client.py +10 -4
  100. tccli/services/dnspod/dnspod_client.py +390 -111
  101. tccli/services/dnspod/v20210323/api.json +196 -0
  102. tccli/services/dnspod/v20210323/examples.json +24 -0
  103. tccli/services/domain/domain_client.py +120 -48
  104. tccli/services/dts/dts_client.py +415 -166
  105. tccli/services/eb/eb_client.py +130 -52
  106. tccli/services/ecdn/ecdn_client.py +75 -30
  107. tccli/services/ecm/ecm_client.py +620 -248
  108. tccli/services/eiam/eiam_client.py +200 -80
  109. tccli/services/emr/emr_client.py +3104 -117
  110. tccli/services/emr/v20190103/api.json +15311 -4361
  111. tccli/services/emr/v20190103/examples.json +452 -42
  112. tccli/services/es/es_client.py +105 -42
  113. tccli/services/facefusion/facefusion_client.py +15 -6
  114. tccli/services/faceid/faceid_client.py +95 -38
  115. tccli/services/faceid/v20180301/api.json +172 -45
  116. tccli/services/faceid/v20180301/examples.json +3 -3
  117. tccli/services/gaap/gaap_client.py +440 -176
  118. tccli/services/gme/gme_client.py +50 -20
  119. tccli/services/gpm/gpm_client.py +90 -36
  120. tccli/services/gse/gse_client.py +110 -44
  121. tccli/services/gwlb/gwlb_client.py +90 -36
  122. tccli/services/hunyuan/__init__.py +4 -0
  123. tccli/services/hunyuan/hunyuan_client.py +490 -0
  124. tccli/services/hunyuan/v20230901/api.json +566 -0
  125. tccli/services/hunyuan/v20230901/examples.json +52 -0
  126. tccli/services/iai/iai_client.py +145 -58
  127. tccli/services/iai/v20200303/api.json +187 -51
  128. tccli/services/iai/v20200303/examples.json +30 -12
  129. tccli/services/iap/iap_client.py +30 -12
  130. tccli/services/ims/ims_client.py +5 -2
  131. tccli/services/ims/v20201229/api.json +133 -141
  132. tccli/services/ims/v20201229/examples.json +3 -3
  133. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +363 -78
  134. tccli/services/intlpartnersmgt/v20220928/api.json +513 -22
  135. tccli/services/intlpartnersmgt/v20220928/examples.json +24 -0
  136. tccli/services/iotcloud/iotcloud_client.py +100 -40
  137. tccli/services/iotcloud/v20210408/api.json +216 -107
  138. tccli/services/iotcloud/v20210408/examples.json +9 -9
  139. tccli/services/ip/ip_client.py +30 -12
  140. tccli/services/kms/kms_client.py +1226 -227
  141. tccli/services/kms/v20190118/api.json +1465 -123
  142. tccli/services/kms/v20190118/examples.json +129 -3
  143. tccli/services/lcic/lcic_client.py +265 -106
  144. tccli/services/lighthouse/lighthouse_client.py +730 -172
  145. tccli/services/lighthouse/v20200324/api.json +502 -14
  146. tccli/services/lighthouse/v20200324/examples.json +59 -5
  147. tccli/services/live/live_client.py +804 -232
  148. tccli/services/live/v20180801/api.json +272 -0
  149. tccli/services/live/v20180801/examples.json +32 -0
  150. tccli/services/lke/__init__.py +4 -0
  151. tccli/services/lke/lke_client.py +5194 -0
  152. tccli/services/lke/v20231130/api.json +14803 -0
  153. tccli/services/lke/v20231130/examples.json +736 -0
  154. tccli/services/lkeap/__init__.py +4 -0
  155. tccli/services/lkeap/lkeap_client.py +602 -0
  156. tccli/services/lkeap/v20240522/api.json +989 -0
  157. tccli/services/lkeap/v20240522/examples.json +92 -0
  158. tccli/services/mariadb/mariadb_client.py +250 -100
  159. tccli/services/mdc/mdc_client.py +90 -36
  160. tccli/services/mdl/mdl_client.py +402 -82
  161. tccli/services/mdl/v20200326/api.json +1437 -100
  162. tccli/services/mdl/v20200326/examples.json +48 -16
  163. tccli/services/mdp/mdp_client.py +785 -122
  164. tccli/services/mdp/v20200527/api.json +1336 -49
  165. tccli/services/mdp/v20200527/examples.json +151 -79
  166. tccli/services/message/__init__.py +4 -0
  167. tccli/services/message/message_client.py +210 -0
  168. tccli/services/message/v20181225/api.json +72 -0
  169. tccli/services/message/v20181225/examples.json +13 -0
  170. tccli/services/mongodb/mongodb_client.py +1452 -136
  171. tccli/services/mongodb/v20190725/api.json +4393 -1462
  172. tccli/services/mongodb/v20190725/examples.json +265 -71
  173. tccli/services/monitor/monitor_client.py +1008 -296
  174. tccli/services/monitor/v20180724/api.json +664 -15
  175. tccli/services/monitor/v20180724/examples.json +152 -4
  176. tccli/services/mps/mps_client.py +1878 -379
  177. tccli/services/mps/v20190612/api.json +7473 -1626
  178. tccli/services/mps/v20190612/examples.json +276 -82
  179. tccli/services/mqtt/__init__.py +4 -0
  180. tccli/services/mqtt/mqtt_client.py +1610 -0
  181. tccli/services/mqtt/v20240516/api.json +3057 -0
  182. tccli/services/mqtt/v20240516/examples.json +213 -0
  183. tccli/services/msp/msp_client.py +35 -14
  184. tccli/services/ocr/ocr_client.py +515 -74
  185. tccli/services/ocr/v20181119/api.json +1991 -168
  186. tccli/services/ocr/v20181119/examples.json +58 -4
  187. tccli/services/omics/omics_client.py +100 -40
  188. tccli/services/organization/organization_client.py +580 -232
  189. tccli/services/postgres/postgres_client.py +455 -182
  190. tccli/services/postgres/v20170312/api.json +134 -109
  191. tccli/services/postgres/v20170312/examples.json +14 -14
  192. tccli/services/privatedns/privatedns_client.py +206 -60
  193. tccli/services/privatedns/v20201028/api.json +179 -0
  194. tccli/services/privatedns/v20201028/examples.json +8 -0
  195. tccli/services/pts/pts_client.py +240 -96
  196. tccli/services/quota/__init__.py +4 -0
  197. tccli/services/quota/quota_client.py +434 -0
  198. tccli/services/quota/v20241204/api.json +548 -0
  199. tccli/services/quota/v20241204/examples.json +51 -0
  200. tccli/services/rce/rce_client.py +5 -2
  201. tccli/services/redis/redis_client.py +698 -212
  202. tccli/services/redis/v20180412/api.json +968 -563
  203. tccli/services/redis/v20180412/examples.json +98 -56
  204. tccli/services/region/__init__.py +4 -0
  205. tccli/services/region/region_client.py +322 -0
  206. tccli/services/region/v20220627/api.json +399 -0
  207. tccli/services/region/v20220627/examples.json +29 -0
  208. tccli/services/rum/rum_client.py +300 -120
  209. tccli/services/scf/scf_client.py +210 -84
  210. tccli/services/ses/ses_client.py +368 -69
  211. tccli/services/ses/v20201002/api.json +240 -0
  212. tccli/services/ses/v20201002/examples.json +32 -0
  213. tccli/services/smh/__init__.py +4 -0
  214. tccli/services/smh/smh_client.py +714 -0
  215. tccli/services/smh/v20210712/api.json +1287 -0
  216. tccli/services/smh/v20210712/examples.json +85 -0
  217. tccli/services/sms/sms_client.py +90 -36
  218. tccli/services/sqlserver/sqlserver_client.py +3855 -470
  219. tccli/services/sqlserver/v20180328/api.json +9757 -3347
  220. tccli/services/sqlserver/v20180328/examples.json +480 -20
  221. tccli/services/ssl/ssl_client.py +504 -72
  222. tccli/services/ssl/v20191205/api.json +789 -21
  223. tccli/services/ssl/v20191205/examples.json +54 -0
  224. tccli/services/ssm/ssm_client.py +120 -48
  225. tccli/services/sts/sts_client.py +25 -10
  226. tccli/services/tag/tag_client.py +150 -60
  227. tccli/services/tat/tat_client.py +95 -38
  228. tccli/services/tbaas/tbaas_client.py +20 -8
  229. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  230. tccli/services/tcaplusdb/v20190823/api.json +836 -760
  231. tccli/services/tcaplusdb/v20190823/examples.json +3 -3
  232. tccli/services/tchd/tchd_client.py +5 -2
  233. tccli/services/tcmpp/tcmpp_client.py +520 -208
  234. tccli/services/tcr/tcr_client.py +380 -152
  235. tccli/services/tcsas/tcsas_client.py +295 -118
  236. tccli/services/tcsas/v20250106/api.json +1084 -980
  237. tccli/services/tcsas/v20250106/examples.json +15 -15
  238. tccli/services/tcss/tcss_client.py +1650 -660
  239. tccli/services/tdid/tdid_client.py +240 -96
  240. tccli/services/tdmq/tdmq_client.py +2876 -466
  241. tccli/services/tdmq/v20200217/api.json +11607 -3958
  242. tccli/services/tdmq/v20200217/examples.json +562 -264
  243. tccli/services/tem/tem_client.py +280 -112
  244. tccli/services/teo/teo_client.py +4507 -966
  245. tccli/services/teo/v20220901/api.json +7341 -1405
  246. tccli/services/teo/v20220901/examples.json +679 -99
  247. tccli/services/tione/__init__.py +4 -0
  248. tccli/services/tione/tione_client.py +210 -0
  249. tccli/services/tione/v20211111/api.json +3074 -0
  250. tccli/services/tione/v20211111/examples.json +12 -0
  251. tccli/services/tiw/tiw_client.py +255 -102
  252. tccli/services/tke/tke_client.py +858 -276
  253. tccli/services/tke/v20180525/api.json +227 -0
  254. tccli/services/tke/v20180525/examples.json +24 -0
  255. tccli/services/tms/tms_client.py +5 -2
  256. tccli/services/tms/v20201229/api.json +91 -100
  257. tccli/services/tmt/tmt_client.py +5 -2
  258. tccli/services/trabbit/trabbit_client.py +145 -58
  259. tccli/services/trocket/__init__.py +4 -0
  260. tccli/services/trocket/trocket_client.py +2450 -0
  261. tccli/services/trocket/v20230308/api.json +6062 -0
  262. tccli/services/trocket/v20230308/examples.json +339 -0
  263. tccli/services/trro/trro_client.py +95 -38
  264. tccli/services/trtc/trtc_client.py +928 -192
  265. tccli/services/trtc/v20190722/api.json +1810 -256
  266. tccli/services/trtc/v20190722/examples.json +100 -6
  267. tccli/services/tts/tts_client.py +5 -2
  268. tccli/services/vclm/vclm_client.py +10 -4
  269. tccli/services/vm/v20210922/api.json +61 -30
  270. tccli/services/vm/v20210922/examples.json +0 -12
  271. tccli/services/vm/vm_client.py +20 -8
  272. tccli/services/vod/v20180717/api.json +531 -54
  273. tccli/services/vod/v20180717/examples.json +25 -7
  274. tccli/services/vod/v20240718/api.json +1105 -0
  275. tccli/services/vod/v20240718/examples.json +97 -0
  276. tccli/services/vod/vod_client.py +1428 -350
  277. tccli/services/vpc/v20170312/api.json +1031 -133
  278. tccli/services/vpc/v20170312/examples.json +119 -23
  279. tccli/services/vpc/vpc_client.py +2159 -644
  280. tccli/services/waf/v20180125/api.json +1372 -194
  281. tccli/services/waf/v20180125/examples.json +89 -1
  282. tccli/services/waf/waf_client.py +1149 -245
  283. tccli/services/wedata/v20250806/api.json +13644 -0
  284. tccli/services/wedata/v20250806/examples.json +621 -0
  285. tccli/services/wedata/wedata_client.py +6067 -1263
  286. tccli/services/yunjing/yunjing_client.py +355 -142
  287. {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/METADATA +4 -7
  288. {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/RECORD +292 -232
  289. {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/WHEEL +1 -1
  290. {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/entry_points.txt +0 -1
  291. {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/LICENSE +0 -0
  292. {tccli_intl_en-3.0.1188.1.dist-info → tccli_intl_en-3.1.28.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doDescribeRoute(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doDescribeRoute(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDescribeGroupInfo(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDescribeGroupInfo(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doCreateConsumer(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doCreateConsumer(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doCreateAcl(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doCreateAcl(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -225,7 +237,7 @@ def doCreateAcl(args, parsed_globals):
225
237
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
238
 
227
239
 
228
- def doCreateInstancePost(args, parsed_globals):
240
+ def doDescribeTypeInstances(args, parsed_globals):
229
241
  g_param = parse_global_arg(parsed_globals)
230
242
 
231
243
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -235,7 +247,10 @@ def doCreateInstancePost(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,18 +262,73 @@ def doCreateInstancePost(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
254
269
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
255
270
  client._sdkVersion += ("_CLI_" + __version__)
256
271
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.CreateInstancePostRequest()
272
+ model = models.DescribeTypeInstancesRequest()
258
273
  model.from_json_string(json.dumps(args))
259
274
  start_time = time.time()
260
275
  while True:
261
- rsp = client.CreateInstancePost(model)
276
+ rsp = client.DescribeTypeInstances(model)
277
+ result = rsp.to_json_string()
278
+ try:
279
+ json_obj = json.loads(result)
280
+ except TypeError as e:
281
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
282
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
283
+ break
284
+ cur_time = time.time()
285
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
286
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
287
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
288
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
289
+ else:
290
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
291
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
292
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
293
+
294
+
295
+ def doDescribeDatahubTopics(args, parsed_globals):
296
+ g_param = parse_global_arg(parsed_globals)
297
+
298
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
299
+ cred = credential.CVMRoleCredential()
300
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
301
+ cred = credential.STSAssumeRoleCredential(
302
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
303
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
304
+ )
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
309
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
310
+ else:
311
+ cred = credential.Credential(
312
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
313
+ )
314
+ http_profile = HttpProfile(
315
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
316
+ reqMethod="POST",
317
+ endpoint=g_param[OptionsDefine.Endpoint],
318
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
319
+ )
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
321
+ if g_param[OptionsDefine.Language]:
322
+ profile.language = g_param[OptionsDefine.Language]
323
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
324
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
325
+ client._sdkVersion += ("_CLI_" + __version__)
326
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
327
+ model = models.DescribeDatahubTopicsRequest()
328
+ model.from_json_string(json.dumps(args))
329
+ start_time = time.time()
330
+ while True:
331
+ rsp = client.DescribeDatahubTopics(model)
262
332
  result = rsp.to_json_string()
263
333
  try:
264
334
  json_obj = json.loads(result)
@@ -287,7 +357,670 @@ def doDescribeAclRule(args, parsed_globals):
287
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
359
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
364
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
365
+ else:
366
+ cred = credential.Credential(
367
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
368
+ )
369
+ http_profile = HttpProfile(
370
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
371
+ reqMethod="POST",
372
+ endpoint=g_param[OptionsDefine.Endpoint],
373
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
374
+ )
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
376
+ if g_param[OptionsDefine.Language]:
377
+ profile.language = g_param[OptionsDefine.Language]
378
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
379
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
380
+ client._sdkVersion += ("_CLI_" + __version__)
381
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
382
+ model = models.DescribeAclRuleRequest()
383
+ model.from_json_string(json.dumps(args))
384
+ start_time = time.time()
385
+ while True:
386
+ rsp = client.DescribeAclRule(model)
387
+ result = rsp.to_json_string()
388
+ try:
389
+ json_obj = json.loads(result)
390
+ except TypeError as e:
391
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
392
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
393
+ break
394
+ cur_time = time.time()
395
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
396
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
397
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
398
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
399
+ else:
400
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
401
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
402
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
403
+
404
+
405
+ def doCreateTopic(args, parsed_globals):
406
+ g_param = parse_global_arg(parsed_globals)
407
+
408
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
409
+ cred = credential.CVMRoleCredential()
410
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
411
+ cred = credential.STSAssumeRoleCredential(
412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
413
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
414
+ )
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
419
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
420
+ else:
421
+ cred = credential.Credential(
422
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
423
+ )
424
+ http_profile = HttpProfile(
425
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
426
+ reqMethod="POST",
427
+ endpoint=g_param[OptionsDefine.Endpoint],
428
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
429
+ )
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
431
+ if g_param[OptionsDefine.Language]:
432
+ profile.language = g_param[OptionsDefine.Language]
433
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
434
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
435
+ client._sdkVersion += ("_CLI_" + __version__)
436
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
437
+ model = models.CreateTopicRequest()
438
+ model.from_json_string(json.dumps(args))
439
+ start_time = time.time()
440
+ while True:
441
+ rsp = client.CreateTopic(model)
442
+ result = rsp.to_json_string()
443
+ try:
444
+ json_obj = json.loads(result)
445
+ except TypeError as e:
446
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
447
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
448
+ break
449
+ cur_time = time.time()
450
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
451
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
452
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
453
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
454
+ else:
455
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
456
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
457
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
458
+
459
+
460
+ def doDescribeSecurityGroupRoutes(args, parsed_globals):
461
+ g_param = parse_global_arg(parsed_globals)
462
+
463
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
464
+ cred = credential.CVMRoleCredential()
465
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
466
+ cred = credential.STSAssumeRoleCredential(
467
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
468
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
469
+ )
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
474
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
475
+ else:
476
+ cred = credential.Credential(
477
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
478
+ )
479
+ http_profile = HttpProfile(
480
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
481
+ reqMethod="POST",
482
+ endpoint=g_param[OptionsDefine.Endpoint],
483
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
484
+ )
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
486
+ if g_param[OptionsDefine.Language]:
487
+ profile.language = g_param[OptionsDefine.Language]
488
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
489
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
490
+ client._sdkVersion += ("_CLI_" + __version__)
491
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
492
+ model = models.DescribeSecurityGroupRoutesRequest()
493
+ model.from_json_string(json.dumps(args))
494
+ start_time = time.time()
495
+ while True:
496
+ rsp = client.DescribeSecurityGroupRoutes(model)
497
+ result = rsp.to_json_string()
498
+ try:
499
+ json_obj = json.loads(result)
500
+ except TypeError as e:
501
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
502
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
503
+ break
504
+ cur_time = time.time()
505
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
506
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
507
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
508
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
509
+ else:
510
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
511
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
512
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
513
+
514
+
515
+ def doBatchModifyTopicAttributes(args, parsed_globals):
516
+ g_param = parse_global_arg(parsed_globals)
517
+
518
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
519
+ cred = credential.CVMRoleCredential()
520
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
521
+ cred = credential.STSAssumeRoleCredential(
522
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
523
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
524
+ )
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
529
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
530
+ else:
531
+ cred = credential.Credential(
532
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
533
+ )
534
+ http_profile = HttpProfile(
535
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
536
+ reqMethod="POST",
537
+ endpoint=g_param[OptionsDefine.Endpoint],
538
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
539
+ )
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
541
+ if g_param[OptionsDefine.Language]:
542
+ profile.language = g_param[OptionsDefine.Language]
543
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
544
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
545
+ client._sdkVersion += ("_CLI_" + __version__)
546
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
547
+ model = models.BatchModifyTopicAttributesRequest()
548
+ model.from_json_string(json.dumps(args))
549
+ start_time = time.time()
550
+ while True:
551
+ rsp = client.BatchModifyTopicAttributes(model)
552
+ result = rsp.to_json_string()
553
+ try:
554
+ json_obj = json.loads(result)
555
+ except TypeError as e:
556
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
557
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
558
+ break
559
+ cur_time = time.time()
560
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
561
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
562
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
563
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
564
+ else:
565
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
566
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
567
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
568
+
569
+
570
+ def doDeleteRoute(args, parsed_globals):
571
+ g_param = parse_global_arg(parsed_globals)
572
+
573
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
574
+ cred = credential.CVMRoleCredential()
575
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
576
+ cred = credential.STSAssumeRoleCredential(
577
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
578
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
579
+ )
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
584
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
585
+ else:
586
+ cred = credential.Credential(
587
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
588
+ )
589
+ http_profile = HttpProfile(
590
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
591
+ reqMethod="POST",
592
+ endpoint=g_param[OptionsDefine.Endpoint],
593
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
594
+ )
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
596
+ if g_param[OptionsDefine.Language]:
597
+ profile.language = g_param[OptionsDefine.Language]
598
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
599
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
600
+ client._sdkVersion += ("_CLI_" + __version__)
601
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
602
+ model = models.DeleteRouteRequest()
603
+ model.from_json_string(json.dumps(args))
604
+ start_time = time.time()
605
+ while True:
606
+ rsp = client.DeleteRoute(model)
607
+ result = rsp.to_json_string()
608
+ try:
609
+ json_obj = json.loads(result)
610
+ except TypeError as e:
611
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
612
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
613
+ break
614
+ cur_time = time.time()
615
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
616
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
617
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
618
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
619
+ else:
620
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
621
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
622
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
623
+
624
+
625
+ def doSendMessage(args, parsed_globals):
626
+ g_param = parse_global_arg(parsed_globals)
627
+
628
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
629
+ cred = credential.CVMRoleCredential()
630
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
631
+ cred = credential.STSAssumeRoleCredential(
632
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
633
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
634
+ )
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
639
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
640
+ else:
641
+ cred = credential.Credential(
642
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
643
+ )
644
+ http_profile = HttpProfile(
645
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
646
+ reqMethod="POST",
647
+ endpoint=g_param[OptionsDefine.Endpoint],
648
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
649
+ )
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
651
+ if g_param[OptionsDefine.Language]:
652
+ profile.language = g_param[OptionsDefine.Language]
653
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
654
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
655
+ client._sdkVersion += ("_CLI_" + __version__)
656
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
657
+ model = models.SendMessageRequest()
658
+ model.from_json_string(json.dumps(args))
659
+ start_time = time.time()
660
+ while True:
661
+ rsp = client.SendMessage(model)
662
+ result = rsp.to_json_string()
663
+ try:
664
+ json_obj = json.loads(result)
665
+ except TypeError as e:
666
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
667
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
668
+ break
669
+ cur_time = time.time()
670
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
671
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
672
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
673
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
674
+ else:
675
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
676
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
677
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
678
+
679
+
680
+ def doDescribeUser(args, parsed_globals):
681
+ g_param = parse_global_arg(parsed_globals)
682
+
683
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
684
+ cred = credential.CVMRoleCredential()
685
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
686
+ cred = credential.STSAssumeRoleCredential(
687
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
688
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
689
+ )
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
694
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
695
+ else:
696
+ cred = credential.Credential(
697
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
698
+ )
699
+ http_profile = HttpProfile(
700
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
701
+ reqMethod="POST",
702
+ endpoint=g_param[OptionsDefine.Endpoint],
703
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
704
+ )
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
706
+ if g_param[OptionsDefine.Language]:
707
+ profile.language = g_param[OptionsDefine.Language]
708
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
709
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
710
+ client._sdkVersion += ("_CLI_" + __version__)
711
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
712
+ model = models.DescribeUserRequest()
713
+ model.from_json_string(json.dumps(args))
714
+ start_time = time.time()
715
+ while True:
716
+ rsp = client.DescribeUser(model)
717
+ result = rsp.to_json_string()
718
+ try:
719
+ json_obj = json.loads(result)
720
+ except TypeError as e:
721
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
722
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
723
+ break
724
+ cur_time = time.time()
725
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
726
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
727
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
728
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
729
+ else:
730
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
731
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
732
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
733
+
734
+
735
+ def doDescribeGroup(args, parsed_globals):
736
+ g_param = parse_global_arg(parsed_globals)
737
+
738
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
739
+ cred = credential.CVMRoleCredential()
740
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
741
+ cred = credential.STSAssumeRoleCredential(
742
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
743
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
744
+ )
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
749
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
750
+ else:
751
+ cred = credential.Credential(
752
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
753
+ )
754
+ http_profile = HttpProfile(
755
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
756
+ reqMethod="POST",
757
+ endpoint=g_param[OptionsDefine.Endpoint],
758
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
759
+ )
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
761
+ if g_param[OptionsDefine.Language]:
762
+ profile.language = g_param[OptionsDefine.Language]
763
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
764
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
765
+ client._sdkVersion += ("_CLI_" + __version__)
766
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
767
+ model = models.DescribeGroupRequest()
768
+ model.from_json_string(json.dumps(args))
769
+ start_time = time.time()
770
+ while True:
771
+ rsp = client.DescribeGroup(model)
772
+ result = rsp.to_json_string()
773
+ try:
774
+ json_obj = json.loads(result)
775
+ except TypeError as e:
776
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
777
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
778
+ break
779
+ cur_time = time.time()
780
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
781
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
782
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
783
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
784
+ else:
785
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
786
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
787
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
788
+
789
+
790
+ def doCreateTopicIpWhiteList(args, parsed_globals):
791
+ g_param = parse_global_arg(parsed_globals)
792
+
793
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
794
+ cred = credential.CVMRoleCredential()
795
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
796
+ cred = credential.STSAssumeRoleCredential(
797
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
798
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
799
+ )
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
804
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
805
+ else:
806
+ cred = credential.Credential(
807
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
808
+ )
809
+ http_profile = HttpProfile(
810
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
811
+ reqMethod="POST",
812
+ endpoint=g_param[OptionsDefine.Endpoint],
813
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
814
+ )
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
816
+ if g_param[OptionsDefine.Language]:
817
+ profile.language = g_param[OptionsDefine.Language]
818
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
819
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
820
+ client._sdkVersion += ("_CLI_" + __version__)
821
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
822
+ model = models.CreateTopicIpWhiteListRequest()
823
+ model.from_json_string(json.dumps(args))
824
+ start_time = time.time()
825
+ while True:
826
+ rsp = client.CreateTopicIpWhiteList(model)
827
+ result = rsp.to_json_string()
828
+ try:
829
+ json_obj = json.loads(result)
830
+ except TypeError as e:
831
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
832
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
833
+ break
834
+ cur_time = time.time()
835
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
836
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
837
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
838
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
839
+ else:
840
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
841
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
842
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
843
+
844
+
845
+ def doDescribeCkafkaVersion(args, parsed_globals):
846
+ g_param = parse_global_arg(parsed_globals)
847
+
848
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
849
+ cred = credential.CVMRoleCredential()
850
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
851
+ cred = credential.STSAssumeRoleCredential(
852
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
853
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
854
+ )
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
859
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
860
+ else:
861
+ cred = credential.Credential(
862
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
863
+ )
864
+ http_profile = HttpProfile(
865
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
866
+ reqMethod="POST",
867
+ endpoint=g_param[OptionsDefine.Endpoint],
868
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
869
+ )
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
871
+ if g_param[OptionsDefine.Language]:
872
+ profile.language = g_param[OptionsDefine.Language]
873
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
874
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
875
+ client._sdkVersion += ("_CLI_" + __version__)
876
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
877
+ model = models.DescribeCkafkaVersionRequest()
878
+ model.from_json_string(json.dumps(args))
879
+ start_time = time.time()
880
+ while True:
881
+ rsp = client.DescribeCkafkaVersion(model)
882
+ result = rsp.to_json_string()
883
+ try:
884
+ json_obj = json.loads(result)
885
+ except TypeError as e:
886
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
887
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
888
+ break
889
+ cur_time = time.time()
890
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
891
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
892
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
893
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
894
+ else:
895
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
896
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
897
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
898
+
899
+
900
+ def doModifyGroupOffsets(args, parsed_globals):
901
+ g_param = parse_global_arg(parsed_globals)
902
+
903
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
904
+ cred = credential.CVMRoleCredential()
905
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
906
+ cred = credential.STSAssumeRoleCredential(
907
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
908
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
909
+ )
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
914
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
915
+ else:
916
+ cred = credential.Credential(
917
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
918
+ )
919
+ http_profile = HttpProfile(
920
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
921
+ reqMethod="POST",
922
+ endpoint=g_param[OptionsDefine.Endpoint],
923
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
924
+ )
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
926
+ if g_param[OptionsDefine.Language]:
927
+ profile.language = g_param[OptionsDefine.Language]
928
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
929
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
930
+ client._sdkVersion += ("_CLI_" + __version__)
931
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
932
+ model = models.ModifyGroupOffsetsRequest()
933
+ model.from_json_string(json.dumps(args))
934
+ start_time = time.time()
935
+ while True:
936
+ rsp = client.ModifyGroupOffsets(model)
937
+ result = rsp.to_json_string()
938
+ try:
939
+ json_obj = json.loads(result)
940
+ except TypeError as e:
941
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
942
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
943
+ break
944
+ cur_time = time.time()
945
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
946
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
947
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
948
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
949
+ else:
950
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
951
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
952
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
953
+
954
+
955
+ def doUpgradeBrokerVersion(args, parsed_globals):
956
+ g_param = parse_global_arg(parsed_globals)
957
+
958
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
959
+ cred = credential.CVMRoleCredential()
960
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
961
+ cred = credential.STSAssumeRoleCredential(
962
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
963
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
964
+ )
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
969
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
970
+ else:
971
+ cred = credential.Credential(
972
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
973
+ )
974
+ http_profile = HttpProfile(
975
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
976
+ reqMethod="POST",
977
+ endpoint=g_param[OptionsDefine.Endpoint],
978
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
979
+ )
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
981
+ if g_param[OptionsDefine.Language]:
982
+ profile.language = g_param[OptionsDefine.Language]
983
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
984
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
985
+ client._sdkVersion += ("_CLI_" + __version__)
986
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
987
+ model = models.UpgradeBrokerVersionRequest()
988
+ model.from_json_string(json.dumps(args))
989
+ start_time = time.time()
990
+ while True:
991
+ rsp = client.UpgradeBrokerVersion(model)
992
+ result = rsp.to_json_string()
993
+ try:
994
+ json_obj = json.loads(result)
995
+ except TypeError as e:
996
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
997
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
998
+ break
999
+ cur_time = time.time()
1000
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1001
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1002
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1003
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1004
+ else:
1005
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1006
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1007
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1008
+
1009
+
1010
+ def doDescribeInstances(args, parsed_globals):
1011
+ g_param = parse_global_arg(parsed_globals)
1012
+
1013
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1014
+ cred = credential.CVMRoleCredential()
1015
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1016
+ cred = credential.STSAssumeRoleCredential(
1017
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
+ )
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
1025
  else:
293
1026
  cred = credential.Credential(
@@ -299,18 +1032,18 @@ def doDescribeAclRule(args, parsed_globals):
299
1032
  endpoint=g_param[OptionsDefine.Endpoint],
300
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
1034
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
1036
  if g_param[OptionsDefine.Language]:
304
1037
  profile.language = g_param[OptionsDefine.Language]
305
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
306
1039
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
307
1040
  client._sdkVersion += ("_CLI_" + __version__)
308
1041
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.DescribeAclRuleRequest()
1042
+ model = models.DescribeInstancesRequest()
310
1043
  model.from_json_string(json.dumps(args))
311
1044
  start_time = time.time()
312
1045
  while True:
313
- rsp = client.DescribeAclRule(model)
1046
+ rsp = client.DescribeInstances(model)
314
1047
  result = rsp.to_json_string()
315
1048
  try:
316
1049
  json_obj = json.loads(result)
@@ -329,7 +1062,7 @@ def doDescribeAclRule(args, parsed_globals):
329
1062
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
1063
 
331
1064
 
332
- def doCreateTopic(args, parsed_globals):
1065
+ def doDescribeCvmInfo(args, parsed_globals):
333
1066
  g_param = parse_global_arg(parsed_globals)
334
1067
 
335
1068
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -339,7 +1072,10 @@ def doCreateTopic(args, parsed_globals):
339
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
1074
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
1080
  else:
345
1081
  cred = credential.Credential(
@@ -351,18 +1087,18 @@ def doCreateTopic(args, parsed_globals):
351
1087
  endpoint=g_param[OptionsDefine.Endpoint],
352
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
1089
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
1091
  if g_param[OptionsDefine.Language]:
356
1092
  profile.language = g_param[OptionsDefine.Language]
357
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
1094
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
359
1095
  client._sdkVersion += ("_CLI_" + __version__)
360
1096
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.CreateTopicRequest()
1097
+ model = models.DescribeCvmInfoRequest()
362
1098
  model.from_json_string(json.dumps(args))
363
1099
  start_time = time.time()
364
1100
  while True:
365
- rsp = client.CreateTopic(model)
1101
+ rsp = client.DescribeCvmInfo(model)
366
1102
  result = rsp.to_json_string()
367
1103
  try:
368
1104
  json_obj = json.loads(result)
@@ -381,7 +1117,7 @@ def doCreateTopic(args, parsed_globals):
381
1117
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
1118
 
383
1119
 
384
- def doModifyInstancePre(args, parsed_globals):
1120
+ def doDescribeDatahubTopic(args, parsed_globals):
385
1121
  g_param = parse_global_arg(parsed_globals)
386
1122
 
387
1123
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -391,7 +1127,10 @@ def doModifyInstancePre(args, parsed_globals):
391
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
1129
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
1135
  else:
397
1136
  cred = credential.Credential(
@@ -403,18 +1142,18 @@ def doModifyInstancePre(args, parsed_globals):
403
1142
  endpoint=g_param[OptionsDefine.Endpoint],
404
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
1144
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
1146
  if g_param[OptionsDefine.Language]:
408
1147
  profile.language = g_param[OptionsDefine.Language]
409
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
1149
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
411
1150
  client._sdkVersion += ("_CLI_" + __version__)
412
1151
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.ModifyInstancePreRequest()
1152
+ model = models.DescribeDatahubTopicRequest()
414
1153
  model.from_json_string(json.dumps(args))
415
1154
  start_time = time.time()
416
1155
  while True:
417
- rsp = client.ModifyInstancePre(model)
1156
+ rsp = client.DescribeDatahubTopic(model)
418
1157
  result = rsp.to_json_string()
419
1158
  try:
420
1159
  json_obj = json.loads(result)
@@ -433,7 +1172,7 @@ def doModifyInstancePre(args, parsed_globals):
433
1172
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
1173
 
435
1174
 
436
- def doBatchModifyTopicAttributes(args, parsed_globals):
1175
+ def doCreateRoute(args, parsed_globals):
437
1176
  g_param = parse_global_arg(parsed_globals)
438
1177
 
439
1178
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -443,7 +1182,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
443
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
1184
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
1190
  else:
449
1191
  cred = credential.Credential(
@@ -455,18 +1197,18 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
455
1197
  endpoint=g_param[OptionsDefine.Endpoint],
456
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
1199
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
1201
  if g_param[OptionsDefine.Language]:
460
1202
  profile.language = g_param[OptionsDefine.Language]
461
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
462
1204
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
463
1205
  client._sdkVersion += ("_CLI_" + __version__)
464
1206
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.BatchModifyTopicAttributesRequest()
1207
+ model = models.CreateRouteRequest()
466
1208
  model.from_json_string(json.dumps(args))
467
1209
  start_time = time.time()
468
1210
  while True:
469
- rsp = client.BatchModifyTopicAttributes(model)
1211
+ rsp = client.CreateRoute(model)
470
1212
  result = rsp.to_json_string()
471
1213
  try:
472
1214
  json_obj = json.loads(result)
@@ -485,7 +1227,7 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
485
1227
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
1228
 
487
1229
 
488
- def doDeleteRoute(args, parsed_globals):
1230
+ def doDeleteGroupSubscribeTopic(args, parsed_globals):
489
1231
  g_param = parse_global_arg(parsed_globals)
490
1232
 
491
1233
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -495,7 +1237,10 @@ def doDeleteRoute(args, parsed_globals):
495
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
1239
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
1245
  else:
501
1246
  cred = credential.Credential(
@@ -507,18 +1252,18 @@ def doDeleteRoute(args, parsed_globals):
507
1252
  endpoint=g_param[OptionsDefine.Endpoint],
508
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
1254
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
1256
  if g_param[OptionsDefine.Language]:
512
1257
  profile.language = g_param[OptionsDefine.Language]
513
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
514
1259
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
515
1260
  client._sdkVersion += ("_CLI_" + __version__)
516
1261
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.DeleteRouteRequest()
1262
+ model = models.DeleteGroupSubscribeTopicRequest()
518
1263
  model.from_json_string(json.dumps(args))
519
1264
  start_time = time.time()
520
1265
  while True:
521
- rsp = client.DeleteRoute(model)
1266
+ rsp = client.DeleteGroupSubscribeTopic(model)
522
1267
  result = rsp.to_json_string()
523
1268
  try:
524
1269
  json_obj = json.loads(result)
@@ -537,7 +1282,7 @@ def doDeleteRoute(args, parsed_globals):
537
1282
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
1283
 
539
1284
 
540
- def doSendMessage(args, parsed_globals):
1285
+ def doDeleteGroup(args, parsed_globals):
541
1286
  g_param = parse_global_arg(parsed_globals)
542
1287
 
543
1288
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -547,7 +1292,10 @@ def doSendMessage(args, parsed_globals):
547
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
1294
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
1300
  else:
553
1301
  cred = credential.Credential(
@@ -559,18 +1307,18 @@ def doSendMessage(args, parsed_globals):
559
1307
  endpoint=g_param[OptionsDefine.Endpoint],
560
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
1309
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
1311
  if g_param[OptionsDefine.Language]:
564
1312
  profile.language = g_param[OptionsDefine.Language]
565
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
566
1314
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
567
1315
  client._sdkVersion += ("_CLI_" + __version__)
568
1316
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.SendMessageRequest()
1317
+ model = models.DeleteGroupRequest()
570
1318
  model.from_json_string(json.dumps(args))
571
1319
  start_time = time.time()
572
1320
  while True:
573
- rsp = client.SendMessage(model)
1321
+ rsp = client.DeleteGroup(model)
574
1322
  result = rsp.to_json_string()
575
1323
  try:
576
1324
  json_obj = json.loads(result)
@@ -589,7 +1337,7 @@ def doSendMessage(args, parsed_globals):
589
1337
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
1338
 
591
1339
 
592
- def doDescribeUser(args, parsed_globals):
1340
+ def doModifyDatahubTopic(args, parsed_globals):
593
1341
  g_param = parse_global_arg(parsed_globals)
594
1342
 
595
1343
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -599,7 +1347,10 @@ def doDescribeUser(args, parsed_globals):
599
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
1349
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
1355
  else:
605
1356
  cred = credential.Credential(
@@ -611,18 +1362,18 @@ def doDescribeUser(args, parsed_globals):
611
1362
  endpoint=g_param[OptionsDefine.Endpoint],
612
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
1364
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
1366
  if g_param[OptionsDefine.Language]:
616
1367
  profile.language = g_param[OptionsDefine.Language]
617
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
618
1369
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
619
1370
  client._sdkVersion += ("_CLI_" + __version__)
620
1371
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.DescribeUserRequest()
1372
+ model = models.ModifyDatahubTopicRequest()
622
1373
  model.from_json_string(json.dumps(args))
623
1374
  start_time = time.time()
624
1375
  while True:
625
- rsp = client.DescribeUser(model)
1376
+ rsp = client.ModifyDatahubTopic(model)
626
1377
  result = rsp.to_json_string()
627
1378
  try:
628
1379
  json_obj = json.loads(result)
@@ -641,7 +1392,7 @@ def doDescribeUser(args, parsed_globals):
641
1392
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
1393
 
643
1394
 
644
- def doCreateTopicIpWhiteList(args, parsed_globals):
1395
+ def doFetchMessageListByOffset(args, parsed_globals):
645
1396
  g_param = parse_global_arg(parsed_globals)
646
1397
 
647
1398
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -651,7 +1402,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
651
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
1404
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
1410
  else:
657
1411
  cred = credential.Credential(
@@ -663,18 +1417,18 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
663
1417
  endpoint=g_param[OptionsDefine.Endpoint],
664
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
1419
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
1421
  if g_param[OptionsDefine.Language]:
668
1422
  profile.language = g_param[OptionsDefine.Language]
669
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
670
1424
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
671
1425
  client._sdkVersion += ("_CLI_" + __version__)
672
1426
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.CreateTopicIpWhiteListRequest()
1427
+ model = models.FetchMessageListByOffsetRequest()
674
1428
  model.from_json_string(json.dumps(args))
675
1429
  start_time = time.time()
676
1430
  while True:
677
- rsp = client.CreateTopicIpWhiteList(model)
1431
+ rsp = client.FetchMessageListByOffset(model)
678
1432
  result = rsp.to_json_string()
679
1433
  try:
680
1434
  json_obj = json.loads(result)
@@ -693,7 +1447,7 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
693
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
1448
 
695
1449
 
696
- def doDescribeGroup(args, parsed_globals):
1450
+ def doCreateDatahubTopic(args, parsed_globals):
697
1451
  g_param = parse_global_arg(parsed_globals)
698
1452
 
699
1453
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -703,7 +1457,10 @@ def doDescribeGroup(args, parsed_globals):
703
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
1459
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
1465
  else:
709
1466
  cred = credential.Credential(
@@ -715,18 +1472,18 @@ def doDescribeGroup(args, parsed_globals):
715
1472
  endpoint=g_param[OptionsDefine.Endpoint],
716
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
1474
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
1476
  if g_param[OptionsDefine.Language]:
720
1477
  profile.language = g_param[OptionsDefine.Language]
721
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
722
1479
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
723
1480
  client._sdkVersion += ("_CLI_" + __version__)
724
1481
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.DescribeGroupRequest()
1482
+ model = models.CreateDatahubTopicRequest()
726
1483
  model.from_json_string(json.dumps(args))
727
1484
  start_time = time.time()
728
1485
  while True:
729
- rsp = client.DescribeGroup(model)
1486
+ rsp = client.CreateDatahubTopic(model)
730
1487
  result = rsp.to_json_string()
731
1488
  try:
732
1489
  json_obj = json.loads(result)
@@ -745,7 +1502,7 @@ def doDescribeGroup(args, parsed_globals):
745
1502
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
1503
 
747
1504
 
748
- def doModifyGroupOffsets(args, parsed_globals):
1505
+ def doDeleteInstancePost(args, parsed_globals):
749
1506
  g_param = parse_global_arg(parsed_globals)
750
1507
 
751
1508
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -755,7 +1512,10 @@ def doModifyGroupOffsets(args, parsed_globals):
755
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
1514
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
1520
  else:
761
1521
  cred = credential.Credential(
@@ -767,18 +1527,18 @@ def doModifyGroupOffsets(args, parsed_globals):
767
1527
  endpoint=g_param[OptionsDefine.Endpoint],
768
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
1529
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
1531
  if g_param[OptionsDefine.Language]:
772
1532
  profile.language = g_param[OptionsDefine.Language]
773
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
774
1534
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
775
1535
  client._sdkVersion += ("_CLI_" + __version__)
776
1536
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.ModifyGroupOffsetsRequest()
1537
+ model = models.DeleteInstancePostRequest()
778
1538
  model.from_json_string(json.dumps(args))
779
1539
  start_time = time.time()
780
1540
  while True:
781
- rsp = client.ModifyGroupOffsets(model)
1541
+ rsp = client.DeleteInstancePost(model)
782
1542
  result = rsp.to_json_string()
783
1543
  try:
784
1544
  json_obj = json.loads(result)
@@ -797,7 +1557,7 @@ def doModifyGroupOffsets(args, parsed_globals):
797
1557
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
1558
 
799
1559
 
800
- def doDescribeInstances(args, parsed_globals):
1560
+ def doDescribeACL(args, parsed_globals):
801
1561
  g_param = parse_global_arg(parsed_globals)
802
1562
 
803
1563
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -807,7 +1567,10 @@ def doDescribeInstances(args, parsed_globals):
807
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
1569
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
1575
  else:
813
1576
  cred = credential.Credential(
@@ -819,18 +1582,18 @@ def doDescribeInstances(args, parsed_globals):
819
1582
  endpoint=g_param[OptionsDefine.Endpoint],
820
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
1584
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
1586
  if g_param[OptionsDefine.Language]:
824
1587
  profile.language = g_param[OptionsDefine.Language]
825
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
826
1589
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
827
1590
  client._sdkVersion += ("_CLI_" + __version__)
828
1591
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.DescribeInstancesRequest()
1592
+ model = models.DescribeACLRequest()
830
1593
  model.from_json_string(json.dumps(args))
831
1594
  start_time = time.time()
832
1595
  while True:
833
- rsp = client.DescribeInstances(model)
1596
+ rsp = client.DescribeACL(model)
834
1597
  result = rsp.to_json_string()
835
1598
  try:
836
1599
  json_obj = json.loads(result)
@@ -849,7 +1612,7 @@ def doDescribeInstances(args, parsed_globals):
849
1612
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
1613
 
851
1614
 
852
- def doModifyInstanceAttributes(args, parsed_globals):
1615
+ def doDescribeTopicDetail(args, parsed_globals):
853
1616
  g_param = parse_global_arg(parsed_globals)
854
1617
 
855
1618
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -859,7 +1622,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
859
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1624
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1630
  else:
865
1631
  cred = credential.Credential(
@@ -871,18 +1637,18 @@ def doModifyInstanceAttributes(args, parsed_globals):
871
1637
  endpoint=g_param[OptionsDefine.Endpoint],
872
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
1639
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
1641
  if g_param[OptionsDefine.Language]:
876
1642
  profile.language = g_param[OptionsDefine.Language]
877
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
878
1644
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
879
1645
  client._sdkVersion += ("_CLI_" + __version__)
880
1646
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.ModifyInstanceAttributesRequest()
1647
+ model = models.DescribeTopicDetailRequest()
882
1648
  model.from_json_string(json.dumps(args))
883
1649
  start_time = time.time()
884
1650
  while True:
885
- rsp = client.ModifyInstanceAttributes(model)
1651
+ rsp = client.DescribeTopicDetail(model)
886
1652
  result = rsp.to_json_string()
887
1653
  try:
888
1654
  json_obj = json.loads(result)
@@ -901,7 +1667,7 @@ def doModifyInstanceAttributes(args, parsed_globals):
901
1667
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
1668
 
903
1669
 
904
- def doModifyDatahubTopic(args, parsed_globals):
1670
+ def doCreateInstancePre(args, parsed_globals):
905
1671
  g_param = parse_global_arg(parsed_globals)
906
1672
 
907
1673
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -911,7 +1677,10 @@ def doModifyDatahubTopic(args, parsed_globals):
911
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1679
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1685
  else:
917
1686
  cred = credential.Credential(
@@ -923,18 +1692,18 @@ def doModifyDatahubTopic(args, parsed_globals):
923
1692
  endpoint=g_param[OptionsDefine.Endpoint],
924
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1694
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1696
  if g_param[OptionsDefine.Language]:
928
1697
  profile.language = g_param[OptionsDefine.Language]
929
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
930
1699
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
931
1700
  client._sdkVersion += ("_CLI_" + __version__)
932
1701
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.ModifyDatahubTopicRequest()
1702
+ model = models.CreateInstancePreRequest()
934
1703
  model.from_json_string(json.dumps(args))
935
1704
  start_time = time.time()
936
1705
  while True:
937
- rsp = client.ModifyDatahubTopic(model)
1706
+ rsp = client.CreateInstancePre(model)
938
1707
  result = rsp.to_json_string()
939
1708
  try:
940
1709
  json_obj = json.loads(result)
@@ -953,7 +1722,7 @@ def doModifyDatahubTopic(args, parsed_globals):
953
1722
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
1723
 
955
1724
 
956
- def doFetchMessageListByOffset(args, parsed_globals):
1725
+ def doFetchMessageByOffset(args, parsed_globals):
957
1726
  g_param = parse_global_arg(parsed_globals)
958
1727
 
959
1728
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -963,7 +1732,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
963
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1734
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1740
  else:
969
1741
  cred = credential.Credential(
@@ -975,18 +1747,18 @@ def doFetchMessageListByOffset(args, parsed_globals):
975
1747
  endpoint=g_param[OptionsDefine.Endpoint],
976
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1749
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1751
  if g_param[OptionsDefine.Language]:
980
1752
  profile.language = g_param[OptionsDefine.Language]
981
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
982
1754
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
983
1755
  client._sdkVersion += ("_CLI_" + __version__)
984
1756
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
985
- model = models.FetchMessageListByOffsetRequest()
1757
+ model = models.FetchMessageByOffsetRequest()
986
1758
  model.from_json_string(json.dumps(args))
987
1759
  start_time = time.time()
988
1760
  while True:
989
- rsp = client.FetchMessageListByOffset(model)
1761
+ rsp = client.FetchMessageByOffset(model)
990
1762
  result = rsp.to_json_string()
991
1763
  try:
992
1764
  json_obj = json.loads(result)
@@ -1005,7 +1777,7 @@ def doFetchMessageListByOffset(args, parsed_globals):
1005
1777
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1778
 
1007
1779
 
1008
- def doCreateDatahubTopic(args, parsed_globals):
1780
+ def doDeleteTopicIpWhiteList(args, parsed_globals):
1009
1781
  g_param = parse_global_arg(parsed_globals)
1010
1782
 
1011
1783
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1015,7 +1787,10 @@ def doCreateDatahubTopic(args, parsed_globals):
1015
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1789
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1795
  else:
1021
1796
  cred = credential.Credential(
@@ -1027,18 +1802,18 @@ def doCreateDatahubTopic(args, parsed_globals):
1027
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1804
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1806
  if g_param[OptionsDefine.Language]:
1032
1807
  profile.language = g_param[OptionsDefine.Language]
1033
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1034
1809
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1035
1810
  client._sdkVersion += ("_CLI_" + __version__)
1036
1811
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.CreateDatahubTopicRequest()
1812
+ model = models.DeleteTopicIpWhiteListRequest()
1038
1813
  model.from_json_string(json.dumps(args))
1039
1814
  start_time = time.time()
1040
1815
  while True:
1041
- rsp = client.CreateDatahubTopic(model)
1816
+ rsp = client.DeleteTopicIpWhiteList(model)
1042
1817
  result = rsp.to_json_string()
1043
1818
  try:
1044
1819
  json_obj = json.loads(result)
@@ -1057,7 +1832,7 @@ def doCreateDatahubTopic(args, parsed_globals):
1057
1832
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1833
 
1059
1834
 
1060
- def doDescribeACL(args, parsed_globals):
1835
+ def doModifyPassword(args, parsed_globals):
1061
1836
  g_param = parse_global_arg(parsed_globals)
1062
1837
 
1063
1838
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1067,7 +1842,10 @@ def doDescribeACL(args, parsed_globals):
1067
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1844
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1850
  else:
1073
1851
  cred = credential.Credential(
@@ -1079,18 +1857,18 @@ def doDescribeACL(args, parsed_globals):
1079
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1859
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1861
  if g_param[OptionsDefine.Language]:
1084
1862
  profile.language = g_param[OptionsDefine.Language]
1085
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
1864
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1087
1865
  client._sdkVersion += ("_CLI_" + __version__)
1088
1866
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.DescribeACLRequest()
1867
+ model = models.ModifyPasswordRequest()
1090
1868
  model.from_json_string(json.dumps(args))
1091
1869
  start_time = time.time()
1092
1870
  while True:
1093
- rsp = client.DescribeACL(model)
1871
+ rsp = client.ModifyPassword(model)
1094
1872
  result = rsp.to_json_string()
1095
1873
  try:
1096
1874
  json_obj = json.loads(result)
@@ -1109,7 +1887,7 @@ def doDescribeACL(args, parsed_globals):
1109
1887
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
1888
 
1111
1889
 
1112
- def doDescribeDatahubTopics(args, parsed_globals):
1890
+ def doDescribeConsumerGroup(args, parsed_globals):
1113
1891
  g_param = parse_global_arg(parsed_globals)
1114
1892
 
1115
1893
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1119,7 +1897,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
1119
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1899
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1905
  else:
1125
1906
  cred = credential.Credential(
@@ -1131,18 +1912,18 @@ def doDescribeDatahubTopics(args, parsed_globals):
1131
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1914
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1916
  if g_param[OptionsDefine.Language]:
1136
1917
  profile.language = g_param[OptionsDefine.Language]
1137
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1138
1919
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1139
1920
  client._sdkVersion += ("_CLI_" + __version__)
1140
1921
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1141
- model = models.DescribeDatahubTopicsRequest()
1922
+ model = models.DescribeConsumerGroupRequest()
1142
1923
  model.from_json_string(json.dumps(args))
1143
1924
  start_time = time.time()
1144
1925
  while True:
1145
- rsp = client.DescribeDatahubTopics(model)
1926
+ rsp = client.DescribeConsumerGroup(model)
1146
1927
  result = rsp.to_json_string()
1147
1928
  try:
1148
1929
  json_obj = json.loads(result)
@@ -1161,7 +1942,7 @@ def doDescribeDatahubTopics(args, parsed_globals):
1161
1942
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
1943
 
1163
1944
 
1164
- def doDescribeTopicDetail(args, parsed_globals):
1945
+ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1165
1946
  g_param = parse_global_arg(parsed_globals)
1166
1947
 
1167
1948
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1171,7 +1952,10 @@ def doDescribeTopicDetail(args, parsed_globals):
1171
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1954
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1960
  else:
1177
1961
  cred = credential.Credential(
@@ -1183,18 +1967,18 @@ def doDescribeTopicDetail(args, parsed_globals):
1183
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1969
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1971
  if g_param[OptionsDefine.Language]:
1188
1972
  profile.language = g_param[OptionsDefine.Language]
1189
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1190
1974
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1191
1975
  client._sdkVersion += ("_CLI_" + __version__)
1192
1976
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1193
- model = models.DescribeTopicDetailRequest()
1977
+ model = models.DescribeTopicSubscribeGroupRequest()
1194
1978
  model.from_json_string(json.dumps(args))
1195
1979
  start_time = time.time()
1196
1980
  while True:
1197
- rsp = client.DescribeTopicDetail(model)
1981
+ rsp = client.DescribeTopicSubscribeGroup(model)
1198
1982
  result = rsp.to_json_string()
1199
1983
  try:
1200
1984
  json_obj = json.loads(result)
@@ -1213,7 +1997,7 @@ def doDescribeTopicDetail(args, parsed_globals):
1213
1997
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
1998
 
1215
1999
 
1216
- def doFetchMessageByOffset(args, parsed_globals):
2000
+ def doModifyRoutineMaintenanceTask(args, parsed_globals):
1217
2001
  g_param = parse_global_arg(parsed_globals)
1218
2002
 
1219
2003
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1223,7 +2007,10 @@ def doFetchMessageByOffset(args, parsed_globals):
1223
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
2009
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
2015
  else:
1229
2016
  cred = credential.Credential(
@@ -1235,18 +2022,18 @@ def doFetchMessageByOffset(args, parsed_globals):
1235
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1236
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
2024
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
2026
  if g_param[OptionsDefine.Language]:
1240
2027
  profile.language = g_param[OptionsDefine.Language]
1241
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1242
2029
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1243
2030
  client._sdkVersion += ("_CLI_" + __version__)
1244
2031
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1245
- model = models.FetchMessageByOffsetRequest()
2032
+ model = models.ModifyRoutineMaintenanceTaskRequest()
1246
2033
  model.from_json_string(json.dumps(args))
1247
2034
  start_time = time.time()
1248
2035
  while True:
1249
- rsp = client.FetchMessageByOffset(model)
2036
+ rsp = client.ModifyRoutineMaintenanceTask(model)
1250
2037
  result = rsp.to_json_string()
1251
2038
  try:
1252
2039
  json_obj = json.loads(result)
@@ -1265,7 +2052,7 @@ def doFetchMessageByOffset(args, parsed_globals):
1265
2052
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
2053
 
1267
2054
 
1268
- def doDeleteTopicIpWhiteList(args, parsed_globals):
2055
+ def doDeleteRouteTriggerTime(args, parsed_globals):
1269
2056
  g_param = parse_global_arg(parsed_globals)
1270
2057
 
1271
2058
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1275,7 +2062,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
1275
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
2064
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
2070
  else:
1281
2071
  cred = credential.Credential(
@@ -1287,18 +2077,18 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
1287
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1288
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
2079
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
2081
  if g_param[OptionsDefine.Language]:
1292
2082
  profile.language = g_param[OptionsDefine.Language]
1293
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1294
2084
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1295
2085
  client._sdkVersion += ("_CLI_" + __version__)
1296
2086
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
- model = models.DeleteTopicIpWhiteListRequest()
2087
+ model = models.DeleteRouteTriggerTimeRequest()
1298
2088
  model.from_json_string(json.dumps(args))
1299
2089
  start_time = time.time()
1300
2090
  while True:
1301
- rsp = client.DeleteTopicIpWhiteList(model)
2091
+ rsp = client.DeleteRouteTriggerTime(model)
1302
2092
  result = rsp.to_json_string()
1303
2093
  try:
1304
2094
  json_obj = json.loads(result)
@@ -1317,7 +2107,7 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
1317
2107
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
2108
 
1319
2109
 
1320
- def doModifyPassword(args, parsed_globals):
2110
+ def doCreatePartition(args, parsed_globals):
1321
2111
  g_param = parse_global_arg(parsed_globals)
1322
2112
 
1323
2113
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1327,7 +2117,10 @@ def doModifyPassword(args, parsed_globals):
1327
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
2119
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
2125
  else:
1333
2126
  cred = credential.Credential(
@@ -1339,18 +2132,18 @@ def doModifyPassword(args, parsed_globals):
1339
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1340
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
2134
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
2136
  if g_param[OptionsDefine.Language]:
1344
2137
  profile.language = g_param[OptionsDefine.Language]
1345
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1346
2139
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1347
2140
  client._sdkVersion += ("_CLI_" + __version__)
1348
2141
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.ModifyPasswordRequest()
2142
+ model = models.CreatePartitionRequest()
1350
2143
  model.from_json_string(json.dumps(args))
1351
2144
  start_time = time.time()
1352
2145
  while True:
1353
- rsp = client.ModifyPassword(model)
2146
+ rsp = client.CreatePartition(model)
1354
2147
  result = rsp.to_json_string()
1355
2148
  try:
1356
2149
  json_obj = json.loads(result)
@@ -1369,7 +2162,7 @@ def doModifyPassword(args, parsed_globals):
1369
2162
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
2163
 
1371
2164
 
1372
- def doDescribeConsumerGroup(args, parsed_globals):
2165
+ def doCreateUser(args, parsed_globals):
1373
2166
  g_param = parse_global_arg(parsed_globals)
1374
2167
 
1375
2168
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1379,7 +2172,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
1379
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
2174
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
2180
  else:
1385
2181
  cred = credential.Credential(
@@ -1391,18 +2187,18 @@ def doDescribeConsumerGroup(args, parsed_globals):
1391
2187
  endpoint=g_param[OptionsDefine.Endpoint],
1392
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
2189
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
2191
  if g_param[OptionsDefine.Language]:
1396
2192
  profile.language = g_param[OptionsDefine.Language]
1397
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1398
2194
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1399
2195
  client._sdkVersion += ("_CLI_" + __version__)
1400
2196
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.DescribeConsumerGroupRequest()
2197
+ model = models.CreateUserRequest()
1402
2198
  model.from_json_string(json.dumps(args))
1403
2199
  start_time = time.time()
1404
2200
  while True:
1405
- rsp = client.DescribeConsumerGroup(model)
2201
+ rsp = client.CreateUser(model)
1406
2202
  result = rsp.to_json_string()
1407
2203
  try:
1408
2204
  json_obj = json.loads(result)
@@ -1421,7 +2217,7 @@ def doDescribeConsumerGroup(args, parsed_globals):
1421
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
2218
 
1423
2219
 
1424
- def doDescribeTopicSubscribeGroup(args, parsed_globals):
2220
+ def doDescribeTaskStatus(args, parsed_globals):
1425
2221
  g_param = parse_global_arg(parsed_globals)
1426
2222
 
1427
2223
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1431,7 +2227,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1431
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
2229
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
2235
  else:
1437
2236
  cred = credential.Credential(
@@ -1443,18 +2242,18 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1443
2242
  endpoint=g_param[OptionsDefine.Endpoint],
1444
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
2244
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
2246
  if g_param[OptionsDefine.Language]:
1448
2247
  profile.language = g_param[OptionsDefine.Language]
1449
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1450
2249
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1451
2250
  client._sdkVersion += ("_CLI_" + __version__)
1452
2251
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.DescribeTopicSubscribeGroupRequest()
2252
+ model = models.DescribeTaskStatusRequest()
1454
2253
  model.from_json_string(json.dumps(args))
1455
2254
  start_time = time.time()
1456
2255
  while True:
1457
- rsp = client.DescribeTopicSubscribeGroup(model)
2256
+ rsp = client.DescribeTaskStatus(model)
1458
2257
  result = rsp.to_json_string()
1459
2258
  try:
1460
2259
  json_obj = json.loads(result)
@@ -1473,7 +2272,7 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
1473
2272
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1474
2273
 
1475
2274
 
1476
- def doDeleteRouteTriggerTime(args, parsed_globals):
2275
+ def doBatchModifyGroupOffsets(args, parsed_globals):
1477
2276
  g_param = parse_global_arg(parsed_globals)
1478
2277
 
1479
2278
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1483,7 +2282,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
1483
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
2284
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
2290
  else:
1489
2291
  cred = credential.Credential(
@@ -1495,18 +2297,18 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
1495
2297
  endpoint=g_param[OptionsDefine.Endpoint],
1496
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
2299
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
2301
  if g_param[OptionsDefine.Language]:
1500
2302
  profile.language = g_param[OptionsDefine.Language]
1501
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1502
2304
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1503
2305
  client._sdkVersion += ("_CLI_" + __version__)
1504
2306
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1505
- model = models.DeleteRouteTriggerTimeRequest()
2307
+ model = models.BatchModifyGroupOffsetsRequest()
1506
2308
  model.from_json_string(json.dumps(args))
1507
2309
  start_time = time.time()
1508
2310
  while True:
1509
- rsp = client.DeleteRouteTriggerTime(model)
2311
+ rsp = client.BatchModifyGroupOffsets(model)
1510
2312
  result = rsp.to_json_string()
1511
2313
  try:
1512
2314
  json_obj = json.loads(result)
@@ -1525,7 +2327,7 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
1525
2327
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1526
2328
 
1527
2329
 
1528
- def doCreatePartition(args, parsed_globals):
2330
+ def doDeleteAcl(args, parsed_globals):
1529
2331
  g_param = parse_global_arg(parsed_globals)
1530
2332
 
1531
2333
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1535,7 +2337,10 @@ def doCreatePartition(args, parsed_globals):
1535
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
2339
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
2345
  else:
1541
2346
  cred = credential.Credential(
@@ -1547,18 +2352,18 @@ def doCreatePartition(args, parsed_globals):
1547
2352
  endpoint=g_param[OptionsDefine.Endpoint],
1548
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
2354
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
2356
  if g_param[OptionsDefine.Language]:
1552
2357
  profile.language = g_param[OptionsDefine.Language]
1553
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1554
2359
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1555
2360
  client._sdkVersion += ("_CLI_" + __version__)
1556
2361
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1557
- model = models.CreatePartitionRequest()
2362
+ model = models.DeleteAclRequest()
1558
2363
  model.from_json_string(json.dumps(args))
1559
2364
  start_time = time.time()
1560
2365
  while True:
1561
- rsp = client.CreatePartition(model)
2366
+ rsp = client.DeleteAcl(model)
1562
2367
  result = rsp.to_json_string()
1563
2368
  try:
1564
2369
  json_obj = json.loads(result)
@@ -1577,7 +2382,7 @@ def doCreatePartition(args, parsed_globals):
1577
2382
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1578
2383
 
1579
2384
 
1580
- def doCreateUser(args, parsed_globals):
2385
+ def doInstanceScalingDown(args, parsed_globals):
1581
2386
  g_param = parse_global_arg(parsed_globals)
1582
2387
 
1583
2388
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1587,7 +2392,10 @@ def doCreateUser(args, parsed_globals):
1587
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
2394
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
2400
  else:
1593
2401
  cred = credential.Credential(
@@ -1599,18 +2407,18 @@ def doCreateUser(args, parsed_globals):
1599
2407
  endpoint=g_param[OptionsDefine.Endpoint],
1600
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
2409
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
2411
  if g_param[OptionsDefine.Language]:
1604
2412
  profile.language = g_param[OptionsDefine.Language]
1605
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1606
2414
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1607
2415
  client._sdkVersion += ("_CLI_" + __version__)
1608
2416
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1609
- model = models.CreateUserRequest()
2417
+ model = models.InstanceScalingDownRequest()
1610
2418
  model.from_json_string(json.dumps(args))
1611
2419
  start_time = time.time()
1612
2420
  while True:
1613
- rsp = client.CreateUser(model)
2421
+ rsp = client.InstanceScalingDown(model)
1614
2422
  result = rsp.to_json_string()
1615
2423
  try:
1616
2424
  json_obj = json.loads(result)
@@ -1629,7 +2437,7 @@ def doCreateUser(args, parsed_globals):
1629
2437
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1630
2438
 
1631
2439
 
1632
- def doDescribeTaskStatus(args, parsed_globals):
2440
+ def doDeleteTopic(args, parsed_globals):
1633
2441
  g_param = parse_global_arg(parsed_globals)
1634
2442
 
1635
2443
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1639,7 +2447,10 @@ def doDescribeTaskStatus(args, parsed_globals):
1639
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
2449
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
2455
  else:
1645
2456
  cred = credential.Credential(
@@ -1651,18 +2462,18 @@ def doDescribeTaskStatus(args, parsed_globals):
1651
2462
  endpoint=g_param[OptionsDefine.Endpoint],
1652
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
2464
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
2466
  if g_param[OptionsDefine.Language]:
1656
2467
  profile.language = g_param[OptionsDefine.Language]
1657
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1658
2469
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1659
2470
  client._sdkVersion += ("_CLI_" + __version__)
1660
2471
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1661
- model = models.DescribeTaskStatusRequest()
2472
+ model = models.DeleteTopicRequest()
1662
2473
  model.from_json_string(json.dumps(args))
1663
2474
  start_time = time.time()
1664
2475
  while True:
1665
- rsp = client.DescribeTaskStatus(model)
2476
+ rsp = client.DeleteTopic(model)
1666
2477
  result = rsp.to_json_string()
1667
2478
  try:
1668
2479
  json_obj = json.loads(result)
@@ -1681,7 +2492,7 @@ def doDescribeTaskStatus(args, parsed_globals):
1681
2492
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1682
2493
 
1683
2494
 
1684
- def doBatchModifyGroupOffsets(args, parsed_globals):
2495
+ def doDescribeGroupOffsets(args, parsed_globals):
1685
2496
  g_param = parse_global_arg(parsed_globals)
1686
2497
 
1687
2498
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1691,7 +2502,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
1691
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
2504
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
2510
  else:
1697
2511
  cred = credential.Credential(
@@ -1703,18 +2517,18 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
1703
2517
  endpoint=g_param[OptionsDefine.Endpoint],
1704
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
2519
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
2521
  if g_param[OptionsDefine.Language]:
1708
2522
  profile.language = g_param[OptionsDefine.Language]
1709
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1710
2524
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1711
2525
  client._sdkVersion += ("_CLI_" + __version__)
1712
2526
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1713
- model = models.BatchModifyGroupOffsetsRequest()
2527
+ model = models.DescribeGroupOffsetsRequest()
1714
2528
  model.from_json_string(json.dumps(args))
1715
2529
  start_time = time.time()
1716
2530
  while True:
1717
- rsp = client.BatchModifyGroupOffsets(model)
2531
+ rsp = client.DescribeGroupOffsets(model)
1718
2532
  result = rsp.to_json_string()
1719
2533
  try:
1720
2534
  json_obj = json.loads(result)
@@ -1733,7 +2547,7 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
1733
2547
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1734
2548
 
1735
2549
 
1736
- def doDeleteAcl(args, parsed_globals):
2550
+ def doDeleteInstancePre(args, parsed_globals):
1737
2551
  g_param = parse_global_arg(parsed_globals)
1738
2552
 
1739
2553
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1743,7 +2557,10 @@ def doDeleteAcl(args, parsed_globals):
1743
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2559
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2565
  else:
1749
2566
  cred = credential.Credential(
@@ -1755,18 +2572,18 @@ def doDeleteAcl(args, parsed_globals):
1755
2572
  endpoint=g_param[OptionsDefine.Endpoint],
1756
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
2574
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
2576
  if g_param[OptionsDefine.Language]:
1760
2577
  profile.language = g_param[OptionsDefine.Language]
1761
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1762
2579
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1763
2580
  client._sdkVersion += ("_CLI_" + __version__)
1764
2581
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1765
- model = models.DeleteAclRequest()
2582
+ model = models.DeleteInstancePreRequest()
1766
2583
  model.from_json_string(json.dumps(args))
1767
2584
  start_time = time.time()
1768
2585
  while True:
1769
- rsp = client.DeleteAcl(model)
2586
+ rsp = client.DeleteInstancePre(model)
1770
2587
  result = rsp.to_json_string()
1771
2588
  try:
1772
2589
  json_obj = json.loads(result)
@@ -1785,7 +2602,7 @@ def doDeleteAcl(args, parsed_globals):
1785
2602
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1786
2603
 
1787
2604
 
1788
- def doDescribeAppInfo(args, parsed_globals):
2605
+ def doDescribeInstanceAttributes(args, parsed_globals):
1789
2606
  g_param = parse_global_arg(parsed_globals)
1790
2607
 
1791
2608
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1795,7 +2612,10 @@ def doDescribeAppInfo(args, parsed_globals):
1795
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
2614
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
2620
  else:
1801
2621
  cred = credential.Credential(
@@ -1807,18 +2627,18 @@ def doDescribeAppInfo(args, parsed_globals):
1807
2627
  endpoint=g_param[OptionsDefine.Endpoint],
1808
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
2629
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
2631
  if g_param[OptionsDefine.Language]:
1812
2632
  profile.language = g_param[OptionsDefine.Language]
1813
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1814
2634
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1815
2635
  client._sdkVersion += ("_CLI_" + __version__)
1816
2636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1817
- model = models.DescribeAppInfoRequest()
2637
+ model = models.DescribeInstanceAttributesRequest()
1818
2638
  model.from_json_string(json.dumps(args))
1819
2639
  start_time = time.time()
1820
2640
  while True:
1821
- rsp = client.DescribeAppInfo(model)
2641
+ rsp = client.DescribeInstanceAttributes(model)
1822
2642
  result = rsp.to_json_string()
1823
2643
  try:
1824
2644
  json_obj = json.loads(result)
@@ -1837,7 +2657,7 @@ def doDescribeAppInfo(args, parsed_globals):
1837
2657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1838
2658
 
1839
2659
 
1840
- def doDescribeGroupOffsets(args, parsed_globals):
2660
+ def doDescribeInstancesDetail(args, parsed_globals):
1841
2661
  g_param = parse_global_arg(parsed_globals)
1842
2662
 
1843
2663
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1847,7 +2667,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
1847
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2669
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2675
  else:
1853
2676
  cred = credential.Credential(
@@ -1859,18 +2682,18 @@ def doDescribeGroupOffsets(args, parsed_globals):
1859
2682
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2684
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2686
  if g_param[OptionsDefine.Language]:
1864
2687
  profile.language = g_param[OptionsDefine.Language]
1865
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1866
2689
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1867
2690
  client._sdkVersion += ("_CLI_" + __version__)
1868
2691
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1869
- model = models.DescribeGroupOffsetsRequest()
2692
+ model = models.DescribeInstancesDetailRequest()
1870
2693
  model.from_json_string(json.dumps(args))
1871
2694
  start_time = time.time()
1872
2695
  while True:
1873
- rsp = client.DescribeGroupOffsets(model)
2696
+ rsp = client.DescribeInstancesDetail(model)
1874
2697
  result = rsp.to_json_string()
1875
2698
  try:
1876
2699
  json_obj = json.loads(result)
@@ -1889,7 +2712,7 @@ def doDescribeGroupOffsets(args, parsed_globals):
1889
2712
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
2713
 
1891
2714
 
1892
- def doDeleteInstancePre(args, parsed_globals):
2715
+ def doBatchCreateAcl(args, parsed_globals):
1893
2716
  g_param = parse_global_arg(parsed_globals)
1894
2717
 
1895
2718
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1899,7 +2722,10 @@ def doDeleteInstancePre(args, parsed_globals):
1899
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2724
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2730
  else:
1905
2731
  cred = credential.Credential(
@@ -1911,18 +2737,18 @@ def doDeleteInstancePre(args, parsed_globals):
1911
2737
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2739
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2741
  if g_param[OptionsDefine.Language]:
1916
2742
  profile.language = g_param[OptionsDefine.Language]
1917
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1918
2744
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1919
2745
  client._sdkVersion += ("_CLI_" + __version__)
1920
2746
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.DeleteInstancePreRequest()
2747
+ model = models.BatchCreateAclRequest()
1922
2748
  model.from_json_string(json.dumps(args))
1923
2749
  start_time = time.time()
1924
2750
  while True:
1925
- rsp = client.DeleteInstancePre(model)
2751
+ rsp = client.BatchCreateAcl(model)
1926
2752
  result = rsp.to_json_string()
1927
2753
  try:
1928
2754
  json_obj = json.loads(result)
@@ -1941,7 +2767,7 @@ def doDeleteInstancePre(args, parsed_globals):
1941
2767
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
2768
 
1943
2769
 
1944
- def doDescribeInstanceAttributes(args, parsed_globals):
2770
+ def doDeleteAclRule(args, parsed_globals):
1945
2771
  g_param = parse_global_arg(parsed_globals)
1946
2772
 
1947
2773
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1951,7 +2777,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1951
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2779
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2785
  else:
1957
2786
  cred = credential.Credential(
@@ -1963,18 +2792,18 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1963
2792
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2794
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2796
  if g_param[OptionsDefine.Language]:
1968
2797
  profile.language = g_param[OptionsDefine.Language]
1969
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1970
2799
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1971
2800
  client._sdkVersion += ("_CLI_" + __version__)
1972
2801
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1973
- model = models.DescribeInstanceAttributesRequest()
2802
+ model = models.DeleteAclRuleRequest()
1974
2803
  model.from_json_string(json.dumps(args))
1975
2804
  start_time = time.time()
1976
2805
  while True:
1977
- rsp = client.DescribeInstanceAttributes(model)
2806
+ rsp = client.DeleteAclRule(model)
1978
2807
  result = rsp.to_json_string()
1979
2808
  try:
1980
2809
  json_obj = json.loads(result)
@@ -1993,7 +2822,7 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1993
2822
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1994
2823
 
1995
2824
 
1996
- def doDescribeInstancesDetail(args, parsed_globals):
2825
+ def doModifyAclRule(args, parsed_globals):
1997
2826
  g_param = parse_global_arg(parsed_globals)
1998
2827
 
1999
2828
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2003,7 +2832,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
2003
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2834
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2840
  else:
2009
2841
  cred = credential.Credential(
@@ -2015,18 +2847,18 @@ def doDescribeInstancesDetail(args, parsed_globals):
2015
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2849
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2851
  if g_param[OptionsDefine.Language]:
2020
2852
  profile.language = g_param[OptionsDefine.Language]
2021
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2022
2854
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2023
2855
  client._sdkVersion += ("_CLI_" + __version__)
2024
2856
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2025
- model = models.DescribeInstancesDetailRequest()
2857
+ model = models.ModifyAclRuleRequest()
2026
2858
  model.from_json_string(json.dumps(args))
2027
2859
  start_time = time.time()
2028
2860
  while True:
2029
- rsp = client.DescribeInstancesDetail(model)
2861
+ rsp = client.ModifyAclRule(model)
2030
2862
  result = rsp.to_json_string()
2031
2863
  try:
2032
2864
  json_obj = json.loads(result)
@@ -2045,7 +2877,7 @@ def doDescribeInstancesDetail(args, parsed_globals):
2045
2877
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2046
2878
 
2047
2879
 
2048
- def doBatchCreateAcl(args, parsed_globals):
2880
+ def doDeleteUser(args, parsed_globals):
2049
2881
  g_param = parse_global_arg(parsed_globals)
2050
2882
 
2051
2883
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2055,7 +2887,10 @@ def doBatchCreateAcl(args, parsed_globals):
2055
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2889
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2895
  else:
2061
2896
  cred = credential.Credential(
@@ -2067,18 +2902,18 @@ def doBatchCreateAcl(args, parsed_globals):
2067
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2904
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2906
  if g_param[OptionsDefine.Language]:
2072
2907
  profile.language = g_param[OptionsDefine.Language]
2073
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2074
2909
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2075
2910
  client._sdkVersion += ("_CLI_" + __version__)
2076
2911
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2077
- model = models.BatchCreateAclRequest()
2912
+ model = models.DeleteUserRequest()
2078
2913
  model.from_json_string(json.dumps(args))
2079
2914
  start_time = time.time()
2080
2915
  while True:
2081
- rsp = client.BatchCreateAcl(model)
2916
+ rsp = client.DeleteUser(model)
2082
2917
  result = rsp.to_json_string()
2083
2918
  try:
2084
2919
  json_obj = json.loads(result)
@@ -2097,7 +2932,7 @@ def doBatchCreateAcl(args, parsed_globals):
2097
2932
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2098
2933
 
2099
2934
 
2100
- def doModifyAclRule(args, parsed_globals):
2935
+ def doDescribeTopicSyncReplica(args, parsed_globals):
2101
2936
  g_param = parse_global_arg(parsed_globals)
2102
2937
 
2103
2938
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2107,7 +2942,10 @@ def doModifyAclRule(args, parsed_globals):
2107
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2944
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2950
  else:
2113
2951
  cred = credential.Credential(
@@ -2119,18 +2957,18 @@ def doModifyAclRule(args, parsed_globals):
2119
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2959
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2961
  if g_param[OptionsDefine.Language]:
2124
2962
  profile.language = g_param[OptionsDefine.Language]
2125
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2126
2964
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2127
2965
  client._sdkVersion += ("_CLI_" + __version__)
2128
2966
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2129
- model = models.ModifyAclRuleRequest()
2967
+ model = models.DescribeTopicSyncReplicaRequest()
2130
2968
  model.from_json_string(json.dumps(args))
2131
2969
  start_time = time.time()
2132
2970
  while True:
2133
- rsp = client.ModifyAclRule(model)
2971
+ rsp = client.DescribeTopicSyncReplica(model)
2134
2972
  result = rsp.to_json_string()
2135
2973
  try:
2136
2974
  json_obj = json.loads(result)
@@ -2149,7 +2987,7 @@ def doModifyAclRule(args, parsed_globals):
2149
2987
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2150
2988
 
2151
2989
 
2152
- def doDeleteUser(args, parsed_globals):
2990
+ def doDescribeTopicAttributes(args, parsed_globals):
2153
2991
  g_param = parse_global_arg(parsed_globals)
2154
2992
 
2155
2993
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2159,7 +2997,10 @@ def doDeleteUser(args, parsed_globals):
2159
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2999
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
3005
  else:
2165
3006
  cred = credential.Credential(
@@ -2171,18 +3012,18 @@ def doDeleteUser(args, parsed_globals):
2171
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2172
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
3014
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
3016
  if g_param[OptionsDefine.Language]:
2176
3017
  profile.language = g_param[OptionsDefine.Language]
2177
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2178
3019
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2179
3020
  client._sdkVersion += ("_CLI_" + __version__)
2180
3021
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2181
- model = models.DeleteUserRequest()
3022
+ model = models.DescribeTopicAttributesRequest()
2182
3023
  model.from_json_string(json.dumps(args))
2183
3024
  start_time = time.time()
2184
3025
  while True:
2185
- rsp = client.DeleteUser(model)
3026
+ rsp = client.DescribeTopicAttributes(model)
2186
3027
  result = rsp.to_json_string()
2187
3028
  try:
2188
3029
  json_obj = json.loads(result)
@@ -2201,7 +3042,7 @@ def doDeleteUser(args, parsed_globals):
2201
3042
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2202
3043
 
2203
3044
 
2204
- def doDescribeTopicSyncReplica(args, parsed_globals):
3045
+ def doFetchMessageListByTimestamp(args, parsed_globals):
2205
3046
  g_param = parse_global_arg(parsed_globals)
2206
3047
 
2207
3048
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2211,7 +3052,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2211
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
3054
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
3060
  else:
2217
3061
  cred = credential.Credential(
@@ -2223,18 +3067,18 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2223
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2224
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
3069
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
3071
  if g_param[OptionsDefine.Language]:
2228
3072
  profile.language = g_param[OptionsDefine.Language]
2229
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2230
3074
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2231
3075
  client._sdkVersion += ("_CLI_" + __version__)
2232
3076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2233
- model = models.DescribeTopicSyncReplicaRequest()
3077
+ model = models.FetchMessageListByTimestampRequest()
2234
3078
  model.from_json_string(json.dumps(args))
2235
3079
  start_time = time.time()
2236
3080
  while True:
2237
- rsp = client.DescribeTopicSyncReplica(model)
3081
+ rsp = client.FetchMessageListByTimestamp(model)
2238
3082
  result = rsp.to_json_string()
2239
3083
  try:
2240
3084
  json_obj = json.loads(result)
@@ -2253,7 +3097,7 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2253
3097
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2254
3098
 
2255
3099
 
2256
- def doDescribeTopicAttributes(args, parsed_globals):
3100
+ def doDescribeTopicProduceConnection(args, parsed_globals):
2257
3101
  g_param = parse_global_arg(parsed_globals)
2258
3102
 
2259
3103
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2263,7 +3107,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
2263
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
3109
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
3115
  else:
2269
3116
  cred = credential.Credential(
@@ -2275,18 +3122,18 @@ def doDescribeTopicAttributes(args, parsed_globals):
2275
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2276
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
3124
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
3126
  if g_param[OptionsDefine.Language]:
2280
3127
  profile.language = g_param[OptionsDefine.Language]
2281
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2282
3129
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2283
3130
  client._sdkVersion += ("_CLI_" + __version__)
2284
3131
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2285
- model = models.DescribeTopicAttributesRequest()
3132
+ model = models.DescribeTopicProduceConnectionRequest()
2286
3133
  model.from_json_string(json.dumps(args))
2287
3134
  start_time = time.time()
2288
3135
  while True:
2289
- rsp = client.DescribeTopicAttributes(model)
3136
+ rsp = client.DescribeTopicProduceConnection(model)
2290
3137
  result = rsp.to_json_string()
2291
3138
  try:
2292
3139
  json_obj = json.loads(result)
@@ -2305,7 +3152,7 @@ def doDescribeTopicAttributes(args, parsed_globals):
2305
3152
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2306
3153
 
2307
3154
 
2308
- def doDescribeTopicProduceConnection(args, parsed_globals):
3155
+ def doCreatePostPaidInstance(args, parsed_globals):
2309
3156
  g_param = parse_global_arg(parsed_globals)
2310
3157
 
2311
3158
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2315,7 +3162,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
2315
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
3164
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
3170
  else:
2321
3171
  cred = credential.Credential(
@@ -2327,18 +3177,18 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
2327
3177
  endpoint=g_param[OptionsDefine.Endpoint],
2328
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
3179
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
3181
  if g_param[OptionsDefine.Language]:
2332
3182
  profile.language = g_param[OptionsDefine.Language]
2333
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2334
3184
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2335
3185
  client._sdkVersion += ("_CLI_" + __version__)
2336
3186
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2337
- model = models.DescribeTopicProduceConnectionRequest()
3187
+ model = models.CreatePostPaidInstanceRequest()
2338
3188
  model.from_json_string(json.dumps(args))
2339
3189
  start_time = time.time()
2340
3190
  while True:
2341
- rsp = client.DescribeTopicProduceConnection(model)
3191
+ rsp = client.CreatePostPaidInstance(model)
2342
3192
  result = rsp.to_json_string()
2343
3193
  try:
2344
3194
  json_obj = json.loads(result)
@@ -2357,7 +3207,7 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
2357
3207
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
3208
 
2359
3209
 
2360
- def doCreatePostPaidInstance(args, parsed_globals):
3210
+ def doCreateAclRule(args, parsed_globals):
2361
3211
  g_param = parse_global_arg(parsed_globals)
2362
3212
 
2363
3213
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2367,7 +3217,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
2367
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
3219
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
3225
  else:
2373
3226
  cred = credential.Credential(
@@ -2379,18 +3232,18 @@ def doCreatePostPaidInstance(args, parsed_globals):
2379
3232
  endpoint=g_param[OptionsDefine.Endpoint],
2380
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
3234
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
3236
  if g_param[OptionsDefine.Language]:
2384
3237
  profile.language = g_param[OptionsDefine.Language]
2385
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2386
3239
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2387
3240
  client._sdkVersion += ("_CLI_" + __version__)
2388
3241
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
- model = models.CreatePostPaidInstanceRequest()
3242
+ model = models.CreateAclRuleRequest()
2390
3243
  model.from_json_string(json.dumps(args))
2391
3244
  start_time = time.time()
2392
3245
  while True:
2393
- rsp = client.CreatePostPaidInstance(model)
3246
+ rsp = client.CreateAclRule(model)
2394
3247
  result = rsp.to_json_string()
2395
3248
  try:
2396
3249
  json_obj = json.loads(result)
@@ -2409,7 +3262,7 @@ def doCreatePostPaidInstance(args, parsed_globals):
2409
3262
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
3263
 
2411
3264
 
2412
- def doCreateAclRule(args, parsed_globals):
3265
+ def doModifyInstanceAttributes(args, parsed_globals):
2413
3266
  g_param = parse_global_arg(parsed_globals)
2414
3267
 
2415
3268
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2419,7 +3272,10 @@ def doCreateAclRule(args, parsed_globals):
2419
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
3274
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
3280
  else:
2425
3281
  cred = credential.Credential(
@@ -2431,18 +3287,18 @@ def doCreateAclRule(args, parsed_globals):
2431
3287
  endpoint=g_param[OptionsDefine.Endpoint],
2432
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
3289
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
3291
  if g_param[OptionsDefine.Language]:
2436
3292
  profile.language = g_param[OptionsDefine.Language]
2437
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2438
3294
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2439
3295
  client._sdkVersion += ("_CLI_" + __version__)
2440
3296
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2441
- model = models.CreateAclRuleRequest()
3297
+ model = models.ModifyInstanceAttributesRequest()
2442
3298
  model.from_json_string(json.dumps(args))
2443
3299
  start_time = time.time()
2444
3300
  while True:
2445
- rsp = client.CreateAclRule(model)
3301
+ rsp = client.ModifyInstanceAttributes(model)
2446
3302
  result = rsp.to_json_string()
2447
3303
  try:
2448
3304
  json_obj = json.loads(result)
@@ -2461,7 +3317,7 @@ def doCreateAclRule(args, parsed_globals):
2461
3317
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2462
3318
 
2463
3319
 
2464
- def doDescribeDatahubTopic(args, parsed_globals):
3320
+ def doDescribeCkafkaZone(args, parsed_globals):
2465
3321
  g_param = parse_global_arg(parsed_globals)
2466
3322
 
2467
3323
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2471,7 +3327,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
2471
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
3329
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
3335
  else:
2477
3336
  cred = credential.Credential(
@@ -2483,18 +3342,18 @@ def doDescribeDatahubTopic(args, parsed_globals):
2483
3342
  endpoint=g_param[OptionsDefine.Endpoint],
2484
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
3344
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
3346
  if g_param[OptionsDefine.Language]:
2488
3347
  profile.language = g_param[OptionsDefine.Language]
2489
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2490
3349
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2491
3350
  client._sdkVersion += ("_CLI_" + __version__)
2492
3351
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2493
- model = models.DescribeDatahubTopicRequest()
3352
+ model = models.DescribeCkafkaZoneRequest()
2494
3353
  model.from_json_string(json.dumps(args))
2495
3354
  start_time = time.time()
2496
3355
  while True:
2497
- rsp = client.DescribeDatahubTopic(model)
3356
+ rsp = client.DescribeCkafkaZone(model)
2498
3357
  result = rsp.to_json_string()
2499
3358
  try:
2500
3359
  json_obj = json.loads(result)
@@ -2513,7 +3372,7 @@ def doDescribeDatahubTopic(args, parsed_globals):
2513
3372
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2514
3373
 
2515
3374
 
2516
- def doDescribeCkafkaZone(args, parsed_globals):
3375
+ def doDescribeRegion(args, parsed_globals):
2517
3376
  g_param = parse_global_arg(parsed_globals)
2518
3377
 
2519
3378
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2523,7 +3382,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
2523
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
3384
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
3390
  else:
2529
3391
  cred = credential.Credential(
@@ -2535,18 +3397,18 @@ def doDescribeCkafkaZone(args, parsed_globals):
2535
3397
  endpoint=g_param[OptionsDefine.Endpoint],
2536
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
3399
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
3401
  if g_param[OptionsDefine.Language]:
2540
3402
  profile.language = g_param[OptionsDefine.Language]
2541
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2542
3404
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2543
3405
  client._sdkVersion += ("_CLI_" + __version__)
2544
3406
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2545
- model = models.DescribeCkafkaZoneRequest()
3407
+ model = models.DescribeRegionRequest()
2546
3408
  model.from_json_string(json.dumps(args))
2547
3409
  start_time = time.time()
2548
3410
  while True:
2549
- rsp = client.DescribeCkafkaZone(model)
3411
+ rsp = client.DescribeRegion(model)
2550
3412
  result = rsp.to_json_string()
2551
3413
  try:
2552
3414
  json_obj = json.loads(result)
@@ -2565,7 +3427,7 @@ def doDescribeCkafkaZone(args, parsed_globals):
2565
3427
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
3428
 
2567
3429
 
2568
- def doDescribeRegion(args, parsed_globals):
3430
+ def doDescribeModifyType(args, parsed_globals):
2569
3431
  g_param = parse_global_arg(parsed_globals)
2570
3432
 
2571
3433
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2575,7 +3437,10 @@ def doDescribeRegion(args, parsed_globals):
2575
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
3439
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
3445
  else:
2581
3446
  cred = credential.Credential(
@@ -2587,18 +3452,18 @@ def doDescribeRegion(args, parsed_globals):
2587
3452
  endpoint=g_param[OptionsDefine.Endpoint],
2588
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
3454
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
3456
  if g_param[OptionsDefine.Language]:
2592
3457
  profile.language = g_param[OptionsDefine.Language]
2593
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2594
3459
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2595
3460
  client._sdkVersion += ("_CLI_" + __version__)
2596
3461
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2597
- model = models.DescribeRegionRequest()
3462
+ model = models.DescribeModifyTypeRequest()
2598
3463
  model.from_json_string(json.dumps(args))
2599
3464
  start_time = time.time()
2600
3465
  while True:
2601
- rsp = client.DescribeRegion(model)
3466
+ rsp = client.DescribeModifyType(model)
2602
3467
  result = rsp.to_json_string()
2603
3468
  try:
2604
3469
  json_obj = json.loads(result)
@@ -2617,7 +3482,7 @@ def doDescribeRegion(args, parsed_globals):
2617
3482
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2618
3483
 
2619
3484
 
2620
- def doDescribeTopic(args, parsed_globals):
3485
+ def doModifyInstancePre(args, parsed_globals):
2621
3486
  g_param = parse_global_arg(parsed_globals)
2622
3487
 
2623
3488
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2627,7 +3492,10 @@ def doDescribeTopic(args, parsed_globals):
2627
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
3494
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
3500
  else:
2633
3501
  cred = credential.Credential(
@@ -2639,18 +3507,18 @@ def doDescribeTopic(args, parsed_globals):
2639
3507
  endpoint=g_param[OptionsDefine.Endpoint],
2640
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
3509
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
3511
  if g_param[OptionsDefine.Language]:
2644
3512
  profile.language = g_param[OptionsDefine.Language]
2645
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2646
3514
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2647
3515
  client._sdkVersion += ("_CLI_" + __version__)
2648
3516
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2649
- model = models.DescribeTopicRequest()
3517
+ model = models.ModifyInstancePreRequest()
2650
3518
  model.from_json_string(json.dumps(args))
2651
3519
  start_time = time.time()
2652
3520
  while True:
2653
- rsp = client.DescribeTopic(model)
3521
+ rsp = client.ModifyInstancePre(model)
2654
3522
  result = rsp.to_json_string()
2655
3523
  try:
2656
3524
  json_obj = json.loads(result)
@@ -2669,7 +3537,7 @@ def doDescribeTopic(args, parsed_globals):
2669
3537
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2670
3538
 
2671
3539
 
2672
- def doDeleteTopic(args, parsed_globals):
3540
+ def doDescribeTopic(args, parsed_globals):
2673
3541
  g_param = parse_global_arg(parsed_globals)
2674
3542
 
2675
3543
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2679,7 +3547,10 @@ def doDeleteTopic(args, parsed_globals):
2679
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
3549
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
3555
  else:
2685
3556
  cred = credential.Credential(
@@ -2691,18 +3562,18 @@ def doDeleteTopic(args, parsed_globals):
2691
3562
  endpoint=g_param[OptionsDefine.Endpoint],
2692
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
3564
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
3566
  if g_param[OptionsDefine.Language]:
2696
3567
  profile.language = g_param[OptionsDefine.Language]
2697
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2698
3569
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2699
3570
  client._sdkVersion += ("_CLI_" + __version__)
2700
3571
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2701
- model = models.DeleteTopicRequest()
3572
+ model = models.DescribeTopicRequest()
2702
3573
  model.from_json_string(json.dumps(args))
2703
3574
  start_time = time.time()
2704
3575
  while True:
2705
- rsp = client.DeleteTopic(model)
3576
+ rsp = client.DescribeTopic(model)
2706
3577
  result = rsp.to_json_string()
2707
3578
  try:
2708
3579
  json_obj = json.loads(result)
@@ -2731,7 +3602,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
2731
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
3604
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3610
  else:
2737
3611
  cred = credential.Credential(
@@ -2743,7 +3617,7 @@ def doInquireCkafkaPrice(args, parsed_globals):
2743
3617
  endpoint=g_param[OptionsDefine.Endpoint],
2744
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
3619
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
3621
  if g_param[OptionsDefine.Language]:
2748
3622
  profile.language = g_param[OptionsDefine.Language]
2749
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2783,7 +3657,10 @@ def doModifyTopicAttributes(args, parsed_globals):
2783
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3659
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3665
  else:
2789
3666
  cred = credential.Credential(
@@ -2795,7 +3672,7 @@ def doModifyTopicAttributes(args, parsed_globals):
2795
3672
  endpoint=g_param[OptionsDefine.Endpoint],
2796
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
3674
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
3676
  if g_param[OptionsDefine.Language]:
2800
3677
  profile.language = g_param[OptionsDefine.Language]
2801
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2840,54 +3717,67 @@ ACTION_MAP = {
2840
3717
  "DescribeGroupInfo": doDescribeGroupInfo,
2841
3718
  "CreateConsumer": doCreateConsumer,
2842
3719
  "CreateAcl": doCreateAcl,
2843
- "CreateInstancePost": doCreateInstancePost,
3720
+ "DescribeTypeInstances": doDescribeTypeInstances,
3721
+ "DescribeDatahubTopics": doDescribeDatahubTopics,
2844
3722
  "DescribeAclRule": doDescribeAclRule,
2845
3723
  "CreateTopic": doCreateTopic,
2846
- "ModifyInstancePre": doModifyInstancePre,
3724
+ "DescribeSecurityGroupRoutes": doDescribeSecurityGroupRoutes,
2847
3725
  "BatchModifyTopicAttributes": doBatchModifyTopicAttributes,
2848
3726
  "DeleteRoute": doDeleteRoute,
2849
3727
  "SendMessage": doSendMessage,
2850
3728
  "DescribeUser": doDescribeUser,
2851
- "CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
2852
3729
  "DescribeGroup": doDescribeGroup,
3730
+ "CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
3731
+ "DescribeCkafkaVersion": doDescribeCkafkaVersion,
2853
3732
  "ModifyGroupOffsets": doModifyGroupOffsets,
3733
+ "UpgradeBrokerVersion": doUpgradeBrokerVersion,
2854
3734
  "DescribeInstances": doDescribeInstances,
2855
- "ModifyInstanceAttributes": doModifyInstanceAttributes,
3735
+ "DescribeCvmInfo": doDescribeCvmInfo,
3736
+ "DescribeDatahubTopic": doDescribeDatahubTopic,
3737
+ "CreateRoute": doCreateRoute,
3738
+ "DeleteGroupSubscribeTopic": doDeleteGroupSubscribeTopic,
3739
+ "DeleteGroup": doDeleteGroup,
2856
3740
  "ModifyDatahubTopic": doModifyDatahubTopic,
2857
3741
  "FetchMessageListByOffset": doFetchMessageListByOffset,
2858
3742
  "CreateDatahubTopic": doCreateDatahubTopic,
3743
+ "DeleteInstancePost": doDeleteInstancePost,
2859
3744
  "DescribeACL": doDescribeACL,
2860
- "DescribeDatahubTopics": doDescribeDatahubTopics,
2861
3745
  "DescribeTopicDetail": doDescribeTopicDetail,
3746
+ "CreateInstancePre": doCreateInstancePre,
2862
3747
  "FetchMessageByOffset": doFetchMessageByOffset,
2863
3748
  "DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
2864
3749
  "ModifyPassword": doModifyPassword,
2865
3750
  "DescribeConsumerGroup": doDescribeConsumerGroup,
2866
3751
  "DescribeTopicSubscribeGroup": doDescribeTopicSubscribeGroup,
3752
+ "ModifyRoutineMaintenanceTask": doModifyRoutineMaintenanceTask,
2867
3753
  "DeleteRouteTriggerTime": doDeleteRouteTriggerTime,
2868
3754
  "CreatePartition": doCreatePartition,
2869
3755
  "CreateUser": doCreateUser,
2870
3756
  "DescribeTaskStatus": doDescribeTaskStatus,
2871
3757
  "BatchModifyGroupOffsets": doBatchModifyGroupOffsets,
2872
3758
  "DeleteAcl": doDeleteAcl,
2873
- "DescribeAppInfo": doDescribeAppInfo,
3759
+ "InstanceScalingDown": doInstanceScalingDown,
3760
+ "DeleteTopic": doDeleteTopic,
2874
3761
  "DescribeGroupOffsets": doDescribeGroupOffsets,
2875
3762
  "DeleteInstancePre": doDeleteInstancePre,
2876
3763
  "DescribeInstanceAttributes": doDescribeInstanceAttributes,
2877
3764
  "DescribeInstancesDetail": doDescribeInstancesDetail,
2878
3765
  "BatchCreateAcl": doBatchCreateAcl,
3766
+ "DeleteAclRule": doDeleteAclRule,
2879
3767
  "ModifyAclRule": doModifyAclRule,
2880
3768
  "DeleteUser": doDeleteUser,
2881
3769
  "DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
2882
3770
  "DescribeTopicAttributes": doDescribeTopicAttributes,
3771
+ "FetchMessageListByTimestamp": doFetchMessageListByTimestamp,
2883
3772
  "DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
2884
3773
  "CreatePostPaidInstance": doCreatePostPaidInstance,
2885
3774
  "CreateAclRule": doCreateAclRule,
2886
- "DescribeDatahubTopic": doDescribeDatahubTopic,
3775
+ "ModifyInstanceAttributes": doModifyInstanceAttributes,
2887
3776
  "DescribeCkafkaZone": doDescribeCkafkaZone,
2888
3777
  "DescribeRegion": doDescribeRegion,
3778
+ "DescribeModifyType": doDescribeModifyType,
3779
+ "ModifyInstancePre": doModifyInstancePre,
2889
3780
  "DescribeTopic": doDescribeTopic,
2890
- "DeleteTopic": doDeleteTopic,
2891
3781
  "InquireCkafkaPrice": doInquireCkafkaPrice,
2892
3782
  "ModifyTopicAttributes": doModifyTopicAttributes,
2893
3783