tccli-intl-en 3.0.1237.1__py2.py3-none-any.whl → 3.0.1282.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +17 -1
- tccli/services/advisor/advisor_client.py +8 -2
- tccli/services/aiart/aiart_client.py +4 -1
- tccli/services/ams/ams_client.py +16 -4
- tccli/services/antiddos/antiddos_client.py +280 -70
- tccli/services/apigateway/apigateway_client.py +372 -93
- tccli/services/apm/apm_client.py +52 -13
- tccli/services/asr/asr_client.py +8 -2
- tccli/services/autoscaling/autoscaling_client.py +232 -58
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +112 -28
- tccli/services/bi/bi_client.py +1242 -4
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +168 -42
- tccli/services/cam/cam_client.py +324 -81
- tccli/services/captcha/captcha_client.py +4 -1
- tccli/services/car/car_client.py +132 -33
- tccli/services/cbs/cbs_client.py +152 -38
- tccli/services/ccc/ccc_client.py +732 -98
- tccli/services/ccc/v20200210/api.json +1727 -196
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +532 -133
- tccli/services/cdc/cdc_client.py +80 -20
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +176 -44
- tccli/services/cdwdoris/cdwdoris_client.py +308 -77
- tccli/services/cdwpg/cdwpg_client.py +96 -24
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +64 -16
- tccli/services/cfs/cfs_client.py +156 -39
- tccli/services/cfw/cfw_client.py +264 -66
- tccli/services/chdfs/chdfs_client.py +116 -29
- tccli/services/ciam/ciam_client.py +64 -16
- tccli/services/ckafka/ckafka_client.py +575 -77
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +332 -83
- tccli/services/clb/v20180317/api.json +29 -14
- tccli/services/cloudaudit/cloudaudit_client.py +72 -18
- tccli/services/cls/cls_client.py +348 -87
- tccli/services/cmq/cmq_client.py +12 -801
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +24 -6
- tccli/services/controlcenter/controlcenter_client.py +4 -1
- tccli/services/csip/csip_client.py +136 -34
- tccli/services/ctsdb/ctsdb_client.py +8 -2
- tccli/services/cvm/cvm_client.py +627 -110
- tccli/services/cvm/v20170312/api.json +750 -340
- tccli/services/cvm/v20170312/examples.json +105 -59
- tccli/services/cwp/cwp_client.py +1860 -465
- tccli/services/cynosdb/cynosdb_client.py +1749 -439
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +4 -1
- tccli/services/dayu/dayu_client.py +412 -103
- tccli/services/dbbrain/dbbrain_client.py +168 -42
- tccli/services/dc/dc_client.py +72 -18
- tccli/services/dcdb/dcdb_client.py +248 -62
- tccli/services/dlc/dlc_client.py +756 -111
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +8 -2
- tccli/services/dnspod/dnspod_client.py +353 -74
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +96 -24
- tccli/services/dts/dts_client.py +332 -83
- tccli/services/eb/eb_client.py +104 -26
- tccli/services/ecdn/ecdn_client.py +60 -15
- tccli/services/ecm/ecm_client.py +496 -124
- tccli/services/eiam/eiam_client.py +160 -40
- tccli/services/emr/emr_client.py +2784 -115
- tccli/services/emr/v20190103/api.json +14647 -4756
- tccli/services/emr/v20190103/examples.json +408 -40
- tccli/services/es/es_client.py +84 -21
- tccli/services/facefusion/facefusion_client.py +12 -3
- tccli/services/faceid/faceid_client.py +76 -19
- tccli/services/faceid/v20180301/api.json +79 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +352 -88
- tccli/services/gme/gme_client.py +40 -10
- tccli/services/gpm/gpm_client.py +72 -18
- tccli/services/gse/gse_client.py +88 -22
- tccli/services/gwlb/gwlb_client.py +72 -18
- tccli/services/iai/iai_client.py +116 -29
- tccli/services/iap/iap_client.py +24 -6
- tccli/services/ims/ims_client.py +4 -1
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +168 -42
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +80 -20
- tccli/services/ip/ip_client.py +24 -6
- tccli/services/kms/kms_client.py +272 -68
- tccli/services/lcic/lcic_client.py +212 -53
- tccli/services/lighthouse/lighthouse_client.py +296 -74
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +480 -120
- tccli/services/lke/lke_client.py +360 -90
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +546 -0
- tccli/services/lkeap/v20240522/api.json +855 -0
- tccli/services/lkeap/v20240522/examples.json +72 -0
- tccli/services/mariadb/mariadb_client.py +200 -50
- tccli/services/mdc/mdc_client.py +72 -18
- tccli/services/mdl/mdl_client.py +132 -33
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +680 -70
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +340 -29
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +864 -152
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +592 -92
- tccli/services/mps/v20190612/api.json +2931 -399
- tccli/services/mps/v20190612/examples.json +64 -14
- tccli/services/msp/msp_client.py +28 -7
- tccli/services/ocr/ocr_client.py +212 -45
- tccli/services/ocr/v20181119/api.json +872 -112
- tccli/services/ocr/v20181119/examples.json +12 -4
- tccli/services/omics/omics_client.py +80 -20
- tccli/services/organization/organization_client.py +464 -116
- tccli/services/postgres/postgres_client.py +364 -91
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +124 -31
- tccli/services/pts/pts_client.py +192 -48
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +4 -1
- tccli/services/redis/redis_client.py +592 -106
- tccli/services/redis/v20180412/api.json +636 -240
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/region_client.py +12 -3
- tccli/services/rum/rum_client.py +240 -60
- tccli/services/scf/scf_client.py +168 -42
- tccli/services/ses/ses_client.py +116 -29
- tccli/services/sms/sms_client.py +72 -18
- tccli/services/sqlserver/sqlserver_client.py +3772 -387
- tccli/services/sqlserver/v20180328/api.json +9760 -3380
- tccli/services/sqlserver/v20180328/examples.json +478 -18
- tccli/services/ssl/ssl_client.py +152 -38
- tccli/services/ssm/ssm_client.py +96 -24
- tccli/services/sts/sts_client.py +20 -5
- tccli/services/tag/tag_client.py +120 -30
- tccli/services/tat/tat_client.py +76 -19
- tccli/services/tbaas/tbaas_client.py +16 -4
- tccli/services/tcaplusdb/tcaplusdb_client.py +208 -52
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +4 -1
- tccli/services/tcmpp/tcmpp_client.py +416 -104
- tccli/services/tcr/tcr_client.py +304 -76
- tccli/services/tcsas/tcsas_client.py +236 -59
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1320 -330
- tccli/services/tdid/tdid_client.py +192 -48
- tccli/services/tdmq/tdmq_client.py +376 -94
- tccli/services/tem/tem_client.py +224 -56
- tccli/services/teo/teo_client.py +1127 -245
- tccli/services/teo/v20220901/api.json +382 -58
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +204 -51
- tccli/services/tke/tke_client.py +552 -138
- tccli/services/tms/tms_client.py +4 -1
- tccli/services/tmt/tmt_client.py +4 -1
- tccli/services/trabbit/trabbit_client.py +116 -29
- tccli/services/trro/trro_client.py +76 -19
- tccli/services/trtc/trtc_client.py +420 -55
- tccli/services/trtc/v20190722/api.json +685 -23
- tccli/services/trtc/v20190722/examples.json +39 -7
- tccli/services/tts/tts_client.py +4 -1
- tccli/services/vclm/vclm_client.py +8 -2
- tccli/services/vm/vm_client.py +16 -4
- tccli/services/vod/v20180717/examples.json +1 -1
- tccli/services/vod/vod_client.py +716 -179
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +1876 -361
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1051 -147
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +5830 -1026
- tccli/services/yunjing/yunjing_client.py +284 -71
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/RECORD +214 -192
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/top_level.txt +0 -0
|
@@ -27,7 +27,10 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -79,7 +82,10 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -131,7 +137,10 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -183,7 +192,10 @@ def doCreateAcl(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -225,7 +237,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doDescribeTypeInstances(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doCreateInstancePost(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -254,11 +269,66 @@ def doCreateInstancePost(args, parsed_globals):
|
|
|
254
269
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.DescribeTypeInstancesRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.DescribeTypeInstances(model)
|
|
277
|
+
result = rsp.to_json_string()
|
|
278
|
+
try:
|
|
279
|
+
json_obj = json.loads(result)
|
|
280
|
+
except TypeError as e:
|
|
281
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
282
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
283
|
+
break
|
|
284
|
+
cur_time = time.time()
|
|
285
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
286
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
287
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
288
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
289
|
+
else:
|
|
290
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
291
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
292
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
293
|
+
|
|
294
|
+
|
|
295
|
+
def doDescribeDatahubTopics(args, parsed_globals):
|
|
296
|
+
g_param = parse_global_arg(parsed_globals)
|
|
297
|
+
|
|
298
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
299
|
+
cred = credential.CVMRoleCredential()
|
|
300
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
301
|
+
cred = credential.STSAssumeRoleCredential(
|
|
302
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
303
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
304
|
+
)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
309
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
310
|
+
else:
|
|
311
|
+
cred = credential.Credential(
|
|
312
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
313
|
+
)
|
|
314
|
+
http_profile = HttpProfile(
|
|
315
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
316
|
+
reqMethod="POST",
|
|
317
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
318
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
319
|
+
)
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
321
|
+
if g_param[OptionsDefine.Language]:
|
|
322
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
323
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
324
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
325
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
326
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
327
|
+
model = models.DescribeDatahubTopicsRequest()
|
|
328
|
+
model.from_json_string(json.dumps(args))
|
|
329
|
+
start_time = time.time()
|
|
330
|
+
while True:
|
|
331
|
+
rsp = client.DescribeDatahubTopics(model)
|
|
262
332
|
result = rsp.to_json_string()
|
|
263
333
|
try:
|
|
264
334
|
json_obj = json.loads(result)
|
|
@@ -287,7 +357,10 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
287
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
359
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
365
|
else:
|
|
293
366
|
cred = credential.Credential(
|
|
@@ -339,7 +412,10 @@ def doCreateTopic(args, parsed_globals):
|
|
|
339
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
414
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
420
|
else:
|
|
345
421
|
cred = credential.Credential(
|
|
@@ -381,7 +457,7 @@ def doCreateTopic(args, parsed_globals):
|
|
|
381
457
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
458
|
|
|
383
459
|
|
|
384
|
-
def
|
|
460
|
+
def doDescribeSecurityGroupRoutes(args, parsed_globals):
|
|
385
461
|
g_param = parse_global_arg(parsed_globals)
|
|
386
462
|
|
|
387
463
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -391,7 +467,10 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
391
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
469
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
475
|
else:
|
|
397
476
|
cred = credential.Credential(
|
|
@@ -410,11 +489,11 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
410
489
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
490
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
491
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
492
|
+
model = models.DescribeSecurityGroupRoutesRequest()
|
|
414
493
|
model.from_json_string(json.dumps(args))
|
|
415
494
|
start_time = time.time()
|
|
416
495
|
while True:
|
|
417
|
-
rsp = client.
|
|
496
|
+
rsp = client.DescribeSecurityGroupRoutes(model)
|
|
418
497
|
result = rsp.to_json_string()
|
|
419
498
|
try:
|
|
420
499
|
json_obj = json.loads(result)
|
|
@@ -443,7 +522,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
443
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
524
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
530
|
else:
|
|
449
531
|
cred = credential.Credential(
|
|
@@ -495,7 +577,10 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
495
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
579
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
585
|
else:
|
|
501
586
|
cred = credential.Credential(
|
|
@@ -547,7 +632,10 @@ def doSendMessage(args, parsed_globals):
|
|
|
547
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
634
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
640
|
else:
|
|
553
641
|
cred = credential.Credential(
|
|
@@ -599,7 +687,10 @@ def doDescribeUser(args, parsed_globals):
|
|
|
599
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
689
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
695
|
else:
|
|
605
696
|
cred = credential.Credential(
|
|
@@ -651,7 +742,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
651
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
744
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
750
|
else:
|
|
657
751
|
cred = credential.Credential(
|
|
@@ -703,7 +797,10 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
703
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
799
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
805
|
else:
|
|
709
806
|
cred = credential.Credential(
|
|
@@ -755,7 +852,10 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
755
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
854
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
860
|
else:
|
|
761
861
|
cred = credential.Credential(
|
|
@@ -807,7 +907,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
807
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
909
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
915
|
else:
|
|
813
916
|
cred = credential.Credential(
|
|
@@ -849,7 +952,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
849
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
953
|
|
|
851
954
|
|
|
852
|
-
def
|
|
955
|
+
def doDescribeCvmInfo(args, parsed_globals):
|
|
853
956
|
g_param = parse_global_arg(parsed_globals)
|
|
854
957
|
|
|
855
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +962,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
859
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
964
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
970
|
else:
|
|
865
971
|
cred = credential.Credential(
|
|
@@ -878,11 +984,121 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
878
984
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
987
|
+
model = models.DescribeCvmInfoRequest()
|
|
882
988
|
model.from_json_string(json.dumps(args))
|
|
883
989
|
start_time = time.time()
|
|
884
990
|
while True:
|
|
885
|
-
rsp = client.
|
|
991
|
+
rsp = client.DescribeCvmInfo(model)
|
|
992
|
+
result = rsp.to_json_string()
|
|
993
|
+
try:
|
|
994
|
+
json_obj = json.loads(result)
|
|
995
|
+
except TypeError as e:
|
|
996
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
997
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
998
|
+
break
|
|
999
|
+
cur_time = time.time()
|
|
1000
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1001
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1002
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1003
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1004
|
+
else:
|
|
1005
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1006
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1007
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1008
|
+
|
|
1009
|
+
|
|
1010
|
+
def doDescribeDatahubTopic(args, parsed_globals):
|
|
1011
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1012
|
+
|
|
1013
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1014
|
+
cred = credential.CVMRoleCredential()
|
|
1015
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1016
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1017
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
|
+
)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1024
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1025
|
+
else:
|
|
1026
|
+
cred = credential.Credential(
|
|
1027
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1028
|
+
)
|
|
1029
|
+
http_profile = HttpProfile(
|
|
1030
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1031
|
+
reqMethod="POST",
|
|
1032
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1033
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1034
|
+
)
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1036
|
+
if g_param[OptionsDefine.Language]:
|
|
1037
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1038
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1039
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1040
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1041
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1042
|
+
model = models.DescribeDatahubTopicRequest()
|
|
1043
|
+
model.from_json_string(json.dumps(args))
|
|
1044
|
+
start_time = time.time()
|
|
1045
|
+
while True:
|
|
1046
|
+
rsp = client.DescribeDatahubTopic(model)
|
|
1047
|
+
result = rsp.to_json_string()
|
|
1048
|
+
try:
|
|
1049
|
+
json_obj = json.loads(result)
|
|
1050
|
+
except TypeError as e:
|
|
1051
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1052
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1053
|
+
break
|
|
1054
|
+
cur_time = time.time()
|
|
1055
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1056
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1057
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1058
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1059
|
+
else:
|
|
1060
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1061
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1062
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1063
|
+
|
|
1064
|
+
|
|
1065
|
+
def doCreateRoute(args, parsed_globals):
|
|
1066
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1067
|
+
|
|
1068
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1069
|
+
cred = credential.CVMRoleCredential()
|
|
1070
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1071
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1072
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1073
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1074
|
+
)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1079
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1080
|
+
else:
|
|
1081
|
+
cred = credential.Credential(
|
|
1082
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1083
|
+
)
|
|
1084
|
+
http_profile = HttpProfile(
|
|
1085
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1086
|
+
reqMethod="POST",
|
|
1087
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1088
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1089
|
+
)
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1091
|
+
if g_param[OptionsDefine.Language]:
|
|
1092
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1093
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1094
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1095
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1096
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1097
|
+
model = models.CreateRouteRequest()
|
|
1098
|
+
model.from_json_string(json.dumps(args))
|
|
1099
|
+
start_time = time.time()
|
|
1100
|
+
while True:
|
|
1101
|
+
rsp = client.CreateRoute(model)
|
|
886
1102
|
result = rsp.to_json_string()
|
|
887
1103
|
try:
|
|
888
1104
|
json_obj = json.loads(result)
|
|
@@ -911,7 +1127,10 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
911
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1129
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1135
|
else:
|
|
917
1136
|
cred = credential.Credential(
|
|
@@ -963,7 +1182,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
963
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1184
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1190
|
else:
|
|
969
1191
|
cred = credential.Credential(
|
|
@@ -1015,7 +1237,10 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1015
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1239
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1245
|
else:
|
|
1021
1246
|
cred = credential.Credential(
|
|
@@ -1057,7 +1282,7 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1057
1282
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1283
|
|
|
1059
1284
|
|
|
1060
|
-
def
|
|
1285
|
+
def doDeleteInstancePost(args, parsed_globals):
|
|
1061
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1287
|
|
|
1063
1288
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1292,10 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1067
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1294
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1300
|
else:
|
|
1073
1301
|
cred = credential.Credential(
|
|
@@ -1086,11 +1314,11 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1086
1314
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1315
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1317
|
+
model = models.DeleteInstancePostRequest()
|
|
1090
1318
|
model.from_json_string(json.dumps(args))
|
|
1091
1319
|
start_time = time.time()
|
|
1092
1320
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1321
|
+
rsp = client.DeleteInstancePost(model)
|
|
1094
1322
|
result = rsp.to_json_string()
|
|
1095
1323
|
try:
|
|
1096
1324
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1337,7 @@ def doDescribeACL(args, parsed_globals):
|
|
|
1109
1337
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1338
|
|
|
1111
1339
|
|
|
1112
|
-
def
|
|
1340
|
+
def doDescribeACL(args, parsed_globals):
|
|
1113
1341
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1342
|
|
|
1115
1343
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1119,7 +1347,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1119
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1349
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1355
|
else:
|
|
1125
1356
|
cred = credential.Credential(
|
|
@@ -1138,11 +1369,11 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
1138
1369
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1370
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1371
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1372
|
+
model = models.DescribeACLRequest()
|
|
1142
1373
|
model.from_json_string(json.dumps(args))
|
|
1143
1374
|
start_time = time.time()
|
|
1144
1375
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1376
|
+
rsp = client.DescribeACL(model)
|
|
1146
1377
|
result = rsp.to_json_string()
|
|
1147
1378
|
try:
|
|
1148
1379
|
json_obj = json.loads(result)
|
|
@@ -1171,7 +1402,10 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1171
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1404
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1410
|
else:
|
|
1177
1411
|
cred = credential.Credential(
|
|
@@ -1213,6 +1447,61 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
1213
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1214
1448
|
|
|
1215
1449
|
|
|
1450
|
+
def doCreateInstancePre(args, parsed_globals):
|
|
1451
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1452
|
+
|
|
1453
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1454
|
+
cred = credential.CVMRoleCredential()
|
|
1455
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1456
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1457
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1458
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1459
|
+
)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1464
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1465
|
+
else:
|
|
1466
|
+
cred = credential.Credential(
|
|
1467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1468
|
+
)
|
|
1469
|
+
http_profile = HttpProfile(
|
|
1470
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1471
|
+
reqMethod="POST",
|
|
1472
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1473
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1474
|
+
)
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1476
|
+
if g_param[OptionsDefine.Language]:
|
|
1477
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1478
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1479
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1480
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1481
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1482
|
+
model = models.CreateInstancePreRequest()
|
|
1483
|
+
model.from_json_string(json.dumps(args))
|
|
1484
|
+
start_time = time.time()
|
|
1485
|
+
while True:
|
|
1486
|
+
rsp = client.CreateInstancePre(model)
|
|
1487
|
+
result = rsp.to_json_string()
|
|
1488
|
+
try:
|
|
1489
|
+
json_obj = json.loads(result)
|
|
1490
|
+
except TypeError as e:
|
|
1491
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1492
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1493
|
+
break
|
|
1494
|
+
cur_time = time.time()
|
|
1495
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1496
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1497
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1498
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1499
|
+
else:
|
|
1500
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1501
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1502
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1503
|
+
|
|
1504
|
+
|
|
1216
1505
|
def doFetchMessageByOffset(args, parsed_globals):
|
|
1217
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1218
1507
|
|
|
@@ -1223,7 +1512,10 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
1223
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1514
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1520
|
else:
|
|
1229
1521
|
cred = credential.Credential(
|
|
@@ -1275,7 +1567,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
1275
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1569
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1575
|
else:
|
|
1281
1576
|
cred = credential.Credential(
|
|
@@ -1327,7 +1622,10 @@ def doModifyPassword(args, parsed_globals):
|
|
|
1327
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1624
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1630
|
else:
|
|
1333
1631
|
cred = credential.Credential(
|
|
@@ -1379,7 +1677,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
1379
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1679
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1685
|
else:
|
|
1385
1686
|
cred = credential.Credential(
|
|
@@ -1431,7 +1732,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
1431
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1734
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1740
|
else:
|
|
1437
1741
|
cred = credential.Credential(
|
|
@@ -1483,7 +1787,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
1483
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1789
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1795
|
else:
|
|
1489
1796
|
cred = credential.Credential(
|
|
@@ -1535,7 +1842,10 @@ def doCreatePartition(args, parsed_globals):
|
|
|
1535
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1844
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1850
|
else:
|
|
1541
1851
|
cred = credential.Credential(
|
|
@@ -1587,7 +1897,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1587
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1899
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1905
|
else:
|
|
1593
1906
|
cred = credential.Credential(
|
|
@@ -1639,7 +1952,10 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
1639
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1954
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1960
|
else:
|
|
1645
1961
|
cred = credential.Credential(
|
|
@@ -1691,7 +2007,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
1691
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
2009
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
2015
|
else:
|
|
1697
2016
|
cred = credential.Credential(
|
|
@@ -1743,7 +2062,10 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1743
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2064
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2070
|
else:
|
|
1749
2071
|
cred = credential.Credential(
|
|
@@ -1795,7 +2117,10 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
1795
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2119
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2125
|
else:
|
|
1801
2126
|
cred = credential.Credential(
|
|
@@ -1847,7 +2172,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
1847
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2174
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2180
|
else:
|
|
1853
2181
|
cred = credential.Credential(
|
|
@@ -1899,7 +2227,10 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
1899
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2229
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2235
|
else:
|
|
1905
2236
|
cred = credential.Credential(
|
|
@@ -1951,7 +2282,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1951
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2284
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2290
|
else:
|
|
1957
2291
|
cred = credential.Credential(
|
|
@@ -2003,7 +2337,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
2003
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2339
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2345
|
else:
|
|
2009
2346
|
cred = credential.Credential(
|
|
@@ -2055,7 +2392,10 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2055
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2394
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2400
|
else:
|
|
2061
2401
|
cred = credential.Credential(
|
|
@@ -2107,7 +2447,10 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
2107
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2449
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2455
|
else:
|
|
2113
2456
|
cred = credential.Credential(
|
|
@@ -2159,7 +2502,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2159
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2504
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2510
|
else:
|
|
2165
2511
|
cred = credential.Credential(
|
|
@@ -2211,7 +2557,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2211
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2559
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2565
|
else:
|
|
2217
2566
|
cred = credential.Credential(
|
|
@@ -2263,7 +2612,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2263
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2614
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2620
|
else:
|
|
2269
2621
|
cred = credential.Credential(
|
|
@@ -2305,6 +2657,61 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
2305
2657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
2658
|
|
|
2307
2659
|
|
|
2660
|
+
def doFetchMessageListByTimestamp(args, parsed_globals):
|
|
2661
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2662
|
+
|
|
2663
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2664
|
+
cred = credential.CVMRoleCredential()
|
|
2665
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2666
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2667
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2668
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2669
|
+
)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2674
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2675
|
+
else:
|
|
2676
|
+
cred = credential.Credential(
|
|
2677
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2678
|
+
)
|
|
2679
|
+
http_profile = HttpProfile(
|
|
2680
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2681
|
+
reqMethod="POST",
|
|
2682
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2683
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2684
|
+
)
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2686
|
+
if g_param[OptionsDefine.Language]:
|
|
2687
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2688
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2689
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2690
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2691
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2692
|
+
model = models.FetchMessageListByTimestampRequest()
|
|
2693
|
+
model.from_json_string(json.dumps(args))
|
|
2694
|
+
start_time = time.time()
|
|
2695
|
+
while True:
|
|
2696
|
+
rsp = client.FetchMessageListByTimestamp(model)
|
|
2697
|
+
result = rsp.to_json_string()
|
|
2698
|
+
try:
|
|
2699
|
+
json_obj = json.loads(result)
|
|
2700
|
+
except TypeError as e:
|
|
2701
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2702
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2703
|
+
break
|
|
2704
|
+
cur_time = time.time()
|
|
2705
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2706
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2707
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2708
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2709
|
+
else:
|
|
2710
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2711
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2712
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2713
|
+
|
|
2714
|
+
|
|
2308
2715
|
def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
2309
2716
|
g_param = parse_global_arg(parsed_globals)
|
|
2310
2717
|
|
|
@@ -2315,7 +2722,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
2315
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2724
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2730
|
else:
|
|
2321
2731
|
cred = credential.Credential(
|
|
@@ -2367,7 +2777,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
2367
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2779
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2785
|
else:
|
|
2373
2786
|
cred = credential.Credential(
|
|
@@ -2419,7 +2832,10 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2419
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2834
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2840
|
else:
|
|
2425
2841
|
cred = credential.Credential(
|
|
@@ -2461,7 +2877,7 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
2461
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
2878
|
|
|
2463
2879
|
|
|
2464
|
-
def
|
|
2880
|
+
def doModifyInstanceAttributes(args, parsed_globals):
|
|
2465
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
2882
|
|
|
2467
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +2887,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2471
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2889
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2895
|
else:
|
|
2477
2896
|
cred = credential.Credential(
|
|
@@ -2490,11 +2909,11 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
2490
2909
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
2912
|
+
model = models.ModifyInstanceAttributesRequest()
|
|
2494
2913
|
model.from_json_string(json.dumps(args))
|
|
2495
2914
|
start_time = time.time()
|
|
2496
2915
|
while True:
|
|
2497
|
-
rsp = client.
|
|
2916
|
+
rsp = client.ModifyInstanceAttributes(model)
|
|
2498
2917
|
result = rsp.to_json_string()
|
|
2499
2918
|
try:
|
|
2500
2919
|
json_obj = json.loads(result)
|
|
@@ -2523,7 +2942,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2523
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2944
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2950
|
else:
|
|
2529
2951
|
cred = credential.Credential(
|
|
@@ -2575,7 +2997,10 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
2575
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2999
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
3005
|
else:
|
|
2581
3006
|
cred = credential.Credential(
|
|
@@ -2627,7 +3052,10 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2627
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
3054
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
3060
|
else:
|
|
2633
3061
|
cred = credential.Credential(
|
|
@@ -2669,6 +3097,61 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
2669
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2670
3098
|
|
|
2671
3099
|
|
|
3100
|
+
def doModifyInstancePre(args, parsed_globals):
|
|
3101
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3102
|
+
|
|
3103
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3104
|
+
cred = credential.CVMRoleCredential()
|
|
3105
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3106
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3107
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3108
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3109
|
+
)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3114
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3115
|
+
else:
|
|
3116
|
+
cred = credential.Credential(
|
|
3117
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3118
|
+
)
|
|
3119
|
+
http_profile = HttpProfile(
|
|
3120
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3121
|
+
reqMethod="POST",
|
|
3122
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3123
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3124
|
+
)
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
3126
|
+
if g_param[OptionsDefine.Language]:
|
|
3127
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3128
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3129
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3130
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3131
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3132
|
+
model = models.ModifyInstancePreRequest()
|
|
3133
|
+
model.from_json_string(json.dumps(args))
|
|
3134
|
+
start_time = time.time()
|
|
3135
|
+
while True:
|
|
3136
|
+
rsp = client.ModifyInstancePre(model)
|
|
3137
|
+
result = rsp.to_json_string()
|
|
3138
|
+
try:
|
|
3139
|
+
json_obj = json.loads(result)
|
|
3140
|
+
except TypeError as e:
|
|
3141
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3142
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3143
|
+
break
|
|
3144
|
+
cur_time = time.time()
|
|
3145
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3146
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3147
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3148
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3149
|
+
else:
|
|
3150
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3151
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3152
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3153
|
+
|
|
3154
|
+
|
|
2672
3155
|
def doDeleteTopic(args, parsed_globals):
|
|
2673
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2674
3157
|
|
|
@@ -2679,7 +3162,10 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
2679
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
3164
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3170
|
else:
|
|
2685
3171
|
cred = credential.Credential(
|
|
@@ -2731,7 +3217,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
2731
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3219
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3225
|
else:
|
|
2737
3226
|
cred = credential.Credential(
|
|
@@ -2783,7 +3272,10 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2783
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3274
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3280
|
else:
|
|
2789
3281
|
cred = credential.Credential(
|
|
@@ -2840,10 +3332,11 @@ ACTION_MAP = {
|
|
|
2840
3332
|
"DescribeGroupInfo": doDescribeGroupInfo,
|
|
2841
3333
|
"CreateConsumer": doCreateConsumer,
|
|
2842
3334
|
"CreateAcl": doCreateAcl,
|
|
2843
|
-
"
|
|
3335
|
+
"DescribeTypeInstances": doDescribeTypeInstances,
|
|
3336
|
+
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
2844
3337
|
"DescribeAclRule": doDescribeAclRule,
|
|
2845
3338
|
"CreateTopic": doCreateTopic,
|
|
2846
|
-
"
|
|
3339
|
+
"DescribeSecurityGroupRoutes": doDescribeSecurityGroupRoutes,
|
|
2847
3340
|
"BatchModifyTopicAttributes": doBatchModifyTopicAttributes,
|
|
2848
3341
|
"DeleteRoute": doDeleteRoute,
|
|
2849
3342
|
"SendMessage": doSendMessage,
|
|
@@ -2852,13 +3345,16 @@ ACTION_MAP = {
|
|
|
2852
3345
|
"DescribeGroup": doDescribeGroup,
|
|
2853
3346
|
"ModifyGroupOffsets": doModifyGroupOffsets,
|
|
2854
3347
|
"DescribeInstances": doDescribeInstances,
|
|
2855
|
-
"
|
|
3348
|
+
"DescribeCvmInfo": doDescribeCvmInfo,
|
|
3349
|
+
"DescribeDatahubTopic": doDescribeDatahubTopic,
|
|
3350
|
+
"CreateRoute": doCreateRoute,
|
|
2856
3351
|
"ModifyDatahubTopic": doModifyDatahubTopic,
|
|
2857
3352
|
"FetchMessageListByOffset": doFetchMessageListByOffset,
|
|
2858
3353
|
"CreateDatahubTopic": doCreateDatahubTopic,
|
|
3354
|
+
"DeleteInstancePost": doDeleteInstancePost,
|
|
2859
3355
|
"DescribeACL": doDescribeACL,
|
|
2860
|
-
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
2861
3356
|
"DescribeTopicDetail": doDescribeTopicDetail,
|
|
3357
|
+
"CreateInstancePre": doCreateInstancePre,
|
|
2862
3358
|
"FetchMessageByOffset": doFetchMessageByOffset,
|
|
2863
3359
|
"DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
|
|
2864
3360
|
"ModifyPassword": doModifyPassword,
|
|
@@ -2880,13 +3376,15 @@ ACTION_MAP = {
|
|
|
2880
3376
|
"DeleteUser": doDeleteUser,
|
|
2881
3377
|
"DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
|
|
2882
3378
|
"DescribeTopicAttributes": doDescribeTopicAttributes,
|
|
3379
|
+
"FetchMessageListByTimestamp": doFetchMessageListByTimestamp,
|
|
2883
3380
|
"DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
|
|
2884
3381
|
"CreatePostPaidInstance": doCreatePostPaidInstance,
|
|
2885
3382
|
"CreateAclRule": doCreateAclRule,
|
|
2886
|
-
"
|
|
3383
|
+
"ModifyInstanceAttributes": doModifyInstanceAttributes,
|
|
2887
3384
|
"DescribeCkafkaZone": doDescribeCkafkaZone,
|
|
2888
3385
|
"DescribeRegion": doDescribeRegion,
|
|
2889
3386
|
"DescribeTopic": doDescribeTopic,
|
|
3387
|
+
"ModifyInstancePre": doModifyInstancePre,
|
|
2890
3388
|
"DeleteTopic": doDeleteTopic,
|
|
2891
3389
|
"InquireCkafkaPrice": doInquireCkafkaPrice,
|
|
2892
3390
|
"ModifyTopicAttributes": doModifyTopicAttributes,
|