tccli-intl-en 3.0.1265.1__py2.py3-none-any.whl → 3.1.1.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/services/__init__.py +5 -1
  4. tccli/services/advisor/advisor_client.py +10 -4
  5. tccli/services/aiart/aiart_client.py +5 -2
  6. tccli/services/ams/ams_client.py +20 -8
  7. tccli/services/antiddos/antiddos_client.py +350 -140
  8. tccli/services/apigateway/apigateway_client.py +465 -186
  9. tccli/services/apm/apm_client.py +835 -68
  10. tccli/services/apm/v20210622/api.json +3936 -1145
  11. tccli/services/apm/v20210622/examples.json +133 -23
  12. tccli/services/asr/asr_client.py +10 -4
  13. tccli/services/autoscaling/autoscaling_client.py +290 -116
  14. tccli/services/autoscaling/v20180419/api.json +1 -1
  15. tccli/services/batch/batch_client.py +140 -56
  16. tccli/services/bi/bi_client.py +120 -48
  17. tccli/services/billing/billing_client.py +210 -84
  18. tccli/services/cam/cam_client.py +405 -162
  19. tccli/services/captcha/captcha_client.py +5 -2
  20. tccli/services/car/car_client.py +165 -66
  21. tccli/services/cbs/cbs_client.py +190 -76
  22. tccli/services/ccc/ccc_client.py +515 -146
  23. tccli/services/ccc/v20200210/api.json +511 -27
  24. tccli/services/ccc/v20200210/examples.json +24 -0
  25. tccli/services/cdb/cdb_client.py +665 -266
  26. tccli/services/cdc/cdc_client.py +100 -40
  27. tccli/services/cdn/cdn_client.py +220 -88
  28. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  29. tccli/services/cdwpg/cdwpg_client.py +120 -48
  30. tccli/services/cdz/cdz_client.py +5 -2
  31. tccli/services/cfg/cfg_client.py +80 -32
  32. tccli/services/cfs/cfs_client.py +195 -78
  33. tccli/services/cfw/cfw_client.py +330 -132
  34. tccli/services/chdfs/chdfs_client.py +145 -58
  35. tccli/services/ciam/ciam_client.py +80 -32
  36. tccli/services/ckafka/ckafka_client.py +629 -131
  37. tccli/services/ckafka/v20190819/api.json +2749 -1470
  38. tccli/services/ckafka/v20190819/examples.json +209 -155
  39. tccli/services/clb/clb_client.py +415 -166
  40. tccli/services/clb/v20180317/api.json +1022 -647
  41. tccli/services/clb/v20180317/examples.json +19 -19
  42. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  43. tccli/services/cls/cls_client.py +434 -173
  44. tccli/services/cmq/cmq_client.py +10 -4
  45. tccli/services/config/config_client.py +30 -12
  46. tccli/services/controlcenter/controlcenter_client.py +5 -2
  47. tccli/services/csip/csip_client.py +170 -68
  48. tccli/services/ctsdb/ctsdb_client.py +10 -4
  49. tccli/services/cvm/cvm_client.py +420 -168
  50. tccli/services/cvm/v20170312/api.json +280 -174
  51. tccli/services/cvm/v20170312/examples.json +116 -116
  52. tccli/services/cwp/cwp_client.py +2325 -930
  53. tccli/services/cynosdb/cynosdb_client.py +1887 -577
  54. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  55. tccli/services/cynosdb/v20190107/examples.json +132 -4
  56. tccli/services/dataintegration/dataintegration_client.py +5 -2
  57. tccli/services/dayu/dayu_client.py +515 -206
  58. tccli/services/dbbrain/dbbrain_client.py +210 -84
  59. tccli/services/dc/dc_client.py +90 -36
  60. tccli/services/dcdb/dcdb_client.py +310 -124
  61. tccli/services/dlc/dlc_client.py +808 -216
  62. tccli/services/dlc/v20210125/api.json +534 -13
  63. tccli/services/dlc/v20210125/examples.json +40 -0
  64. tccli/services/dms/dms_client.py +10 -4
  65. tccli/services/dnspod/dnspod_client.py +200 -80
  66. tccli/services/domain/domain_client.py +120 -48
  67. tccli/services/dts/dts_client.py +415 -166
  68. tccli/services/eb/eb_client.py +130 -52
  69. tccli/services/ecdn/ecdn_client.py +75 -30
  70. tccli/services/ecm/ecm_client.py +620 -248
  71. tccli/services/eiam/eiam_client.py +200 -80
  72. tccli/services/emr/emr_client.py +385 -154
  73. tccli/services/es/es_client.py +105 -42
  74. tccli/services/facefusion/facefusion_client.py +15 -6
  75. tccli/services/faceid/faceid_client.py +95 -38
  76. tccli/services/faceid/v20180301/examples.json +2 -2
  77. tccli/services/gaap/gaap_client.py +440 -176
  78. tccli/services/gme/gme_client.py +50 -20
  79. tccli/services/gpm/gpm_client.py +90 -36
  80. tccli/services/gse/gse_client.py +110 -44
  81. tccli/services/gwlb/gwlb_client.py +90 -36
  82. tccli/services/iai/iai_client.py +145 -58
  83. tccli/services/iap/iap_client.py +30 -12
  84. tccli/services/ims/ims_client.py +5 -2
  85. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
  86. tccli/services/iotcloud/iotcloud_client.py +100 -40
  87. tccli/services/ip/ip_client.py +30 -12
  88. tccli/services/kms/kms_client.py +340 -136
  89. tccli/services/lcic/lcic_client.py +265 -106
  90. tccli/services/lighthouse/lighthouse_client.py +370 -148
  91. tccli/services/live/live_client.py +600 -240
  92. tccli/services/lke/lke_client.py +450 -180
  93. tccli/services/lkeap/lkeap_client.py +142 -12
  94. tccli/services/lkeap/v20240522/api.json +263 -0
  95. tccli/services/lkeap/v20240522/examples.json +35 -1
  96. tccli/services/mariadb/mariadb_client.py +250 -100
  97. tccli/services/mdc/mdc_client.py +90 -36
  98. tccli/services/mdl/mdl_client.py +165 -66
  99. tccli/services/mdl/v20200326/api.json +186 -12
  100. tccli/services/mdl/v20200326/examples.json +16 -16
  101. tccli/services/mdp/mdp_client.py +416 -124
  102. tccli/services/mdp/v20200527/api.json +146 -14
  103. tccli/services/mdp/v20200527/examples.json +95 -79
  104. tccli/services/message/__init__.py +4 -0
  105. tccli/services/message/message_client.py +210 -0
  106. tccli/services/message/v20181225/api.json +72 -0
  107. tccli/services/message/v20181225/examples.json +13 -0
  108. tccli/services/mongodb/mongodb_client.py +369 -58
  109. tccli/services/mongodb/v20190725/api.json +811 -226
  110. tccli/services/mongodb/v20190725/examples.json +54 -22
  111. tccli/services/monitor/monitor_client.py +1008 -296
  112. tccli/services/monitor/v20180724/api.json +657 -8
  113. tccli/services/monitor/v20180724/examples.json +152 -4
  114. tccli/services/mps/mps_client.py +684 -184
  115. tccli/services/mps/v20190612/api.json +1656 -222
  116. tccli/services/mps/v20190612/examples.json +60 -10
  117. tccli/services/msp/msp_client.py +35 -14
  118. tccli/services/ocr/ocr_client.py +246 -76
  119. tccli/services/ocr/v20181119/api.json +119 -10
  120. tccli/services/ocr/v20181119/examples.json +8 -0
  121. tccli/services/omics/omics_client.py +100 -40
  122. tccli/services/organization/organization_client.py +580 -232
  123. tccli/services/postgres/postgres_client.py +455 -182
  124. tccli/services/privatedns/privatedns_client.py +155 -62
  125. tccli/services/pts/pts_client.py +240 -96
  126. tccli/services/quota/quota_client.py +229 -2
  127. tccli/services/quota/v20241204/api.json +451 -2
  128. tccli/services/quota/v20241204/examples.json +42 -3
  129. tccli/services/rce/rce_client.py +5 -2
  130. tccli/services/redis/redis_client.py +545 -218
  131. tccli/services/redis/v20180412/api.json +225 -113
  132. tccli/services/redis/v20180412/examples.json +19 -19
  133. tccli/services/region/region_client.py +15 -6
  134. tccli/services/rum/rum_client.py +300 -120
  135. tccli/services/scf/scf_client.py +210 -84
  136. tccli/services/ses/ses_client.py +145 -58
  137. tccli/services/sms/sms_client.py +90 -36
  138. tccli/services/sqlserver/sqlserver_client.py +695 -278
  139. tccli/services/ssl/ssl_client.py +190 -76
  140. tccli/services/ssm/ssm_client.py +120 -48
  141. tccli/services/sts/sts_client.py +25 -10
  142. tccli/services/tag/tag_client.py +150 -60
  143. tccli/services/tat/tat_client.py +95 -38
  144. tccli/services/tbaas/tbaas_client.py +20 -8
  145. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  146. tccli/services/tchd/tchd_client.py +5 -2
  147. tccli/services/tcmpp/tcmpp_client.py +520 -208
  148. tccli/services/tcr/tcr_client.py +380 -152
  149. tccli/services/tcsas/tcsas_client.py +295 -118
  150. tccli/services/tcsas/v20250106/api.json +101 -61
  151. tccli/services/tcsas/v20250106/examples.json +2 -2
  152. tccli/services/tcss/tcss_client.py +1650 -660
  153. tccli/services/tdid/tdid_client.py +240 -96
  154. tccli/services/tdmq/tdmq_client.py +470 -188
  155. tccli/services/tem/tem_client.py +280 -112
  156. tccli/services/teo/teo_client.py +1365 -483
  157. tccli/services/teo/v20220901/api.json +354 -39
  158. tccli/services/teo/v20220901/examples.json +24 -0
  159. tccli/services/tione/tione_client.py +5 -2
  160. tccli/services/tiw/tiw_client.py +255 -102
  161. tccli/services/tke/tke_client.py +690 -276
  162. tccli/services/tms/tms_client.py +5 -2
  163. tccli/services/tmt/tmt_client.py +5 -2
  164. tccli/services/trabbit/trabbit_client.py +145 -58
  165. tccli/services/trro/trro_client.py +95 -38
  166. tccli/services/trtc/trtc_client.py +255 -102
  167. tccli/services/trtc/v20190722/api.json +11 -11
  168. tccli/services/trtc/v20190722/examples.json +7 -7
  169. tccli/services/tts/tts_client.py +5 -2
  170. tccli/services/vclm/vclm_client.py +10 -4
  171. tccli/services/vm/vm_client.py +20 -8
  172. tccli/services/vod/vod_client.py +895 -358
  173. tccli/services/vpc/v20170312/api.json +970 -75
  174. tccli/services/vpc/v20170312/examples.json +106 -10
  175. tccli/services/vpc/vpc_client.py +2159 -644
  176. tccli/services/waf/waf_client.py +535 -214
  177. tccli/services/wedata/v20250806/api.json +13644 -0
  178. tccli/services/wedata/v20250806/examples.json +621 -0
  179. tccli/services/wedata/wedata_client.py +6067 -1263
  180. tccli/services/yunjing/yunjing_client.py +355 -142
  181. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/METADATA +4 -7
  182. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/RECORD +186 -180
  183. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/WHEEL +1 -1
  184. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/entry_points.txt +0 -1
  185. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/LICENSE +0 -0
  186. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/top_level.txt +0 -0
@@ -17,6 +17,116 @@ from tencentcloud.mongodb.v20190725 import models as models_v20190725
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
+ def doTerminateDBInstances(args, parsed_globals):
21
+ g_param = parse_global_arg(parsed_globals)
22
+
23
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
24
+ cred = credential.CVMRoleCredential()
25
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
26
+ cred = credential.STSAssumeRoleCredential(
27
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
+ )
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
34
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
35
+ else:
36
+ cred = credential.Credential(
37
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
38
+ )
39
+ http_profile = HttpProfile(
40
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
41
+ reqMethod="POST",
42
+ endpoint=g_param[OptionsDefine.Endpoint],
43
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
44
+ )
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
46
+ if g_param[OptionsDefine.Language]:
47
+ profile.language = g_param[OptionsDefine.Language]
48
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
49
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
50
+ client._sdkVersion += ("_CLI_" + __version__)
51
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
52
+ model = models.TerminateDBInstancesRequest()
53
+ model.from_json_string(json.dumps(args))
54
+ start_time = time.time()
55
+ while True:
56
+ rsp = client.TerminateDBInstances(model)
57
+ result = rsp.to_json_string()
58
+ try:
59
+ json_obj = json.loads(result)
60
+ except TypeError as e:
61
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
62
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
63
+ break
64
+ cur_time = time.time()
65
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
66
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
67
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
68
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
69
+ else:
70
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
71
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
72
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
73
+
74
+
75
+ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
76
+ g_param = parse_global_arg(parsed_globals)
77
+
78
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
79
+ cred = credential.CVMRoleCredential()
80
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
81
+ cred = credential.STSAssumeRoleCredential(
82
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
83
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
84
+ )
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
89
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
90
+ else:
91
+ cred = credential.Credential(
92
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
93
+ )
94
+ http_profile = HttpProfile(
95
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
96
+ reqMethod="POST",
97
+ endpoint=g_param[OptionsDefine.Endpoint],
98
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
99
+ )
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
101
+ if g_param[OptionsDefine.Language]:
102
+ profile.language = g_param[OptionsDefine.Language]
103
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
104
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
105
+ client._sdkVersion += ("_CLI_" + __version__)
106
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
107
+ model = models.DescribeDBInstanceNodePropertyRequest()
108
+ model.from_json_string(json.dumps(args))
109
+ start_time = time.time()
110
+ while True:
111
+ rsp = client.DescribeDBInstanceNodeProperty(model)
112
+ result = rsp.to_json_string()
113
+ try:
114
+ json_obj = json.loads(result)
115
+ except TypeError as e:
116
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
117
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
118
+ break
119
+ cur_time = time.time()
120
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
121
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
122
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
123
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
124
+ else:
125
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
126
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
127
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
128
+
129
+
20
130
  def doDescribeDBInstanceDeal(args, parsed_globals):
21
131
  g_param = parse_global_arg(parsed_globals)
22
132
 
@@ -27,7 +137,10 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
27
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
139
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
145
  else:
33
146
  cred = credential.Credential(
@@ -39,7 +152,7 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
39
152
  endpoint=g_param[OptionsDefine.Endpoint],
40
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
154
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
156
  if g_param[OptionsDefine.Language]:
44
157
  profile.language = g_param[OptionsDefine.Language]
45
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +192,10 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
79
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
194
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
200
  else:
85
201
  cred = credential.Credential(
@@ -91,7 +207,7 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
91
207
  endpoint=g_param[OptionsDefine.Endpoint],
92
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
209
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
211
  if g_param[OptionsDefine.Language]:
96
212
  profile.language = g_param[OptionsDefine.Language]
97
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +247,10 @@ def doDescribeClientConnections(args, parsed_globals):
131
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
249
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
255
  else:
137
256
  cred = credential.Credential(
@@ -143,7 +262,7 @@ def doDescribeClientConnections(args, parsed_globals):
143
262
  endpoint=g_param[OptionsDefine.Endpoint],
144
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
264
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
266
  if g_param[OptionsDefine.Language]:
148
267
  profile.language = g_param[OptionsDefine.Language]
149
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +302,10 @@ def doResetDBInstancePassword(args, parsed_globals):
183
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
304
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
310
  else:
189
311
  cred = credential.Credential(
@@ -195,7 +317,7 @@ def doResetDBInstancePassword(args, parsed_globals):
195
317
  endpoint=g_param[OptionsDefine.Endpoint],
196
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
319
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
321
  if g_param[OptionsDefine.Language]:
200
322
  profile.language = g_param[OptionsDefine.Language]
201
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +357,10 @@ def doDescribeSecurityGroup(args, parsed_globals):
235
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
359
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
365
  else:
241
366
  cred = credential.Credential(
@@ -247,7 +372,7 @@ def doDescribeSecurityGroup(args, parsed_globals):
247
372
  endpoint=g_param[OptionsDefine.Endpoint],
248
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
374
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
376
  if g_param[OptionsDefine.Language]:
252
377
  profile.language = g_param[OptionsDefine.Language]
253
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +412,10 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
287
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
414
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
420
  else:
293
421
  cred = credential.Credential(
@@ -299,7 +427,7 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
299
427
  endpoint=g_param[OptionsDefine.Endpoint],
300
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
429
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
431
  if g_param[OptionsDefine.Language]:
304
432
  profile.language = g_param[OptionsDefine.Language]
305
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +467,10 @@ def doDescribeDBBackups(args, parsed_globals):
339
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
469
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
475
  else:
345
476
  cred = credential.Credential(
@@ -351,7 +482,7 @@ def doDescribeDBBackups(args, parsed_globals):
351
482
  endpoint=g_param[OptionsDefine.Endpoint],
352
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
484
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
486
  if g_param[OptionsDefine.Language]:
356
487
  profile.language = g_param[OptionsDefine.Language]
357
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +522,10 @@ def doIsolateDBInstance(args, parsed_globals):
391
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
524
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
530
  else:
397
531
  cred = credential.Credential(
@@ -403,7 +537,7 @@ def doIsolateDBInstance(args, parsed_globals):
403
537
  endpoint=g_param[OptionsDefine.Endpoint],
404
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
539
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
541
  if g_param[OptionsDefine.Language]:
408
542
  profile.language = g_param[OptionsDefine.Language]
409
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +577,10 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
443
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
579
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
585
  else:
449
586
  cred = credential.Credential(
@@ -455,7 +592,7 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
455
592
  endpoint=g_param[OptionsDefine.Endpoint],
456
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
594
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
596
  if g_param[OptionsDefine.Language]:
460
597
  profile.language = g_param[OptionsDefine.Language]
461
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +632,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
495
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
634
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
640
  else:
501
641
  cred = credential.Credential(
@@ -507,7 +647,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
507
647
  endpoint=g_param[OptionsDefine.Endpoint],
508
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
649
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
651
  if g_param[OptionsDefine.Language]:
512
652
  profile.language = g_param[OptionsDefine.Language]
513
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +687,10 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
547
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
689
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
695
  else:
553
696
  cred = credential.Credential(
@@ -559,7 +702,7 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
559
702
  endpoint=g_param[OptionsDefine.Endpoint],
560
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
704
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
706
  if g_param[OptionsDefine.Language]:
564
707
  profile.language = g_param[OptionsDefine.Language]
565
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +742,10 @@ def doCreateDBInstanceHour(args, parsed_globals):
599
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
744
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
750
  else:
605
751
  cred = credential.Credential(
@@ -611,7 +757,7 @@ def doCreateDBInstanceHour(args, parsed_globals):
611
757
  endpoint=g_param[OptionsDefine.Endpoint],
612
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
759
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
761
  if g_param[OptionsDefine.Language]:
616
762
  profile.language = g_param[OptionsDefine.Language]
617
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -641,6 +787,61 @@ def doCreateDBInstanceHour(args, parsed_globals):
641
787
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
788
 
643
789
 
790
+ def doDescribeDetailedSlowLogs(args, parsed_globals):
791
+ g_param = parse_global_arg(parsed_globals)
792
+
793
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
794
+ cred = credential.CVMRoleCredential()
795
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
796
+ cred = credential.STSAssumeRoleCredential(
797
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
798
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
799
+ )
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
804
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
805
+ else:
806
+ cred = credential.Credential(
807
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
808
+ )
809
+ http_profile = HttpProfile(
810
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
811
+ reqMethod="POST",
812
+ endpoint=g_param[OptionsDefine.Endpoint],
813
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
814
+ )
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
816
+ if g_param[OptionsDefine.Language]:
817
+ profile.language = g_param[OptionsDefine.Language]
818
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
819
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
820
+ client._sdkVersion += ("_CLI_" + __version__)
821
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
822
+ model = models.DescribeDetailedSlowLogsRequest()
823
+ model.from_json_string(json.dumps(args))
824
+ start_time = time.time()
825
+ while True:
826
+ rsp = client.DescribeDetailedSlowLogs(model)
827
+ result = rsp.to_json_string()
828
+ try:
829
+ json_obj = json.loads(result)
830
+ except TypeError as e:
831
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
832
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
833
+ break
834
+ cur_time = time.time()
835
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
836
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
837
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
838
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
839
+ else:
840
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
841
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
842
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
843
+
844
+
644
845
  def doCreateBackupDownloadTask(args, parsed_globals):
645
846
  g_param = parse_global_arg(parsed_globals)
646
847
 
@@ -651,7 +852,10 @@ def doCreateBackupDownloadTask(args, parsed_globals):
651
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
854
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
860
  else:
657
861
  cred = credential.Credential(
@@ -663,7 +867,7 @@ def doCreateBackupDownloadTask(args, parsed_globals):
663
867
  endpoint=g_param[OptionsDefine.Endpoint],
664
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
869
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
871
  if g_param[OptionsDefine.Language]:
668
872
  profile.language = g_param[OptionsDefine.Language]
669
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +907,10 @@ def doDescribeDBInstances(args, parsed_globals):
703
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
909
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
915
  else:
709
916
  cred = credential.Credential(
@@ -715,7 +922,7 @@ def doDescribeDBInstances(args, parsed_globals):
715
922
  endpoint=g_param[OptionsDefine.Endpoint],
716
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
924
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
926
  if g_param[OptionsDefine.Language]:
720
927
  profile.language = g_param[OptionsDefine.Language]
721
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +962,10 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
755
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
964
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
970
  else:
761
971
  cred = credential.Credential(
@@ -767,7 +977,7 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
767
977
  endpoint=g_param[OptionsDefine.Endpoint],
768
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
979
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
981
  if g_param[OptionsDefine.Language]:
772
982
  profile.language = g_param[OptionsDefine.Language]
773
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +1017,10 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
807
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
1019
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
1025
  else:
813
1026
  cred = credential.Credential(
@@ -819,7 +1032,7 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
819
1032
  endpoint=g_param[OptionsDefine.Endpoint],
820
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
1034
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
1036
  if g_param[OptionsDefine.Language]:
824
1037
  profile.language = g_param[OptionsDefine.Language]
825
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +1072,10 @@ def doDescribeSlowLogs(args, parsed_globals):
859
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1074
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1080
  else:
865
1081
  cred = credential.Credential(
@@ -871,7 +1087,7 @@ def doDescribeSlowLogs(args, parsed_globals):
871
1087
  endpoint=g_param[OptionsDefine.Endpoint],
872
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
1089
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
1091
  if g_param[OptionsDefine.Language]:
876
1092
  profile.language = g_param[OptionsDefine.Language]
877
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +1127,10 @@ def doCreateDBInstance(args, parsed_globals):
911
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1129
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1135
  else:
917
1136
  cred = credential.Credential(
@@ -923,7 +1142,7 @@ def doCreateDBInstance(args, parsed_globals):
923
1142
  endpoint=g_param[OptionsDefine.Endpoint],
924
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1144
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1146
  if g_param[OptionsDefine.Language]:
928
1147
  profile.language = g_param[OptionsDefine.Language]
929
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -963,7 +1182,10 @@ def doModifyDBInstanceSpec(args, parsed_globals):
963
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1184
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1190
  else:
969
1191
  cred = credential.Credential(
@@ -975,7 +1197,7 @@ def doModifyDBInstanceSpec(args, parsed_globals):
975
1197
  endpoint=g_param[OptionsDefine.Endpoint],
976
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1199
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1201
  if g_param[OptionsDefine.Language]:
980
1202
  profile.language = g_param[OptionsDefine.Language]
981
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1237,10 @@ def doDescribeInstanceParams(args, parsed_globals):
1015
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1239
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1245
  else:
1021
1246
  cred = credential.Credential(
@@ -1027,7 +1252,7 @@ def doDescribeInstanceParams(args, parsed_globals):
1027
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1254
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1256
  if g_param[OptionsDefine.Language]:
1032
1257
  profile.language = g_param[OptionsDefine.Language]
1033
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1067,7 +1292,10 @@ def doDescribeSpecInfo(args, parsed_globals):
1067
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1294
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1300
  else:
1073
1301
  cred = credential.Credential(
@@ -1079,7 +1307,7 @@ def doDescribeSpecInfo(args, parsed_globals):
1079
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1309
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1311
  if g_param[OptionsDefine.Language]:
1084
1312
  profile.language = g_param[OptionsDefine.Language]
1085
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1119,7 +1347,10 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
1119
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1349
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1355
  else:
1125
1356
  cred = credential.Credential(
@@ -1131,7 +1362,7 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
1131
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1364
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1366
  if g_param[OptionsDefine.Language]:
1136
1367
  profile.language = g_param[OptionsDefine.Language]
1137
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1402,10 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
1171
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1404
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1410
  else:
1177
1411
  cred = credential.Credential(
@@ -1183,7 +1417,7 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
1183
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1419
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1421
  if g_param[OptionsDefine.Language]:
1188
1422
  profile.language = g_param[OptionsDefine.Language]
1189
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1213,6 +1447,61 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
1213
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
1448
 
1215
1449
 
1450
+ def doSetDBInstanceDeletionProtection(args, parsed_globals):
1451
+ g_param = parse_global_arg(parsed_globals)
1452
+
1453
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1454
+ cred = credential.CVMRoleCredential()
1455
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1456
+ cred = credential.STSAssumeRoleCredential(
1457
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1458
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1459
+ )
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1464
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1465
+ else:
1466
+ cred = credential.Credential(
1467
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1468
+ )
1469
+ http_profile = HttpProfile(
1470
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1471
+ reqMethod="POST",
1472
+ endpoint=g_param[OptionsDefine.Endpoint],
1473
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1474
+ )
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1476
+ if g_param[OptionsDefine.Language]:
1477
+ profile.language = g_param[OptionsDefine.Language]
1478
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1479
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1480
+ client._sdkVersion += ("_CLI_" + __version__)
1481
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1482
+ model = models.SetDBInstanceDeletionProtectionRequest()
1483
+ model.from_json_string(json.dumps(args))
1484
+ start_time = time.time()
1485
+ while True:
1486
+ rsp = client.SetDBInstanceDeletionProtection(model)
1487
+ result = rsp.to_json_string()
1488
+ try:
1489
+ json_obj = json.loads(result)
1490
+ except TypeError as e:
1491
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1492
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1493
+ break
1494
+ cur_time = time.time()
1495
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1496
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1497
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1498
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1499
+ else:
1500
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1501
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1502
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1503
+
1504
+
1216
1505
  def doAssignProject(args, parsed_globals):
1217
1506
  g_param = parse_global_arg(parsed_globals)
1218
1507
 
@@ -1223,7 +1512,10 @@ def doAssignProject(args, parsed_globals):
1223
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1514
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1520
  else:
1229
1521
  cred = credential.Credential(
@@ -1235,7 +1527,7 @@ def doAssignProject(args, parsed_globals):
1235
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1529
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1531
  if g_param[OptionsDefine.Language]:
1240
1532
  profile.language = g_param[OptionsDefine.Language]
1241
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1567,10 @@ def doRenameInstance(args, parsed_globals):
1275
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1569
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1575
  else:
1281
1576
  cred = credential.Credential(
@@ -1287,7 +1582,7 @@ def doRenameInstance(args, parsed_globals):
1287
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1584
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1586
  if g_param[OptionsDefine.Language]:
1292
1587
  profile.language = g_param[OptionsDefine.Language]
1293
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1327,7 +1622,10 @@ def doRenewDBInstances(args, parsed_globals):
1327
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1624
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1630
  else:
1333
1631
  cred = credential.Credential(
@@ -1339,7 +1637,7 @@ def doRenewDBInstances(args, parsed_globals):
1339
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1639
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1641
  if g_param[OptionsDefine.Language]:
1344
1642
  profile.language = g_param[OptionsDefine.Language]
1345
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1677,10 @@ def doCreateBackupDBInstance(args, parsed_globals):
1379
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1679
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1685
  else:
1385
1686
  cred = credential.Credential(
@@ -1391,7 +1692,7 @@ def doCreateBackupDBInstance(args, parsed_globals):
1391
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1694
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1696
  if g_param[OptionsDefine.Language]:
1396
1697
  profile.language = g_param[OptionsDefine.Language]
1397
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1732,10 @@ def doInquirePriceRenewDBInstances(args, parsed_globals):
1431
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1734
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1740
  else:
1437
1741
  cred = credential.Credential(
@@ -1443,7 +1747,7 @@ def doInquirePriceRenewDBInstances(args, parsed_globals):
1443
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1749
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1751
  if g_param[OptionsDefine.Language]:
1448
1752
  profile.language = g_param[OptionsDefine.Language]
1449
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1787,10 @@ def doModifyDBInstanceSecurityGroup(args, parsed_globals):
1483
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1789
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1795
  else:
1489
1796
  cred = credential.Credential(
@@ -1495,7 +1802,7 @@ def doModifyDBInstanceSecurityGroup(args, parsed_globals):
1495
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1804
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1806
  if g_param[OptionsDefine.Language]:
1500
1807
  profile.language = g_param[OptionsDefine.Language]
1501
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1536,6 +1843,8 @@ MODELS_MAP = {
1536
1843
  }
1537
1844
 
1538
1845
  ACTION_MAP = {
1846
+ "TerminateDBInstances": doTerminateDBInstances,
1847
+ "DescribeDBInstanceNodeProperty": doDescribeDBInstanceNodeProperty,
1539
1848
  "DescribeDBInstanceDeal": doDescribeDBInstanceDeal,
1540
1849
  "DescribeDBInstanceNamespace": doDescribeDBInstanceNamespace,
1541
1850
  "DescribeClientConnections": doDescribeClientConnections,
@@ -1548,6 +1857,7 @@ ACTION_MAP = {
1548
1857
  "DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
1549
1858
  "ModifyDBInstanceNetworkAddress": doModifyDBInstanceNetworkAddress,
1550
1859
  "CreateDBInstanceHour": doCreateDBInstanceHour,
1860
+ "DescribeDetailedSlowLogs": doDescribeDetailedSlowLogs,
1551
1861
  "CreateBackupDownloadTask": doCreateBackupDownloadTask,
1552
1862
  "DescribeDBInstances": doDescribeDBInstances,
1553
1863
  "OfflineIsolatedDBInstance": doOfflineIsolatedDBInstance,
@@ -1559,6 +1869,7 @@ ACTION_MAP = {
1559
1869
  "DescribeSpecInfo": doDescribeSpecInfo,
1560
1870
  "DescribeBackupDownloadTask": doDescribeBackupDownloadTask,
1561
1871
  "InquirePriceCreateDBInstances": doInquirePriceCreateDBInstances,
1872
+ "SetDBInstanceDeletionProtection": doSetDBInstanceDeletionProtection,
1562
1873
  "AssignProject": doAssignProject,
1563
1874
  "RenameInstance": doRenameInstance,
1564
1875
  "RenewDBInstances": doRenewDBInstances,