tccli-intl-en 3.0.1248.1__py2.py3-none-any.whl → 3.1.33.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +1 -1
- tccli/services/__init__.py +32 -1
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/aiart/aiart_client.py +5 -2
- tccli/services/ams/ams_client.py +20 -8
- tccli/services/antiddos/antiddos_client.py +350 -140
- tccli/services/apigateway/apigateway_client.py +465 -186
- tccli/services/apm/apm_client.py +835 -68
- tccli/services/apm/v20210622/api.json +3936 -1145
- tccli/services/apm/v20210622/examples.json +133 -23
- tccli/services/asr/asr_client.py +10 -4
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +78 -28
- tccli/services/batch/batch_client.py +140 -56
- tccli/services/bi/bi_client.py +120 -48
- tccli/services/billing/billing_client.py +210 -84
- tccli/services/cam/cam_client.py +405 -162
- tccli/services/captcha/captcha_client.py +5 -2
- tccli/services/car/car_client.py +165 -66
- tccli/services/cbs/cbs_client.py +190 -76
- tccli/services/ccc/ccc_client.py +794 -160
- tccli/services/ccc/v20200210/api.json +1778 -202
- tccli/services/ccc/v20200210/examples.json +64 -0
- tccli/services/cdb/cdb_client.py +1770 -531
- tccli/services/cdb/v20170320/api.json +2166 -335
- tccli/services/cdb/v20170320/examples.json +126 -6
- tccli/services/cdc/cdc_client.py +100 -40
- tccli/services/cdc/v20201214/api.json +2 -2
- tccli/services/cdc/v20201214/examples.json +4 -4
- tccli/services/cdn/cdn_client.py +220 -88
- tccli/services/cdn/v20180606/api.json +22 -22
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cdwdoris/cdwdoris_client.py +385 -154
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/__init__.py +4 -0
- tccli/services/cdz/cdz_client.py +210 -0
- tccli/services/cdz/v20221123/api.json +233 -0
- tccli/services/cdz/v20221123/examples.json +12 -0
- tccli/services/cfg/cfg_client.py +80 -32
- tccli/services/cfs/cfs_client.py +195 -78
- tccli/services/cfw/cfw_client.py +330 -132
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +80 -32
- tccli/services/ckafka/ckafka_client.py +1149 -259
- tccli/services/ckafka/v20190819/api.json +3738 -1696
- tccli/services/ckafka/v20190819/examples.json +266 -162
- tccli/services/clb/clb_client.py +1054 -469
- tccli/services/clb/v20180317/api.json +2273 -1020
- tccli/services/clb/v20180317/examples.json +184 -124
- tccli/services/cloudaudit/cloudaudit_client.py +90 -36
- tccli/services/cls/cls_client.py +434 -173
- tccli/services/cmq/cmq_client.py +14 -803
- tccli/services/cmq/v20190304/api.json +173 -1367
- tccli/services/cmq/v20190304/examples.json +0 -120
- tccli/services/config/config_client.py +30 -12
- tccli/services/controlcenter/controlcenter_client.py +229 -2
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/csip/csip_client.py +170 -68
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +706 -189
- tccli/services/cvm/v20170312/api.json +598 -185
- tccli/services/cvm/v20170312/examples.json +172 -126
- tccli/services/cwp/cwp_client.py +2325 -930
- tccli/services/cynosdb/cynosdb_client.py +1887 -577
- tccli/services/cynosdb/v20190107/api.json +11763 -7697
- tccli/services/cynosdb/v20190107/examples.json +132 -4
- tccli/services/dataintegration/dataintegration_client.py +5 -2
- tccli/services/dayu/dayu_client.py +515 -206
- tccli/services/dbbrain/dbbrain_client.py +210 -84
- tccli/services/dc/dc_client.py +90 -36
- tccli/services/dcdb/dcdb_client.py +310 -124
- tccli/services/dlc/dlc_client.py +859 -214
- tccli/services/dlc/v20210125/api.json +637 -13
- tccli/services/dlc/v20210125/examples.json +48 -0
- tccli/services/dms/dms_client.py +10 -4
- tccli/services/dnspod/dnspod_client.py +302 -76
- tccli/services/dnspod/v20210323/api.json +153 -0
- tccli/services/dnspod/v20210323/examples.json +16 -0
- tccli/services/domain/domain_client.py +120 -48
- tccli/services/dts/dts_client.py +415 -166
- tccli/services/eb/eb_client.py +130 -52
- tccli/services/ecdn/ecdn_client.py +75 -30
- tccli/services/ecm/ecm_client.py +620 -248
- tccli/services/eiam/eiam_client.py +200 -80
- tccli/services/emr/emr_client.py +2815 -146
- tccli/services/emr/v20190103/api.json +14527 -4841
- tccli/services/emr/v20190103/examples.json +404 -36
- tccli/services/es/es_client.py +105 -42
- tccli/services/facefusion/facefusion_client.py +15 -6
- tccli/services/faceid/faceid_client.py +95 -38
- tccli/services/faceid/v20180301/api.json +196 -53
- tccli/services/faceid/v20180301/examples.json +3 -3
- tccli/services/gaap/gaap_client.py +440 -176
- tccli/services/gme/gme_client.py +50 -20
- tccli/services/gpm/gpm_client.py +90 -36
- tccli/services/gse/gse_client.py +110 -44
- tccli/services/gwlb/gwlb_client.py +90 -36
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +546 -0
- tccli/services/hunyuan/v20230901/api.json +628 -0
- tccli/services/hunyuan/v20230901/examples.json +60 -0
- tccli/services/iai/iai_client.py +145 -58
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ims/ims_client.py +5 -2
- tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
- tccli/services/iotcloud/iotcloud_client.py +100 -40
- tccli/services/ip/ip_client.py +30 -12
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/kms/v20190118/api.json +80 -3
- tccli/services/kms/v20190118/examples.json +3 -3
- tccli/services/lcic/lcic_client.py +265 -106
- tccli/services/lighthouse/lighthouse_client.py +730 -172
- tccli/services/lighthouse/v20200324/api.json +502 -14
- tccli/services/lighthouse/v20200324/examples.json +59 -5
- tccli/services/live/live_client.py +600 -240
- tccli/services/lke/lke_client.py +450 -180
- tccli/services/lkeap/__init__.py +4 -0
- tccli/services/lkeap/lkeap_client.py +602 -0
- tccli/services/lkeap/v20240522/api.json +989 -0
- tccli/services/lkeap/v20240522/examples.json +92 -0
- tccli/services/mariadb/mariadb_client.py +250 -100
- tccli/services/mdc/mdc_client.py +90 -36
- tccli/services/mdl/mdl_client.py +357 -90
- tccli/services/mdl/v20200326/api.json +1095 -77
- tccli/services/mdl/v20200326/examples.json +40 -16
- tccli/services/mdp/mdp_client.py +416 -124
- tccli/services/mdp/v20200527/api.json +335 -40
- tccli/services/mdp/v20200527/examples.json +95 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +210 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/mongodb/mongodb_client.py +1404 -141
- tccli/services/mongodb/v20190725/api.json +2919 -677
- tccli/services/mongodb/v20190725/examples.json +190 -22
- tccli/services/monitor/monitor_client.py +1008 -296
- tccli/services/monitor/v20180724/api.json +664 -15
- tccli/services/monitor/v20180724/examples.json +152 -4
- tccli/services/mps/mps_client.py +1721 -381
- tccli/services/mps/v20190612/api.json +4905 -561
- tccli/services/mps/v20190612/examples.json +221 -69
- tccli/services/mqtt/__init__.py +4 -0
- tccli/services/mqtt/mqtt_client.py +1610 -0
- tccli/services/mqtt/v20240516/api.json +3057 -0
- tccli/services/mqtt/v20240516/examples.json +213 -0
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/ocr/ocr_client.py +358 -76
- tccli/services/ocr/v20181119/api.json +731 -88
- tccli/services/ocr/v20181119/examples.json +40 -10
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/organization/organization_client.py +580 -232
- tccli/services/postgres/postgres_client.py +455 -182
- tccli/services/privatedns/privatedns_client.py +155 -62
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/quota/__init__.py +4 -0
- tccli/services/quota/quota_client.py +434 -0
- tccli/services/quota/v20241204/api.json +548 -0
- tccli/services/quota/v20241204/examples.json +51 -0
- tccli/services/rce/rce_client.py +5 -2
- tccli/services/redis/redis_client.py +545 -218
- tccli/services/redis/v20180412/api.json +227 -115
- tccli/services/redis/v20180412/examples.json +19 -19
- tccli/services/region/region_client.py +15 -6
- tccli/services/rum/rum_client.py +300 -120
- tccli/services/scf/scf_client.py +210 -84
- tccli/services/ses/ses_client.py +145 -58
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sqlserver/sqlserver_client.py +3759 -480
- tccli/services/sqlserver/v20180328/api.json +8909 -2941
- tccli/services/sqlserver/v20180328/examples.json +447 -3
- tccli/services/ssl/ssl_client.py +190 -76
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +25 -10
- tccli/services/tag/tag_client.py +150 -60
- tccli/services/tat/tat_client.py +95 -38
- tccli/services/tbaas/tbaas_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
- tccli/services/tcaplusdb/v20190823/api.json +836 -760
- tccli/services/tcaplusdb/v20190823/examples.json +3 -3
- tccli/services/tchd/tchd_client.py +5 -2
- tccli/services/tcmpp/tcmpp_client.py +520 -208
- tccli/services/tcr/tcr_client.py +380 -152
- tccli/services/tcsas/tcsas_client.py +2576 -327
- tccli/services/tcsas/v20250106/api.json +8304 -3241
- tccli/services/tcsas/v20250106/examples.json +311 -15
- tccli/services/tcss/tcss_client.py +1650 -660
- tccli/services/tdid/tdid_client.py +240 -96
- tccli/services/tdmq/tdmq_client.py +2876 -466
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/tem/tem_client.py +280 -112
- tccli/services/teo/teo_client.py +1590 -540
- tccli/services/teo/v20220901/api.json +703 -71
- tccli/services/teo/v20220901/examples.json +88 -22
- tccli/services/tione/__init__.py +4 -0
- tccli/services/tione/tione_client.py +210 -0
- tccli/services/tione/v20211111/api.json +3074 -0
- tccli/services/tione/v20211111/examples.json +12 -0
- tccli/services/tiw/tiw_client.py +255 -102
- tccli/services/tke/tke_client.py +858 -276
- tccli/services/tke/v20180525/api.json +227 -0
- tccli/services/tke/v20180525/examples.json +24 -0
- tccli/services/tms/tms_client.py +5 -2
- tccli/services/tmt/tmt_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/trro/trro_client.py +95 -38
- tccli/services/trtc/trtc_client.py +255 -102
- tccli/services/trtc/v20190722/api.json +135 -31
- tccli/services/trtc/v20190722/examples.json +7 -7
- tccli/services/tts/tts_client.py +5 -2
- tccli/services/vclm/vclm_client.py +10 -4
- tccli/services/vm/vm_client.py +20 -8
- tccli/services/vod/v20180717/api.json +2929 -296
- tccli/services/vod/v20180717/examples.json +40 -6
- tccli/services/vod/vod_client.py +1175 -358
- tccli/services/vpc/v20170312/api.json +1102 -137
- tccli/services/vpc/v20170312/examples.json +127 -23
- tccli/services/vpc/vpc_client.py +2241 -670
- tccli/services/waf/v20180125/api.json +1372 -194
- tccli/services/waf/v20180125/examples.json +89 -1
- tccli/services/waf/waf_client.py +1149 -245
- tccli/services/wedata/v20250806/api.json +13644 -0
- tccli/services/wedata/v20250806/examples.json +621 -0
- tccli/services/wedata/wedata_client.py +6067 -1263
- tccli/services/yunjing/yunjing_client.py +355 -142
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/METADATA +4 -7
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/RECORD +245 -203
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/WHEEL +1 -1
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/entry_points.txt +0 -1
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1248.1.dist-info → tccli_intl_en-3.1.33.1.dist-info}/top_level.txt +0 -0
|
@@ -17,7 +17,7 @@ from tencentcloud.tcsas.v20250106 import models as models_v20250106
|
|
|
17
17
|
from jmespath import search
|
|
18
18
|
import time
|
|
19
19
|
|
|
20
|
-
def
|
|
20
|
+
def doDescribeMNGPaymentReportDetail(args, parsed_globals):
|
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
|
22
22
|
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -27,7 +27,10 @@ def doDescribeMNPOfflinePackageURL(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,18 +42,18 @@ def doDescribeMNPOfflinePackageURL(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
46
49
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
47
50
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
48
51
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
49
|
-
model = models.
|
|
52
|
+
model = models.DescribeMNGPaymentReportDetailRequest()
|
|
50
53
|
model.from_json_string(json.dumps(args))
|
|
51
54
|
start_time = time.time()
|
|
52
55
|
while True:
|
|
53
|
-
rsp = client.
|
|
56
|
+
rsp = client.DescribeMNGPaymentReportDetail(model)
|
|
54
57
|
result = rsp.to_json_string()
|
|
55
58
|
try:
|
|
56
59
|
json_obj = json.loads(result)
|
|
@@ -69,7 +72,7 @@ def doDescribeMNPOfflinePackageURL(args, parsed_globals):
|
|
|
69
72
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
70
73
|
|
|
71
74
|
|
|
72
|
-
def
|
|
75
|
+
def doModifyApplicationConfig(args, parsed_globals):
|
|
73
76
|
g_param = parse_global_arg(parsed_globals)
|
|
74
77
|
|
|
75
78
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -79,7 +82,10 @@ def doDeleteGlobalDomain(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,18 +97,18 @@ def doDeleteGlobalDomain(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
98
104
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
99
105
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
100
106
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
101
|
-
model = models.
|
|
107
|
+
model = models.ModifyApplicationConfigRequest()
|
|
102
108
|
model.from_json_string(json.dumps(args))
|
|
103
109
|
start_time = time.time()
|
|
104
110
|
while True:
|
|
105
|
-
rsp = client.
|
|
111
|
+
rsp = client.ModifyApplicationConfig(model)
|
|
106
112
|
result = rsp.to_json_string()
|
|
107
113
|
try:
|
|
108
114
|
json_obj = json.loads(result)
|
|
@@ -121,7 +127,7 @@ def doDeleteGlobalDomain(args, parsed_globals):
|
|
|
121
127
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
122
128
|
|
|
123
129
|
|
|
124
|
-
def
|
|
130
|
+
def doDescribeMNGAdvertisingOverview(args, parsed_globals):
|
|
125
131
|
g_param = parse_global_arg(parsed_globals)
|
|
126
132
|
|
|
127
133
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -131,7 +137,10 @@ def doRollbackMNPVersion(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,18 +152,18 @@ def doRollbackMNPVersion(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
150
159
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
151
160
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
152
161
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
153
|
-
model = models.
|
|
162
|
+
model = models.DescribeMNGAdvertisingOverviewRequest()
|
|
154
163
|
model.from_json_string(json.dumps(args))
|
|
155
164
|
start_time = time.time()
|
|
156
165
|
while True:
|
|
157
|
-
rsp = client.
|
|
166
|
+
rsp = client.DescribeMNGAdvertisingOverview(model)
|
|
158
167
|
result = rsp.to_json_string()
|
|
159
168
|
try:
|
|
160
169
|
json_obj = json.loads(result)
|
|
@@ -173,7 +182,7 @@ def doRollbackMNPVersion(args, parsed_globals):
|
|
|
173
182
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
174
183
|
|
|
175
184
|
|
|
176
|
-
def
|
|
185
|
+
def doCreateMNP(args, parsed_globals):
|
|
177
186
|
g_param = parse_global_arg(parsed_globals)
|
|
178
187
|
|
|
179
188
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -183,7 +192,10 @@ def doRemoveMNP(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,18 +207,18 @@ def doRemoveMNP(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
202
214
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
203
215
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
204
216
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
205
|
-
model = models.
|
|
217
|
+
model = models.CreateMNPRequest()
|
|
206
218
|
model.from_json_string(json.dumps(args))
|
|
207
219
|
start_time = time.time()
|
|
208
220
|
while True:
|
|
209
|
-
rsp = client.
|
|
221
|
+
rsp = client.CreateMNP(model)
|
|
210
222
|
result = rsp.to_json_string()
|
|
211
223
|
try:
|
|
212
224
|
json_obj = json.loads(result)
|
|
@@ -225,7 +237,7 @@ def doRemoveMNP(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doDescribeUser(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doCreateMNP(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,18 +262,18 @@ def doCreateMNP(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
269
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.DescribeUserRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.DescribeUser(model)
|
|
262
277
|
result = rsp.to_json_string()
|
|
263
278
|
try:
|
|
264
279
|
json_obj = json.loads(result)
|
|
@@ -277,7 +292,7 @@ def doCreateMNP(args, parsed_globals):
|
|
|
277
292
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
293
|
|
|
279
294
|
|
|
280
|
-
def
|
|
295
|
+
def doDescribeMNPActiveUserRealTimeStatistics(args, parsed_globals):
|
|
281
296
|
g_param = parse_global_arg(parsed_globals)
|
|
282
297
|
|
|
283
298
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -287,7 +302,10 @@ def doDescribeApplicationSensitiveAPIList(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,18 +317,18 @@ def doDescribeApplicationSensitiveAPIList(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
306
324
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
325
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
326
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
327
|
+
model = models.DescribeMNPActiveUserRealTimeStatisticsRequest()
|
|
310
328
|
model.from_json_string(json.dumps(args))
|
|
311
329
|
start_time = time.time()
|
|
312
330
|
while True:
|
|
313
|
-
rsp = client.
|
|
331
|
+
rsp = client.DescribeMNPActiveUserRealTimeStatistics(model)
|
|
314
332
|
result = rsp.to_json_string()
|
|
315
333
|
try:
|
|
316
334
|
json_obj = json.loads(result)
|
|
@@ -329,7 +347,7 @@ def doDescribeApplicationSensitiveAPIList(args, parsed_globals):
|
|
|
329
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
348
|
|
|
331
349
|
|
|
332
|
-
def
|
|
350
|
+
def doModifyTeam(args, parsed_globals):
|
|
333
351
|
g_param = parse_global_arg(parsed_globals)
|
|
334
352
|
|
|
335
353
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -339,7 +357,10 @@ def doDeleteApplication(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,18 +372,18 @@ def doDeleteApplication(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
379
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
380
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
381
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.
|
|
382
|
+
model = models.ModifyTeamRequest()
|
|
362
383
|
model.from_json_string(json.dumps(args))
|
|
363
384
|
start_time = time.time()
|
|
364
385
|
while True:
|
|
365
|
-
rsp = client.
|
|
386
|
+
rsp = client.ModifyTeam(model)
|
|
366
387
|
result = rsp.to_json_string()
|
|
367
388
|
try:
|
|
368
389
|
json_obj = json.loads(result)
|
|
@@ -381,7 +402,7 @@ def doDeleteApplication(args, parsed_globals):
|
|
|
381
402
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
403
|
|
|
383
404
|
|
|
384
|
-
def
|
|
405
|
+
def doDescribeAPPDataDetailLineChart(args, parsed_globals):
|
|
385
406
|
g_param = parse_global_arg(parsed_globals)
|
|
386
407
|
|
|
387
408
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -391,7 +412,10 @@ def doDescribeRoleList(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,18 +427,18 @@ def doDescribeRoleList(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
410
434
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
435
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
436
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
437
|
+
model = models.DescribeAPPDataDetailLineChartRequest()
|
|
414
438
|
model.from_json_string(json.dumps(args))
|
|
415
439
|
start_time = time.time()
|
|
416
440
|
while True:
|
|
417
|
-
rsp = client.
|
|
441
|
+
rsp = client.DescribeAPPDataDetailLineChart(model)
|
|
418
442
|
result = rsp.to_json_string()
|
|
419
443
|
try:
|
|
420
444
|
json_obj = json.loads(result)
|
|
@@ -433,7 +457,7 @@ def doDescribeRoleList(args, parsed_globals):
|
|
|
433
457
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
458
|
|
|
435
459
|
|
|
436
|
-
def
|
|
460
|
+
def doDescribeMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
437
461
|
g_param = parse_global_arg(parsed_globals)
|
|
438
462
|
|
|
439
463
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -443,7 +467,10 @@ def doProcessMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,18 +482,18 @@ def doProcessMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
462
489
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
490
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
491
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
-
model = models.
|
|
492
|
+
model = models.DescribeMNPSensitiveAPIPermissionApprovalRequest()
|
|
466
493
|
model.from_json_string(json.dumps(args))
|
|
467
494
|
start_time = time.time()
|
|
468
495
|
while True:
|
|
469
|
-
rsp = client.
|
|
496
|
+
rsp = client.DescribeMNPSensitiveAPIPermissionApproval(model)
|
|
470
497
|
result = rsp.to_json_string()
|
|
471
498
|
try:
|
|
472
499
|
json_obj = json.loads(result)
|
|
@@ -485,7 +512,7 @@ def doProcessMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
485
512
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
513
|
|
|
487
514
|
|
|
488
|
-
def
|
|
515
|
+
def doDescribeMNGPaymentLineChart(args, parsed_globals):
|
|
489
516
|
g_param = parse_global_arg(parsed_globals)
|
|
490
517
|
|
|
491
518
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +522,10 @@ def doDescribeTeamList(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,18 +537,18 @@ def doDescribeTeamList(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
544
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
545
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
546
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
547
|
+
model = models.DescribeMNGPaymentLineChartRequest()
|
|
518
548
|
model.from_json_string(json.dumps(args))
|
|
519
549
|
start_time = time.time()
|
|
520
550
|
while True:
|
|
521
|
-
rsp = client.
|
|
551
|
+
rsp = client.DescribeMNGPaymentLineChart(model)
|
|
522
552
|
result = rsp.to_json_string()
|
|
523
553
|
try:
|
|
524
554
|
json_obj = json.loads(result)
|
|
@@ -537,7 +567,7 @@ def doDescribeTeamList(args, parsed_globals):
|
|
|
537
567
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
568
|
|
|
539
569
|
|
|
540
|
-
def
|
|
570
|
+
def doDisableApplicationSensitiveAPI(args, parsed_globals):
|
|
541
571
|
g_param = parse_global_arg(parsed_globals)
|
|
542
572
|
|
|
543
573
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +577,10 @@ def doDescribeApplicationConfigFile(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,18 +592,18 @@ def doDescribeApplicationConfigFile(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
599
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
600
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
601
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
602
|
+
model = models.DisableApplicationSensitiveAPIRequest()
|
|
570
603
|
model.from_json_string(json.dumps(args))
|
|
571
604
|
start_time = time.time()
|
|
572
605
|
while True:
|
|
573
|
-
rsp = client.
|
|
606
|
+
rsp = client.DisableApplicationSensitiveAPI(model)
|
|
574
607
|
result = rsp.to_json_string()
|
|
575
608
|
try:
|
|
576
609
|
json_obj = json.loads(result)
|
|
@@ -589,7 +622,7 @@ def doDescribeApplicationConfigFile(args, parsed_globals):
|
|
|
589
622
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
623
|
|
|
591
624
|
|
|
592
|
-
def
|
|
625
|
+
def doModifyMNPDomain(args, parsed_globals):
|
|
593
626
|
g_param = parse_global_arg(parsed_globals)
|
|
594
627
|
|
|
595
628
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +632,10 @@ def doDescribeTeam(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,18 +647,18 @@ def doDescribeTeam(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
654
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
655
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
656
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
657
|
+
model = models.ModifyMNPDomainRequest()
|
|
622
658
|
model.from_json_string(json.dumps(args))
|
|
623
659
|
start_time = time.time()
|
|
624
660
|
while True:
|
|
625
|
-
rsp = client.
|
|
661
|
+
rsp = client.ModifyMNPDomain(model)
|
|
626
662
|
result = rsp.to_json_string()
|
|
627
663
|
try:
|
|
628
664
|
json_obj = json.loads(result)
|
|
@@ -641,7 +677,7 @@ def doDescribeTeam(args, parsed_globals):
|
|
|
641
677
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
678
|
|
|
643
679
|
|
|
644
|
-
def
|
|
680
|
+
def doDescribeTempSecret4UploadFile2Cos(args, parsed_globals):
|
|
645
681
|
g_param = parse_global_arg(parsed_globals)
|
|
646
682
|
|
|
647
683
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -651,7 +687,10 @@ def doProcessMNPApproval(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,18 +702,18 @@ def doProcessMNPApproval(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
670
709
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
710
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
711
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
712
|
+
model = models.DescribeTempSecret4UploadFile2CosRequest()
|
|
674
713
|
model.from_json_string(json.dumps(args))
|
|
675
714
|
start_time = time.time()
|
|
676
715
|
while True:
|
|
677
|
-
rsp = client.
|
|
716
|
+
rsp = client.DescribeTempSecret4UploadFile2Cos(model)
|
|
678
717
|
result = rsp.to_json_string()
|
|
679
718
|
try:
|
|
680
719
|
json_obj = json.loads(result)
|
|
@@ -693,7 +732,7 @@ def doProcessMNPApproval(args, parsed_globals):
|
|
|
693
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
733
|
|
|
695
734
|
|
|
696
|
-
def
|
|
735
|
+
def doCreateApplicationSensitiveAPI(args, parsed_globals):
|
|
697
736
|
g_param = parse_global_arg(parsed_globals)
|
|
698
737
|
|
|
699
738
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +742,10 @@ def doConfigureMNPPreview(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,18 +757,18 @@ def doConfigureMNPPreview(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
764
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
765
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
766
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
767
|
+
model = models.CreateApplicationSensitiveAPIRequest()
|
|
726
768
|
model.from_json_string(json.dumps(args))
|
|
727
769
|
start_time = time.time()
|
|
728
770
|
while True:
|
|
729
|
-
rsp = client.
|
|
771
|
+
rsp = client.CreateApplicationSensitiveAPI(model)
|
|
730
772
|
result = rsp.to_json_string()
|
|
731
773
|
try:
|
|
732
774
|
json_obj = json.loads(result)
|
|
@@ -745,7 +787,7 @@ def doConfigureMNPPreview(args, parsed_globals):
|
|
|
745
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
788
|
|
|
747
789
|
|
|
748
|
-
def
|
|
790
|
+
def doCreateUser(args, parsed_globals):
|
|
749
791
|
g_param = parse_global_arg(parsed_globals)
|
|
750
792
|
|
|
751
793
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +797,10 @@ def doDescribeMNPApprovalList(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,18 +812,18 @@ def doDescribeMNPApprovalList(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
819
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
820
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
821
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
822
|
+
model = models.CreateUserRequest()
|
|
778
823
|
model.from_json_string(json.dumps(args))
|
|
779
824
|
start_time = time.time()
|
|
780
825
|
while True:
|
|
781
|
-
rsp = client.
|
|
826
|
+
rsp = client.CreateUser(model)
|
|
782
827
|
result = rsp.to_json_string()
|
|
783
828
|
try:
|
|
784
829
|
json_obj = json.loads(result)
|
|
@@ -797,7 +842,7 @@ def doDescribeMNPApprovalList(args, parsed_globals):
|
|
|
797
842
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
843
|
|
|
799
844
|
|
|
800
|
-
def
|
|
845
|
+
def doDescribeApplication(args, parsed_globals):
|
|
801
846
|
g_param = parse_global_arg(parsed_globals)
|
|
802
847
|
|
|
803
848
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +852,10 @@ def doDescribeMNPSensitiveAPIPermissionApprovalList(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,18 +867,18 @@ def doDescribeMNPSensitiveAPIPermissionApprovalList(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
874
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
875
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
876
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
877
|
+
model = models.DescribeApplicationRequest()
|
|
830
878
|
model.from_json_string(json.dumps(args))
|
|
831
879
|
start_time = time.time()
|
|
832
880
|
while True:
|
|
833
|
-
rsp = client.
|
|
881
|
+
rsp = client.DescribeApplication(model)
|
|
834
882
|
result = rsp.to_json_string()
|
|
835
883
|
try:
|
|
836
884
|
json_obj = json.loads(result)
|
|
@@ -849,7 +897,7 @@ def doDescribeMNPSensitiveAPIPermissionApprovalList(args, parsed_globals):
|
|
|
849
897
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
898
|
|
|
851
899
|
|
|
852
|
-
def
|
|
900
|
+
def doDescribeMNGPaymentOverview(args, parsed_globals):
|
|
853
901
|
g_param = parse_global_arg(parsed_globals)
|
|
854
902
|
|
|
855
903
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +907,10 @@ def doModifyApplication(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,18 +922,18 @@ def doModifyApplication(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
929
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
930
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
931
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
932
|
+
model = models.DescribeMNGPaymentOverviewRequest()
|
|
882
933
|
model.from_json_string(json.dumps(args))
|
|
883
934
|
start_time = time.time()
|
|
884
935
|
while True:
|
|
885
|
-
rsp = client.
|
|
936
|
+
rsp = client.DescribeMNGPaymentOverview(model)
|
|
886
937
|
result = rsp.to_json_string()
|
|
887
938
|
try:
|
|
888
939
|
json_obj = json.loads(result)
|
|
@@ -901,7 +952,7 @@ def doModifyApplication(args, parsed_globals):
|
|
|
901
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
953
|
|
|
903
954
|
|
|
904
|
-
def
|
|
955
|
+
def doDescribeUserList(args, parsed_globals):
|
|
905
956
|
g_param = parse_global_arg(parsed_globals)
|
|
906
957
|
|
|
907
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +962,10 @@ def doDescribeUser(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,18 +977,18 @@ def doDescribeUser(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
984
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
987
|
+
model = models.DescribeUserListRequest()
|
|
934
988
|
model.from_json_string(json.dumps(args))
|
|
935
989
|
start_time = time.time()
|
|
936
990
|
while True:
|
|
937
|
-
rsp = client.
|
|
991
|
+
rsp = client.DescribeUserList(model)
|
|
938
992
|
result = rsp.to_json_string()
|
|
939
993
|
try:
|
|
940
994
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1007,7 @@ def doDescribeUser(args, parsed_globals):
|
|
|
953
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1008
|
|
|
955
1009
|
|
|
956
|
-
def
|
|
1010
|
+
def doRollbackMNPVersion(args, parsed_globals):
|
|
957
1011
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1012
|
|
|
959
1013
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1017,10 @@ def doDescribeTeamMemberList(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,18 +1032,18 @@ def doDescribeTeamMemberList(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1039
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1042
|
+
model = models.RollbackMNPVersionRequest()
|
|
986
1043
|
model.from_json_string(json.dumps(args))
|
|
987
1044
|
start_time = time.time()
|
|
988
1045
|
while True:
|
|
989
|
-
rsp = client.
|
|
1046
|
+
rsp = client.RollbackMNPVersion(model)
|
|
990
1047
|
result = rsp.to_json_string()
|
|
991
1048
|
try:
|
|
992
1049
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1062,7 @@ def doDescribeTeamMemberList(args, parsed_globals):
|
|
|
1005
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1063
|
|
|
1007
1064
|
|
|
1008
|
-
def
|
|
1065
|
+
def doRemoveMNP(args, parsed_globals):
|
|
1009
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1067
|
|
|
1011
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1072,10 @@ def doModifyTeam(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,18 +1087,18 @@ def doModifyTeam(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1094
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1097
|
+
model = models.RemoveMNPRequest()
|
|
1038
1098
|
model.from_json_string(json.dumps(args))
|
|
1039
1099
|
start_time = time.time()
|
|
1040
1100
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1101
|
+
rsp = client.RemoveMNP(model)
|
|
1042
1102
|
result = rsp.to_json_string()
|
|
1043
1103
|
try:
|
|
1044
1104
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1117,7 @@ def doModifyTeam(args, parsed_globals):
|
|
|
1057
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1118
|
|
|
1059
1119
|
|
|
1060
|
-
def
|
|
1120
|
+
def doDescribeRoleList(args, parsed_globals):
|
|
1061
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1122
|
|
|
1063
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1127,10 @@ def doCreateMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,18 +1142,18 @@ def doCreateMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1149
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1152
|
+
model = models.DescribeRoleListRequest()
|
|
1090
1153
|
model.from_json_string(json.dumps(args))
|
|
1091
1154
|
start_time = time.time()
|
|
1092
1155
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1156
|
+
rsp = client.DescribeRoleList(model)
|
|
1094
1157
|
result = rsp.to_json_string()
|
|
1095
1158
|
try:
|
|
1096
1159
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1172,7 @@ def doCreateMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
1109
1172
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1173
|
|
|
1111
1174
|
|
|
1112
|
-
def
|
|
1175
|
+
def doDescribeTeamList(args, parsed_globals):
|
|
1113
1176
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1177
|
|
|
1115
1178
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1119,7 +1182,10 @@ def doDescribeMNPDomainACL(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,18 +1197,18 @@ def doDescribeMNPDomainACL(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1138
1204
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1205
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1206
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1207
|
+
model = models.DescribeTeamListRequest()
|
|
1142
1208
|
model.from_json_string(json.dumps(args))
|
|
1143
1209
|
start_time = time.time()
|
|
1144
1210
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1211
|
+
rsp = client.DescribeTeamList(model)
|
|
1146
1212
|
result = rsp.to_json_string()
|
|
1147
1213
|
try:
|
|
1148
1214
|
json_obj = json.loads(result)
|
|
@@ -1161,7 +1227,7 @@ def doDescribeMNPDomainACL(args, parsed_globals):
|
|
|
1161
1227
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1162
1228
|
|
|
1163
1229
|
|
|
1164
|
-
def
|
|
1230
|
+
def doDescribeMNPAccessAnalysisOverview(args, parsed_globals):
|
|
1165
1231
|
g_param = parse_global_arg(parsed_globals)
|
|
1166
1232
|
|
|
1167
1233
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1171,7 +1237,10 @@ def doDescribeMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,18 +1252,18 @@ def doDescribeMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1190
1259
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1191
1260
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1192
1261
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1193
|
-
model = models.
|
|
1262
|
+
model = models.DescribeMNPAccessAnalysisOverviewRequest()
|
|
1194
1263
|
model.from_json_string(json.dumps(args))
|
|
1195
1264
|
start_time = time.time()
|
|
1196
1265
|
while True:
|
|
1197
|
-
rsp = client.
|
|
1266
|
+
rsp = client.DescribeMNPAccessAnalysisOverview(model)
|
|
1198
1267
|
result = rsp.to_json_string()
|
|
1199
1268
|
try:
|
|
1200
1269
|
json_obj = json.loads(result)
|
|
@@ -1213,7 +1282,7 @@ def doDescribeMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
|
1213
1282
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1214
1283
|
|
|
1215
1284
|
|
|
1216
|
-
def
|
|
1285
|
+
def doDescribeMNGAccessAnalysisLineChart(args, parsed_globals):
|
|
1217
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
1218
1287
|
|
|
1219
1288
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1223,7 +1292,10 @@ def doDeleteTeam(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,18 +1307,18 @@ def doDeleteTeam(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1242
1314
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1243
1315
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1244
1316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1245
|
-
model = models.
|
|
1317
|
+
model = models.DescribeMNGAccessAnalysisLineChartRequest()
|
|
1246
1318
|
model.from_json_string(json.dumps(args))
|
|
1247
1319
|
start_time = time.time()
|
|
1248
1320
|
while True:
|
|
1249
|
-
rsp = client.
|
|
1321
|
+
rsp = client.DescribeMNGAccessAnalysisLineChart(model)
|
|
1250
1322
|
result = rsp.to_json_string()
|
|
1251
1323
|
try:
|
|
1252
1324
|
json_obj = json.loads(result)
|
|
@@ -1265,7 +1337,7 @@ def doDeleteTeam(args, parsed_globals):
|
|
|
1265
1337
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1338
|
|
|
1267
1339
|
|
|
1268
|
-
def
|
|
1340
|
+
def doDescribePaymentDataOverview(args, parsed_globals):
|
|
1269
1341
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1342
|
|
|
1271
1343
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1275,7 +1347,10 @@ def doDescribeMNP(args, parsed_globals):
|
|
|
1275
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1349
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1355
|
else:
|
|
1281
1356
|
cred = credential.Credential(
|
|
@@ -1287,18 +1362,18 @@ def doDescribeMNP(args, parsed_globals):
|
|
|
1287
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1364
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1366
|
if g_param[OptionsDefine.Language]:
|
|
1292
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1294
1369
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1295
1370
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1296
1371
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1297
|
-
model = models.
|
|
1372
|
+
model = models.DescribePaymentDataOverviewRequest()
|
|
1298
1373
|
model.from_json_string(json.dumps(args))
|
|
1299
1374
|
start_time = time.time()
|
|
1300
1375
|
while True:
|
|
1301
|
-
rsp = client.
|
|
1376
|
+
rsp = client.DescribePaymentDataOverview(model)
|
|
1302
1377
|
result = rsp.to_json_string()
|
|
1303
1378
|
try:
|
|
1304
1379
|
json_obj = json.loads(result)
|
|
@@ -1317,7 +1392,7 @@ def doDescribeMNP(args, parsed_globals):
|
|
|
1317
1392
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
1393
|
|
|
1319
1394
|
|
|
1320
|
-
def
|
|
1395
|
+
def doProcessMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
1321
1396
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
1397
|
|
|
1323
1398
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1327,7 +1402,10 @@ def doDescribeUserList(args, parsed_globals):
|
|
|
1327
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1404
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1410
|
else:
|
|
1333
1411
|
cred = credential.Credential(
|
|
@@ -1339,18 +1417,18 @@ def doDescribeUserList(args, parsed_globals):
|
|
|
1339
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1419
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1421
|
if g_param[OptionsDefine.Language]:
|
|
1344
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1346
1424
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1347
1425
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1348
1426
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1349
|
-
model = models.
|
|
1427
|
+
model = models.ProcessMNPSensitiveAPIPermissionApprovalRequest()
|
|
1350
1428
|
model.from_json_string(json.dumps(args))
|
|
1351
1429
|
start_time = time.time()
|
|
1352
1430
|
while True:
|
|
1353
|
-
rsp = client.
|
|
1431
|
+
rsp = client.ProcessMNPSensitiveAPIPermissionApproval(model)
|
|
1354
1432
|
result = rsp.to_json_string()
|
|
1355
1433
|
try:
|
|
1356
1434
|
json_obj = json.loads(result)
|
|
@@ -1369,7 +1447,7 @@ def doDescribeUserList(args, parsed_globals):
|
|
|
1369
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1370
1448
|
|
|
1371
1449
|
|
|
1372
|
-
def
|
|
1450
|
+
def doReleaseMNPVersion(args, parsed_globals):
|
|
1373
1451
|
g_param = parse_global_arg(parsed_globals)
|
|
1374
1452
|
|
|
1375
1453
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1379,7 +1457,10 @@ def doCreateMNPDomainACL(args, parsed_globals):
|
|
|
1379
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1459
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1465
|
else:
|
|
1385
1466
|
cred = credential.Credential(
|
|
@@ -1391,18 +1472,18 @@ def doCreateMNPDomainACL(args, parsed_globals):
|
|
|
1391
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1474
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1476
|
if g_param[OptionsDefine.Language]:
|
|
1396
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1398
1479
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1399
1480
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1400
1481
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1401
|
-
model = models.
|
|
1482
|
+
model = models.ReleaseMNPVersionRequest()
|
|
1402
1483
|
model.from_json_string(json.dumps(args))
|
|
1403
1484
|
start_time = time.time()
|
|
1404
1485
|
while True:
|
|
1405
|
-
rsp = client.
|
|
1486
|
+
rsp = client.ReleaseMNPVersion(model)
|
|
1406
1487
|
result = rsp.to_json_string()
|
|
1407
1488
|
try:
|
|
1408
1489
|
json_obj = json.loads(result)
|
|
@@ -1421,7 +1502,7 @@ def doCreateMNPDomainACL(args, parsed_globals):
|
|
|
1421
1502
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1422
1503
|
|
|
1423
1504
|
|
|
1424
|
-
def
|
|
1505
|
+
def doDescribeMNPAdvertisingDetail(args, parsed_globals):
|
|
1425
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1426
1507
|
|
|
1427
1508
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1431,7 +1512,10 @@ def doAddTeamMember(args, parsed_globals):
|
|
|
1431
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1514
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1520
|
else:
|
|
1437
1521
|
cred = credential.Credential(
|
|
@@ -1443,18 +1527,18 @@ def doAddTeamMember(args, parsed_globals):
|
|
|
1443
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1529
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1531
|
if g_param[OptionsDefine.Language]:
|
|
1448
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1450
1534
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1451
1535
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1452
1536
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1453
|
-
model = models.
|
|
1537
|
+
model = models.DescribeMNPAdvertisingDetailRequest()
|
|
1454
1538
|
model.from_json_string(json.dumps(args))
|
|
1455
1539
|
start_time = time.time()
|
|
1456
1540
|
while True:
|
|
1457
|
-
rsp = client.
|
|
1541
|
+
rsp = client.DescribeMNPAdvertisingDetail(model)
|
|
1458
1542
|
result = rsp.to_json_string()
|
|
1459
1543
|
try:
|
|
1460
1544
|
json_obj = json.loads(result)
|
|
@@ -1473,7 +1557,7 @@ def doAddTeamMember(args, parsed_globals):
|
|
|
1473
1557
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1474
1558
|
|
|
1475
1559
|
|
|
1476
|
-
def
|
|
1560
|
+
def doDeleteTeam(args, parsed_globals):
|
|
1477
1561
|
g_param = parse_global_arg(parsed_globals)
|
|
1478
1562
|
|
|
1479
1563
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1483,7 +1567,10 @@ def doCreateMNPApproval(args, parsed_globals):
|
|
|
1483
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1569
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1575
|
else:
|
|
1489
1576
|
cred = credential.Credential(
|
|
@@ -1495,18 +1582,18 @@ def doCreateMNPApproval(args, parsed_globals):
|
|
|
1495
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1584
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1586
|
if g_param[OptionsDefine.Language]:
|
|
1500
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1502
1589
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1503
1590
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1504
1591
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1505
|
-
model = models.
|
|
1592
|
+
model = models.DeleteTeamRequest()
|
|
1506
1593
|
model.from_json_string(json.dumps(args))
|
|
1507
1594
|
start_time = time.time()
|
|
1508
1595
|
while True:
|
|
1509
|
-
rsp = client.
|
|
1596
|
+
rsp = client.DeleteTeam(model)
|
|
1510
1597
|
result = rsp.to_json_string()
|
|
1511
1598
|
try:
|
|
1512
1599
|
json_obj = json.loads(result)
|
|
@@ -1525,7 +1612,7 @@ def doCreateMNPApproval(args, parsed_globals):
|
|
|
1525
1612
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
1613
|
|
|
1527
1614
|
|
|
1528
|
-
def
|
|
1615
|
+
def doDescribeMNGRetentionData(args, parsed_globals):
|
|
1529
1616
|
g_param = parse_global_arg(parsed_globals)
|
|
1530
1617
|
|
|
1531
1618
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1535,7 +1622,10 @@ def doModifyTeamMember(args, parsed_globals):
|
|
|
1535
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1624
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1630
|
else:
|
|
1541
1631
|
cred = credential.Credential(
|
|
@@ -1547,18 +1637,18 @@ def doModifyTeamMember(args, parsed_globals):
|
|
|
1547
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1639
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1641
|
if g_param[OptionsDefine.Language]:
|
|
1552
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1554
1644
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
1645
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
1646
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.
|
|
1647
|
+
model = models.DescribeMNGRetentionDataRequest()
|
|
1558
1648
|
model.from_json_string(json.dumps(args))
|
|
1559
1649
|
start_time = time.time()
|
|
1560
1650
|
while True:
|
|
1561
|
-
rsp = client.
|
|
1651
|
+
rsp = client.DescribeMNGRetentionData(model)
|
|
1562
1652
|
result = rsp.to_json_string()
|
|
1563
1653
|
try:
|
|
1564
1654
|
json_obj = json.loads(result)
|
|
@@ -1577,7 +1667,7 @@ def doModifyTeamMember(args, parsed_globals):
|
|
|
1577
1667
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
1668
|
|
|
1579
1669
|
|
|
1580
|
-
def
|
|
1670
|
+
def doDescribeApplicationConfigInfos(args, parsed_globals):
|
|
1581
1671
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
1672
|
|
|
1583
1673
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1587,7 +1677,10 @@ def doDisableApplicationSensitiveAPI(args, parsed_globals):
|
|
|
1587
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1679
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1685
|
else:
|
|
1593
1686
|
cred = credential.Credential(
|
|
@@ -1599,18 +1692,18 @@ def doDisableApplicationSensitiveAPI(args, parsed_globals):
|
|
|
1599
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1694
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1696
|
if g_param[OptionsDefine.Language]:
|
|
1604
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1606
1699
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1607
1700
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1608
1701
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1609
|
-
model = models.
|
|
1702
|
+
model = models.DescribeApplicationConfigInfosRequest()
|
|
1610
1703
|
model.from_json_string(json.dumps(args))
|
|
1611
1704
|
start_time = time.time()
|
|
1612
1705
|
while True:
|
|
1613
|
-
rsp = client.
|
|
1706
|
+
rsp = client.DescribeApplicationConfigInfos(model)
|
|
1614
1707
|
result = rsp.to_json_string()
|
|
1615
1708
|
try:
|
|
1616
1709
|
json_obj = json.loads(result)
|
|
@@ -1629,7 +1722,7 @@ def doDisableApplicationSensitiveAPI(args, parsed_globals):
|
|
|
1629
1722
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1630
1723
|
|
|
1631
1724
|
|
|
1632
|
-
def
|
|
1725
|
+
def doDescribeMNPCategory(args, parsed_globals):
|
|
1633
1726
|
g_param = parse_global_arg(parsed_globals)
|
|
1634
1727
|
|
|
1635
1728
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1639,7 +1732,10 @@ def doReleaseMNPVersion(args, parsed_globals):
|
|
|
1639
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1734
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1740
|
else:
|
|
1645
1741
|
cred = credential.Credential(
|
|
@@ -1651,18 +1747,18 @@ def doReleaseMNPVersion(args, parsed_globals):
|
|
|
1651
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1749
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1751
|
if g_param[OptionsDefine.Language]:
|
|
1656
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1658
1754
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1659
1755
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1660
1756
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1661
|
-
model = models.
|
|
1757
|
+
model = models.DescribeMNPCategoryRequest()
|
|
1662
1758
|
model.from_json_string(json.dumps(args))
|
|
1663
1759
|
start_time = time.time()
|
|
1664
1760
|
while True:
|
|
1665
|
-
rsp = client.
|
|
1761
|
+
rsp = client.DescribeMNPCategory(model)
|
|
1666
1762
|
result = rsp.to_json_string()
|
|
1667
1763
|
try:
|
|
1668
1764
|
json_obj = json.loads(result)
|
|
@@ -1681,7 +1777,7 @@ def doReleaseMNPVersion(args, parsed_globals):
|
|
|
1681
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1682
1778
|
|
|
1683
1779
|
|
|
1684
|
-
def
|
|
1780
|
+
def doDescribeMNGAccessAnalysisDetail(args, parsed_globals):
|
|
1685
1781
|
g_param = parse_global_arg(parsed_globals)
|
|
1686
1782
|
|
|
1687
1783
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1691,7 +1787,10 @@ def doDeleteMNP(args, parsed_globals):
|
|
|
1691
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1789
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1795
|
else:
|
|
1697
1796
|
cred = credential.Credential(
|
|
@@ -1703,18 +1802,18 @@ def doDeleteMNP(args, parsed_globals):
|
|
|
1703
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1804
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1806
|
if g_param[OptionsDefine.Language]:
|
|
1708
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1710
1809
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1711
1810
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1712
1811
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1713
|
-
model = models.
|
|
1812
|
+
model = models.DescribeMNGAccessAnalysisDetailRequest()
|
|
1714
1813
|
model.from_json_string(json.dumps(args))
|
|
1715
1814
|
start_time = time.time()
|
|
1716
1815
|
while True:
|
|
1717
|
-
rsp = client.
|
|
1816
|
+
rsp = client.DescribeMNGAccessAnalysisDetail(model)
|
|
1718
1817
|
result = rsp.to_json_string()
|
|
1719
1818
|
try:
|
|
1720
1819
|
json_obj = json.loads(result)
|
|
@@ -1733,7 +1832,7 @@ def doDeleteMNP(args, parsed_globals):
|
|
|
1733
1832
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1734
1833
|
|
|
1735
1834
|
|
|
1736
|
-
def
|
|
1835
|
+
def doDescribeMNGAccessAnalysisOverview(args, parsed_globals):
|
|
1737
1836
|
g_param = parse_global_arg(parsed_globals)
|
|
1738
1837
|
|
|
1739
1838
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1743,7 +1842,10 @@ def doDescribeMNPSensitiveAPIPermissionList(args, parsed_globals):
|
|
|
1743
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1844
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1850
|
else:
|
|
1749
1851
|
cred = credential.Credential(
|
|
@@ -1755,18 +1857,18 @@ def doDescribeMNPSensitiveAPIPermissionList(args, parsed_globals):
|
|
|
1755
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1859
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1861
|
if g_param[OptionsDefine.Language]:
|
|
1760
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1762
1864
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1763
1865
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1764
1866
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1765
|
-
model = models.
|
|
1867
|
+
model = models.DescribeMNGAccessAnalysisOverviewRequest()
|
|
1766
1868
|
model.from_json_string(json.dumps(args))
|
|
1767
1869
|
start_time = time.time()
|
|
1768
1870
|
while True:
|
|
1769
|
-
rsp = client.
|
|
1871
|
+
rsp = client.DescribeMNGAccessAnalysisOverview(model)
|
|
1770
1872
|
result = rsp.to_json_string()
|
|
1771
1873
|
try:
|
|
1772
1874
|
json_obj = json.loads(result)
|
|
@@ -1785,7 +1887,7 @@ def doDescribeMNPSensitiveAPIPermissionList(args, parsed_globals):
|
|
|
1785
1887
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1786
1888
|
|
|
1787
1889
|
|
|
1788
|
-
def
|
|
1890
|
+
def doCreateGlobalDomainACL(args, parsed_globals):
|
|
1789
1891
|
g_param = parse_global_arg(parsed_globals)
|
|
1790
1892
|
|
|
1791
1893
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1795,7 +1897,10 @@ def doDescribeMNPCategory(args, parsed_globals):
|
|
|
1795
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1899
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1905
|
else:
|
|
1801
1906
|
cred = credential.Credential(
|
|
@@ -1807,18 +1912,18 @@ def doDescribeMNPCategory(args, parsed_globals):
|
|
|
1807
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1914
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1916
|
if g_param[OptionsDefine.Language]:
|
|
1812
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1814
1919
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
1920
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
1921
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
-
model = models.
|
|
1922
|
+
model = models.CreateGlobalDomainACLRequest()
|
|
1818
1923
|
model.from_json_string(json.dumps(args))
|
|
1819
1924
|
start_time = time.time()
|
|
1820
1925
|
while True:
|
|
1821
|
-
rsp = client.
|
|
1926
|
+
rsp = client.CreateGlobalDomainACL(model)
|
|
1822
1927
|
result = rsp.to_json_string()
|
|
1823
1928
|
try:
|
|
1824
1929
|
json_obj = json.loads(result)
|
|
@@ -1837,7 +1942,7 @@ def doDescribeMNPCategory(args, parsed_globals):
|
|
|
1837
1942
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1838
1943
|
|
|
1839
1944
|
|
|
1840
|
-
def
|
|
1945
|
+
def doDescribeMNPReportDataLineChart(args, parsed_globals):
|
|
1841
1946
|
g_param = parse_global_arg(parsed_globals)
|
|
1842
1947
|
|
|
1843
1948
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1847,7 +1952,10 @@ def doDescribeApplication(args, parsed_globals):
|
|
|
1847
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1954
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1960
|
else:
|
|
1853
1961
|
cred = credential.Credential(
|
|
@@ -1859,18 +1967,18 @@ def doDescribeApplication(args, parsed_globals):
|
|
|
1859
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1969
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1971
|
if g_param[OptionsDefine.Language]:
|
|
1864
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1866
1974
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1867
1975
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1868
1976
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1869
|
-
model = models.
|
|
1977
|
+
model = models.DescribeMNPReportDataLineChartRequest()
|
|
1870
1978
|
model.from_json_string(json.dumps(args))
|
|
1871
1979
|
start_time = time.time()
|
|
1872
1980
|
while True:
|
|
1873
|
-
rsp = client.
|
|
1981
|
+
rsp = client.DescribeMNPReportDataLineChart(model)
|
|
1874
1982
|
result = rsp.to_json_string()
|
|
1875
1983
|
try:
|
|
1876
1984
|
json_obj = json.loads(result)
|
|
@@ -1889,7 +1997,7 @@ def doDescribeApplication(args, parsed_globals):
|
|
|
1889
1997
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
1998
|
|
|
1891
1999
|
|
|
1892
|
-
def
|
|
2000
|
+
def doProcessMNPApproval(args, parsed_globals):
|
|
1893
2001
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2002
|
|
|
1895
2003
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1899,7 +2007,10 @@ def doCreateGlobalDomainACL(args, parsed_globals):
|
|
|
1899
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2009
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2015
|
else:
|
|
1905
2016
|
cred = credential.Credential(
|
|
@@ -1911,18 +2022,18 @@ def doCreateGlobalDomainACL(args, parsed_globals):
|
|
|
1911
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2024
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2026
|
if g_param[OptionsDefine.Language]:
|
|
1916
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
2029
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
2030
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
2031
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.
|
|
2032
|
+
model = models.ProcessMNPApprovalRequest()
|
|
1922
2033
|
model.from_json_string(json.dumps(args))
|
|
1923
2034
|
start_time = time.time()
|
|
1924
2035
|
while True:
|
|
1925
|
-
rsp = client.
|
|
2036
|
+
rsp = client.ProcessMNPApproval(model)
|
|
1926
2037
|
result = rsp.to_json_string()
|
|
1927
2038
|
try:
|
|
1928
2039
|
json_obj = json.loads(result)
|
|
@@ -1941,7 +2052,7 @@ def doCreateGlobalDomainACL(args, parsed_globals):
|
|
|
1941
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
2053
|
|
|
1943
2054
|
|
|
1944
|
-
def
|
|
2055
|
+
def doCreateMNPVersion(args, parsed_globals):
|
|
1945
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2057
|
|
|
1947
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1951,7 +2062,10 @@ def doDescribeMNPAllStageVersions(args, parsed_globals):
|
|
|
1951
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2064
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2070
|
else:
|
|
1957
2071
|
cred = credential.Credential(
|
|
@@ -1963,18 +2077,18 @@ def doDescribeMNPAllStageVersions(args, parsed_globals):
|
|
|
1963
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2079
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2081
|
if g_param[OptionsDefine.Language]:
|
|
1968
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1970
2084
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1971
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1972
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1973
|
-
model = models.
|
|
2087
|
+
model = models.CreateMNPVersionRequest()
|
|
1974
2088
|
model.from_json_string(json.dumps(args))
|
|
1975
2089
|
start_time = time.time()
|
|
1976
2090
|
while True:
|
|
1977
|
-
rsp = client.
|
|
2091
|
+
rsp = client.CreateMNPVersion(model)
|
|
1978
2092
|
result = rsp.to_json_string()
|
|
1979
2093
|
try:
|
|
1980
2094
|
json_obj = json.loads(result)
|
|
@@ -1993,7 +2107,7 @@ def doDescribeMNPAllStageVersions(args, parsed_globals):
|
|
|
1993
2107
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1994
2108
|
|
|
1995
2109
|
|
|
1996
|
-
def
|
|
2110
|
+
def doDescribeMNGPaymentRetentionAnalysis(args, parsed_globals):
|
|
1997
2111
|
g_param = parse_global_arg(parsed_globals)
|
|
1998
2112
|
|
|
1999
2113
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2003,7 +2117,10 @@ def doModifyMNPDomain(args, parsed_globals):
|
|
|
2003
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2119
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2125
|
else:
|
|
2009
2126
|
cred = credential.Credential(
|
|
@@ -2015,18 +2132,18 @@ def doModifyMNPDomain(args, parsed_globals):
|
|
|
2015
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2134
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2136
|
if g_param[OptionsDefine.Language]:
|
|
2020
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2022
2139
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2023
2140
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2024
2141
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2025
|
-
model = models.
|
|
2142
|
+
model = models.DescribeMNGPaymentRetentionAnalysisRequest()
|
|
2026
2143
|
model.from_json_string(json.dumps(args))
|
|
2027
2144
|
start_time = time.time()
|
|
2028
2145
|
while True:
|
|
2029
|
-
rsp = client.
|
|
2146
|
+
rsp = client.DescribeMNGPaymentRetentionAnalysis(model)
|
|
2030
2147
|
result = rsp.to_json_string()
|
|
2031
2148
|
try:
|
|
2032
2149
|
json_obj = json.loads(result)
|
|
@@ -2045,7 +2162,7 @@ def doModifyMNPDomain(args, parsed_globals):
|
|
|
2045
2162
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2046
2163
|
|
|
2047
2164
|
|
|
2048
|
-
def
|
|
2165
|
+
def doCreateMNPSensitiveAPIPermissionApproval(args, parsed_globals):
|
|
2049
2166
|
g_param = parse_global_arg(parsed_globals)
|
|
2050
2167
|
|
|
2051
2168
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2055,7 +2172,10 @@ def doDescribeTempSecret4UploadFile2Cos(args, parsed_globals):
|
|
|
2055
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2174
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2180
|
else:
|
|
2061
2181
|
cred = credential.Credential(
|
|
@@ -2067,18 +2187,18 @@ def doDescribeTempSecret4UploadFile2Cos(args, parsed_globals):
|
|
|
2067
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2189
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2191
|
if g_param[OptionsDefine.Language]:
|
|
2072
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2074
2194
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2075
2195
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2076
2196
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2077
|
-
model = models.
|
|
2197
|
+
model = models.CreateMNPSensitiveAPIPermissionApprovalRequest()
|
|
2078
2198
|
model.from_json_string(json.dumps(args))
|
|
2079
2199
|
start_time = time.time()
|
|
2080
2200
|
while True:
|
|
2081
|
-
rsp = client.
|
|
2201
|
+
rsp = client.CreateMNPSensitiveAPIPermissionApproval(model)
|
|
2082
2202
|
result = rsp.to_json_string()
|
|
2083
2203
|
try:
|
|
2084
2204
|
json_obj = json.loads(result)
|
|
@@ -2097,7 +2217,7 @@ def doDescribeTempSecret4UploadFile2Cos(args, parsed_globals):
|
|
|
2097
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2098
2218
|
|
|
2099
2219
|
|
|
2100
|
-
def
|
|
2220
|
+
def doDescribeMNPList(args, parsed_globals):
|
|
2101
2221
|
g_param = parse_global_arg(parsed_globals)
|
|
2102
2222
|
|
|
2103
2223
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2107,7 +2227,10 @@ def doDescribeGlobalDomainACL(args, parsed_globals):
|
|
|
2107
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2229
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2235
|
else:
|
|
2113
2236
|
cred = credential.Credential(
|
|
@@ -2119,18 +2242,18 @@ def doDescribeGlobalDomainACL(args, parsed_globals):
|
|
|
2119
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2244
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2246
|
if g_param[OptionsDefine.Language]:
|
|
2124
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2126
2249
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2127
2250
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2128
2251
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2129
|
-
model = models.
|
|
2252
|
+
model = models.DescribeMNPListRequest()
|
|
2130
2253
|
model.from_json_string(json.dumps(args))
|
|
2131
2254
|
start_time = time.time()
|
|
2132
2255
|
while True:
|
|
2133
|
-
rsp = client.
|
|
2256
|
+
rsp = client.DescribeMNPList(model)
|
|
2134
2257
|
result = rsp.to_json_string()
|
|
2135
2258
|
try:
|
|
2136
2259
|
json_obj = json.loads(result)
|
|
@@ -2149,7 +2272,7 @@ def doDescribeGlobalDomainACL(args, parsed_globals):
|
|
|
2149
2272
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2273
|
|
|
2151
2274
|
|
|
2152
|
-
def
|
|
2275
|
+
def doDescribeMNPMAUDataDetail(args, parsed_globals):
|
|
2153
2276
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2277
|
|
|
2155
2278
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2159,7 +2282,10 @@ def doModifyMNP(args, parsed_globals):
|
|
|
2159
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2284
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2290
|
else:
|
|
2165
2291
|
cred = credential.Credential(
|
|
@@ -2171,18 +2297,18 @@ def doModifyMNP(args, parsed_globals):
|
|
|
2171
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2299
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2301
|
if g_param[OptionsDefine.Language]:
|
|
2176
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2178
2304
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2179
2305
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2180
2306
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2181
|
-
model = models.
|
|
2307
|
+
model = models.DescribeMNPMAUDataDetailRequest()
|
|
2182
2308
|
model.from_json_string(json.dumps(args))
|
|
2183
2309
|
start_time = time.time()
|
|
2184
2310
|
while True:
|
|
2185
|
-
rsp = client.
|
|
2311
|
+
rsp = client.DescribeMNPMAUDataDetail(model)
|
|
2186
2312
|
result = rsp.to_json_string()
|
|
2187
2313
|
try:
|
|
2188
2314
|
json_obj = json.loads(result)
|
|
@@ -2201,7 +2327,7 @@ def doModifyMNP(args, parsed_globals):
|
|
|
2201
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2202
2328
|
|
|
2203
2329
|
|
|
2204
|
-
def
|
|
2330
|
+
def doDescribeAdvertisingLineChart(args, parsed_globals):
|
|
2205
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
2206
2332
|
|
|
2207
2333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2211,7 +2337,10 @@ def doCreateTeam(args, parsed_globals):
|
|
|
2211
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2339
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2345
|
else:
|
|
2217
2346
|
cred = credential.Credential(
|
|
@@ -2223,18 +2352,18 @@ def doCreateTeam(args, parsed_globals):
|
|
|
2223
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2354
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2356
|
if g_param[OptionsDefine.Language]:
|
|
2228
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2230
2359
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2231
2360
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2232
2361
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2233
|
-
model = models.
|
|
2362
|
+
model = models.DescribeAdvertisingLineChartRequest()
|
|
2234
2363
|
model.from_json_string(json.dumps(args))
|
|
2235
2364
|
start_time = time.time()
|
|
2236
2365
|
while True:
|
|
2237
|
-
rsp = client.
|
|
2366
|
+
rsp = client.DescribeAdvertisingLineChart(model)
|
|
2238
2367
|
result = rsp.to_json_string()
|
|
2239
2368
|
try:
|
|
2240
2369
|
json_obj = json.loads(result)
|
|
@@ -2253,7 +2382,7 @@ def doCreateTeam(args, parsed_globals):
|
|
|
2253
2382
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2254
2383
|
|
|
2255
2384
|
|
|
2256
|
-
def
|
|
2385
|
+
def doCreateApplicationConfig(args, parsed_globals):
|
|
2257
2386
|
g_param = parse_global_arg(parsed_globals)
|
|
2258
2387
|
|
|
2259
2388
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2263,7 +2392,10 @@ def doCreateApplication(args, parsed_globals):
|
|
|
2263
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2394
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2400
|
else:
|
|
2269
2401
|
cred = credential.Credential(
|
|
@@ -2275,18 +2407,18 @@ def doCreateApplication(args, parsed_globals):
|
|
|
2275
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2409
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2411
|
if g_param[OptionsDefine.Language]:
|
|
2280
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2282
2414
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2283
2415
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2284
2416
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2285
|
-
model = models.
|
|
2417
|
+
model = models.CreateApplicationConfigRequest()
|
|
2286
2418
|
model.from_json_string(json.dumps(args))
|
|
2287
2419
|
start_time = time.time()
|
|
2288
2420
|
while True:
|
|
2289
|
-
rsp = client.
|
|
2421
|
+
rsp = client.CreateApplicationConfig(model)
|
|
2290
2422
|
result = rsp.to_json_string()
|
|
2291
2423
|
try:
|
|
2292
2424
|
json_obj = json.loads(result)
|
|
@@ -2305,7 +2437,7 @@ def doCreateApplication(args, parsed_globals):
|
|
|
2305
2437
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
2438
|
|
|
2307
2439
|
|
|
2308
|
-
def
|
|
2440
|
+
def doDescribeMNPOfflinePackageURL(args, parsed_globals):
|
|
2309
2441
|
g_param = parse_global_arg(parsed_globals)
|
|
2310
2442
|
|
|
2311
2443
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2315,7 +2447,10 @@ def doEnableApplicationSensitiveAPI(args, parsed_globals):
|
|
|
2315
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2449
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2455
|
else:
|
|
2321
2456
|
cred = credential.Credential(
|
|
@@ -2327,18 +2462,18 @@ def doEnableApplicationSensitiveAPI(args, parsed_globals):
|
|
|
2327
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2464
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2466
|
if g_param[OptionsDefine.Language]:
|
|
2332
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2334
2469
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2335
2470
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2336
2471
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2337
|
-
model = models.
|
|
2472
|
+
model = models.DescribeMNPOfflinePackageURLRequest()
|
|
2338
2473
|
model.from_json_string(json.dumps(args))
|
|
2339
2474
|
start_time = time.time()
|
|
2340
2475
|
while True:
|
|
2341
|
-
rsp = client.
|
|
2476
|
+
rsp = client.DescribeMNPOfflinePackageURL(model)
|
|
2342
2477
|
result = rsp.to_json_string()
|
|
2343
2478
|
try:
|
|
2344
2479
|
json_obj = json.loads(result)
|
|
@@ -2357,7 +2492,7 @@ def doEnableApplicationSensitiveAPI(args, parsed_globals):
|
|
|
2357
2492
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
2493
|
|
|
2359
2494
|
|
|
2360
|
-
def
|
|
2495
|
+
def doDescribeMNPReportDetail(args, parsed_globals):
|
|
2361
2496
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
2497
|
|
|
2363
2498
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2367,7 +2502,10 @@ def doModifyUser(args, parsed_globals):
|
|
|
2367
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2504
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2510
|
else:
|
|
2373
2511
|
cred = credential.Credential(
|
|
@@ -2379,18 +2517,18 @@ def doModifyUser(args, parsed_globals):
|
|
|
2379
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2519
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2521
|
if g_param[OptionsDefine.Language]:
|
|
2384
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2386
2524
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2387
2525
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2388
2526
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2389
|
-
model = models.
|
|
2527
|
+
model = models.DescribeMNPReportDetailRequest()
|
|
2390
2528
|
model.from_json_string(json.dumps(args))
|
|
2391
2529
|
start_time = time.time()
|
|
2392
2530
|
while True:
|
|
2393
|
-
rsp = client.
|
|
2531
|
+
rsp = client.DescribeMNPReportDetail(model)
|
|
2394
2532
|
result = rsp.to_json_string()
|
|
2395
2533
|
try:
|
|
2396
2534
|
json_obj = json.loads(result)
|
|
@@ -2409,7 +2547,7 @@ def doModifyUser(args, parsed_globals):
|
|
|
2409
2547
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
2548
|
|
|
2411
2549
|
|
|
2412
|
-
def
|
|
2550
|
+
def doDeleteGlobalDomain(args, parsed_globals):
|
|
2413
2551
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
2552
|
|
|
2415
2553
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2419,7 +2557,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2419
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2559
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2565
|
else:
|
|
2425
2566
|
cred = credential.Credential(
|
|
@@ -2431,18 +2572,18 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2431
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2574
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2576
|
if g_param[OptionsDefine.Language]:
|
|
2436
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2438
2579
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2439
2580
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2440
2581
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2441
|
-
model = models.
|
|
2582
|
+
model = models.DeleteGlobalDomainRequest()
|
|
2442
2583
|
model.from_json_string(json.dumps(args))
|
|
2443
2584
|
start_time = time.time()
|
|
2444
2585
|
while True:
|
|
2445
|
-
rsp = client.
|
|
2586
|
+
rsp = client.DeleteGlobalDomain(model)
|
|
2446
2587
|
result = rsp.to_json_string()
|
|
2447
2588
|
try:
|
|
2448
2589
|
json_obj = json.loads(result)
|
|
@@ -2461,7 +2602,7 @@ def doDeleteUser(args, parsed_globals):
|
|
|
2461
2602
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
2603
|
|
|
2463
2604
|
|
|
2464
|
-
def
|
|
2605
|
+
def doDescribeMNPRetentionData(args, parsed_globals):
|
|
2465
2606
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
2607
|
|
|
2467
2608
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +2612,10 @@ def doCreateMNPVersion(args, parsed_globals):
|
|
|
2471
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2614
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2620
|
else:
|
|
2477
2621
|
cred = credential.Credential(
|
|
@@ -2483,18 +2627,18 @@ def doCreateMNPVersion(args, parsed_globals):
|
|
|
2483
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2629
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2631
|
if g_param[OptionsDefine.Language]:
|
|
2488
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2490
2634
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
2635
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
2636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
2637
|
+
model = models.DescribeMNPRetentionDataRequest()
|
|
2494
2638
|
model.from_json_string(json.dumps(args))
|
|
2495
2639
|
start_time = time.time()
|
|
2496
2640
|
while True:
|
|
2497
|
-
rsp = client.
|
|
2641
|
+
rsp = client.DescribeMNPRetentionData(model)
|
|
2498
2642
|
result = rsp.to_json_string()
|
|
2499
2643
|
try:
|
|
2500
2644
|
json_obj = json.loads(result)
|
|
@@ -2513,7 +2657,7 @@ def doCreateMNPVersion(args, parsed_globals):
|
|
|
2513
2657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2514
2658
|
|
|
2515
2659
|
|
|
2516
|
-
def
|
|
2660
|
+
def doDescribeApplicationSensitiveAPIList(args, parsed_globals):
|
|
2517
2661
|
g_param = parse_global_arg(parsed_globals)
|
|
2518
2662
|
|
|
2519
2663
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2523,7 +2667,10 @@ def doModifyGlobalDomain(args, parsed_globals):
|
|
|
2523
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2669
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2675
|
else:
|
|
2529
2676
|
cred = credential.Credential(
|
|
@@ -2535,18 +2682,18 @@ def doModifyGlobalDomain(args, parsed_globals):
|
|
|
2535
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2684
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2686
|
if g_param[OptionsDefine.Language]:
|
|
2540
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2542
2689
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2543
2690
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2544
2691
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2545
|
-
model = models.
|
|
2692
|
+
model = models.DescribeApplicationSensitiveAPIListRequest()
|
|
2546
2693
|
model.from_json_string(json.dumps(args))
|
|
2547
2694
|
start_time = time.time()
|
|
2548
2695
|
while True:
|
|
2549
|
-
rsp = client.
|
|
2696
|
+
rsp = client.DescribeApplicationSensitiveAPIList(model)
|
|
2550
2697
|
result = rsp.to_json_string()
|
|
2551
2698
|
try:
|
|
2552
2699
|
json_obj = json.loads(result)
|
|
@@ -2565,7 +2712,7 @@ def doModifyGlobalDomain(args, parsed_globals):
|
|
|
2565
2712
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
2713
|
|
|
2567
2714
|
|
|
2568
|
-
def
|
|
2715
|
+
def doDescribeMNGAdvertisingDetail(args, parsed_globals):
|
|
2569
2716
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
2717
|
|
|
2571
2718
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2575,7 +2722,10 @@ def doDescribeApplicationList(args, parsed_globals):
|
|
|
2575
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2724
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2730
|
else:
|
|
2581
2731
|
cred = credential.Credential(
|
|
@@ -2587,18 +2737,18 @@ def doDescribeApplicationList(args, parsed_globals):
|
|
|
2587
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2739
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2741
|
if g_param[OptionsDefine.Language]:
|
|
2592
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2594
2744
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2595
2745
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2596
2746
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2597
|
-
model = models.
|
|
2747
|
+
model = models.DescribeMNGAdvertisingDetailRequest()
|
|
2598
2748
|
model.from_json_string(json.dumps(args))
|
|
2599
2749
|
start_time = time.time()
|
|
2600
2750
|
while True:
|
|
2601
|
-
rsp = client.
|
|
2751
|
+
rsp = client.DescribeMNGAdvertisingDetail(model)
|
|
2602
2752
|
result = rsp.to_json_string()
|
|
2603
2753
|
try:
|
|
2604
2754
|
json_obj = json.loads(result)
|
|
@@ -2617,7 +2767,7 @@ def doDescribeApplicationList(args, parsed_globals):
|
|
|
2617
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2618
2768
|
|
|
2619
2769
|
|
|
2620
|
-
def
|
|
2770
|
+
def doDescribeApplicationConfigFile(args, parsed_globals):
|
|
2621
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
2622
2772
|
|
|
2623
2773
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2627,7 +2777,10 @@ def doCreatePresetKey(args, parsed_globals):
|
|
|
2627
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2779
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2785
|
else:
|
|
2633
2786
|
cred = credential.Credential(
|
|
@@ -2639,18 +2792,18 @@ def doCreatePresetKey(args, parsed_globals):
|
|
|
2639
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2794
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2796
|
if g_param[OptionsDefine.Language]:
|
|
2644
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2646
2799
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2647
2800
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2648
2801
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2649
|
-
model = models.
|
|
2802
|
+
model = models.DescribeApplicationConfigFileRequest()
|
|
2650
2803
|
model.from_json_string(json.dumps(args))
|
|
2651
2804
|
start_time = time.time()
|
|
2652
2805
|
while True:
|
|
2653
|
-
rsp = client.
|
|
2806
|
+
rsp = client.DescribeApplicationConfigFile(model)
|
|
2654
2807
|
result = rsp.to_json_string()
|
|
2655
2808
|
try:
|
|
2656
2809
|
json_obj = json.loads(result)
|
|
@@ -2669,7 +2822,7 @@ def doCreatePresetKey(args, parsed_globals):
|
|
|
2669
2822
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2670
2823
|
|
|
2671
2824
|
|
|
2672
|
-
def
|
|
2825
|
+
def doDescribeMNGAdvertisingLineChart(args, parsed_globals):
|
|
2673
2826
|
g_param = parse_global_arg(parsed_globals)
|
|
2674
2827
|
|
|
2675
2828
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2679,7 +2832,10 @@ def doDescribeMNPReleasedVersionHistory(args, parsed_globals):
|
|
|
2679
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2834
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2840
|
else:
|
|
2685
2841
|
cred = credential.Credential(
|
|
@@ -2691,18 +2847,18 @@ def doDescribeMNPReleasedVersionHistory(args, parsed_globals):
|
|
|
2691
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2849
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2851
|
if g_param[OptionsDefine.Language]:
|
|
2696
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2698
2854
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2699
2855
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2700
2856
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2701
|
-
model = models.
|
|
2857
|
+
model = models.DescribeMNGAdvertisingLineChartRequest()
|
|
2702
2858
|
model.from_json_string(json.dumps(args))
|
|
2703
2859
|
start_time = time.time()
|
|
2704
2860
|
while True:
|
|
2705
|
-
rsp = client.
|
|
2861
|
+
rsp = client.DescribeMNGAdvertisingLineChart(model)
|
|
2706
2862
|
result = rsp.to_json_string()
|
|
2707
2863
|
try:
|
|
2708
2864
|
json_obj = json.loads(result)
|
|
@@ -2721,7 +2877,7 @@ def doDescribeMNPReleasedVersionHistory(args, parsed_globals):
|
|
|
2721
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2722
2878
|
|
|
2723
2879
|
|
|
2724
|
-
def
|
|
2880
|
+
def doDescribeMNPApprovalList(args, parsed_globals):
|
|
2725
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2726
2882
|
|
|
2727
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2731,7 +2887,10 @@ def doDescribeMNPPreview(args, parsed_globals):
|
|
|
2731
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2889
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2895
|
else:
|
|
2737
2896
|
cred = credential.Credential(
|
|
@@ -2743,18 +2902,18 @@ def doDescribeMNPPreview(args, parsed_globals):
|
|
|
2743
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2904
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2906
|
if g_param[OptionsDefine.Language]:
|
|
2748
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2750
2909
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2751
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2752
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2753
|
-
model = models.
|
|
2912
|
+
model = models.DescribeMNPApprovalListRequest()
|
|
2754
2913
|
model.from_json_string(json.dumps(args))
|
|
2755
2914
|
start_time = time.time()
|
|
2756
2915
|
while True:
|
|
2757
|
-
rsp = client.
|
|
2916
|
+
rsp = client.DescribeMNPApprovalList(model)
|
|
2758
2917
|
result = rsp.to_json_string()
|
|
2759
2918
|
try:
|
|
2760
2919
|
json_obj = json.loads(result)
|
|
@@ -2773,7 +2932,7 @@ def doDescribeMNPPreview(args, parsed_globals):
|
|
|
2773
2932
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2774
2933
|
|
|
2775
2934
|
|
|
2776
|
-
def
|
|
2935
|
+
def doDescribeMNPSensitiveAPIPermissionApprovalList(args, parsed_globals):
|
|
2777
2936
|
g_param = parse_global_arg(parsed_globals)
|
|
2778
2937
|
|
|
2779
2938
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2783,7 +2942,10 @@ def doCreateApplicationSensitiveAPI(args, parsed_globals):
|
|
|
2783
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2944
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
2950
|
else:
|
|
2789
2951
|
cred = credential.Credential(
|
|
@@ -2795,18 +2957,18 @@ def doCreateApplicationSensitiveAPI(args, parsed_globals):
|
|
|
2795
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
2959
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
2961
|
if g_param[OptionsDefine.Language]:
|
|
2800
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2802
2964
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2803
2965
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2804
2966
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2805
|
-
model = models.
|
|
2967
|
+
model = models.DescribeMNPSensitiveAPIPermissionApprovalListRequest()
|
|
2806
2968
|
model.from_json_string(json.dumps(args))
|
|
2807
2969
|
start_time = time.time()
|
|
2808
2970
|
while True:
|
|
2809
|
-
rsp = client.
|
|
2971
|
+
rsp = client.DescribeMNPSensitiveAPIPermissionApprovalList(model)
|
|
2810
2972
|
result = rsp.to_json_string()
|
|
2811
2973
|
try:
|
|
2812
2974
|
json_obj = json.loads(result)
|
|
@@ -2825,7 +2987,7 @@ def doCreateApplicationSensitiveAPI(args, parsed_globals):
|
|
|
2825
2987
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2826
2988
|
|
|
2827
2989
|
|
|
2828
|
-
def
|
|
2990
|
+
def doModifyApplication(args, parsed_globals):
|
|
2829
2991
|
g_param = parse_global_arg(parsed_globals)
|
|
2830
2992
|
|
|
2831
2993
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2835,7 +2997,10 @@ def doDeleteTeamMember(args, parsed_globals):
|
|
|
2835
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2999
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3005
|
else:
|
|
2841
3006
|
cred = credential.Credential(
|
|
@@ -2847,18 +3012,1888 @@ def doDeleteTeamMember(args, parsed_globals):
|
|
|
2847
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3014
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3016
|
if g_param[OptionsDefine.Language]:
|
|
2852
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2854
3019
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2855
3020
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2856
3021
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2857
|
-
model = models.
|
|
3022
|
+
model = models.ModifyApplicationRequest()
|
|
2858
3023
|
model.from_json_string(json.dumps(args))
|
|
2859
3024
|
start_time = time.time()
|
|
2860
3025
|
while True:
|
|
2861
|
-
rsp = client.
|
|
3026
|
+
rsp = client.ModifyApplication(model)
|
|
3027
|
+
result = rsp.to_json_string()
|
|
3028
|
+
try:
|
|
3029
|
+
json_obj = json.loads(result)
|
|
3030
|
+
except TypeError as e:
|
|
3031
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3032
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3033
|
+
break
|
|
3034
|
+
cur_time = time.time()
|
|
3035
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3036
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3037
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3038
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3039
|
+
else:
|
|
3040
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3041
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3042
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3043
|
+
|
|
3044
|
+
|
|
3045
|
+
def doDescribeTeamMemberList(args, parsed_globals):
|
|
3046
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3047
|
+
|
|
3048
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3049
|
+
cred = credential.CVMRoleCredential()
|
|
3050
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3051
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3052
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3053
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3054
|
+
)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3059
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3060
|
+
else:
|
|
3061
|
+
cred = credential.Credential(
|
|
3062
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3063
|
+
)
|
|
3064
|
+
http_profile = HttpProfile(
|
|
3065
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3066
|
+
reqMethod="POST",
|
|
3067
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3068
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3069
|
+
)
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3071
|
+
if g_param[OptionsDefine.Language]:
|
|
3072
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3073
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3074
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3075
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3076
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3077
|
+
model = models.DescribeTeamMemberListRequest()
|
|
3078
|
+
model.from_json_string(json.dumps(args))
|
|
3079
|
+
start_time = time.time()
|
|
3080
|
+
while True:
|
|
3081
|
+
rsp = client.DescribeTeamMemberList(model)
|
|
3082
|
+
result = rsp.to_json_string()
|
|
3083
|
+
try:
|
|
3084
|
+
json_obj = json.loads(result)
|
|
3085
|
+
except TypeError as e:
|
|
3086
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3087
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3088
|
+
break
|
|
3089
|
+
cur_time = time.time()
|
|
3090
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3091
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3092
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3093
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3094
|
+
else:
|
|
3095
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3096
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3097
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3098
|
+
|
|
3099
|
+
|
|
3100
|
+
def doDescribeAPPDataOverview(args, parsed_globals):
|
|
3101
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3102
|
+
|
|
3103
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3104
|
+
cred = credential.CVMRoleCredential()
|
|
3105
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3106
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3107
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3108
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3109
|
+
)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3114
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3115
|
+
else:
|
|
3116
|
+
cred = credential.Credential(
|
|
3117
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3118
|
+
)
|
|
3119
|
+
http_profile = HttpProfile(
|
|
3120
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3121
|
+
reqMethod="POST",
|
|
3122
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3123
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3124
|
+
)
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3126
|
+
if g_param[OptionsDefine.Language]:
|
|
3127
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3128
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3129
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3130
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3131
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3132
|
+
model = models.DescribeAPPDataOverviewRequest()
|
|
3133
|
+
model.from_json_string(json.dumps(args))
|
|
3134
|
+
start_time = time.time()
|
|
3135
|
+
while True:
|
|
3136
|
+
rsp = client.DescribeAPPDataOverview(model)
|
|
3137
|
+
result = rsp.to_json_string()
|
|
3138
|
+
try:
|
|
3139
|
+
json_obj = json.loads(result)
|
|
3140
|
+
except TypeError as e:
|
|
3141
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3142
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3143
|
+
break
|
|
3144
|
+
cur_time = time.time()
|
|
3145
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3146
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3147
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3148
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3149
|
+
else:
|
|
3150
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3151
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3152
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3153
|
+
|
|
3154
|
+
|
|
3155
|
+
def doDescribeMNPDomainACL(args, parsed_globals):
|
|
3156
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3157
|
+
|
|
3158
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3159
|
+
cred = credential.CVMRoleCredential()
|
|
3160
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3161
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3162
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3163
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3164
|
+
)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3169
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3170
|
+
else:
|
|
3171
|
+
cred = credential.Credential(
|
|
3172
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3173
|
+
)
|
|
3174
|
+
http_profile = HttpProfile(
|
|
3175
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3176
|
+
reqMethod="POST",
|
|
3177
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3178
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3179
|
+
)
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3181
|
+
if g_param[OptionsDefine.Language]:
|
|
3182
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3183
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3184
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3185
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3186
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3187
|
+
model = models.DescribeMNPDomainACLRequest()
|
|
3188
|
+
model.from_json_string(json.dumps(args))
|
|
3189
|
+
start_time = time.time()
|
|
3190
|
+
while True:
|
|
3191
|
+
rsp = client.DescribeMNPDomainACL(model)
|
|
3192
|
+
result = rsp.to_json_string()
|
|
3193
|
+
try:
|
|
3194
|
+
json_obj = json.loads(result)
|
|
3195
|
+
except TypeError as e:
|
|
3196
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3197
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3198
|
+
break
|
|
3199
|
+
cur_time = time.time()
|
|
3200
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3201
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3202
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3203
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3204
|
+
else:
|
|
3205
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3206
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3207
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3208
|
+
|
|
3209
|
+
|
|
3210
|
+
def doCreateMNPDomainACL(args, parsed_globals):
|
|
3211
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3212
|
+
|
|
3213
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3214
|
+
cred = credential.CVMRoleCredential()
|
|
3215
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3216
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3217
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3218
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3219
|
+
)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3224
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3225
|
+
else:
|
|
3226
|
+
cred = credential.Credential(
|
|
3227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3228
|
+
)
|
|
3229
|
+
http_profile = HttpProfile(
|
|
3230
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3231
|
+
reqMethod="POST",
|
|
3232
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3233
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3234
|
+
)
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3236
|
+
if g_param[OptionsDefine.Language]:
|
|
3237
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3238
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3239
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3240
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3241
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3242
|
+
model = models.CreateMNPDomainACLRequest()
|
|
3243
|
+
model.from_json_string(json.dumps(args))
|
|
3244
|
+
start_time = time.time()
|
|
3245
|
+
while True:
|
|
3246
|
+
rsp = client.CreateMNPDomainACL(model)
|
|
3247
|
+
result = rsp.to_json_string()
|
|
3248
|
+
try:
|
|
3249
|
+
json_obj = json.loads(result)
|
|
3250
|
+
except TypeError as e:
|
|
3251
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3252
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3253
|
+
break
|
|
3254
|
+
cur_time = time.time()
|
|
3255
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3256
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3257
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3258
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3259
|
+
else:
|
|
3260
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3261
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3262
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3263
|
+
|
|
3264
|
+
|
|
3265
|
+
def doModifyTeamMember(args, parsed_globals):
|
|
3266
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3267
|
+
|
|
3268
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3269
|
+
cred = credential.CVMRoleCredential()
|
|
3270
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3271
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3272
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3273
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3274
|
+
)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3279
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3280
|
+
else:
|
|
3281
|
+
cred = credential.Credential(
|
|
3282
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3283
|
+
)
|
|
3284
|
+
http_profile = HttpProfile(
|
|
3285
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3286
|
+
reqMethod="POST",
|
|
3287
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3288
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3289
|
+
)
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3291
|
+
if g_param[OptionsDefine.Language]:
|
|
3292
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3293
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3294
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3295
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3296
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3297
|
+
model = models.ModifyTeamMemberRequest()
|
|
3298
|
+
model.from_json_string(json.dumps(args))
|
|
3299
|
+
start_time = time.time()
|
|
3300
|
+
while True:
|
|
3301
|
+
rsp = client.ModifyTeamMember(model)
|
|
3302
|
+
result = rsp.to_json_string()
|
|
3303
|
+
try:
|
|
3304
|
+
json_obj = json.loads(result)
|
|
3305
|
+
except TypeError as e:
|
|
3306
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3307
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3308
|
+
break
|
|
3309
|
+
cur_time = time.time()
|
|
3310
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3311
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3312
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3313
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3314
|
+
else:
|
|
3315
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3316
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3317
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3318
|
+
|
|
3319
|
+
|
|
3320
|
+
def doDeleteMNP(args, parsed_globals):
|
|
3321
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3322
|
+
|
|
3323
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3324
|
+
cred = credential.CVMRoleCredential()
|
|
3325
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3326
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3327
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3328
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3329
|
+
)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3334
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3335
|
+
else:
|
|
3336
|
+
cred = credential.Credential(
|
|
3337
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3338
|
+
)
|
|
3339
|
+
http_profile = HttpProfile(
|
|
3340
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3341
|
+
reqMethod="POST",
|
|
3342
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3343
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3344
|
+
)
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3346
|
+
if g_param[OptionsDefine.Language]:
|
|
3347
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3348
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3349
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3350
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3351
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3352
|
+
model = models.DeleteMNPRequest()
|
|
3353
|
+
model.from_json_string(json.dumps(args))
|
|
3354
|
+
start_time = time.time()
|
|
3355
|
+
while True:
|
|
3356
|
+
rsp = client.DeleteMNP(model)
|
|
3357
|
+
result = rsp.to_json_string()
|
|
3358
|
+
try:
|
|
3359
|
+
json_obj = json.loads(result)
|
|
3360
|
+
except TypeError as e:
|
|
3361
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3362
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3363
|
+
break
|
|
3364
|
+
cur_time = time.time()
|
|
3365
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3366
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3367
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3368
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3369
|
+
else:
|
|
3370
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3371
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3372
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3373
|
+
|
|
3374
|
+
|
|
3375
|
+
def doDescribeMNPSensitiveAPIPermissionList(args, parsed_globals):
|
|
3376
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3377
|
+
|
|
3378
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3379
|
+
cred = credential.CVMRoleCredential()
|
|
3380
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3381
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3382
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3383
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3384
|
+
)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3389
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3390
|
+
else:
|
|
3391
|
+
cred = credential.Credential(
|
|
3392
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3393
|
+
)
|
|
3394
|
+
http_profile = HttpProfile(
|
|
3395
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3396
|
+
reqMethod="POST",
|
|
3397
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3398
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3399
|
+
)
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3401
|
+
if g_param[OptionsDefine.Language]:
|
|
3402
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3403
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3404
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3405
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3406
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3407
|
+
model = models.DescribeMNPSensitiveAPIPermissionListRequest()
|
|
3408
|
+
model.from_json_string(json.dumps(args))
|
|
3409
|
+
start_time = time.time()
|
|
3410
|
+
while True:
|
|
3411
|
+
rsp = client.DescribeMNPSensitiveAPIPermissionList(model)
|
|
3412
|
+
result = rsp.to_json_string()
|
|
3413
|
+
try:
|
|
3414
|
+
json_obj = json.loads(result)
|
|
3415
|
+
except TypeError as e:
|
|
3416
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3417
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3418
|
+
break
|
|
3419
|
+
cur_time = time.time()
|
|
3420
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3421
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3422
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3423
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3424
|
+
else:
|
|
3425
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3426
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3427
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3428
|
+
|
|
3429
|
+
|
|
3430
|
+
def doDescribeMNPReleasedVersionHistory(args, parsed_globals):
|
|
3431
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3432
|
+
|
|
3433
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3434
|
+
cred = credential.CVMRoleCredential()
|
|
3435
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3436
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3437
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3438
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3439
|
+
)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3444
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3445
|
+
else:
|
|
3446
|
+
cred = credential.Credential(
|
|
3447
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3448
|
+
)
|
|
3449
|
+
http_profile = HttpProfile(
|
|
3450
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3451
|
+
reqMethod="POST",
|
|
3452
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3453
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3454
|
+
)
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3456
|
+
if g_param[OptionsDefine.Language]:
|
|
3457
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3458
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3459
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3460
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3461
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3462
|
+
model = models.DescribeMNPReleasedVersionHistoryRequest()
|
|
3463
|
+
model.from_json_string(json.dumps(args))
|
|
3464
|
+
start_time = time.time()
|
|
3465
|
+
while True:
|
|
3466
|
+
rsp = client.DescribeMNPReleasedVersionHistory(model)
|
|
3467
|
+
result = rsp.to_json_string()
|
|
3468
|
+
try:
|
|
3469
|
+
json_obj = json.loads(result)
|
|
3470
|
+
except TypeError as e:
|
|
3471
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3472
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3473
|
+
break
|
|
3474
|
+
cur_time = time.time()
|
|
3475
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3476
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3477
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3478
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3479
|
+
else:
|
|
3480
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3481
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3482
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3483
|
+
|
|
3484
|
+
|
|
3485
|
+
def doDescribeMNPAllStageVersions(args, parsed_globals):
|
|
3486
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3487
|
+
|
|
3488
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3489
|
+
cred = credential.CVMRoleCredential()
|
|
3490
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3491
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3492
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3493
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3494
|
+
)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3499
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3500
|
+
else:
|
|
3501
|
+
cred = credential.Credential(
|
|
3502
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3503
|
+
)
|
|
3504
|
+
http_profile = HttpProfile(
|
|
3505
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3506
|
+
reqMethod="POST",
|
|
3507
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3508
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3509
|
+
)
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3511
|
+
if g_param[OptionsDefine.Language]:
|
|
3512
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3513
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3514
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3515
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3516
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3517
|
+
model = models.DescribeMNPAllStageVersionsRequest()
|
|
3518
|
+
model.from_json_string(json.dumps(args))
|
|
3519
|
+
start_time = time.time()
|
|
3520
|
+
while True:
|
|
3521
|
+
rsp = client.DescribeMNPAllStageVersions(model)
|
|
3522
|
+
result = rsp.to_json_string()
|
|
3523
|
+
try:
|
|
3524
|
+
json_obj = json.loads(result)
|
|
3525
|
+
except TypeError as e:
|
|
3526
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3527
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3528
|
+
break
|
|
3529
|
+
cur_time = time.time()
|
|
3530
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3531
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3532
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3533
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3534
|
+
else:
|
|
3535
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3536
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3537
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3538
|
+
|
|
3539
|
+
|
|
3540
|
+
def doDescribeGlobalOverviewReportDetail(args, parsed_globals):
|
|
3541
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3542
|
+
|
|
3543
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3544
|
+
cred = credential.CVMRoleCredential()
|
|
3545
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3546
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3547
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3548
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3549
|
+
)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3554
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3555
|
+
else:
|
|
3556
|
+
cred = credential.Credential(
|
|
3557
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3558
|
+
)
|
|
3559
|
+
http_profile = HttpProfile(
|
|
3560
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3561
|
+
reqMethod="POST",
|
|
3562
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3563
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3564
|
+
)
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3566
|
+
if g_param[OptionsDefine.Language]:
|
|
3567
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3568
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3569
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3570
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3571
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3572
|
+
model = models.DescribeGlobalOverviewReportDetailRequest()
|
|
3573
|
+
model.from_json_string(json.dumps(args))
|
|
3574
|
+
start_time = time.time()
|
|
3575
|
+
while True:
|
|
3576
|
+
rsp = client.DescribeGlobalOverviewReportDetail(model)
|
|
3577
|
+
result = rsp.to_json_string()
|
|
3578
|
+
try:
|
|
3579
|
+
json_obj = json.loads(result)
|
|
3580
|
+
except TypeError as e:
|
|
3581
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3582
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3583
|
+
break
|
|
3584
|
+
cur_time = time.time()
|
|
3585
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3586
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3587
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3588
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3589
|
+
else:
|
|
3590
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3591
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3592
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3593
|
+
|
|
3594
|
+
|
|
3595
|
+
def doDescribeGlobalDomainACL(args, parsed_globals):
|
|
3596
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3597
|
+
|
|
3598
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3599
|
+
cred = credential.CVMRoleCredential()
|
|
3600
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3601
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3602
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3603
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3604
|
+
)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3609
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3610
|
+
else:
|
|
3611
|
+
cred = credential.Credential(
|
|
3612
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3613
|
+
)
|
|
3614
|
+
http_profile = HttpProfile(
|
|
3615
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3616
|
+
reqMethod="POST",
|
|
3617
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3618
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3619
|
+
)
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3621
|
+
if g_param[OptionsDefine.Language]:
|
|
3622
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3623
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3624
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3625
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3626
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3627
|
+
model = models.DescribeGlobalDomainACLRequest()
|
|
3628
|
+
model.from_json_string(json.dumps(args))
|
|
3629
|
+
start_time = time.time()
|
|
3630
|
+
while True:
|
|
3631
|
+
rsp = client.DescribeGlobalDomainACL(model)
|
|
3632
|
+
result = rsp.to_json_string()
|
|
3633
|
+
try:
|
|
3634
|
+
json_obj = json.loads(result)
|
|
3635
|
+
except TypeError as e:
|
|
3636
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3637
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3638
|
+
break
|
|
3639
|
+
cur_time = time.time()
|
|
3640
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3641
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3642
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3643
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3644
|
+
else:
|
|
3645
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3646
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3647
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3648
|
+
|
|
3649
|
+
|
|
3650
|
+
def doDescribeMNPMAUMetricCard(args, parsed_globals):
|
|
3651
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3652
|
+
|
|
3653
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3654
|
+
cred = credential.CVMRoleCredential()
|
|
3655
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3656
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3657
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3658
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3659
|
+
)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3664
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3665
|
+
else:
|
|
3666
|
+
cred = credential.Credential(
|
|
3667
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3668
|
+
)
|
|
3669
|
+
http_profile = HttpProfile(
|
|
3670
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3671
|
+
reqMethod="POST",
|
|
3672
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3673
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3674
|
+
)
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3676
|
+
if g_param[OptionsDefine.Language]:
|
|
3677
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3678
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3679
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3680
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3681
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3682
|
+
model = models.DescribeMNPMAUMetricCardRequest()
|
|
3683
|
+
model.from_json_string(json.dumps(args))
|
|
3684
|
+
start_time = time.time()
|
|
3685
|
+
while True:
|
|
3686
|
+
rsp = client.DescribeMNPMAUMetricCard(model)
|
|
3687
|
+
result = rsp.to_json_string()
|
|
3688
|
+
try:
|
|
3689
|
+
json_obj = json.loads(result)
|
|
3690
|
+
except TypeError as e:
|
|
3691
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3692
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3693
|
+
break
|
|
3694
|
+
cur_time = time.time()
|
|
3695
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3696
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3697
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3698
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3699
|
+
else:
|
|
3700
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3701
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3702
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3703
|
+
|
|
3704
|
+
|
|
3705
|
+
def doCreateTeam(args, parsed_globals):
|
|
3706
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3707
|
+
|
|
3708
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3709
|
+
cred = credential.CVMRoleCredential()
|
|
3710
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3711
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3712
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3713
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3714
|
+
)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3719
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3720
|
+
else:
|
|
3721
|
+
cred = credential.Credential(
|
|
3722
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3723
|
+
)
|
|
3724
|
+
http_profile = HttpProfile(
|
|
3725
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3726
|
+
reqMethod="POST",
|
|
3727
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3728
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3729
|
+
)
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3731
|
+
if g_param[OptionsDefine.Language]:
|
|
3732
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3733
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3734
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3735
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3736
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3737
|
+
model = models.CreateTeamRequest()
|
|
3738
|
+
model.from_json_string(json.dumps(args))
|
|
3739
|
+
start_time = time.time()
|
|
3740
|
+
while True:
|
|
3741
|
+
rsp = client.CreateTeam(model)
|
|
3742
|
+
result = rsp.to_json_string()
|
|
3743
|
+
try:
|
|
3744
|
+
json_obj = json.loads(result)
|
|
3745
|
+
except TypeError as e:
|
|
3746
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3747
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3748
|
+
break
|
|
3749
|
+
cur_time = time.time()
|
|
3750
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3751
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3752
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3753
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3754
|
+
else:
|
|
3755
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3756
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3757
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3758
|
+
|
|
3759
|
+
|
|
3760
|
+
def doCreateApplication(args, parsed_globals):
|
|
3761
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3762
|
+
|
|
3763
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3764
|
+
cred = credential.CVMRoleCredential()
|
|
3765
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3766
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3767
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3768
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3769
|
+
)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3774
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3775
|
+
else:
|
|
3776
|
+
cred = credential.Credential(
|
|
3777
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3778
|
+
)
|
|
3779
|
+
http_profile = HttpProfile(
|
|
3780
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3781
|
+
reqMethod="POST",
|
|
3782
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3783
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3784
|
+
)
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3786
|
+
if g_param[OptionsDefine.Language]:
|
|
3787
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3788
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3789
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3790
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3791
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3792
|
+
model = models.CreateApplicationRequest()
|
|
3793
|
+
model.from_json_string(json.dumps(args))
|
|
3794
|
+
start_time = time.time()
|
|
3795
|
+
while True:
|
|
3796
|
+
rsp = client.CreateApplication(model)
|
|
3797
|
+
result = rsp.to_json_string()
|
|
3798
|
+
try:
|
|
3799
|
+
json_obj = json.loads(result)
|
|
3800
|
+
except TypeError as e:
|
|
3801
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3802
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3803
|
+
break
|
|
3804
|
+
cur_time = time.time()
|
|
3805
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3806
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3807
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3808
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3809
|
+
else:
|
|
3810
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3811
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3812
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3813
|
+
|
|
3814
|
+
|
|
3815
|
+
def doDeleteUser(args, parsed_globals):
|
|
3816
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3817
|
+
|
|
3818
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3819
|
+
cred = credential.CVMRoleCredential()
|
|
3820
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3821
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3822
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3823
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3824
|
+
)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
|
+
else:
|
|
3831
|
+
cred = credential.Credential(
|
|
3832
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3833
|
+
)
|
|
3834
|
+
http_profile = HttpProfile(
|
|
3835
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3836
|
+
reqMethod="POST",
|
|
3837
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3838
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3839
|
+
)
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3841
|
+
if g_param[OptionsDefine.Language]:
|
|
3842
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3843
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3844
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3845
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3846
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3847
|
+
model = models.DeleteUserRequest()
|
|
3848
|
+
model.from_json_string(json.dumps(args))
|
|
3849
|
+
start_time = time.time()
|
|
3850
|
+
while True:
|
|
3851
|
+
rsp = client.DeleteUser(model)
|
|
3852
|
+
result = rsp.to_json_string()
|
|
3853
|
+
try:
|
|
3854
|
+
json_obj = json.loads(result)
|
|
3855
|
+
except TypeError as e:
|
|
3856
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3857
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3858
|
+
break
|
|
3859
|
+
cur_time = time.time()
|
|
3860
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3861
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3862
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3863
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3864
|
+
else:
|
|
3865
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3866
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3867
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3868
|
+
|
|
3869
|
+
|
|
3870
|
+
def doModifyGlobalDomain(args, parsed_globals):
|
|
3871
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3872
|
+
|
|
3873
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3874
|
+
cred = credential.CVMRoleCredential()
|
|
3875
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3876
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3877
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3878
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3879
|
+
)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3884
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3885
|
+
else:
|
|
3886
|
+
cred = credential.Credential(
|
|
3887
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3888
|
+
)
|
|
3889
|
+
http_profile = HttpProfile(
|
|
3890
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3891
|
+
reqMethod="POST",
|
|
3892
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3893
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3894
|
+
)
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3896
|
+
if g_param[OptionsDefine.Language]:
|
|
3897
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3898
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3899
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3900
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3901
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3902
|
+
model = models.ModifyGlobalDomainRequest()
|
|
3903
|
+
model.from_json_string(json.dumps(args))
|
|
3904
|
+
start_time = time.time()
|
|
3905
|
+
while True:
|
|
3906
|
+
rsp = client.ModifyGlobalDomain(model)
|
|
3907
|
+
result = rsp.to_json_string()
|
|
3908
|
+
try:
|
|
3909
|
+
json_obj = json.loads(result)
|
|
3910
|
+
except TypeError as e:
|
|
3911
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3912
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3913
|
+
break
|
|
3914
|
+
cur_time = time.time()
|
|
3915
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3916
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3917
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3918
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3919
|
+
else:
|
|
3920
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3921
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3922
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3923
|
+
|
|
3924
|
+
|
|
3925
|
+
def doCreatePresetKey(args, parsed_globals):
|
|
3926
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3927
|
+
|
|
3928
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3929
|
+
cred = credential.CVMRoleCredential()
|
|
3930
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3931
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3932
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3933
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3934
|
+
)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3939
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3940
|
+
else:
|
|
3941
|
+
cred = credential.Credential(
|
|
3942
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3943
|
+
)
|
|
3944
|
+
http_profile = HttpProfile(
|
|
3945
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3946
|
+
reqMethod="POST",
|
|
3947
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3948
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3949
|
+
)
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3951
|
+
if g_param[OptionsDefine.Language]:
|
|
3952
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3953
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3954
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3955
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3956
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3957
|
+
model = models.CreatePresetKeyRequest()
|
|
3958
|
+
model.from_json_string(json.dumps(args))
|
|
3959
|
+
start_time = time.time()
|
|
3960
|
+
while True:
|
|
3961
|
+
rsp = client.CreatePresetKey(model)
|
|
3962
|
+
result = rsp.to_json_string()
|
|
3963
|
+
try:
|
|
3964
|
+
json_obj = json.loads(result)
|
|
3965
|
+
except TypeError as e:
|
|
3966
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3967
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3968
|
+
break
|
|
3969
|
+
cur_time = time.time()
|
|
3970
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3971
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3972
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3973
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3974
|
+
else:
|
|
3975
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3976
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3977
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3978
|
+
|
|
3979
|
+
|
|
3980
|
+
def doDescribeMNPPreview(args, parsed_globals):
|
|
3981
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3982
|
+
|
|
3983
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3984
|
+
cred = credential.CVMRoleCredential()
|
|
3985
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3986
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3987
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3988
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3989
|
+
)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3994
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3995
|
+
else:
|
|
3996
|
+
cred = credential.Credential(
|
|
3997
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3998
|
+
)
|
|
3999
|
+
http_profile = HttpProfile(
|
|
4000
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4001
|
+
reqMethod="POST",
|
|
4002
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4003
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4004
|
+
)
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4006
|
+
if g_param[OptionsDefine.Language]:
|
|
4007
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4008
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4009
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4010
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4011
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4012
|
+
model = models.DescribeMNPPreviewRequest()
|
|
4013
|
+
model.from_json_string(json.dumps(args))
|
|
4014
|
+
start_time = time.time()
|
|
4015
|
+
while True:
|
|
4016
|
+
rsp = client.DescribeMNPPreview(model)
|
|
4017
|
+
result = rsp.to_json_string()
|
|
4018
|
+
try:
|
|
4019
|
+
json_obj = json.loads(result)
|
|
4020
|
+
except TypeError as e:
|
|
4021
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4022
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4023
|
+
break
|
|
4024
|
+
cur_time = time.time()
|
|
4025
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4026
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4027
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4028
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4029
|
+
else:
|
|
4030
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4031
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4032
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4033
|
+
|
|
4034
|
+
|
|
4035
|
+
def doDescribeMNGActiveUserRealTimeStatistics(args, parsed_globals):
|
|
4036
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4037
|
+
|
|
4038
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4039
|
+
cred = credential.CVMRoleCredential()
|
|
4040
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4041
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4042
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4043
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4044
|
+
)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4049
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4050
|
+
else:
|
|
4051
|
+
cred = credential.Credential(
|
|
4052
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4053
|
+
)
|
|
4054
|
+
http_profile = HttpProfile(
|
|
4055
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4056
|
+
reqMethod="POST",
|
|
4057
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4058
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4059
|
+
)
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4061
|
+
if g_param[OptionsDefine.Language]:
|
|
4062
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4063
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4064
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4065
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4066
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4067
|
+
model = models.DescribeMNGActiveUserRealTimeStatisticsRequest()
|
|
4068
|
+
model.from_json_string(json.dumps(args))
|
|
4069
|
+
start_time = time.time()
|
|
4070
|
+
while True:
|
|
4071
|
+
rsp = client.DescribeMNGActiveUserRealTimeStatistics(model)
|
|
4072
|
+
result = rsp.to_json_string()
|
|
4073
|
+
try:
|
|
4074
|
+
json_obj = json.loads(result)
|
|
4075
|
+
except TypeError as e:
|
|
4076
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4077
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4078
|
+
break
|
|
4079
|
+
cur_time = time.time()
|
|
4080
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4081
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4082
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4083
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4084
|
+
else:
|
|
4085
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4086
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4087
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4088
|
+
|
|
4089
|
+
|
|
4090
|
+
def doDescribeMNPVersion(args, parsed_globals):
|
|
4091
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4092
|
+
|
|
4093
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4094
|
+
cred = credential.CVMRoleCredential()
|
|
4095
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4096
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4097
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4098
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4099
|
+
)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4104
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4105
|
+
else:
|
|
4106
|
+
cred = credential.Credential(
|
|
4107
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4108
|
+
)
|
|
4109
|
+
http_profile = HttpProfile(
|
|
4110
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4111
|
+
reqMethod="POST",
|
|
4112
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4113
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4114
|
+
)
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4116
|
+
if g_param[OptionsDefine.Language]:
|
|
4117
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4118
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4119
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4120
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4121
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4122
|
+
model = models.DescribeMNPVersionRequest()
|
|
4123
|
+
model.from_json_string(json.dumps(args))
|
|
4124
|
+
start_time = time.time()
|
|
4125
|
+
while True:
|
|
4126
|
+
rsp = client.DescribeMNPVersion(model)
|
|
4127
|
+
result = rsp.to_json_string()
|
|
4128
|
+
try:
|
|
4129
|
+
json_obj = json.loads(result)
|
|
4130
|
+
except TypeError as e:
|
|
4131
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4132
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4133
|
+
break
|
|
4134
|
+
cur_time = time.time()
|
|
4135
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4136
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4137
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4138
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4139
|
+
else:
|
|
4140
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4141
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4142
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4143
|
+
|
|
4144
|
+
|
|
4145
|
+
def doDescribeMNGMAUDataDetail(args, parsed_globals):
|
|
4146
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4147
|
+
|
|
4148
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4149
|
+
cred = credential.CVMRoleCredential()
|
|
4150
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4151
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4152
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4153
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4154
|
+
)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4159
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4160
|
+
else:
|
|
4161
|
+
cred = credential.Credential(
|
|
4162
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4163
|
+
)
|
|
4164
|
+
http_profile = HttpProfile(
|
|
4165
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4166
|
+
reqMethod="POST",
|
|
4167
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4168
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4169
|
+
)
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4171
|
+
if g_param[OptionsDefine.Language]:
|
|
4172
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4173
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4174
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4175
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4176
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4177
|
+
model = models.DescribeMNGMAUDataDetailRequest()
|
|
4178
|
+
model.from_json_string(json.dumps(args))
|
|
4179
|
+
start_time = time.time()
|
|
4180
|
+
while True:
|
|
4181
|
+
rsp = client.DescribeMNGMAUDataDetail(model)
|
|
4182
|
+
result = rsp.to_json_string()
|
|
4183
|
+
try:
|
|
4184
|
+
json_obj = json.loads(result)
|
|
4185
|
+
except TypeError as e:
|
|
4186
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4187
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4188
|
+
break
|
|
4189
|
+
cur_time = time.time()
|
|
4190
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4191
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4192
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4193
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4194
|
+
else:
|
|
4195
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4196
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4197
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4198
|
+
|
|
4199
|
+
|
|
4200
|
+
def doDescribeMNGMAUMonthlyComparisonMetricCard(args, parsed_globals):
|
|
4201
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4202
|
+
|
|
4203
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4204
|
+
cred = credential.CVMRoleCredential()
|
|
4205
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4206
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4207
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4208
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4209
|
+
)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4214
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4215
|
+
else:
|
|
4216
|
+
cred = credential.Credential(
|
|
4217
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4218
|
+
)
|
|
4219
|
+
http_profile = HttpProfile(
|
|
4220
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4221
|
+
reqMethod="POST",
|
|
4222
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4223
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4224
|
+
)
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4226
|
+
if g_param[OptionsDefine.Language]:
|
|
4227
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4228
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4229
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4230
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4231
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4232
|
+
model = models.DescribeMNGMAUMonthlyComparisonMetricCardRequest()
|
|
4233
|
+
model.from_json_string(json.dumps(args))
|
|
4234
|
+
start_time = time.time()
|
|
4235
|
+
while True:
|
|
4236
|
+
rsp = client.DescribeMNGMAUMonthlyComparisonMetricCard(model)
|
|
4237
|
+
result = rsp.to_json_string()
|
|
4238
|
+
try:
|
|
4239
|
+
json_obj = json.loads(result)
|
|
4240
|
+
except TypeError as e:
|
|
4241
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4242
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4243
|
+
break
|
|
4244
|
+
cur_time = time.time()
|
|
4245
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4246
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4247
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4248
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4249
|
+
else:
|
|
4250
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4251
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4252
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4253
|
+
|
|
4254
|
+
|
|
4255
|
+
def doDescribeMNGMAULineChart(args, parsed_globals):
|
|
4256
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4257
|
+
|
|
4258
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4259
|
+
cred = credential.CVMRoleCredential()
|
|
4260
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4261
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4262
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4263
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4264
|
+
)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4269
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4270
|
+
else:
|
|
4271
|
+
cred = credential.Credential(
|
|
4272
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4273
|
+
)
|
|
4274
|
+
http_profile = HttpProfile(
|
|
4275
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4276
|
+
reqMethod="POST",
|
|
4277
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4278
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4279
|
+
)
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4281
|
+
if g_param[OptionsDefine.Language]:
|
|
4282
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4283
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4284
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4285
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4286
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4287
|
+
model = models.DescribeMNGMAULineChartRequest()
|
|
4288
|
+
model.from_json_string(json.dumps(args))
|
|
4289
|
+
start_time = time.time()
|
|
4290
|
+
while True:
|
|
4291
|
+
rsp = client.DescribeMNGMAULineChart(model)
|
|
4292
|
+
result = rsp.to_json_string()
|
|
4293
|
+
try:
|
|
4294
|
+
json_obj = json.loads(result)
|
|
4295
|
+
except TypeError as e:
|
|
4296
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4297
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4298
|
+
break
|
|
4299
|
+
cur_time = time.time()
|
|
4300
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4301
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4302
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4303
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4304
|
+
else:
|
|
4305
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4306
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4307
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4308
|
+
|
|
4309
|
+
|
|
4310
|
+
def doDeleteApplication(args, parsed_globals):
|
|
4311
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4312
|
+
|
|
4313
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4314
|
+
cred = credential.CVMRoleCredential()
|
|
4315
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4316
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4317
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4318
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4319
|
+
)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4324
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4325
|
+
else:
|
|
4326
|
+
cred = credential.Credential(
|
|
4327
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4328
|
+
)
|
|
4329
|
+
http_profile = HttpProfile(
|
|
4330
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4331
|
+
reqMethod="POST",
|
|
4332
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4333
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4334
|
+
)
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4336
|
+
if g_param[OptionsDefine.Language]:
|
|
4337
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4338
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4339
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4340
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4341
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4342
|
+
model = models.DeleteApplicationRequest()
|
|
4343
|
+
model.from_json_string(json.dumps(args))
|
|
4344
|
+
start_time = time.time()
|
|
4345
|
+
while True:
|
|
4346
|
+
rsp = client.DeleteApplication(model)
|
|
4347
|
+
result = rsp.to_json_string()
|
|
4348
|
+
try:
|
|
4349
|
+
json_obj = json.loads(result)
|
|
4350
|
+
except TypeError as e:
|
|
4351
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4352
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4353
|
+
break
|
|
4354
|
+
cur_time = time.time()
|
|
4355
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4356
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4357
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4358
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4359
|
+
else:
|
|
4360
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4361
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4362
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4363
|
+
|
|
4364
|
+
|
|
4365
|
+
def doDescribeTeam(args, parsed_globals):
|
|
4366
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4367
|
+
|
|
4368
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4369
|
+
cred = credential.CVMRoleCredential()
|
|
4370
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4371
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4372
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4373
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4374
|
+
)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4379
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4380
|
+
else:
|
|
4381
|
+
cred = credential.Credential(
|
|
4382
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4383
|
+
)
|
|
4384
|
+
http_profile = HttpProfile(
|
|
4385
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4386
|
+
reqMethod="POST",
|
|
4387
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4388
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4389
|
+
)
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4391
|
+
if g_param[OptionsDefine.Language]:
|
|
4392
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4393
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4394
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4395
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4396
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4397
|
+
model = models.DescribeTeamRequest()
|
|
4398
|
+
model.from_json_string(json.dumps(args))
|
|
4399
|
+
start_time = time.time()
|
|
4400
|
+
while True:
|
|
4401
|
+
rsp = client.DescribeTeam(model)
|
|
4402
|
+
result = rsp.to_json_string()
|
|
4403
|
+
try:
|
|
4404
|
+
json_obj = json.loads(result)
|
|
4405
|
+
except TypeError as e:
|
|
4406
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4407
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4408
|
+
break
|
|
4409
|
+
cur_time = time.time()
|
|
4410
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4411
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4412
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4413
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4414
|
+
else:
|
|
4415
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4416
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4417
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4418
|
+
|
|
4419
|
+
|
|
4420
|
+
def doDescribeAdvertisingOverview(args, parsed_globals):
|
|
4421
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4422
|
+
|
|
4423
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4424
|
+
cred = credential.CVMRoleCredential()
|
|
4425
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4426
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4427
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4428
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4429
|
+
)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4434
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4435
|
+
else:
|
|
4436
|
+
cred = credential.Credential(
|
|
4437
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4438
|
+
)
|
|
4439
|
+
http_profile = HttpProfile(
|
|
4440
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4441
|
+
reqMethod="POST",
|
|
4442
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4443
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4444
|
+
)
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4446
|
+
if g_param[OptionsDefine.Language]:
|
|
4447
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4448
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4449
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4450
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4451
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4452
|
+
model = models.DescribeAdvertisingOverviewRequest()
|
|
4453
|
+
model.from_json_string(json.dumps(args))
|
|
4454
|
+
start_time = time.time()
|
|
4455
|
+
while True:
|
|
4456
|
+
rsp = client.DescribeAdvertisingOverview(model)
|
|
4457
|
+
result = rsp.to_json_string()
|
|
4458
|
+
try:
|
|
4459
|
+
json_obj = json.loads(result)
|
|
4460
|
+
except TypeError as e:
|
|
4461
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4462
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4463
|
+
break
|
|
4464
|
+
cur_time = time.time()
|
|
4465
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4466
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4467
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4468
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4469
|
+
else:
|
|
4470
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4471
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4472
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4473
|
+
|
|
4474
|
+
|
|
4475
|
+
def doConfigureMNPPreview(args, parsed_globals):
|
|
4476
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4477
|
+
|
|
4478
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4479
|
+
cred = credential.CVMRoleCredential()
|
|
4480
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4481
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4482
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4483
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4484
|
+
)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4489
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4490
|
+
else:
|
|
4491
|
+
cred = credential.Credential(
|
|
4492
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4493
|
+
)
|
|
4494
|
+
http_profile = HttpProfile(
|
|
4495
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4496
|
+
reqMethod="POST",
|
|
4497
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4498
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4499
|
+
)
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4501
|
+
if g_param[OptionsDefine.Language]:
|
|
4502
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4503
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4504
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4505
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4506
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4507
|
+
model = models.ConfigureMNPPreviewRequest()
|
|
4508
|
+
model.from_json_string(json.dumps(args))
|
|
4509
|
+
start_time = time.time()
|
|
4510
|
+
while True:
|
|
4511
|
+
rsp = client.ConfigureMNPPreview(model)
|
|
4512
|
+
result = rsp.to_json_string()
|
|
4513
|
+
try:
|
|
4514
|
+
json_obj = json.loads(result)
|
|
4515
|
+
except TypeError as e:
|
|
4516
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4517
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4518
|
+
break
|
|
4519
|
+
cur_time = time.time()
|
|
4520
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4521
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4522
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4523
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4524
|
+
else:
|
|
4525
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4526
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4527
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4528
|
+
|
|
4529
|
+
|
|
4530
|
+
def doDescribeMNPPageAnalysisDetail(args, parsed_globals):
|
|
4531
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4532
|
+
|
|
4533
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4534
|
+
cred = credential.CVMRoleCredential()
|
|
4535
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4536
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4537
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4538
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4539
|
+
)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4544
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4545
|
+
else:
|
|
4546
|
+
cred = credential.Credential(
|
|
4547
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4548
|
+
)
|
|
4549
|
+
http_profile = HttpProfile(
|
|
4550
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4551
|
+
reqMethod="POST",
|
|
4552
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4553
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4554
|
+
)
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4556
|
+
if g_param[OptionsDefine.Language]:
|
|
4557
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4558
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4559
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4560
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4561
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4562
|
+
model = models.DescribeMNPPageAnalysisDetailRequest()
|
|
4563
|
+
model.from_json_string(json.dumps(args))
|
|
4564
|
+
start_time = time.time()
|
|
4565
|
+
while True:
|
|
4566
|
+
rsp = client.DescribeMNPPageAnalysisDetail(model)
|
|
4567
|
+
result = rsp.to_json_string()
|
|
4568
|
+
try:
|
|
4569
|
+
json_obj = json.loads(result)
|
|
4570
|
+
except TypeError as e:
|
|
4571
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4572
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4573
|
+
break
|
|
4574
|
+
cur_time = time.time()
|
|
4575
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4576
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4577
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4578
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4579
|
+
else:
|
|
4580
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4581
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4582
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4583
|
+
|
|
4584
|
+
|
|
4585
|
+
def doDescribeGlobalOverviewDataSummary(args, parsed_globals):
|
|
4586
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4587
|
+
|
|
4588
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4589
|
+
cred = credential.CVMRoleCredential()
|
|
4590
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4591
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4592
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4593
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4594
|
+
)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4599
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4600
|
+
else:
|
|
4601
|
+
cred = credential.Credential(
|
|
4602
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4603
|
+
)
|
|
4604
|
+
http_profile = HttpProfile(
|
|
4605
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4606
|
+
reqMethod="POST",
|
|
4607
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4608
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4609
|
+
)
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4611
|
+
if g_param[OptionsDefine.Language]:
|
|
4612
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4613
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4614
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4615
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4616
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4617
|
+
model = models.DescribeGlobalOverviewDataSummaryRequest()
|
|
4618
|
+
model.from_json_string(json.dumps(args))
|
|
4619
|
+
start_time = time.time()
|
|
4620
|
+
while True:
|
|
4621
|
+
rsp = client.DescribeGlobalOverviewDataSummary(model)
|
|
4622
|
+
result = rsp.to_json_string()
|
|
4623
|
+
try:
|
|
4624
|
+
json_obj = json.loads(result)
|
|
4625
|
+
except TypeError as e:
|
|
4626
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4627
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4628
|
+
break
|
|
4629
|
+
cur_time = time.time()
|
|
4630
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4631
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4632
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4633
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4634
|
+
else:
|
|
4635
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4636
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4637
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4638
|
+
|
|
4639
|
+
|
|
4640
|
+
def doDescribeMNP(args, parsed_globals):
|
|
4641
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4642
|
+
|
|
4643
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4644
|
+
cred = credential.CVMRoleCredential()
|
|
4645
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4646
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4647
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4648
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4649
|
+
)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4654
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4655
|
+
else:
|
|
4656
|
+
cred = credential.Credential(
|
|
4657
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4658
|
+
)
|
|
4659
|
+
http_profile = HttpProfile(
|
|
4660
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4661
|
+
reqMethod="POST",
|
|
4662
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4663
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4664
|
+
)
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4666
|
+
if g_param[OptionsDefine.Language]:
|
|
4667
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4668
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4669
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4670
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4671
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4672
|
+
model = models.DescribeMNPRequest()
|
|
4673
|
+
model.from_json_string(json.dumps(args))
|
|
4674
|
+
start_time = time.time()
|
|
4675
|
+
while True:
|
|
4676
|
+
rsp = client.DescribeMNP(model)
|
|
4677
|
+
result = rsp.to_json_string()
|
|
4678
|
+
try:
|
|
4679
|
+
json_obj = json.loads(result)
|
|
4680
|
+
except TypeError as e:
|
|
4681
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4682
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4683
|
+
break
|
|
4684
|
+
cur_time = time.time()
|
|
4685
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4686
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4687
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4688
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4689
|
+
else:
|
|
4690
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4691
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4692
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4693
|
+
|
|
4694
|
+
|
|
4695
|
+
def doAddTeamMember(args, parsed_globals):
|
|
4696
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4697
|
+
|
|
4698
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4699
|
+
cred = credential.CVMRoleCredential()
|
|
4700
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4701
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4702
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4703
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4704
|
+
)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4709
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4710
|
+
else:
|
|
4711
|
+
cred = credential.Credential(
|
|
4712
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4713
|
+
)
|
|
4714
|
+
http_profile = HttpProfile(
|
|
4715
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4716
|
+
reqMethod="POST",
|
|
4717
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4718
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4719
|
+
)
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4721
|
+
if g_param[OptionsDefine.Language]:
|
|
4722
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4723
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4724
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4725
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4726
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4727
|
+
model = models.AddTeamMemberRequest()
|
|
4728
|
+
model.from_json_string(json.dumps(args))
|
|
4729
|
+
start_time = time.time()
|
|
4730
|
+
while True:
|
|
4731
|
+
rsp = client.AddTeamMember(model)
|
|
4732
|
+
result = rsp.to_json_string()
|
|
4733
|
+
try:
|
|
4734
|
+
json_obj = json.loads(result)
|
|
4735
|
+
except TypeError as e:
|
|
4736
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4737
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4738
|
+
break
|
|
4739
|
+
cur_time = time.time()
|
|
4740
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4741
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4742
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4743
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4744
|
+
else:
|
|
4745
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4746
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4747
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4748
|
+
|
|
4749
|
+
|
|
4750
|
+
def doDescribeMNPMAULineChart(args, parsed_globals):
|
|
4751
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4752
|
+
|
|
4753
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4754
|
+
cred = credential.CVMRoleCredential()
|
|
4755
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4756
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4757
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4758
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4759
|
+
)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4764
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4765
|
+
else:
|
|
4766
|
+
cred = credential.Credential(
|
|
4767
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4768
|
+
)
|
|
4769
|
+
http_profile = HttpProfile(
|
|
4770
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4771
|
+
reqMethod="POST",
|
|
4772
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4773
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4774
|
+
)
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4776
|
+
if g_param[OptionsDefine.Language]:
|
|
4777
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4778
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4779
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4780
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4781
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4782
|
+
model = models.DescribeMNPMAULineChartRequest()
|
|
4783
|
+
model.from_json_string(json.dumps(args))
|
|
4784
|
+
start_time = time.time()
|
|
4785
|
+
while True:
|
|
4786
|
+
rsp = client.DescribeMNPMAULineChart(model)
|
|
4787
|
+
result = rsp.to_json_string()
|
|
4788
|
+
try:
|
|
4789
|
+
json_obj = json.loads(result)
|
|
4790
|
+
except TypeError as e:
|
|
4791
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4792
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4793
|
+
break
|
|
4794
|
+
cur_time = time.time()
|
|
4795
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4796
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4797
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4798
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4799
|
+
else:
|
|
4800
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4801
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4802
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4803
|
+
|
|
4804
|
+
|
|
4805
|
+
def doCreateMNPApproval(args, parsed_globals):
|
|
4806
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4807
|
+
|
|
4808
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4809
|
+
cred = credential.CVMRoleCredential()
|
|
4810
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4811
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4812
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4813
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4814
|
+
)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4819
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4820
|
+
else:
|
|
4821
|
+
cred = credential.Credential(
|
|
4822
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4823
|
+
)
|
|
4824
|
+
http_profile = HttpProfile(
|
|
4825
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4826
|
+
reqMethod="POST",
|
|
4827
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4828
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4829
|
+
)
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4831
|
+
if g_param[OptionsDefine.Language]:
|
|
4832
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4833
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4834
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4835
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4836
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4837
|
+
model = models.CreateMNPApprovalRequest()
|
|
4838
|
+
model.from_json_string(json.dumps(args))
|
|
4839
|
+
start_time = time.time()
|
|
4840
|
+
while True:
|
|
4841
|
+
rsp = client.CreateMNPApproval(model)
|
|
4842
|
+
result = rsp.to_json_string()
|
|
4843
|
+
try:
|
|
4844
|
+
json_obj = json.loads(result)
|
|
4845
|
+
except TypeError as e:
|
|
4846
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4847
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4848
|
+
break
|
|
4849
|
+
cur_time = time.time()
|
|
4850
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4851
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4852
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4853
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4854
|
+
else:
|
|
4855
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4856
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4857
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4858
|
+
|
|
4859
|
+
|
|
4860
|
+
def doDescribePaymentDataDetail(args, parsed_globals):
|
|
4861
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4862
|
+
|
|
4863
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4864
|
+
cred = credential.CVMRoleCredential()
|
|
4865
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4866
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4867
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4868
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4869
|
+
)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4874
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4875
|
+
else:
|
|
4876
|
+
cred = credential.Credential(
|
|
4877
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4878
|
+
)
|
|
4879
|
+
http_profile = HttpProfile(
|
|
4880
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4881
|
+
reqMethod="POST",
|
|
4882
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4883
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4884
|
+
)
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4886
|
+
if g_param[OptionsDefine.Language]:
|
|
4887
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4888
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4889
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4890
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4891
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4892
|
+
model = models.DescribePaymentDataDetailRequest()
|
|
4893
|
+
model.from_json_string(json.dumps(args))
|
|
4894
|
+
start_time = time.time()
|
|
4895
|
+
while True:
|
|
4896
|
+
rsp = client.DescribePaymentDataDetail(model)
|
|
2862
4897
|
result = rsp.to_json_string()
|
|
2863
4898
|
try:
|
|
2864
4899
|
json_obj = json.loads(result)
|
|
@@ -2877,7 +4912,7 @@ def doDeleteTeamMember(args, parsed_globals):
|
|
|
2877
4912
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2878
4913
|
|
|
2879
4914
|
|
|
2880
|
-
def
|
|
4915
|
+
def doDescribePaymentDataLineChart(args, parsed_globals):
|
|
2881
4916
|
g_param = parse_global_arg(parsed_globals)
|
|
2882
4917
|
|
|
2883
4918
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2887,7 +4922,10 @@ def doDescribeMNPList(args, parsed_globals):
|
|
|
2887
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
4924
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
4930
|
else:
|
|
2893
4931
|
cred = credential.Credential(
|
|
@@ -2899,18 +4937,18 @@ def doDescribeMNPList(args, parsed_globals):
|
|
|
2899
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
4939
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
4941
|
if g_param[OptionsDefine.Language]:
|
|
2904
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2906
4944
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2907
4945
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2908
4946
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2909
|
-
model = models.
|
|
4947
|
+
model = models.DescribePaymentDataLineChartRequest()
|
|
2910
4948
|
model.from_json_string(json.dumps(args))
|
|
2911
4949
|
start_time = time.time()
|
|
2912
4950
|
while True:
|
|
2913
|
-
rsp = client.
|
|
4951
|
+
rsp = client.DescribePaymentDataLineChart(model)
|
|
2914
4952
|
result = rsp.to_json_string()
|
|
2915
4953
|
try:
|
|
2916
4954
|
json_obj = json.loads(result)
|
|
@@ -2929,7 +4967,7 @@ def doDescribeMNPList(args, parsed_globals):
|
|
|
2929
4967
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2930
4968
|
|
|
2931
4969
|
|
|
2932
|
-
def
|
|
4970
|
+
def doModifyMNP(args, parsed_globals):
|
|
2933
4971
|
g_param = parse_global_arg(parsed_globals)
|
|
2934
4972
|
|
|
2935
4973
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2939,7 +4977,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
2939
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
4979
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
4985
|
else:
|
|
2945
4986
|
cred = credential.Credential(
|
|
@@ -2951,18 +4992,18 @@ def doCreateUser(args, parsed_globals):
|
|
|
2951
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
4994
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
4996
|
if g_param[OptionsDefine.Language]:
|
|
2956
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2958
4999
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2959
5000
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2960
5001
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2961
|
-
model = models.
|
|
5002
|
+
model = models.ModifyMNPRequest()
|
|
2962
5003
|
model.from_json_string(json.dumps(args))
|
|
2963
5004
|
start_time = time.time()
|
|
2964
5005
|
while True:
|
|
2965
|
-
rsp = client.
|
|
5006
|
+
rsp = client.ModifyMNP(model)
|
|
2966
5007
|
result = rsp.to_json_string()
|
|
2967
5008
|
try:
|
|
2968
5009
|
json_obj = json.loads(result)
|
|
@@ -2981,7 +5022,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
2981
5022
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2982
5023
|
|
|
2983
5024
|
|
|
2984
|
-
def
|
|
5025
|
+
def doEnableApplicationSensitiveAPI(args, parsed_globals):
|
|
2985
5026
|
g_param = parse_global_arg(parsed_globals)
|
|
2986
5027
|
|
|
2987
5028
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2991,7 +5032,10 @@ def doDescribeMNPVersion(args, parsed_globals):
|
|
|
2991
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
5034
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
5040
|
else:
|
|
2997
5041
|
cred = credential.Credential(
|
|
@@ -3003,18 +5047,128 @@ def doDescribeMNPVersion(args, parsed_globals):
|
|
|
3003
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
5049
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
5051
|
if g_param[OptionsDefine.Language]:
|
|
3008
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3010
5054
|
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3011
5055
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3012
5056
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3013
|
-
model = models.
|
|
5057
|
+
model = models.EnableApplicationSensitiveAPIRequest()
|
|
3014
5058
|
model.from_json_string(json.dumps(args))
|
|
3015
5059
|
start_time = time.time()
|
|
3016
5060
|
while True:
|
|
3017
|
-
rsp = client.
|
|
5061
|
+
rsp = client.EnableApplicationSensitiveAPI(model)
|
|
5062
|
+
result = rsp.to_json_string()
|
|
5063
|
+
try:
|
|
5064
|
+
json_obj = json.loads(result)
|
|
5065
|
+
except TypeError as e:
|
|
5066
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5067
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5068
|
+
break
|
|
5069
|
+
cur_time = time.time()
|
|
5070
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5071
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5072
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5073
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5074
|
+
else:
|
|
5075
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5076
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5077
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5078
|
+
|
|
5079
|
+
|
|
5080
|
+
def doModifyUser(args, parsed_globals):
|
|
5081
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5082
|
+
|
|
5083
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5084
|
+
cred = credential.CVMRoleCredential()
|
|
5085
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5086
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5087
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5088
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5089
|
+
)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5094
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5095
|
+
else:
|
|
5096
|
+
cred = credential.Credential(
|
|
5097
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5098
|
+
)
|
|
5099
|
+
http_profile = HttpProfile(
|
|
5100
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5101
|
+
reqMethod="POST",
|
|
5102
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5103
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5104
|
+
)
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5106
|
+
if g_param[OptionsDefine.Language]:
|
|
5107
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5108
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5109
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5110
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5111
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5112
|
+
model = models.ModifyUserRequest()
|
|
5113
|
+
model.from_json_string(json.dumps(args))
|
|
5114
|
+
start_time = time.time()
|
|
5115
|
+
while True:
|
|
5116
|
+
rsp = client.ModifyUser(model)
|
|
5117
|
+
result = rsp.to_json_string()
|
|
5118
|
+
try:
|
|
5119
|
+
json_obj = json.loads(result)
|
|
5120
|
+
except TypeError as e:
|
|
5121
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5122
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5123
|
+
break
|
|
5124
|
+
cur_time = time.time()
|
|
5125
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5126
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5127
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5128
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5129
|
+
else:
|
|
5130
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5131
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5132
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5133
|
+
|
|
5134
|
+
|
|
5135
|
+
def doDeleteTeamMember(args, parsed_globals):
|
|
5136
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5137
|
+
|
|
5138
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5139
|
+
cred = credential.CVMRoleCredential()
|
|
5140
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5141
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5142
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5143
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5144
|
+
)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5149
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5150
|
+
else:
|
|
5151
|
+
cred = credential.Credential(
|
|
5152
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5153
|
+
)
|
|
5154
|
+
http_profile = HttpProfile(
|
|
5155
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5156
|
+
reqMethod="POST",
|
|
5157
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5158
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5159
|
+
)
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5161
|
+
if g_param[OptionsDefine.Language]:
|
|
5162
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5163
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5164
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5165
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5166
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5167
|
+
model = models.DeleteTeamMemberRequest()
|
|
5168
|
+
model.from_json_string(json.dumps(args))
|
|
5169
|
+
start_time = time.time()
|
|
5170
|
+
while True:
|
|
5171
|
+
rsp = client.DeleteTeamMember(model)
|
|
3018
5172
|
result = rsp.to_json_string()
|
|
3019
5173
|
try:
|
|
3020
5174
|
json_obj = json.loads(result)
|
|
@@ -3043,7 +5197,10 @@ def doDeleteApplicationSensitiveAPI(args, parsed_globals):
|
|
|
3043
5197
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
5198
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
5199
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
5204
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
5205
|
else:
|
|
3049
5206
|
cred = credential.Credential(
|
|
@@ -3055,7 +5212,7 @@ def doDeleteApplicationSensitiveAPI(args, parsed_globals):
|
|
|
3055
5212
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
5213
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
5214
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
5216
|
if g_param[OptionsDefine.Language]:
|
|
3060
5217
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
5218
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3085,6 +5242,61 @@ def doDeleteApplicationSensitiveAPI(args, parsed_globals):
|
|
|
3085
5242
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3086
5243
|
|
|
3087
5244
|
|
|
5245
|
+
def doDescribeApplicationList(args, parsed_globals):
|
|
5246
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5247
|
+
|
|
5248
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5249
|
+
cred = credential.CVMRoleCredential()
|
|
5250
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5251
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5252
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5253
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5254
|
+
)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5259
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5260
|
+
else:
|
|
5261
|
+
cred = credential.Credential(
|
|
5262
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5263
|
+
)
|
|
5264
|
+
http_profile = HttpProfile(
|
|
5265
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5266
|
+
reqMethod="POST",
|
|
5267
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5268
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5269
|
+
)
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5271
|
+
if g_param[OptionsDefine.Language]:
|
|
5272
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5273
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5274
|
+
client = mod.TcsasClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5275
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5276
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5277
|
+
model = models.DescribeApplicationListRequest()
|
|
5278
|
+
model.from_json_string(json.dumps(args))
|
|
5279
|
+
start_time = time.time()
|
|
5280
|
+
while True:
|
|
5281
|
+
rsp = client.DescribeApplicationList(model)
|
|
5282
|
+
result = rsp.to_json_string()
|
|
5283
|
+
try:
|
|
5284
|
+
json_obj = json.loads(result)
|
|
5285
|
+
except TypeError as e:
|
|
5286
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5287
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5288
|
+
break
|
|
5289
|
+
cur_time = time.time()
|
|
5290
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5291
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5292
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5293
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5294
|
+
else:
|
|
5295
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5296
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5297
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5298
|
+
|
|
5299
|
+
|
|
3088
5300
|
CLIENT_MAP = {
|
|
3089
5301
|
"v20250106": tcsas_client_v20250106,
|
|
3090
5302
|
|
|
@@ -3096,65 +5308,102 @@ MODELS_MAP = {
|
|
|
3096
5308
|
}
|
|
3097
5309
|
|
|
3098
5310
|
ACTION_MAP = {
|
|
3099
|
-
"
|
|
3100
|
-
"
|
|
5311
|
+
"DescribeMNGPaymentReportDetail": doDescribeMNGPaymentReportDetail,
|
|
5312
|
+
"ModifyApplicationConfig": doModifyApplicationConfig,
|
|
5313
|
+
"DescribeMNGAdvertisingOverview": doDescribeMNGAdvertisingOverview,
|
|
5314
|
+
"CreateMNP": doCreateMNP,
|
|
5315
|
+
"DescribeUser": doDescribeUser,
|
|
5316
|
+
"DescribeMNPActiveUserRealTimeStatistics": doDescribeMNPActiveUserRealTimeStatistics,
|
|
5317
|
+
"ModifyTeam": doModifyTeam,
|
|
5318
|
+
"DescribeAPPDataDetailLineChart": doDescribeAPPDataDetailLineChart,
|
|
5319
|
+
"DescribeMNPSensitiveAPIPermissionApproval": doDescribeMNPSensitiveAPIPermissionApproval,
|
|
5320
|
+
"DescribeMNGPaymentLineChart": doDescribeMNGPaymentLineChart,
|
|
5321
|
+
"DisableApplicationSensitiveAPI": doDisableApplicationSensitiveAPI,
|
|
5322
|
+
"ModifyMNPDomain": doModifyMNPDomain,
|
|
5323
|
+
"DescribeTempSecret4UploadFile2Cos": doDescribeTempSecret4UploadFile2Cos,
|
|
5324
|
+
"CreateApplicationSensitiveAPI": doCreateApplicationSensitiveAPI,
|
|
5325
|
+
"CreateUser": doCreateUser,
|
|
5326
|
+
"DescribeApplication": doDescribeApplication,
|
|
5327
|
+
"DescribeMNGPaymentOverview": doDescribeMNGPaymentOverview,
|
|
5328
|
+
"DescribeUserList": doDescribeUserList,
|
|
3101
5329
|
"RollbackMNPVersion": doRollbackMNPVersion,
|
|
3102
5330
|
"RemoveMNP": doRemoveMNP,
|
|
3103
|
-
"CreateMNP": doCreateMNP,
|
|
3104
|
-
"DescribeApplicationSensitiveAPIList": doDescribeApplicationSensitiveAPIList,
|
|
3105
|
-
"DeleteApplication": doDeleteApplication,
|
|
3106
5331
|
"DescribeRoleList": doDescribeRoleList,
|
|
3107
|
-
"ProcessMNPSensitiveAPIPermissionApproval": doProcessMNPSensitiveAPIPermissionApproval,
|
|
3108
5332
|
"DescribeTeamList": doDescribeTeamList,
|
|
3109
|
-
"
|
|
3110
|
-
"
|
|
5333
|
+
"DescribeMNPAccessAnalysisOverview": doDescribeMNPAccessAnalysisOverview,
|
|
5334
|
+
"DescribeMNGAccessAnalysisLineChart": doDescribeMNGAccessAnalysisLineChart,
|
|
5335
|
+
"DescribePaymentDataOverview": doDescribePaymentDataOverview,
|
|
5336
|
+
"ProcessMNPSensitiveAPIPermissionApproval": doProcessMNPSensitiveAPIPermissionApproval,
|
|
5337
|
+
"ReleaseMNPVersion": doReleaseMNPVersion,
|
|
5338
|
+
"DescribeMNPAdvertisingDetail": doDescribeMNPAdvertisingDetail,
|
|
5339
|
+
"DeleteTeam": doDeleteTeam,
|
|
5340
|
+
"DescribeMNGRetentionData": doDescribeMNGRetentionData,
|
|
5341
|
+
"DescribeApplicationConfigInfos": doDescribeApplicationConfigInfos,
|
|
5342
|
+
"DescribeMNPCategory": doDescribeMNPCategory,
|
|
5343
|
+
"DescribeMNGAccessAnalysisDetail": doDescribeMNGAccessAnalysisDetail,
|
|
5344
|
+
"DescribeMNGAccessAnalysisOverview": doDescribeMNGAccessAnalysisOverview,
|
|
5345
|
+
"CreateGlobalDomainACL": doCreateGlobalDomainACL,
|
|
5346
|
+
"DescribeMNPReportDataLineChart": doDescribeMNPReportDataLineChart,
|
|
3111
5347
|
"ProcessMNPApproval": doProcessMNPApproval,
|
|
3112
|
-
"
|
|
5348
|
+
"CreateMNPVersion": doCreateMNPVersion,
|
|
5349
|
+
"DescribeMNGPaymentRetentionAnalysis": doDescribeMNGPaymentRetentionAnalysis,
|
|
5350
|
+
"CreateMNPSensitiveAPIPermissionApproval": doCreateMNPSensitiveAPIPermissionApproval,
|
|
5351
|
+
"DescribeMNPList": doDescribeMNPList,
|
|
5352
|
+
"DescribeMNPMAUDataDetail": doDescribeMNPMAUDataDetail,
|
|
5353
|
+
"DescribeAdvertisingLineChart": doDescribeAdvertisingLineChart,
|
|
5354
|
+
"CreateApplicationConfig": doCreateApplicationConfig,
|
|
5355
|
+
"DescribeMNPOfflinePackageURL": doDescribeMNPOfflinePackageURL,
|
|
5356
|
+
"DescribeMNPReportDetail": doDescribeMNPReportDetail,
|
|
5357
|
+
"DeleteGlobalDomain": doDeleteGlobalDomain,
|
|
5358
|
+
"DescribeMNPRetentionData": doDescribeMNPRetentionData,
|
|
5359
|
+
"DescribeApplicationSensitiveAPIList": doDescribeApplicationSensitiveAPIList,
|
|
5360
|
+
"DescribeMNGAdvertisingDetail": doDescribeMNGAdvertisingDetail,
|
|
5361
|
+
"DescribeApplicationConfigFile": doDescribeApplicationConfigFile,
|
|
5362
|
+
"DescribeMNGAdvertisingLineChart": doDescribeMNGAdvertisingLineChart,
|
|
3113
5363
|
"DescribeMNPApprovalList": doDescribeMNPApprovalList,
|
|
3114
5364
|
"DescribeMNPSensitiveAPIPermissionApprovalList": doDescribeMNPSensitiveAPIPermissionApprovalList,
|
|
3115
5365
|
"ModifyApplication": doModifyApplication,
|
|
3116
|
-
"DescribeUser": doDescribeUser,
|
|
3117
5366
|
"DescribeTeamMemberList": doDescribeTeamMemberList,
|
|
3118
|
-
"
|
|
3119
|
-
"CreateMNPSensitiveAPIPermissionApproval": doCreateMNPSensitiveAPIPermissionApproval,
|
|
5367
|
+
"DescribeAPPDataOverview": doDescribeAPPDataOverview,
|
|
3120
5368
|
"DescribeMNPDomainACL": doDescribeMNPDomainACL,
|
|
3121
|
-
"DescribeMNPSensitiveAPIPermissionApproval": doDescribeMNPSensitiveAPIPermissionApproval,
|
|
3122
|
-
"DeleteTeam": doDeleteTeam,
|
|
3123
|
-
"DescribeMNP": doDescribeMNP,
|
|
3124
|
-
"DescribeUserList": doDescribeUserList,
|
|
3125
5369
|
"CreateMNPDomainACL": doCreateMNPDomainACL,
|
|
3126
|
-
"AddTeamMember": doAddTeamMember,
|
|
3127
|
-
"CreateMNPApproval": doCreateMNPApproval,
|
|
3128
5370
|
"ModifyTeamMember": doModifyTeamMember,
|
|
3129
|
-
"DisableApplicationSensitiveAPI": doDisableApplicationSensitiveAPI,
|
|
3130
|
-
"ReleaseMNPVersion": doReleaseMNPVersion,
|
|
3131
5371
|
"DeleteMNP": doDeleteMNP,
|
|
3132
5372
|
"DescribeMNPSensitiveAPIPermissionList": doDescribeMNPSensitiveAPIPermissionList,
|
|
3133
|
-
"
|
|
3134
|
-
"DescribeApplication": doDescribeApplication,
|
|
3135
|
-
"CreateGlobalDomainACL": doCreateGlobalDomainACL,
|
|
5373
|
+
"DescribeMNPReleasedVersionHistory": doDescribeMNPReleasedVersionHistory,
|
|
3136
5374
|
"DescribeMNPAllStageVersions": doDescribeMNPAllStageVersions,
|
|
3137
|
-
"
|
|
3138
|
-
"DescribeTempSecret4UploadFile2Cos": doDescribeTempSecret4UploadFile2Cos,
|
|
5375
|
+
"DescribeGlobalOverviewReportDetail": doDescribeGlobalOverviewReportDetail,
|
|
3139
5376
|
"DescribeGlobalDomainACL": doDescribeGlobalDomainACL,
|
|
3140
|
-
"
|
|
5377
|
+
"DescribeMNPMAUMetricCard": doDescribeMNPMAUMetricCard,
|
|
3141
5378
|
"CreateTeam": doCreateTeam,
|
|
3142
5379
|
"CreateApplication": doCreateApplication,
|
|
3143
|
-
"EnableApplicationSensitiveAPI": doEnableApplicationSensitiveAPI,
|
|
3144
|
-
"ModifyUser": doModifyUser,
|
|
3145
5380
|
"DeleteUser": doDeleteUser,
|
|
3146
|
-
"CreateMNPVersion": doCreateMNPVersion,
|
|
3147
5381
|
"ModifyGlobalDomain": doModifyGlobalDomain,
|
|
3148
|
-
"DescribeApplicationList": doDescribeApplicationList,
|
|
3149
5382
|
"CreatePresetKey": doCreatePresetKey,
|
|
3150
|
-
"DescribeMNPReleasedVersionHistory": doDescribeMNPReleasedVersionHistory,
|
|
3151
5383
|
"DescribeMNPPreview": doDescribeMNPPreview,
|
|
3152
|
-
"
|
|
3153
|
-
"DeleteTeamMember": doDeleteTeamMember,
|
|
3154
|
-
"DescribeMNPList": doDescribeMNPList,
|
|
3155
|
-
"CreateUser": doCreateUser,
|
|
5384
|
+
"DescribeMNGActiveUserRealTimeStatistics": doDescribeMNGActiveUserRealTimeStatistics,
|
|
3156
5385
|
"DescribeMNPVersion": doDescribeMNPVersion,
|
|
5386
|
+
"DescribeMNGMAUDataDetail": doDescribeMNGMAUDataDetail,
|
|
5387
|
+
"DescribeMNGMAUMonthlyComparisonMetricCard": doDescribeMNGMAUMonthlyComparisonMetricCard,
|
|
5388
|
+
"DescribeMNGMAULineChart": doDescribeMNGMAULineChart,
|
|
5389
|
+
"DeleteApplication": doDeleteApplication,
|
|
5390
|
+
"DescribeTeam": doDescribeTeam,
|
|
5391
|
+
"DescribeAdvertisingOverview": doDescribeAdvertisingOverview,
|
|
5392
|
+
"ConfigureMNPPreview": doConfigureMNPPreview,
|
|
5393
|
+
"DescribeMNPPageAnalysisDetail": doDescribeMNPPageAnalysisDetail,
|
|
5394
|
+
"DescribeGlobalOverviewDataSummary": doDescribeGlobalOverviewDataSummary,
|
|
5395
|
+
"DescribeMNP": doDescribeMNP,
|
|
5396
|
+
"AddTeamMember": doAddTeamMember,
|
|
5397
|
+
"DescribeMNPMAULineChart": doDescribeMNPMAULineChart,
|
|
5398
|
+
"CreateMNPApproval": doCreateMNPApproval,
|
|
5399
|
+
"DescribePaymentDataDetail": doDescribePaymentDataDetail,
|
|
5400
|
+
"DescribePaymentDataLineChart": doDescribePaymentDataLineChart,
|
|
5401
|
+
"ModifyMNP": doModifyMNP,
|
|
5402
|
+
"EnableApplicationSensitiveAPI": doEnableApplicationSensitiveAPI,
|
|
5403
|
+
"ModifyUser": doModifyUser,
|
|
5404
|
+
"DeleteTeamMember": doDeleteTeamMember,
|
|
3157
5405
|
"DeleteApplicationSensitiveAPI": doDeleteApplicationSensitiveAPI,
|
|
5406
|
+
"DescribeApplicationList": doDescribeApplicationList,
|
|
3158
5407
|
|
|
3159
5408
|
}
|
|
3160
5409
|
|