tccli-intl-en 3.0.1237.1__py2.py3-none-any.whl → 3.0.1282.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +17 -1
- tccli/services/advisor/advisor_client.py +8 -2
- tccli/services/aiart/aiart_client.py +4 -1
- tccli/services/ams/ams_client.py +16 -4
- tccli/services/antiddos/antiddos_client.py +280 -70
- tccli/services/apigateway/apigateway_client.py +372 -93
- tccli/services/apm/apm_client.py +52 -13
- tccli/services/asr/asr_client.py +8 -2
- tccli/services/autoscaling/autoscaling_client.py +232 -58
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/batch_client.py +112 -28
- tccli/services/bi/bi_client.py +1242 -4
- tccli/services/bi/v20220105/api.json +5340 -107
- tccli/services/bi/v20220105/examples.json +196 -1
- tccli/services/billing/billing_client.py +168 -42
- tccli/services/cam/cam_client.py +324 -81
- tccli/services/captcha/captcha_client.py +4 -1
- tccli/services/car/car_client.py +132 -33
- tccli/services/cbs/cbs_client.py +152 -38
- tccli/services/ccc/ccc_client.py +732 -98
- tccli/services/ccc/v20200210/api.json +1727 -196
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +532 -133
- tccli/services/cdc/cdc_client.py +80 -20
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +176 -44
- tccli/services/cdwdoris/cdwdoris_client.py +308 -77
- tccli/services/cdwpg/cdwpg_client.py +96 -24
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +64 -16
- tccli/services/cfs/cfs_client.py +156 -39
- tccli/services/cfw/cfw_client.py +264 -66
- tccli/services/chdfs/chdfs_client.py +116 -29
- tccli/services/ciam/ciam_client.py +64 -16
- tccli/services/ckafka/ckafka_client.py +575 -77
- tccli/services/ckafka/v20190819/api.json +2749 -1470
- tccli/services/ckafka/v20190819/examples.json +209 -155
- tccli/services/clb/clb_client.py +332 -83
- tccli/services/clb/v20180317/api.json +29 -14
- tccli/services/cloudaudit/cloudaudit_client.py +72 -18
- tccli/services/cls/cls_client.py +348 -87
- tccli/services/cmq/cmq_client.py +12 -801
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +24 -6
- tccli/services/controlcenter/controlcenter_client.py +4 -1
- tccli/services/csip/csip_client.py +136 -34
- tccli/services/ctsdb/ctsdb_client.py +8 -2
- tccli/services/cvm/cvm_client.py +627 -110
- tccli/services/cvm/v20170312/api.json +750 -340
- tccli/services/cvm/v20170312/examples.json +105 -59
- tccli/services/cwp/cwp_client.py +1860 -465
- tccli/services/cynosdb/cynosdb_client.py +1749 -439
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +4 -1
- tccli/services/dayu/dayu_client.py +412 -103
- tccli/services/dbbrain/dbbrain_client.py +168 -42
- tccli/services/dc/dc_client.py +72 -18
- tccli/services/dcdb/dcdb_client.py +248 -62
- tccli/services/dlc/dlc_client.py +756 -111
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +8 -2
- tccli/services/dnspod/dnspod_client.py +353 -74
- tccli/services/dnspod/v20210323/api.json +196 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/domain/domain_client.py +96 -24
- tccli/services/dts/dts_client.py +332 -83
- tccli/services/eb/eb_client.py +104 -26
- tccli/services/ecdn/ecdn_client.py +60 -15
- tccli/services/ecm/ecm_client.py +496 -124
- tccli/services/eiam/eiam_client.py +160 -40
- tccli/services/emr/emr_client.py +2784 -115
- tccli/services/emr/v20190103/api.json +14647 -4756
- tccli/services/emr/v20190103/examples.json +408 -40
- tccli/services/es/es_client.py +84 -21
- tccli/services/facefusion/facefusion_client.py +12 -3
- tccli/services/faceid/faceid_client.py +76 -19
- tccli/services/faceid/v20180301/api.json +79 -14
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +352 -88
- tccli/services/gme/gme_client.py +40 -10
- tccli/services/gpm/gpm_client.py +72 -18
- tccli/services/gse/gse_client.py +88 -22
- tccli/services/gwlb/gwlb_client.py +72 -18
- tccli/services/iai/iai_client.py +116 -29
- tccli/services/iap/iap_client.py +24 -6
- tccli/services/ims/ims_client.py +4 -1
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +168 -42
- tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
- tccli/services/iotcloud/iotcloud_client.py +80 -20
- tccli/services/ip/ip_client.py +24 -6
- tccli/services/kms/kms_client.py +272 -68
- tccli/services/lcic/lcic_client.py +212 -53
- tccli/services/lighthouse/lighthouse_client.py +296 -74
- tccli/services/lighthouse/v20200324/api.json +14 -14
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/live_client.py +480 -120
- tccli/services/lke/lke_client.py +360 -90
- tccli/services/lke/v20231130/api.json +182 -39
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +546 -0
- tccli/services/lkeap/v20240522/api.json +855 -0
- tccli/services/lkeap/v20240522/examples.json +72 -0
- tccli/services/mariadb/mariadb_client.py +200 -50
- tccli/services/mdc/mdc_client.py +72 -18
- tccli/services/mdl/mdl_client.py +132 -33
- tccli/services/mdl/v20200326/api.json +186 -12
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/mdp_client.py +680 -70
- tccli/services/mdp/v20200527/api.json +748 -23
- tccli/services/mdp/v20200527/examples.json +143 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +340 -29
- tccli/services/mongodb/v20190725/api.json +811 -226
- tccli/services/mongodb/v20190725/examples.json +54 -22
- tccli/services/monitor/monitor_client.py +864 -152
- tccli/services/monitor/v20180724/api.json +657 -8
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +592 -92
- tccli/services/mps/v20190612/api.json +2931 -399
- tccli/services/mps/v20190612/examples.json +64 -14
- tccli/services/msp/msp_client.py +28 -7
- tccli/services/ocr/ocr_client.py +212 -45
- tccli/services/ocr/v20181119/api.json +872 -112
- tccli/services/ocr/v20181119/examples.json +12 -4
- tccli/services/omics/omics_client.py +80 -20
- tccli/services/organization/organization_client.py +464 -116
- tccli/services/postgres/postgres_client.py +364 -91
- tccli/services/postgres/v20170312/api.json +134 -109
- tccli/services/postgres/v20170312/examples.json +14 -14
- tccli/services/privatedns/privatedns_client.py +124 -31
- tccli/services/pts/pts_client.py +192 -48
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +4 -1
- tccli/services/redis/redis_client.py +592 -106
- tccli/services/redis/v20180412/api.json +636 -240
- tccli/services/redis/v20180412/examples.json +98 -56
- tccli/services/region/region_client.py +12 -3
- tccli/services/rum/rum_client.py +240 -60
- tccli/services/scf/scf_client.py +168 -42
- tccli/services/ses/ses_client.py +116 -29
- tccli/services/sms/sms_client.py +72 -18
- tccli/services/sqlserver/sqlserver_client.py +3772 -387
- tccli/services/sqlserver/v20180328/api.json +9760 -3380
- tccli/services/sqlserver/v20180328/examples.json +478 -18
- tccli/services/ssl/ssl_client.py +152 -38
- tccli/services/ssm/ssm_client.py +96 -24
- tccli/services/sts/sts_client.py +20 -5
- tccli/services/tag/tag_client.py +120 -30
- tccli/services/tat/tat_client.py +76 -19
- tccli/services/tbaas/tbaas_client.py +16 -4
- tccli/services/tcaplusdb/tcaplusdb_client.py +208 -52
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +4 -1
- tccli/services/tcmpp/tcmpp_client.py +416 -104
- tccli/services/tcr/tcr_client.py +304 -76
- tccli/services/tcsas/tcsas_client.py +236 -59
- tccli/services/tcsas/v20250106/api.json +155 -79
- tccli/services/tcsas/v20250106/examples.json +3 -3
- tccli/services/tcss/tcss_client.py +1320 -330
- tccli/services/tdid/tdid_client.py +192 -48
- tccli/services/tdmq/tdmq_client.py +376 -94
- tccli/services/tem/tem_client.py +224 -56
- tccli/services/teo/teo_client.py +1127 -245
- tccli/services/teo/v20220901/api.json +382 -58
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +204 -51
- tccli/services/tke/tke_client.py +552 -138
- tccli/services/tms/tms_client.py +4 -1
- tccli/services/tmt/tmt_client.py +4 -1
- tccli/services/trabbit/trabbit_client.py +116 -29
- tccli/services/trro/trro_client.py +76 -19
- tccli/services/trtc/trtc_client.py +420 -55
- tccli/services/trtc/v20190722/api.json +685 -23
- tccli/services/trtc/v20190722/examples.json +39 -7
- tccli/services/tts/tts_client.py +4 -1
- tccli/services/vclm/vclm_client.py +8 -2
- tccli/services/vm/vm_client.py +16 -4
- tccli/services/vod/v20180717/examples.json +1 -1
- tccli/services/vod/vod_client.py +716 -179
- tccli/services/vpc/v20170312/api.json +970 -75
- tccli/services/vpc/v20170312/examples.json +106 -10
- tccli/services/vpc/vpc_client.py +1876 -361
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1051 -147
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +5830 -1026
- tccli/services/yunjing/yunjing_client.py +284 -71
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/RECORD +214 -192
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1237.1.dist-info → tccli_intl_en-3.0.1282.1.dist-info}/top_level.txt +0 -0
tccli/services/mdp/mdp_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doDeleteStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -79,7 +82,10 @@ def doDescribeLinearAssemblyCDNDomainWithChannels(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -121,6 +127,61 @@ def doDescribeLinearAssemblyCDNDomainWithChannels(args, parsed_globals):
|
|
|
121
127
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
122
128
|
|
|
123
129
|
|
|
130
|
+
def doCreateStreamPackageVodRemuxTask(args, parsed_globals):
|
|
131
|
+
g_param = parse_global_arg(parsed_globals)
|
|
132
|
+
|
|
133
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
134
|
+
cred = credential.CVMRoleCredential()
|
|
135
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
136
|
+
cred = credential.STSAssumeRoleCredential(
|
|
137
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
138
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
139
|
+
)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
144
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
145
|
+
else:
|
|
146
|
+
cred = credential.Credential(
|
|
147
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
148
|
+
)
|
|
149
|
+
http_profile = HttpProfile(
|
|
150
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
151
|
+
reqMethod="POST",
|
|
152
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
153
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
154
|
+
)
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
156
|
+
if g_param[OptionsDefine.Language]:
|
|
157
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
158
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
159
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
160
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
161
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
162
|
+
model = models.CreateStreamPackageVodRemuxTaskRequest()
|
|
163
|
+
model.from_json_string(json.dumps(args))
|
|
164
|
+
start_time = time.time()
|
|
165
|
+
while True:
|
|
166
|
+
rsp = client.CreateStreamPackageVodRemuxTask(model)
|
|
167
|
+
result = rsp.to_json_string()
|
|
168
|
+
try:
|
|
169
|
+
json_obj = json.loads(result)
|
|
170
|
+
except TypeError as e:
|
|
171
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
172
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
173
|
+
break
|
|
174
|
+
cur_time = time.time()
|
|
175
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
176
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
177
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
178
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
179
|
+
else:
|
|
180
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
181
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
182
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
183
|
+
|
|
184
|
+
|
|
124
185
|
def doCreateStreamPackageSSAIChannel(args, parsed_globals):
|
|
125
186
|
g_param = parse_global_arg(parsed_globals)
|
|
126
187
|
|
|
@@ -131,7 +192,10 @@ def doCreateStreamPackageSSAIChannel(args, parsed_globals):
|
|
|
131
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
194
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
200
|
else:
|
|
137
201
|
cred = credential.Credential(
|
|
@@ -183,7 +247,10 @@ def doDeleteStreamPackageChannelEndpoints(args, parsed_globals):
|
|
|
183
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
249
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
255
|
else:
|
|
189
256
|
cred = credential.Credential(
|
|
@@ -235,7 +302,10 @@ def doDeleteStreamPackageHarvestJobs(args, parsed_globals):
|
|
|
235
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
304
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
310
|
else:
|
|
241
311
|
cred = credential.Credential(
|
|
@@ -277,7 +347,7 @@ def doDeleteStreamPackageHarvestJobs(args, parsed_globals):
|
|
|
277
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
348
|
|
|
279
349
|
|
|
280
|
-
def
|
|
350
|
+
def doDeleteStreamPackageVodRemuxTask(args, parsed_globals):
|
|
281
351
|
g_param = parse_global_arg(parsed_globals)
|
|
282
352
|
|
|
283
353
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -287,7 +357,10 @@ def doDeleteStreamPackageSource(args, parsed_globals):
|
|
|
287
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
359
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
365
|
else:
|
|
293
366
|
cred = credential.Credential(
|
|
@@ -306,11 +379,11 @@ def doDeleteStreamPackageSource(args, parsed_globals):
|
|
|
306
379
|
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
380
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
381
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
382
|
+
model = models.DeleteStreamPackageVodRemuxTaskRequest()
|
|
310
383
|
model.from_json_string(json.dumps(args))
|
|
311
384
|
start_time = time.time()
|
|
312
385
|
while True:
|
|
313
|
-
rsp = client.
|
|
386
|
+
rsp = client.DeleteStreamPackageVodRemuxTask(model)
|
|
314
387
|
result = rsp.to_json_string()
|
|
315
388
|
try:
|
|
316
389
|
json_obj = json.loads(result)
|
|
@@ -339,7 +412,10 @@ def doDescribeStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
339
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
414
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
420
|
else:
|
|
345
421
|
cred = credential.Credential(
|
|
@@ -391,7 +467,10 @@ def doModifyStreamPackageSSAIChannel(args, parsed_globals):
|
|
|
391
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
469
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
475
|
else:
|
|
397
476
|
cred = credential.Credential(
|
|
@@ -443,7 +522,10 @@ def doDescribeStreamPackageSource(args, parsed_globals):
|
|
|
443
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
524
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
530
|
else:
|
|
449
531
|
cred = credential.Credential(
|
|
@@ -495,7 +577,10 @@ def doDeleteStreamPackageHarvestJob(args, parsed_globals):
|
|
|
495
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
579
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
585
|
else:
|
|
501
586
|
cred = credential.Credential(
|
|
@@ -547,7 +632,10 @@ def doModifyStreamPackageLinearAssemblyProgram(args, parsed_globals):
|
|
|
547
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
634
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
640
|
else:
|
|
553
641
|
cred = credential.Credential(
|
|
@@ -599,7 +687,10 @@ def doModifyStreamPackageSource(args, parsed_globals):
|
|
|
599
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
689
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
695
|
else:
|
|
605
696
|
cred = credential.Credential(
|
|
@@ -651,7 +742,10 @@ def doCreateStreamPackageHarvestJob(args, parsed_globals):
|
|
|
651
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
744
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
750
|
else:
|
|
657
751
|
cred = credential.Credential(
|
|
@@ -693,6 +787,61 @@ def doCreateStreamPackageHarvestJob(args, parsed_globals):
|
|
|
693
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
788
|
|
|
695
789
|
|
|
790
|
+
def doBindSSAICDNDomainWithChannel(args, parsed_globals):
|
|
791
|
+
g_param = parse_global_arg(parsed_globals)
|
|
792
|
+
|
|
793
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
794
|
+
cred = credential.CVMRoleCredential()
|
|
795
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
796
|
+
cred = credential.STSAssumeRoleCredential(
|
|
797
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
798
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
799
|
+
)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
804
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
805
|
+
else:
|
|
806
|
+
cred = credential.Credential(
|
|
807
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
808
|
+
)
|
|
809
|
+
http_profile = HttpProfile(
|
|
810
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
811
|
+
reqMethod="POST",
|
|
812
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
813
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
814
|
+
)
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
816
|
+
if g_param[OptionsDefine.Language]:
|
|
817
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
818
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
819
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
820
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
821
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
822
|
+
model = models.BindSSAICDNDomainWithChannelRequest()
|
|
823
|
+
model.from_json_string(json.dumps(args))
|
|
824
|
+
start_time = time.time()
|
|
825
|
+
while True:
|
|
826
|
+
rsp = client.BindSSAICDNDomainWithChannel(model)
|
|
827
|
+
result = rsp.to_json_string()
|
|
828
|
+
try:
|
|
829
|
+
json_obj = json.loads(result)
|
|
830
|
+
except TypeError as e:
|
|
831
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
832
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
833
|
+
break
|
|
834
|
+
cur_time = time.time()
|
|
835
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
836
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
837
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
838
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
839
|
+
else:
|
|
840
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
841
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
842
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
843
|
+
|
|
844
|
+
|
|
696
845
|
def doDescribeLinearAssemblyCDNDomainWithChannel(args, parsed_globals):
|
|
697
846
|
g_param = parse_global_arg(parsed_globals)
|
|
698
847
|
|
|
@@ -703,7 +852,10 @@ def doDescribeLinearAssemblyCDNDomainWithChannel(args, parsed_globals):
|
|
|
703
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
854
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
860
|
else:
|
|
709
861
|
cred = credential.Credential(
|
|
@@ -755,7 +907,10 @@ def doModifyStreamPackageChannelEndpoint(args, parsed_globals):
|
|
|
755
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
909
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
915
|
else:
|
|
761
916
|
cred = credential.Credential(
|
|
@@ -807,7 +962,10 @@ def doDescribeStreamPackageSSAIUsage(args, parsed_globals):
|
|
|
807
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
964
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
970
|
else:
|
|
813
971
|
cred = credential.Credential(
|
|
@@ -859,7 +1017,10 @@ def doStopStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
859
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1019
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1025
|
else:
|
|
865
1026
|
cred = credential.Credential(
|
|
@@ -911,7 +1072,10 @@ def doBindNewLVBDomainWithChannel(args, parsed_globals):
|
|
|
911
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1074
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1080
|
else:
|
|
917
1081
|
cred = credential.Credential(
|
|
@@ -963,7 +1127,10 @@ def doDescribeStreamPackageSSAIChannels(args, parsed_globals):
|
|
|
963
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1129
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1135
|
else:
|
|
969
1136
|
cred = credential.Credential(
|
|
@@ -1015,7 +1182,10 @@ def doDescribeStreamPackageLinearAssemblyPrograms(args, parsed_globals):
|
|
|
1015
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1184
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1190
|
else:
|
|
1021
1191
|
cred = credential.Credential(
|
|
@@ -1067,7 +1237,10 @@ def doModifyStreamPackageChannelInputAuthInfo(args, parsed_globals):
|
|
|
1067
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1239
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1245
|
else:
|
|
1073
1246
|
cred = credential.Credential(
|
|
@@ -1119,7 +1292,10 @@ def doModifyStreamPackageSourceLocation(args, parsed_globals):
|
|
|
1119
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1294
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1300
|
else:
|
|
1125
1301
|
cred = credential.Credential(
|
|
@@ -1171,7 +1347,10 @@ def doDeleteStreamPackageSSAIChannel(args, parsed_globals):
|
|
|
1171
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1349
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1355
|
else:
|
|
1177
1356
|
cred = credential.Credential(
|
|
@@ -1223,7 +1402,10 @@ def doDescribeStreamPackageChannels(args, parsed_globals):
|
|
|
1223
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1404
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1410
|
else:
|
|
1229
1411
|
cred = credential.Credential(
|
|
@@ -1265,6 +1447,61 @@ def doDescribeStreamPackageChannels(args, parsed_globals):
|
|
|
1265
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1448
|
|
|
1267
1449
|
|
|
1450
|
+
def doDescribeStreamPackageVodRemuxTasks(args, parsed_globals):
|
|
1451
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1452
|
+
|
|
1453
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1454
|
+
cred = credential.CVMRoleCredential()
|
|
1455
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1456
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1457
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1458
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1459
|
+
)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1464
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1465
|
+
else:
|
|
1466
|
+
cred = credential.Credential(
|
|
1467
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1468
|
+
)
|
|
1469
|
+
http_profile = HttpProfile(
|
|
1470
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1471
|
+
reqMethod="POST",
|
|
1472
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1473
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1474
|
+
)
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1476
|
+
if g_param[OptionsDefine.Language]:
|
|
1477
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1478
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1479
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1480
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1481
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1482
|
+
model = models.DescribeStreamPackageVodRemuxTasksRequest()
|
|
1483
|
+
model.from_json_string(json.dumps(args))
|
|
1484
|
+
start_time = time.time()
|
|
1485
|
+
while True:
|
|
1486
|
+
rsp = client.DescribeStreamPackageVodRemuxTasks(model)
|
|
1487
|
+
result = rsp.to_json_string()
|
|
1488
|
+
try:
|
|
1489
|
+
json_obj = json.loads(result)
|
|
1490
|
+
except TypeError as e:
|
|
1491
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1492
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1493
|
+
break
|
|
1494
|
+
cur_time = time.time()
|
|
1495
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1496
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1497
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1498
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1499
|
+
else:
|
|
1500
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1501
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1502
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1503
|
+
|
|
1504
|
+
|
|
1268
1505
|
def doCreateStreamPackageSource(args, parsed_globals):
|
|
1269
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1507
|
|
|
@@ -1275,7 +1512,10 @@ def doCreateStreamPackageSource(args, parsed_globals):
|
|
|
1275
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1514
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1520
|
else:
|
|
1281
1521
|
cred = credential.Credential(
|
|
@@ -1327,7 +1567,10 @@ def doStartStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
1327
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1569
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1575
|
else:
|
|
1333
1576
|
cred = credential.Credential(
|
|
@@ -1379,7 +1622,10 @@ def doDescribeStreamPackageLinearAssemblyChannelAlerts(args, parsed_globals):
|
|
|
1379
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1624
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1630
|
else:
|
|
1385
1631
|
cred = credential.Credential(
|
|
@@ -1431,7 +1677,10 @@ def doCreateStreamPackageChannelEndpoint(args, parsed_globals):
|
|
|
1431
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1679
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1685
|
else:
|
|
1437
1686
|
cred = credential.Credential(
|
|
@@ -1483,7 +1732,10 @@ def doUnbindLinearAssemblyCDNDomainWithChannel(args, parsed_globals):
|
|
|
1483
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1734
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1740
|
else:
|
|
1489
1741
|
cred = credential.Credential(
|
|
@@ -1525,7 +1777,7 @@ def doUnbindLinearAssemblyCDNDomainWithChannel(args, parsed_globals):
|
|
|
1525
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
1778
|
|
|
1527
1779
|
|
|
1528
|
-
def
|
|
1780
|
+
def doStartStreamPackageVodRemuxTask(args, parsed_globals):
|
|
1529
1781
|
g_param = parse_global_arg(parsed_globals)
|
|
1530
1782
|
|
|
1531
1783
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1535,7 +1787,10 @@ def doModifyStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
1535
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1789
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1795
|
else:
|
|
1541
1796
|
cred = credential.Credential(
|
|
@@ -1554,11 +1809,11 @@ def doModifyStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
1554
1809
|
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
1810
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
1811
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.
|
|
1812
|
+
model = models.StartStreamPackageVodRemuxTaskRequest()
|
|
1558
1813
|
model.from_json_string(json.dumps(args))
|
|
1559
1814
|
start_time = time.time()
|
|
1560
1815
|
while True:
|
|
1561
|
-
rsp = client.
|
|
1816
|
+
rsp = client.StartStreamPackageVodRemuxTask(model)
|
|
1562
1817
|
result = rsp.to_json_string()
|
|
1563
1818
|
try:
|
|
1564
1819
|
json_obj = json.loads(result)
|
|
@@ -1587,7 +1842,10 @@ def doCreateStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
|
1587
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1844
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1850
|
else:
|
|
1593
1851
|
cred = credential.Credential(
|
|
@@ -1639,7 +1897,10 @@ def doDescribeStreamPackageSources(args, parsed_globals):
|
|
|
1639
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1899
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1905
|
else:
|
|
1645
1906
|
cred = credential.Credential(
|
|
@@ -1691,7 +1952,10 @@ def doDescribeStreamPackageLinearAssemblyProgram(args, parsed_globals):
|
|
|
1691
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1954
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1960
|
else:
|
|
1697
1961
|
cred = credential.Credential(
|
|
@@ -1743,7 +2007,10 @@ def doDescribeStreamPackageSourceAlerts(args, parsed_globals):
|
|
|
1743
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2009
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2015
|
else:
|
|
1749
2016
|
cred = credential.Credential(
|
|
@@ -1785,7 +2052,7 @@ def doDescribeStreamPackageSourceAlerts(args, parsed_globals):
|
|
|
1785
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1786
2053
|
|
|
1787
2054
|
|
|
1788
|
-
def
|
|
2055
|
+
def doDeleteStreamPackageSource(args, parsed_globals):
|
|
1789
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1790
2057
|
|
|
1791
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1795,7 +2062,10 @@ def doCreateStreamPackageSourceLocation(args, parsed_globals):
|
|
|
1795
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2064
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2070
|
else:
|
|
1801
2071
|
cred = credential.Credential(
|
|
@@ -1814,11 +2084,66 @@ def doCreateStreamPackageSourceLocation(args, parsed_globals):
|
|
|
1814
2084
|
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
-
model = models.
|
|
2087
|
+
model = models.DeleteStreamPackageSourceRequest()
|
|
1818
2088
|
model.from_json_string(json.dumps(args))
|
|
1819
2089
|
start_time = time.time()
|
|
1820
2090
|
while True:
|
|
1821
|
-
rsp = client.
|
|
2091
|
+
rsp = client.DeleteStreamPackageSource(model)
|
|
2092
|
+
result = rsp.to_json_string()
|
|
2093
|
+
try:
|
|
2094
|
+
json_obj = json.loads(result)
|
|
2095
|
+
except TypeError as e:
|
|
2096
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2097
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2098
|
+
break
|
|
2099
|
+
cur_time = time.time()
|
|
2100
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2101
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2102
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2103
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2104
|
+
else:
|
|
2105
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2106
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2107
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2108
|
+
|
|
2109
|
+
|
|
2110
|
+
def doModifyStreamPackageLinearAssemblyChannel(args, parsed_globals):
|
|
2111
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2112
|
+
|
|
2113
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2114
|
+
cred = credential.CVMRoleCredential()
|
|
2115
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2116
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2117
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2118
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2119
|
+
)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2124
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2125
|
+
else:
|
|
2126
|
+
cred = credential.Credential(
|
|
2127
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2128
|
+
)
|
|
2129
|
+
http_profile = HttpProfile(
|
|
2130
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2131
|
+
reqMethod="POST",
|
|
2132
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2133
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2134
|
+
)
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2136
|
+
if g_param[OptionsDefine.Language]:
|
|
2137
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2138
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2139
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2140
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2141
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2142
|
+
model = models.ModifyStreamPackageLinearAssemblyChannelRequest()
|
|
2143
|
+
model.from_json_string(json.dumps(args))
|
|
2144
|
+
start_time = time.time()
|
|
2145
|
+
while True:
|
|
2146
|
+
rsp = client.ModifyStreamPackageLinearAssemblyChannel(model)
|
|
1822
2147
|
result = rsp.to_json_string()
|
|
1823
2148
|
try:
|
|
1824
2149
|
json_obj = json.loads(result)
|
|
@@ -1847,7 +2172,10 @@ def doCreateStreamPackageLinearAssemblyProgram(args, parsed_globals):
|
|
|
1847
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2174
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2180
|
else:
|
|
1853
2181
|
cred = credential.Credential(
|
|
@@ -1889,6 +2217,61 @@ def doCreateStreamPackageLinearAssemblyProgram(args, parsed_globals):
|
|
|
1889
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
2218
|
|
|
1891
2219
|
|
|
2220
|
+
def doDescribeStreamPackageLinearAssemblyChannels(args, parsed_globals):
|
|
2221
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2222
|
+
|
|
2223
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2224
|
+
cred = credential.CVMRoleCredential()
|
|
2225
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2226
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2228
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2229
|
+
)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2234
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2235
|
+
else:
|
|
2236
|
+
cred = credential.Credential(
|
|
2237
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2238
|
+
)
|
|
2239
|
+
http_profile = HttpProfile(
|
|
2240
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2241
|
+
reqMethod="POST",
|
|
2242
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2243
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2244
|
+
)
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2246
|
+
if g_param[OptionsDefine.Language]:
|
|
2247
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2248
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2249
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2250
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2251
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2252
|
+
model = models.DescribeStreamPackageLinearAssemblyChannelsRequest()
|
|
2253
|
+
model.from_json_string(json.dumps(args))
|
|
2254
|
+
start_time = time.time()
|
|
2255
|
+
while True:
|
|
2256
|
+
rsp = client.DescribeStreamPackageLinearAssemblyChannels(model)
|
|
2257
|
+
result = rsp.to_json_string()
|
|
2258
|
+
try:
|
|
2259
|
+
json_obj = json.loads(result)
|
|
2260
|
+
except TypeError as e:
|
|
2261
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2262
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2263
|
+
break
|
|
2264
|
+
cur_time = time.time()
|
|
2265
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2266
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2267
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2268
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2269
|
+
else:
|
|
2270
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2271
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2272
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2273
|
+
|
|
2274
|
+
|
|
1892
2275
|
def doDeleteStreamPackageLinearAssemblyPrograms(args, parsed_globals):
|
|
1893
2276
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2277
|
|
|
@@ -1899,7 +2282,10 @@ def doDeleteStreamPackageLinearAssemblyPrograms(args, parsed_globals):
|
|
|
1899
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2284
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2290
|
else:
|
|
1905
2291
|
cred = credential.Credential(
|
|
@@ -1951,7 +2337,10 @@ def doDescribeStreamPackageLinearAssemblyProgramSchedules(args, parsed_globals):
|
|
|
1951
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2339
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2345
|
else:
|
|
1957
2346
|
cred = credential.Credential(
|
|
@@ -2003,7 +2392,10 @@ def doDeleteStreamPackageSourceLocation(args, parsed_globals):
|
|
|
2003
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2394
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2400
|
else:
|
|
2009
2401
|
cred = credential.Credential(
|
|
@@ -2055,7 +2447,10 @@ def doDescribeStreamPackageHarvestJob(args, parsed_globals):
|
|
|
2055
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2449
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2455
|
else:
|
|
2061
2456
|
cred = credential.Credential(
|
|
@@ -2107,7 +2502,10 @@ def doDeleteStreamPackageLinearAssemblyProgram(args, parsed_globals):
|
|
|
2107
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2504
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2510
|
else:
|
|
2113
2511
|
cred = credential.Credential(
|
|
@@ -2159,7 +2557,10 @@ def doDescribeStreamPackageHarvestJobs(args, parsed_globals):
|
|
|
2159
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2559
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2565
|
else:
|
|
2165
2566
|
cred = credential.Credential(
|
|
@@ -2211,7 +2612,10 @@ def doBindLinearAssemblyCDNDomainWithChannel(args, parsed_globals):
|
|
|
2211
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2614
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2620
|
else:
|
|
2217
2621
|
cred = credential.Credential(
|
|
@@ -2263,7 +2667,10 @@ def doDescribeStreamPackageSourceLocations(args, parsed_globals):
|
|
|
2263
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2669
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2675
|
else:
|
|
2269
2676
|
cred = credential.Credential(
|
|
@@ -2315,7 +2722,10 @@ def doDescribeStreamPackageSourceLocation(args, parsed_globals):
|
|
|
2315
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2724
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2730
|
else:
|
|
2321
2731
|
cred = credential.Credential(
|
|
@@ -2367,7 +2777,10 @@ def doDeleteStreamPackageLinearAssemblyChannels(args, parsed_globals):
|
|
|
2367
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2779
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2785
|
else:
|
|
2373
2786
|
cred = credential.Credential(
|
|
@@ -2419,7 +2832,10 @@ def doDescribeStreamPackageChannel(args, parsed_globals):
|
|
|
2419
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2834
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2840
|
else:
|
|
2425
2841
|
cred = credential.Credential(
|
|
@@ -2461,7 +2877,7 @@ def doDescribeStreamPackageChannel(args, parsed_globals):
|
|
|
2461
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
2878
|
|
|
2463
2879
|
|
|
2464
|
-
def
|
|
2880
|
+
def doUnbindSSAICDNDomainWithChannel(args, parsed_globals):
|
|
2465
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
2882
|
|
|
2467
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +2887,10 @@ def doDescribeStreamPackageLinearAssemblyChannels(args, parsed_globals):
|
|
|
2471
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2889
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2895
|
else:
|
|
2477
2896
|
cred = credential.Credential(
|
|
@@ -2490,11 +2909,66 @@ def doDescribeStreamPackageLinearAssemblyChannels(args, parsed_globals):
|
|
|
2490
2909
|
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
2912
|
+
model = models.UnbindSSAICDNDomainWithChannelRequest()
|
|
2494
2913
|
model.from_json_string(json.dumps(args))
|
|
2495
2914
|
start_time = time.time()
|
|
2496
2915
|
while True:
|
|
2497
|
-
rsp = client.
|
|
2916
|
+
rsp = client.UnbindSSAICDNDomainWithChannel(model)
|
|
2917
|
+
result = rsp.to_json_string()
|
|
2918
|
+
try:
|
|
2919
|
+
json_obj = json.loads(result)
|
|
2920
|
+
except TypeError as e:
|
|
2921
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2922
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2923
|
+
break
|
|
2924
|
+
cur_time = time.time()
|
|
2925
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2926
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2927
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2928
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2929
|
+
else:
|
|
2930
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2931
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2932
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2933
|
+
|
|
2934
|
+
|
|
2935
|
+
def doDeleteStreamPackageVodRemuxTasks(args, parsed_globals):
|
|
2936
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2937
|
+
|
|
2938
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2939
|
+
cred = credential.CVMRoleCredential()
|
|
2940
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2941
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2942
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2943
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2944
|
+
)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2949
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2950
|
+
else:
|
|
2951
|
+
cred = credential.Credential(
|
|
2952
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2953
|
+
)
|
|
2954
|
+
http_profile = HttpProfile(
|
|
2955
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2956
|
+
reqMethod="POST",
|
|
2957
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2958
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2959
|
+
)
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2961
|
+
if g_param[OptionsDefine.Language]:
|
|
2962
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2963
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2964
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2965
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2966
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2967
|
+
model = models.DeleteStreamPackageVodRemuxTasksRequest()
|
|
2968
|
+
model.from_json_string(json.dumps(args))
|
|
2969
|
+
start_time = time.time()
|
|
2970
|
+
while True:
|
|
2971
|
+
rsp = client.DeleteStreamPackageVodRemuxTasks(model)
|
|
2498
2972
|
result = rsp.to_json_string()
|
|
2499
2973
|
try:
|
|
2500
2974
|
json_obj = json.loads(result)
|
|
@@ -2523,7 +2997,10 @@ def doCreateStreamPackageChannel(args, parsed_globals):
|
|
|
2523
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2999
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
3005
|
else:
|
|
2529
3006
|
cred = credential.Credential(
|
|
@@ -2575,7 +3052,10 @@ def doDescribeStreamPackageSourceLocationAlerts(args, parsed_globals):
|
|
|
2575
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
3054
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
3060
|
else:
|
|
2581
3061
|
cred = credential.Credential(
|
|
@@ -2617,6 +3097,61 @@ def doDescribeStreamPackageSourceLocationAlerts(args, parsed_globals):
|
|
|
2617
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2618
3098
|
|
|
2619
3099
|
|
|
3100
|
+
def doCreateStreamPackageSourceLocation(args, parsed_globals):
|
|
3101
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3102
|
+
|
|
3103
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3104
|
+
cred = credential.CVMRoleCredential()
|
|
3105
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3106
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3107
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3108
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3109
|
+
)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3114
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3115
|
+
else:
|
|
3116
|
+
cred = credential.Credential(
|
|
3117
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3118
|
+
)
|
|
3119
|
+
http_profile = HttpProfile(
|
|
3120
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3121
|
+
reqMethod="POST",
|
|
3122
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3123
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3124
|
+
)
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
3126
|
+
if g_param[OptionsDefine.Language]:
|
|
3127
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3128
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3129
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3130
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3131
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3132
|
+
model = models.CreateStreamPackageSourceLocationRequest()
|
|
3133
|
+
model.from_json_string(json.dumps(args))
|
|
3134
|
+
start_time = time.time()
|
|
3135
|
+
while True:
|
|
3136
|
+
rsp = client.CreateStreamPackageSourceLocation(model)
|
|
3137
|
+
result = rsp.to_json_string()
|
|
3138
|
+
try:
|
|
3139
|
+
json_obj = json.loads(result)
|
|
3140
|
+
except TypeError as e:
|
|
3141
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3142
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3143
|
+
break
|
|
3144
|
+
cur_time = time.time()
|
|
3145
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3146
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3147
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3148
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3149
|
+
else:
|
|
3150
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3151
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3152
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3153
|
+
|
|
3154
|
+
|
|
2620
3155
|
def doDeleteStreamPackageChannels(args, parsed_globals):
|
|
2621
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2622
3157
|
|
|
@@ -2627,7 +3162,10 @@ def doDeleteStreamPackageChannels(args, parsed_globals):
|
|
|
2627
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
3164
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
3170
|
else:
|
|
2633
3171
|
cred = credential.Credential(
|
|
@@ -2679,7 +3217,10 @@ def doUnbindCdnDomainWithChannel(args, parsed_globals):
|
|
|
2679
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
3219
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3225
|
else:
|
|
2685
3226
|
cred = credential.Credential(
|
|
@@ -2731,7 +3272,10 @@ def doModifyStreamPackageChannel(args, parsed_globals):
|
|
|
2731
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3274
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3280
|
else:
|
|
2737
3281
|
cred = credential.Credential(
|
|
@@ -2773,6 +3317,61 @@ def doModifyStreamPackageChannel(args, parsed_globals):
|
|
|
2773
3317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2774
3318
|
|
|
2775
3319
|
|
|
3320
|
+
def doDescribeStreamPackageVodRemuxTask(args, parsed_globals):
|
|
3321
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3322
|
+
|
|
3323
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3324
|
+
cred = credential.CVMRoleCredential()
|
|
3325
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3326
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3327
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3328
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3329
|
+
)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3334
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3335
|
+
else:
|
|
3336
|
+
cred = credential.Credential(
|
|
3337
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3338
|
+
)
|
|
3339
|
+
http_profile = HttpProfile(
|
|
3340
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3341
|
+
reqMethod="POST",
|
|
3342
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3343
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3344
|
+
)
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
3346
|
+
if g_param[OptionsDefine.Language]:
|
|
3347
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3348
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3349
|
+
client = mod.MdpClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3350
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3351
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3352
|
+
model = models.DescribeStreamPackageVodRemuxTaskRequest()
|
|
3353
|
+
model.from_json_string(json.dumps(args))
|
|
3354
|
+
start_time = time.time()
|
|
3355
|
+
while True:
|
|
3356
|
+
rsp = client.DescribeStreamPackageVodRemuxTask(model)
|
|
3357
|
+
result = rsp.to_json_string()
|
|
3358
|
+
try:
|
|
3359
|
+
json_obj = json.loads(result)
|
|
3360
|
+
except TypeError as e:
|
|
3361
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3362
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3363
|
+
break
|
|
3364
|
+
cur_time = time.time()
|
|
3365
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3366
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3367
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3368
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3369
|
+
else:
|
|
3370
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3371
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3372
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3373
|
+
|
|
3374
|
+
|
|
2776
3375
|
def doDescribeStreamPackageSSAIChannel(args, parsed_globals):
|
|
2777
3376
|
g_param = parse_global_arg(parsed_globals)
|
|
2778
3377
|
|
|
@@ -2783,7 +3382,10 @@ def doDescribeStreamPackageSSAIChannel(args, parsed_globals):
|
|
|
2783
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3384
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3390
|
else:
|
|
2789
3391
|
cred = credential.Credential(
|
|
@@ -2838,10 +3440,11 @@ MODELS_MAP = {
|
|
|
2838
3440
|
ACTION_MAP = {
|
|
2839
3441
|
"DeleteStreamPackageLinearAssemblyChannel": doDeleteStreamPackageLinearAssemblyChannel,
|
|
2840
3442
|
"DescribeLinearAssemblyCDNDomainWithChannels": doDescribeLinearAssemblyCDNDomainWithChannels,
|
|
3443
|
+
"CreateStreamPackageVodRemuxTask": doCreateStreamPackageVodRemuxTask,
|
|
2841
3444
|
"CreateStreamPackageSSAIChannel": doCreateStreamPackageSSAIChannel,
|
|
2842
3445
|
"DeleteStreamPackageChannelEndpoints": doDeleteStreamPackageChannelEndpoints,
|
|
2843
3446
|
"DeleteStreamPackageHarvestJobs": doDeleteStreamPackageHarvestJobs,
|
|
2844
|
-
"
|
|
3447
|
+
"DeleteStreamPackageVodRemuxTask": doDeleteStreamPackageVodRemuxTask,
|
|
2845
3448
|
"DescribeStreamPackageLinearAssemblyChannel": doDescribeStreamPackageLinearAssemblyChannel,
|
|
2846
3449
|
"ModifyStreamPackageSSAIChannel": doModifyStreamPackageSSAIChannel,
|
|
2847
3450
|
"DescribeStreamPackageSource": doDescribeStreamPackageSource,
|
|
@@ -2849,6 +3452,7 @@ ACTION_MAP = {
|
|
|
2849
3452
|
"ModifyStreamPackageLinearAssemblyProgram": doModifyStreamPackageLinearAssemblyProgram,
|
|
2850
3453
|
"ModifyStreamPackageSource": doModifyStreamPackageSource,
|
|
2851
3454
|
"CreateStreamPackageHarvestJob": doCreateStreamPackageHarvestJob,
|
|
3455
|
+
"BindSSAICDNDomainWithChannel": doBindSSAICDNDomainWithChannel,
|
|
2852
3456
|
"DescribeLinearAssemblyCDNDomainWithChannel": doDescribeLinearAssemblyCDNDomainWithChannel,
|
|
2853
3457
|
"ModifyStreamPackageChannelEndpoint": doModifyStreamPackageChannelEndpoint,
|
|
2854
3458
|
"DescribeStreamPackageSSAIUsage": doDescribeStreamPackageSSAIUsage,
|
|
@@ -2860,18 +3464,21 @@ ACTION_MAP = {
|
|
|
2860
3464
|
"ModifyStreamPackageSourceLocation": doModifyStreamPackageSourceLocation,
|
|
2861
3465
|
"DeleteStreamPackageSSAIChannel": doDeleteStreamPackageSSAIChannel,
|
|
2862
3466
|
"DescribeStreamPackageChannels": doDescribeStreamPackageChannels,
|
|
3467
|
+
"DescribeStreamPackageVodRemuxTasks": doDescribeStreamPackageVodRemuxTasks,
|
|
2863
3468
|
"CreateStreamPackageSource": doCreateStreamPackageSource,
|
|
2864
3469
|
"StartStreamPackageLinearAssemblyChannel": doStartStreamPackageLinearAssemblyChannel,
|
|
2865
3470
|
"DescribeStreamPackageLinearAssemblyChannelAlerts": doDescribeStreamPackageLinearAssemblyChannelAlerts,
|
|
2866
3471
|
"CreateStreamPackageChannelEndpoint": doCreateStreamPackageChannelEndpoint,
|
|
2867
3472
|
"UnbindLinearAssemblyCDNDomainWithChannel": doUnbindLinearAssemblyCDNDomainWithChannel,
|
|
2868
|
-
"
|
|
3473
|
+
"StartStreamPackageVodRemuxTask": doStartStreamPackageVodRemuxTask,
|
|
2869
3474
|
"CreateStreamPackageLinearAssemblyChannel": doCreateStreamPackageLinearAssemblyChannel,
|
|
2870
3475
|
"DescribeStreamPackageSources": doDescribeStreamPackageSources,
|
|
2871
3476
|
"DescribeStreamPackageLinearAssemblyProgram": doDescribeStreamPackageLinearAssemblyProgram,
|
|
2872
3477
|
"DescribeStreamPackageSourceAlerts": doDescribeStreamPackageSourceAlerts,
|
|
2873
|
-
"
|
|
3478
|
+
"DeleteStreamPackageSource": doDeleteStreamPackageSource,
|
|
3479
|
+
"ModifyStreamPackageLinearAssemblyChannel": doModifyStreamPackageLinearAssemblyChannel,
|
|
2874
3480
|
"CreateStreamPackageLinearAssemblyProgram": doCreateStreamPackageLinearAssemblyProgram,
|
|
3481
|
+
"DescribeStreamPackageLinearAssemblyChannels": doDescribeStreamPackageLinearAssemblyChannels,
|
|
2875
3482
|
"DeleteStreamPackageLinearAssemblyPrograms": doDeleteStreamPackageLinearAssemblyPrograms,
|
|
2876
3483
|
"DescribeStreamPackageLinearAssemblyProgramSchedules": doDescribeStreamPackageLinearAssemblyProgramSchedules,
|
|
2877
3484
|
"DeleteStreamPackageSourceLocation": doDeleteStreamPackageSourceLocation,
|
|
@@ -2883,12 +3490,15 @@ ACTION_MAP = {
|
|
|
2883
3490
|
"DescribeStreamPackageSourceLocation": doDescribeStreamPackageSourceLocation,
|
|
2884
3491
|
"DeleteStreamPackageLinearAssemblyChannels": doDeleteStreamPackageLinearAssemblyChannels,
|
|
2885
3492
|
"DescribeStreamPackageChannel": doDescribeStreamPackageChannel,
|
|
2886
|
-
"
|
|
3493
|
+
"UnbindSSAICDNDomainWithChannel": doUnbindSSAICDNDomainWithChannel,
|
|
3494
|
+
"DeleteStreamPackageVodRemuxTasks": doDeleteStreamPackageVodRemuxTasks,
|
|
2887
3495
|
"CreateStreamPackageChannel": doCreateStreamPackageChannel,
|
|
2888
3496
|
"DescribeStreamPackageSourceLocationAlerts": doDescribeStreamPackageSourceLocationAlerts,
|
|
3497
|
+
"CreateStreamPackageSourceLocation": doCreateStreamPackageSourceLocation,
|
|
2889
3498
|
"DeleteStreamPackageChannels": doDeleteStreamPackageChannels,
|
|
2890
3499
|
"UnbindCdnDomainWithChannel": doUnbindCdnDomainWithChannel,
|
|
2891
3500
|
"ModifyStreamPackageChannel": doModifyStreamPackageChannel,
|
|
3501
|
+
"DescribeStreamPackageVodRemuxTask": doDescribeStreamPackageVodRemuxTask,
|
|
2892
3502
|
"DescribeStreamPackageSSAIChannel": doDescribeStreamPackageSSAIChannel,
|
|
2893
3503
|
|
|
2894
3504
|
}
|