tccli-intl-en 3.0.1268.1__py2.py3-none-any.whl → 3.0.1269.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +3 -0
- tccli/services/cvm/v20170312/api.json +43 -33
- tccli/services/cvm/v20170312/examples.json +12 -12
- tccli/services/dlc/dlc_client.py +114 -8
- tccli/services/dlc/v20210125/api.json +252 -7
- tccli/services/dlc/v20210125/examples.json +16 -0
- tccli/services/faceid/v20180301/examples.json +1 -1
- tccli/services/mdl/v20200326/api.json +41 -11
- tccli/services/mdl/v20200326/examples.json +16 -16
- tccli/services/mdp/v20200527/api.json +60 -14
- tccli/services/mdp/v20200527/examples.json +79 -79
- tccli/services/message/__init__.py +4 -0
- tccli/services/message/message_client.py +207 -0
- tccli/services/message/v20181225/api.json +72 -0
- tccli/services/message/v20181225/examples.json +13 -0
- tccli/services/teo/v20220901/api.json +3 -3
- {tccli_intl_en-3.0.1268.1.dist-info → tccli_intl_en-3.0.1269.1.dist-info}/METADATA +2 -2
- {tccli_intl_en-3.0.1268.1.dist-info → tccli_intl_en-3.0.1269.1.dist-info}/RECORD +23 -19
- {tccli_intl_en-3.0.1268.1.dist-info → tccli_intl_en-3.0.1269.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1268.1.dist-info → tccli_intl_en-3.0.1269.1.dist-info}/WHEEL +0 -0
- {tccli_intl_en-3.0.1268.1.dist-info → tccli_intl_en-3.0.1269.1.dist-info}/entry_points.txt +0 -0
- {tccli_intl_en-3.0.1268.1.dist-info → tccli_intl_en-3.0.1269.1.dist-info}/top_level.txt +0 -0
tccli/services/dlc/dlc_client.py
CHANGED
|
@@ -2721,7 +2721,7 @@ def doAttachUserPolicy(args, parsed_globals):
|
|
|
2721
2721
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2722
2722
|
|
|
2723
2723
|
|
|
2724
|
-
def
|
|
2724
|
+
def doModifyGovernEventRule(args, parsed_globals):
|
|
2725
2725
|
g_param = parse_global_arg(parsed_globals)
|
|
2726
2726
|
|
|
2727
2727
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2750,11 +2750,11 @@ def doCopyDLCTable(args, parsed_globals):
|
|
|
2750
2750
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2751
2751
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2752
2752
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2753
|
-
model = models.
|
|
2753
|
+
model = models.ModifyGovernEventRuleRequest()
|
|
2754
2754
|
model.from_json_string(json.dumps(args))
|
|
2755
2755
|
start_time = time.time()
|
|
2756
2756
|
while True:
|
|
2757
|
-
rsp = client.
|
|
2757
|
+
rsp = client.ModifyGovernEventRule(model)
|
|
2758
2758
|
result = rsp.to_json_string()
|
|
2759
2759
|
try:
|
|
2760
2760
|
json_obj = json.loads(result)
|
|
@@ -4333,7 +4333,7 @@ def doQueryResult(args, parsed_globals):
|
|
|
4333
4333
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4334
4334
|
|
|
4335
4335
|
|
|
4336
|
-
def
|
|
4336
|
+
def doCopyDLCTable(args, parsed_globals):
|
|
4337
4337
|
g_param = parse_global_arg(parsed_globals)
|
|
4338
4338
|
|
|
4339
4339
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4362,11 +4362,11 @@ def doModifyGovernEventRule(args, parsed_globals):
|
|
|
4362
4362
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4363
4363
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4364
4364
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4365
|
-
model = models.
|
|
4365
|
+
model = models.CopyDLCTableRequest()
|
|
4366
4366
|
model.from_json_string(json.dumps(args))
|
|
4367
4367
|
start_time = time.time()
|
|
4368
4368
|
while True:
|
|
4369
|
-
rsp = client.
|
|
4369
|
+
rsp = client.CopyDLCTable(model)
|
|
4370
4370
|
result = rsp.to_json_string()
|
|
4371
4371
|
try:
|
|
4372
4372
|
json_obj = json.loads(result)
|
|
@@ -4749,6 +4749,58 @@ def doRestartDataEngine(args, parsed_globals):
|
|
|
4749
4749
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4750
4750
|
|
|
4751
4751
|
|
|
4752
|
+
def doAttachDataMaskPolicy(args, parsed_globals):
|
|
4753
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4754
|
+
|
|
4755
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4756
|
+
cred = credential.CVMRoleCredential()
|
|
4757
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4758
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4759
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
|
+
)
|
|
4762
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4763
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4764
|
+
else:
|
|
4765
|
+
cred = credential.Credential(
|
|
4766
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4767
|
+
)
|
|
4768
|
+
http_profile = HttpProfile(
|
|
4769
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4770
|
+
reqMethod="POST",
|
|
4771
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4772
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4773
|
+
)
|
|
4774
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
4775
|
+
if g_param[OptionsDefine.Language]:
|
|
4776
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4777
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4778
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4779
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4780
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4781
|
+
model = models.AttachDataMaskPolicyRequest()
|
|
4782
|
+
model.from_json_string(json.dumps(args))
|
|
4783
|
+
start_time = time.time()
|
|
4784
|
+
while True:
|
|
4785
|
+
rsp = client.AttachDataMaskPolicy(model)
|
|
4786
|
+
result = rsp.to_json_string()
|
|
4787
|
+
try:
|
|
4788
|
+
json_obj = json.loads(result)
|
|
4789
|
+
except TypeError as e:
|
|
4790
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4791
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4792
|
+
break
|
|
4793
|
+
cur_time = time.time()
|
|
4794
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4795
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4796
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4797
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4798
|
+
else:
|
|
4799
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4800
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4801
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4802
|
+
|
|
4803
|
+
|
|
4752
4804
|
def doRenewDataEngine(args, parsed_globals):
|
|
4753
4805
|
g_param = parse_global_arg(parsed_globals)
|
|
4754
4806
|
|
|
@@ -5165,6 +5217,58 @@ def doDropDMSTable(args, parsed_globals):
|
|
|
5165
5217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5166
5218
|
|
|
5167
5219
|
|
|
5220
|
+
def doCreateDataMaskStrategy(args, parsed_globals):
|
|
5221
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5222
|
+
|
|
5223
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5224
|
+
cred = credential.CVMRoleCredential()
|
|
5225
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5226
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5228
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5229
|
+
)
|
|
5230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5231
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5232
|
+
else:
|
|
5233
|
+
cred = credential.Credential(
|
|
5234
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5235
|
+
)
|
|
5236
|
+
http_profile = HttpProfile(
|
|
5237
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5238
|
+
reqMethod="POST",
|
|
5239
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5240
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5241
|
+
)
|
|
5242
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
5243
|
+
if g_param[OptionsDefine.Language]:
|
|
5244
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5245
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5246
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5247
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5248
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5249
|
+
model = models.CreateDataMaskStrategyRequest()
|
|
5250
|
+
model.from_json_string(json.dumps(args))
|
|
5251
|
+
start_time = time.time()
|
|
5252
|
+
while True:
|
|
5253
|
+
rsp = client.CreateDataMaskStrategy(model)
|
|
5254
|
+
result = rsp.to_json_string()
|
|
5255
|
+
try:
|
|
5256
|
+
json_obj = json.loads(result)
|
|
5257
|
+
except TypeError as e:
|
|
5258
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5259
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5260
|
+
break
|
|
5261
|
+
cur_time = time.time()
|
|
5262
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5263
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5264
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5265
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5266
|
+
else:
|
|
5267
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5268
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5269
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5270
|
+
|
|
5271
|
+
|
|
5168
5272
|
def doDescribeStoreLocation(args, parsed_globals):
|
|
5169
5273
|
g_param = parse_global_arg(parsed_globals)
|
|
5170
5274
|
|
|
@@ -5488,7 +5592,7 @@ ACTION_MAP = {
|
|
|
5488
5592
|
"SuspendResumeDataEngine": doSuspendResumeDataEngine,
|
|
5489
5593
|
"CreateDMSDatabase": doCreateDMSDatabase,
|
|
5490
5594
|
"AttachUserPolicy": doAttachUserPolicy,
|
|
5491
|
-
"
|
|
5595
|
+
"ModifyGovernEventRule": doModifyGovernEventRule,
|
|
5492
5596
|
"CreateResultDownload": doCreateResultDownload,
|
|
5493
5597
|
"ModifyAdvancedStoreLocation": doModifyAdvancedStoreLocation,
|
|
5494
5598
|
"AlterDMSDatabase": doAlterDMSDatabase,
|
|
@@ -5519,7 +5623,7 @@ ACTION_MAP = {
|
|
|
5519
5623
|
"DetachUserPolicy": doDetachUserPolicy,
|
|
5520
5624
|
"DetachWorkGroupPolicy": doDetachWorkGroupPolicy,
|
|
5521
5625
|
"QueryResult": doQueryResult,
|
|
5522
|
-
"
|
|
5626
|
+
"CopyDLCTable": doCopyDLCTable,
|
|
5523
5627
|
"DescribeJobs": doDescribeJobs,
|
|
5524
5628
|
"RegisterThirdPartyAccessUser": doRegisterThirdPartyAccessUser,
|
|
5525
5629
|
"DeleteUsersFromWorkGroup": doDeleteUsersFromWorkGroup,
|
|
@@ -5527,6 +5631,7 @@ ACTION_MAP = {
|
|
|
5527
5631
|
"UnbindWorkGroupsFromUser": doUnbindWorkGroupsFromUser,
|
|
5528
5632
|
"DescribeWorkGroups": doDescribeWorkGroups,
|
|
5529
5633
|
"RestartDataEngine": doRestartDataEngine,
|
|
5634
|
+
"AttachDataMaskPolicy": doAttachDataMaskPolicy,
|
|
5530
5635
|
"RenewDataEngine": doRenewDataEngine,
|
|
5531
5636
|
"DeleteThirdPartyAccessUser": doDeleteThirdPartyAccessUser,
|
|
5532
5637
|
"DescribeDMSDatabase": doDescribeDMSDatabase,
|
|
@@ -5535,6 +5640,7 @@ ACTION_MAP = {
|
|
|
5535
5640
|
"ModifyUser": doModifyUser,
|
|
5536
5641
|
"ModifyDataEngineDescription": doModifyDataEngineDescription,
|
|
5537
5642
|
"DropDMSTable": doDropDMSTable,
|
|
5643
|
+
"CreateDataMaskStrategy": doCreateDataMaskStrategy,
|
|
5538
5644
|
"DescribeStoreLocation": doDescribeStoreLocation,
|
|
5539
5645
|
"DescribeSparkAppJob": doDescribeSparkAppJob,
|
|
5540
5646
|
"CreateDataEngine": doCreateDataEngine,
|
|
@@ -14,6 +14,13 @@
|
|
|
14
14
|
"output": "AlterDMSDatabaseResponse",
|
|
15
15
|
"status": "online"
|
|
16
16
|
},
|
|
17
|
+
"AttachDataMaskPolicy": {
|
|
18
|
+
"document": "This API is used to bind a DMask policy.",
|
|
19
|
+
"input": "AttachDataMaskPolicyRequest",
|
|
20
|
+
"name": "Bind a DMask policy",
|
|
21
|
+
"output": "AttachDataMaskPolicyResponse",
|
|
22
|
+
"status": "online"
|
|
23
|
+
},
|
|
17
24
|
"AttachUserPolicy": {
|
|
18
25
|
"document": "This API is used to bind the authentication policy to the user.",
|
|
19
26
|
"input": "AttachUserPolicyRequest",
|
|
@@ -112,6 +119,13 @@
|
|
|
112
119
|
"output": "CreateDataEngineResponse",
|
|
113
120
|
"status": "online"
|
|
114
121
|
},
|
|
122
|
+
"CreateDataMaskStrategy": {
|
|
123
|
+
"document": "This API is used to create a DMask policy.",
|
|
124
|
+
"input": "CreateDataMaskStrategyRequest",
|
|
125
|
+
"name": "Creates a DMask policy",
|
|
126
|
+
"output": "CreateDataMaskStrategyResponse",
|
|
127
|
+
"status": "online"
|
|
128
|
+
},
|
|
115
129
|
"CreateInternalTable": {
|
|
116
130
|
"document": "This API is used to create a managed internal table. It has been disused.",
|
|
117
131
|
"input": "CreateInternalTableRequest",
|
|
@@ -990,6 +1004,33 @@
|
|
|
990
1004
|
],
|
|
991
1005
|
"usage": "both"
|
|
992
1006
|
},
|
|
1007
|
+
"AttachDataMaskPolicyRequest": {
|
|
1008
|
+
"document": "AttachDataMaskPolicy request structure.",
|
|
1009
|
+
"members": [
|
|
1010
|
+
{
|
|
1011
|
+
"disabled": false,
|
|
1012
|
+
"document": "Collection of DMask permission objects that should be bound.",
|
|
1013
|
+
"example": "无",
|
|
1014
|
+
"member": "DataMaskStrategyPolicy",
|
|
1015
|
+
"name": "DataMaskStrategyPolicySet",
|
|
1016
|
+
"required": false,
|
|
1017
|
+
"type": "list"
|
|
1018
|
+
}
|
|
1019
|
+
],
|
|
1020
|
+
"type": "object"
|
|
1021
|
+
},
|
|
1022
|
+
"AttachDataMaskPolicyResponse": {
|
|
1023
|
+
"document": "AttachDataMaskPolicy response structure.",
|
|
1024
|
+
"members": [
|
|
1025
|
+
{
|
|
1026
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
1027
|
+
"member": "string",
|
|
1028
|
+
"name": "RequestId",
|
|
1029
|
+
"type": "string"
|
|
1030
|
+
}
|
|
1031
|
+
],
|
|
1032
|
+
"type": "object"
|
|
1033
|
+
},
|
|
993
1034
|
"AttachUserPolicyRequest": {
|
|
994
1035
|
"document": "AttachUserPolicy request structure.",
|
|
995
1036
|
"members": [
|
|
@@ -2350,6 +2391,43 @@
|
|
|
2350
2391
|
],
|
|
2351
2392
|
"type": "object"
|
|
2352
2393
|
},
|
|
2394
|
+
"CreateDataMaskStrategyRequest": {
|
|
2395
|
+
"document": "CreateDataMaskStrategy request structure.",
|
|
2396
|
+
"members": [
|
|
2397
|
+
{
|
|
2398
|
+
"disabled": false,
|
|
2399
|
+
"document": "Masking policy description.",
|
|
2400
|
+
"example": "无",
|
|
2401
|
+
"member": "DataMaskStrategyInfo",
|
|
2402
|
+
"name": "Strategy",
|
|
2403
|
+
"required": false,
|
|
2404
|
+
"type": "object"
|
|
2405
|
+
}
|
|
2406
|
+
],
|
|
2407
|
+
"type": "object"
|
|
2408
|
+
},
|
|
2409
|
+
"CreateDataMaskStrategyResponse": {
|
|
2410
|
+
"document": "CreateDataMaskStrategy response structure.",
|
|
2411
|
+
"members": [
|
|
2412
|
+
{
|
|
2413
|
+
"disabled": false,
|
|
2414
|
+
"document": "Policy ID",
|
|
2415
|
+
"example": "71a88499-266f-4b24-9944-2d80078ec0a6",
|
|
2416
|
+
"member": "string",
|
|
2417
|
+
"name": "StrategyId",
|
|
2418
|
+
"output_required": false,
|
|
2419
|
+
"type": "string",
|
|
2420
|
+
"value_allowed_null": false
|
|
2421
|
+
},
|
|
2422
|
+
{
|
|
2423
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
2424
|
+
"member": "string",
|
|
2425
|
+
"name": "RequestId",
|
|
2426
|
+
"type": "string"
|
|
2427
|
+
}
|
|
2428
|
+
],
|
|
2429
|
+
"type": "object"
|
|
2430
|
+
},
|
|
2353
2431
|
"CreateInternalTableRequest": {
|
|
2354
2432
|
"document": "CreateInternalTable request structure.",
|
|
2355
2433
|
"members": [
|
|
@@ -4912,6 +4990,117 @@
|
|
|
4912
4990
|
],
|
|
4913
4991
|
"usage": "both"
|
|
4914
4992
|
},
|
|
4993
|
+
"DataMaskStrategyInfo": {
|
|
4994
|
+
"document": "DMask policy information.",
|
|
4995
|
+
"members": [
|
|
4996
|
+
{
|
|
4997
|
+
"disabled": false,
|
|
4998
|
+
"document": "Policy name",
|
|
4999
|
+
"example": "策略1",
|
|
5000
|
+
"member": "string",
|
|
5001
|
+
"name": "StrategyName",
|
|
5002
|
+
"output_required": false,
|
|
5003
|
+
"required": false,
|
|
5004
|
+
"type": "string",
|
|
5005
|
+
"value_allowed_null": false
|
|
5006
|
+
},
|
|
5007
|
+
{
|
|
5008
|
+
"disabled": false,
|
|
5009
|
+
"document": "MASK_SHOW_FIRST_4, MASK_SHOW_LAST_4, MASK_HASH, MASK_DATE_SHOW_YEAR, MASK_NULL, MASK_DEFAULT.",
|
|
5010
|
+
"example": "MASK_SHOW_FIRST_4",
|
|
5011
|
+
"member": "string",
|
|
5012
|
+
"name": "StrategyType",
|
|
5013
|
+
"output_required": false,
|
|
5014
|
+
"required": false,
|
|
5015
|
+
"type": "string",
|
|
5016
|
+
"value_allowed_null": false
|
|
5017
|
+
},
|
|
5018
|
+
{
|
|
5019
|
+
"disabled": false,
|
|
5020
|
+
"document": "Policy description",
|
|
5021
|
+
"example": "for testing purpose",
|
|
5022
|
+
"member": "string",
|
|
5023
|
+
"name": "StrategyDesc",
|
|
5024
|
+
"output_required": false,
|
|
5025
|
+
"required": false,
|
|
5026
|
+
"type": "string",
|
|
5027
|
+
"value_allowed_null": false
|
|
5028
|
+
},
|
|
5029
|
+
{
|
|
5030
|
+
"disabled": false,
|
|
5031
|
+
"document": "User group policy list.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
5032
|
+
"example": "无",
|
|
5033
|
+
"member": "GroupInfo",
|
|
5034
|
+
"name": "Groups",
|
|
5035
|
+
"output_required": false,
|
|
5036
|
+
"required": false,
|
|
5037
|
+
"type": "list",
|
|
5038
|
+
"value_allowed_null": true
|
|
5039
|
+
},
|
|
5040
|
+
{
|
|
5041
|
+
"disabled": false,
|
|
5042
|
+
"document": "User sub-account uin list, concatenated by ;.",
|
|
5043
|
+
"example": "12312314112;1231231231",
|
|
5044
|
+
"member": "string",
|
|
5045
|
+
"name": "Users",
|
|
5046
|
+
"output_required": false,
|
|
5047
|
+
"required": false,
|
|
5048
|
+
"type": "string",
|
|
5049
|
+
"value_allowed_null": false
|
|
5050
|
+
},
|
|
5051
|
+
{
|
|
5052
|
+
"disabled": false,
|
|
5053
|
+
"document": "Policy ID",
|
|
5054
|
+
"example": "1",
|
|
5055
|
+
"member": "string",
|
|
5056
|
+
"name": "StrategyId",
|
|
5057
|
+
"output_required": false,
|
|
5058
|
+
"required": false,
|
|
5059
|
+
"type": "string",
|
|
5060
|
+
"value_allowed_null": false
|
|
5061
|
+
}
|
|
5062
|
+
],
|
|
5063
|
+
"usage": "both"
|
|
5064
|
+
},
|
|
5065
|
+
"DataMaskStrategyPolicy": {
|
|
5066
|
+
"document": "Masking policy permission object.",
|
|
5067
|
+
"members": [
|
|
5068
|
+
{
|
|
5069
|
+
"disabled": false,
|
|
5070
|
+
"document": "Masking permission object.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
5071
|
+
"example": "无",
|
|
5072
|
+
"member": "Policy",
|
|
5073
|
+
"name": "PolicyInfo",
|
|
5074
|
+
"output_required": false,
|
|
5075
|
+
"required": false,
|
|
5076
|
+
"type": "object",
|
|
5077
|
+
"value_allowed_null": true
|
|
5078
|
+
},
|
|
5079
|
+
{
|
|
5080
|
+
"disabled": false,
|
|
5081
|
+
"document": "Masking policy ID. specifies the ID of the data masking policy.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
5082
|
+
"example": "1123-12a-31231",
|
|
5083
|
+
"member": "string",
|
|
5084
|
+
"name": "DataMaskStrategyId",
|
|
5085
|
+
"output_required": false,
|
|
5086
|
+
"required": false,
|
|
5087
|
+
"type": "string",
|
|
5088
|
+
"value_allowed_null": true
|
|
5089
|
+
},
|
|
5090
|
+
{
|
|
5091
|
+
"disabled": false,
|
|
5092
|
+
"document": "Bound field type.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
5093
|
+
"example": "int",
|
|
5094
|
+
"member": "string",
|
|
5095
|
+
"name": "ColumnType",
|
|
5096
|
+
"output_required": false,
|
|
5097
|
+
"required": false,
|
|
5098
|
+
"type": "string",
|
|
5099
|
+
"value_allowed_null": true
|
|
5100
|
+
}
|
|
5101
|
+
],
|
|
5102
|
+
"usage": "both"
|
|
5103
|
+
},
|
|
4915
5104
|
"DeleteCHDFSBindingProductRequest": {
|
|
4916
5105
|
"document": "DeleteCHDFSBindingProduct request structure.",
|
|
4917
5106
|
"members": [
|
|
@@ -8406,6 +8595,34 @@
|
|
|
8406
8595
|
],
|
|
8407
8596
|
"type": "object"
|
|
8408
8597
|
},
|
|
8598
|
+
"GroupInfo": {
|
|
8599
|
+
"document": "DMask user group information.",
|
|
8600
|
+
"members": [
|
|
8601
|
+
{
|
|
8602
|
+
"disabled": false,
|
|
8603
|
+
"document": "User group ID.",
|
|
8604
|
+
"example": "212123",
|
|
8605
|
+
"member": "int64",
|
|
8606
|
+
"name": "WorkGroupId",
|
|
8607
|
+
"output_required": true,
|
|
8608
|
+
"required": false,
|
|
8609
|
+
"type": "int",
|
|
8610
|
+
"value_allowed_null": false
|
|
8611
|
+
},
|
|
8612
|
+
{
|
|
8613
|
+
"disabled": false,
|
|
8614
|
+
"document": "Policy type.",
|
|
8615
|
+
"example": "MASK_SHOW_FIRST_4; MASK_SHOW_LAST_4;MASK_HASH; MASK_DATE_SHOW_YEAR; MASK_NULL; MASK_DEFAULT 等",
|
|
8616
|
+
"member": "string",
|
|
8617
|
+
"name": "StrategyType",
|
|
8618
|
+
"output_required": true,
|
|
8619
|
+
"required": false,
|
|
8620
|
+
"type": "string",
|
|
8621
|
+
"value_allowed_null": false
|
|
8622
|
+
}
|
|
8623
|
+
],
|
|
8624
|
+
"usage": "both"
|
|
8625
|
+
},
|
|
8409
8626
|
"JobResponseInfo": {
|
|
8410
8627
|
"document": "Job information",
|
|
8411
8628
|
"members": [
|
|
@@ -9512,30 +9729,33 @@
|
|
|
9512
9729
|
"members": [
|
|
9513
9730
|
{
|
|
9514
9731
|
"disabled": false,
|
|
9515
|
-
"document": "The name
|
|
9732
|
+
"document": "The database name requiring authorization. use * to represent all databases under the current Catalog. for administrator level authorization type, only * is allowed. for data connection level authorization type, leave it blank. for other types, any specified database is allowed.",
|
|
9516
9733
|
"example": "test_database",
|
|
9517
9734
|
"member": "string",
|
|
9518
9735
|
"name": "Database",
|
|
9736
|
+
"output_required": true,
|
|
9519
9737
|
"required": true,
|
|
9520
9738
|
"type": "string",
|
|
9521
9739
|
"value_allowed_null": false
|
|
9522
9740
|
},
|
|
9523
9741
|
{
|
|
9524
9742
|
"disabled": false,
|
|
9525
|
-
"document": "
|
|
9743
|
+
"document": "Specifies the name of the data source requiring authorization. at administrator level, only * is supported (representing all resources at this level). for database-level or data source-level authentication, only COSDataCatalog or * is supported. for table-level authentication, user-defined data sources can be filled. defaults to DataLakeCatalog if left blank. note: if authenticating a user-defined data source, the permissions DLC can manage are a subset of the account provided when the user accesses the data source.",
|
|
9526
9744
|
"example": "DataLakeCatalog",
|
|
9527
9745
|
"member": "string",
|
|
9528
9746
|
"name": "Catalog",
|
|
9747
|
+
"output_required": true,
|
|
9529
9748
|
"required": true,
|
|
9530
9749
|
"type": "string",
|
|
9531
9750
|
"value_allowed_null": false
|
|
9532
9751
|
},
|
|
9533
9752
|
{
|
|
9534
9753
|
"disabled": false,
|
|
9535
|
-
"document": "
|
|
9754
|
+
"document": "Specifies the table name requiring authorization. use * to represent all tables in the current Database. for administrator-level authorization type, only * is allowed. for data connection level or Database-level authorization type, leave it blank. for other types, any specific data table can be specified.",
|
|
9536
9755
|
"example": "test_table",
|
|
9537
9756
|
"member": "string",
|
|
9538
9757
|
"name": "Table",
|
|
9758
|
+
"output_required": true,
|
|
9539
9759
|
"required": true,
|
|
9540
9760
|
"type": "string",
|
|
9541
9761
|
"value_allowed_null": false
|
|
@@ -9546,6 +9766,7 @@
|
|
|
9546
9766
|
"example": "ALL",
|
|
9547
9767
|
"member": "string",
|
|
9548
9768
|
"name": "Operation",
|
|
9769
|
+
"output_required": true,
|
|
9549
9770
|
"required": true,
|
|
9550
9771
|
"type": "string",
|
|
9551
9772
|
"value_allowed_null": false
|
|
@@ -9556,46 +9777,51 @@
|
|
|
9556
9777
|
"example": "ADMIN",
|
|
9557
9778
|
"member": "string",
|
|
9558
9779
|
"name": "PolicyType",
|
|
9780
|
+
"output_required": true,
|
|
9559
9781
|
"required": false,
|
|
9560
9782
|
"type": "string",
|
|
9561
9783
|
"value_allowed_null": false
|
|
9562
9784
|
},
|
|
9563
9785
|
{
|
|
9564
9786
|
"disabled": false,
|
|
9565
|
-
"document": "
|
|
9787
|
+
"document": "Name of the function requiring authorization. use * to represent all functions in the current Catalog. for administrator-level authorization type, only * is allowed. for data connection-level authorization type, leave it blank. for other types, any function can be specified.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
9566
9788
|
"example": "fun1",
|
|
9567
9789
|
"member": "string",
|
|
9568
9790
|
"name": "Function",
|
|
9791
|
+
"output_required": true,
|
|
9569
9792
|
"required": false,
|
|
9570
9793
|
"type": "string",
|
|
9571
9794
|
"value_allowed_null": true
|
|
9572
9795
|
},
|
|
9573
9796
|
{
|
|
9574
9797
|
"disabled": false,
|
|
9575
|
-
"document": "
|
|
9798
|
+
"document": "Authorization is required for the view. fill in * to represent all views under the current Database. when the authorization type is administrator level, only * is allowed. when the authorization type is data connection level or Database level, only blank is allowed. for other types, any view can be specified.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
9576
9799
|
"example": "view1",
|
|
9577
9800
|
"member": "string",
|
|
9578
9801
|
"name": "View",
|
|
9802
|
+
"output_required": true,
|
|
9579
9803
|
"required": false,
|
|
9580
9804
|
"type": "string",
|
|
9581
9805
|
"value_allowed_null": true
|
|
9582
9806
|
},
|
|
9583
9807
|
{
|
|
9584
9808
|
"disabled": false,
|
|
9585
|
-
"document": "
|
|
9809
|
+
"document": "Columns requiring authorization. use * to represent all current columns. when the authorization type is administrator level, only * is allowed.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
9586
9810
|
"example": "column1",
|
|
9587
9811
|
"member": "string",
|
|
9588
9812
|
"name": "Column",
|
|
9813
|
+
"output_required": true,
|
|
9589
9814
|
"required": false,
|
|
9590
9815
|
"type": "string",
|
|
9591
9816
|
"value_allowed_null": true
|
|
9592
9817
|
},
|
|
9593
9818
|
{
|
|
9594
9819
|
"disabled": false,
|
|
9595
|
-
"document": "The
|
|
9820
|
+
"document": "The data engine requiring authorization. use * to represent all current engines. when the authorization type is administrator level, only * is allowed.\nNote: This field may return null, indicating that no valid values can be obtained.",
|
|
9596
9821
|
"example": "dataEngine1",
|
|
9597
9822
|
"member": "string",
|
|
9598
9823
|
"name": "DataEngine",
|
|
9824
|
+
"output_required": true,
|
|
9599
9825
|
"required": false,
|
|
9600
9826
|
"type": "string",
|
|
9601
9827
|
"value_allowed_null": true
|
|
@@ -9606,6 +9832,7 @@
|
|
|
9606
9832
|
"example": "false",
|
|
9607
9833
|
"member": "bool",
|
|
9608
9834
|
"name": "ReAuth",
|
|
9835
|
+
"output_required": true,
|
|
9609
9836
|
"required": false,
|
|
9610
9837
|
"type": "bool",
|
|
9611
9838
|
"value_allowed_null": true
|
|
@@ -9616,6 +9843,7 @@
|
|
|
9616
9843
|
"example": "USER",
|
|
9617
9844
|
"member": "string",
|
|
9618
9845
|
"name": "Source",
|
|
9846
|
+
"output_required": true,
|
|
9619
9847
|
"required": false,
|
|
9620
9848
|
"type": "string",
|
|
9621
9849
|
"value_allowed_null": true
|
|
@@ -9626,6 +9854,7 @@
|
|
|
9626
9854
|
"example": "COMMON",
|
|
9627
9855
|
"member": "string",
|
|
9628
9856
|
"name": "Mode",
|
|
9857
|
+
"output_required": true,
|
|
9629
9858
|
"required": false,
|
|
9630
9859
|
"type": "string",
|
|
9631
9860
|
"value_allowed_null": true
|
|
@@ -9636,6 +9865,7 @@
|
|
|
9636
9865
|
"example": "12345678",
|
|
9637
9866
|
"member": "string",
|
|
9638
9867
|
"name": "Operator",
|
|
9868
|
+
"output_required": true,
|
|
9639
9869
|
"required": false,
|
|
9640
9870
|
"type": "string",
|
|
9641
9871
|
"value_allowed_null": true
|
|
@@ -9646,6 +9876,7 @@
|
|
|
9646
9876
|
"example": "2021-07-28 16:19:32",
|
|
9647
9877
|
"member": "string",
|
|
9648
9878
|
"name": "CreateTime",
|
|
9879
|
+
"output_required": true,
|
|
9649
9880
|
"required": false,
|
|
9650
9881
|
"type": "string",
|
|
9651
9882
|
"value_allowed_null": true
|
|
@@ -9656,6 +9887,7 @@
|
|
|
9656
9887
|
"example": "1",
|
|
9657
9888
|
"member": "int64",
|
|
9658
9889
|
"name": "SourceId",
|
|
9890
|
+
"output_required": true,
|
|
9659
9891
|
"required": false,
|
|
9660
9892
|
"type": "int",
|
|
9661
9893
|
"value_allowed_null": true
|
|
@@ -9666,6 +9898,7 @@
|
|
|
9666
9898
|
"example": "test_group",
|
|
9667
9899
|
"member": "string",
|
|
9668
9900
|
"name": "SourceName",
|
|
9901
|
+
"output_required": true,
|
|
9669
9902
|
"required": false,
|
|
9670
9903
|
"type": "string",
|
|
9671
9904
|
"value_allowed_null": true
|
|
@@ -9676,9 +9909,21 @@
|
|
|
9676
9909
|
"example": "1",
|
|
9677
9910
|
"member": "int64",
|
|
9678
9911
|
"name": "Id",
|
|
9912
|
+
"output_required": true,
|
|
9679
9913
|
"required": false,
|
|
9680
9914
|
"type": "int",
|
|
9681
9915
|
"value_allowed_null": true
|
|
9916
|
+
},
|
|
9917
|
+
{
|
|
9918
|
+
"disabled": false,
|
|
9919
|
+
"document": "Specifies the engine type.\n",
|
|
9920
|
+
"example": "SuperSQL/Native",
|
|
9921
|
+
"member": "string",
|
|
9922
|
+
"name": "EngineGeneration",
|
|
9923
|
+
"output_required": false,
|
|
9924
|
+
"required": false,
|
|
9925
|
+
"type": "string",
|
|
9926
|
+
"value_allowed_null": false
|
|
9682
9927
|
}
|
|
9683
9928
|
],
|
|
9684
9929
|
"usage": "both"
|
|
@@ -16,6 +16,14 @@
|
|
|
16
16
|
"title": "Updating Databases in the DMS Metadata Module"
|
|
17
17
|
}
|
|
18
18
|
],
|
|
19
|
+
"AttachDataMaskPolicy": [
|
|
20
|
+
{
|
|
21
|
+
"document": "",
|
|
22
|
+
"input": "POST / HTTP/1.1\nHost: dlc.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: AttachDataMaskPolicy\n<Common request parameters>\n\n{\n \"DataMaskStrategyPolicySet\": [\n {\n \"PolicyInfo\": {\n \"Database\": \"default_database\",\n \"Catalog\": \"DataLakeCatalog\",\n \"Table\": \"default_table\",\n \"Operation\": \"SELECT\",\n \"PolicyType\": \"DATAMASK\",\n \"Column\": \"string_msg\"\n },\n \"ColumnType\": \"string\",\n \"DataMaskStrategyId\": \"72de85e2-887a-4a87-bf86-90fc90ff25fa\"\n }\n ]\n}",
|
|
23
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"12345678-1234-1234-1234-12345678\"\n }\n}",
|
|
24
|
+
"title": "Binding a DMask Policy"
|
|
25
|
+
}
|
|
26
|
+
],
|
|
19
27
|
"AttachUserPolicy": [
|
|
20
28
|
{
|
|
21
29
|
"document": " ",
|
|
@@ -128,6 +136,14 @@
|
|
|
128
136
|
"title": "Creating a data engine"
|
|
129
137
|
}
|
|
130
138
|
],
|
|
139
|
+
"CreateDataMaskStrategy": [
|
|
140
|
+
{
|
|
141
|
+
"document": "",
|
|
142
|
+
"input": "POST / HTTP/1.1\nHost: dlc.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateDataMaskStrategy\n<Common request parameters>\n\n{\n \"Strategy\": {\n \"StrategyName\": \"create_data_mask_tag\",\n \"Groups\": [\n {\n \"WorkGroupId\": 46920,\n \"StrategyType\": \"MASK_HASH\"\n }\n ]\n }\n}",
|
|
143
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"812228c6-45c7-43a2-af77-c7e67dc0b524\",\n \"StrategyId\": \"71a88499-266f-4b24-9944-2d80078ec0a6\"\n }\n}",
|
|
144
|
+
"title": "Creating a Data Masking Policy"
|
|
145
|
+
}
|
|
146
|
+
],
|
|
131
147
|
"CreateInternalTable": [
|
|
132
148
|
{
|
|
133
149
|
"document": " ",
|