tccli 3.0.1005.1__py2.py3-none-any.whl → 3.0.1006.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/examples/cdb/v20170320/CloseAuditService.md +20 -0
- tccli/examples/cdb/v20170320/CreateAuditRuleTemplate.md +31 -0
- tccli/examples/cdb/v20170320/DeleteAuditRuleTemplates.md +20 -0
- tccli/examples/cdb/v20170320/DeleteDatabase.md +21 -0
- tccli/examples/cdb/v20170320/DescribeAuditInstanceList.md +51 -0
- tccli/examples/cdb/v20170320/DescribeAuditRuleTemplateModifyHistory.md +70 -0
- tccli/examples/cdb/v20170320/DescribeAuditRuleTemplates.md +61 -0
- tccli/examples/cdb/v20170320/ModifyAuditRuleTemplates.md +21 -0
- tccli/examples/cdb/v20170320/ModifyAuditService.md +23 -0
- tccli/examples/cfg/v20210820/DescribeTaskPolicyTriggerLog.md +38 -0
- tccli/examples/cfg/v20210820/TriggerPolicy.md +25 -0
- tccli/examples/config/v20220802/ListAggregateConfigRules.md +79 -0
- tccli/examples/config/v20220802/ListConfigRules.md +138 -0
- tccli/examples/tdmq/v20200217/CreateProCluster.md +3 -3
- tccli/examples/teo/v20220901/DescribeOverviewL7Data.md +4 -2
- tccli/examples/teo/v20220901/DescribePrefetchTasks.md +2 -1
- tccli/examples/teo/v20220901/DescribePurgeTasks.md +2 -1
- tccli/examples/teo/v20220901/DescribeTimingL4Data.md +4 -1
- tccli/examples/teo/v20220901/DescribeTimingL7AnalysisData.md +6 -3
- tccli/examples/teo/v20220901/DescribeTimingL7CacheData.md +6 -3
- tccli/examples/teo/v20220901/DescribeTopL7AnalysisData.md +6 -3
- tccli/examples/teo/v20220901/DescribeTopL7CacheData.md +8 -4
- tccli/examples/teo/v20220901/DownloadL4Logs.md +2 -1
- tccli/examples/teo/v20220901/DownloadL7Logs.md +2 -1
- tccli/examples/tke/v20180525/DescribeIPAMD.md +6 -3
- tccli/examples/tse/v20201207/CloseWafProtection.md +21 -0
- tccli/examples/tse/v20201207/CreateWafDomains.md +21 -0
- tccli/examples/tse/v20201207/OpenWafProtection.md +21 -0
- tccli/examples/vod/v20180717/DescribeTaskDetail.md +4 -0
- tccli/examples/vrs/v20200824/GetVRSVoiceTypes.md +4 -2
- tccli/services/__init__.py +3 -0
- tccli/services/cdb/cdb_client.py +497 -20
- tccli/services/cdb/v20170320/api.json +1174 -51
- tccli/services/cdb/v20170320/examples.json +72 -0
- tccli/services/cfg/cfg_client.py +106 -0
- tccli/services/cfg/v20210820/api.json +199 -0
- tccli/services/cfg/v20210820/examples.json +16 -0
- tccli/services/config/__init__.py +4 -0
- tccli/services/config/config_client.py +247 -0
- tccli/services/config/v20220802/api.json +767 -0
- tccli/services/config/v20220802/examples.json +21 -0
- tccli/services/hai/v20230812/api.json +11 -0
- tccli/services/tdmq/v20200217/api.json +50 -30
- tccli/services/tdmq/v20200217/examples.json +2 -2
- tccli/services/teo/v20220901/api.json +51 -40
- tccli/services/teo/v20220901/examples.json +24 -24
- tccli/services/tke/v20180525/api.json +18 -8
- tccli/services/tke/v20180525/examples.json +2 -2
- tccli/services/tse/tse_client.py +159 -0
- tccli/services/tse/v20201207/api.json +147 -0
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/vod/v20180717/api.json +278 -24
- tccli/services/vod/v20180717/examples.json +4 -4
- tccli/services/vrs/v20200824/examples.json +1 -1
- tccli/services/waf/v20180125/api.json +3 -3
- {tccli-3.0.1005.1.dist-info → tccli-3.0.1006.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1005.1.dist-info → tccli-3.0.1006.1.dist-info}/RECORD +61 -41
- {tccli-3.0.1005.1.dist-info → tccli-3.0.1006.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1005.1.dist-info → tccli-3.0.1006.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1005.1.dist-info → tccli-3.0.1006.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/cdb/cdb_client.py
CHANGED
@@ -225,7 +225,7 @@ def doDescribeDBFeatures(args, parsed_globals):
|
|
225
225
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
226
226
|
|
227
227
|
|
228
|
-
def
|
228
|
+
def doCreateAuditRuleTemplate(args, parsed_globals):
|
229
229
|
g_param = parse_global_arg(parsed_globals)
|
230
230
|
|
231
231
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -254,11 +254,11 @@ def doDescribeDataBackupOverview(args, parsed_globals):
|
|
254
254
|
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
255
255
|
client._sdkVersion += ("_CLI_" + __version__)
|
256
256
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
257
|
-
model = models.
|
257
|
+
model = models.CreateAuditRuleTemplateRequest()
|
258
258
|
model.from_json_string(json.dumps(args))
|
259
259
|
start_time = time.time()
|
260
260
|
while True:
|
261
|
-
rsp = client.
|
261
|
+
rsp = client.CreateAuditRuleTemplate(model)
|
262
262
|
result = rsp.to_json_string()
|
263
263
|
try:
|
264
264
|
json_obj = json.loads(result)
|
@@ -849,6 +849,58 @@ def doDescribeCdbZoneConfig(args, parsed_globals):
|
|
849
849
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
850
850
|
|
851
851
|
|
852
|
+
def doCloseAuditService(args, parsed_globals):
|
853
|
+
g_param = parse_global_arg(parsed_globals)
|
854
|
+
|
855
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
856
|
+
cred = credential.CVMRoleCredential()
|
857
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
858
|
+
cred = credential.STSAssumeRoleCredential(
|
859
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
860
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
861
|
+
)
|
862
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
863
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
864
|
+
else:
|
865
|
+
cred = credential.Credential(
|
866
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
867
|
+
)
|
868
|
+
http_profile = HttpProfile(
|
869
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
870
|
+
reqMethod="POST",
|
871
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
872
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
873
|
+
)
|
874
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
875
|
+
if g_param[OptionsDefine.Language]:
|
876
|
+
profile.language = g_param[OptionsDefine.Language]
|
877
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
878
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
879
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
880
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
881
|
+
model = models.CloseAuditServiceRequest()
|
882
|
+
model.from_json_string(json.dumps(args))
|
883
|
+
start_time = time.time()
|
884
|
+
while True:
|
885
|
+
rsp = client.CloseAuditService(model)
|
886
|
+
result = rsp.to_json_string()
|
887
|
+
try:
|
888
|
+
json_obj = json.loads(result)
|
889
|
+
except TypeError as e:
|
890
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
891
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
892
|
+
break
|
893
|
+
cur_time = time.time()
|
894
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
895
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
896
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
897
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
898
|
+
else:
|
899
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
900
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
901
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
902
|
+
|
903
|
+
|
852
904
|
def doStopRollback(args, parsed_globals):
|
853
905
|
g_param = parse_global_arg(parsed_globals)
|
854
906
|
|
@@ -1369,6 +1421,58 @@ def doDescribeBackupConfig(args, parsed_globals):
|
|
1369
1421
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1370
1422
|
|
1371
1423
|
|
1424
|
+
def doOpenDBInstanceEncryption(args, parsed_globals):
|
1425
|
+
g_param = parse_global_arg(parsed_globals)
|
1426
|
+
|
1427
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1428
|
+
cred = credential.CVMRoleCredential()
|
1429
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1430
|
+
cred = credential.STSAssumeRoleCredential(
|
1431
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1432
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
1433
|
+
)
|
1434
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1435
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1436
|
+
else:
|
1437
|
+
cred = credential.Credential(
|
1438
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1439
|
+
)
|
1440
|
+
http_profile = HttpProfile(
|
1441
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1442
|
+
reqMethod="POST",
|
1443
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1444
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1445
|
+
)
|
1446
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1447
|
+
if g_param[OptionsDefine.Language]:
|
1448
|
+
profile.language = g_param[OptionsDefine.Language]
|
1449
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1450
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
1451
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1452
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1453
|
+
model = models.OpenDBInstanceEncryptionRequest()
|
1454
|
+
model.from_json_string(json.dumps(args))
|
1455
|
+
start_time = time.time()
|
1456
|
+
while True:
|
1457
|
+
rsp = client.OpenDBInstanceEncryption(model)
|
1458
|
+
result = rsp.to_json_string()
|
1459
|
+
try:
|
1460
|
+
json_obj = json.loads(result)
|
1461
|
+
except TypeError as e:
|
1462
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1463
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1464
|
+
break
|
1465
|
+
cur_time = time.time()
|
1466
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1467
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1468
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1469
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1470
|
+
else:
|
1471
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1472
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1473
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1474
|
+
|
1475
|
+
|
1372
1476
|
def doCloseWanService(args, parsed_globals):
|
1373
1477
|
g_param = parse_global_arg(parsed_globals)
|
1374
1478
|
|
@@ -1525,7 +1629,7 @@ def doDescribeAuditPolicies(args, parsed_globals):
|
|
1525
1629
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1526
1630
|
|
1527
1631
|
|
1528
|
-
def
|
1632
|
+
def doDeleteDatabase(args, parsed_globals):
|
1529
1633
|
g_param = parse_global_arg(parsed_globals)
|
1530
1634
|
|
1531
1635
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1554,11 +1658,11 @@ def doOpenDBInstanceEncryption(args, parsed_globals):
|
|
1554
1658
|
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
1555
1659
|
client._sdkVersion += ("_CLI_" + __version__)
|
1556
1660
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1557
|
-
model = models.
|
1661
|
+
model = models.DeleteDatabaseRequest()
|
1558
1662
|
model.from_json_string(json.dumps(args))
|
1559
1663
|
start_time = time.time()
|
1560
1664
|
while True:
|
1561
|
-
rsp = client.
|
1665
|
+
rsp = client.DeleteDatabase(model)
|
1562
1666
|
result = rsp.to_json_string()
|
1563
1667
|
try:
|
1564
1668
|
json_obj = json.loads(result)
|
@@ -1785,7 +1889,7 @@ def doSwitchDBInstanceMasterSlave(args, parsed_globals):
|
|
1785
1889
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1786
1890
|
|
1787
1891
|
|
1788
|
-
def
|
1892
|
+
def doCreateDatabase(args, parsed_globals):
|
1789
1893
|
g_param = parse_global_arg(parsed_globals)
|
1790
1894
|
|
1791
1895
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1814,11 +1918,11 @@ def doDeleteAuditPolicy(args, parsed_globals):
|
|
1814
1918
|
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
1815
1919
|
client._sdkVersion += ("_CLI_" + __version__)
|
1816
1920
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1817
|
-
model = models.
|
1921
|
+
model = models.CreateDatabaseRequest()
|
1818
1922
|
model.from_json_string(json.dumps(args))
|
1819
1923
|
start_time = time.time()
|
1820
1924
|
while True:
|
1821
|
-
rsp = client.
|
1925
|
+
rsp = client.CreateDatabase(model)
|
1822
1926
|
result = rsp.to_json_string()
|
1823
1927
|
try:
|
1824
1928
|
json_obj = json.loads(result)
|
@@ -2097,6 +2201,58 @@ def doDescribeAccountPrivileges(args, parsed_globals):
|
|
2097
2201
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2098
2202
|
|
2099
2203
|
|
2204
|
+
def doDescribeDataBackupOverview(args, parsed_globals):
|
2205
|
+
g_param = parse_global_arg(parsed_globals)
|
2206
|
+
|
2207
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2208
|
+
cred = credential.CVMRoleCredential()
|
2209
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2210
|
+
cred = credential.STSAssumeRoleCredential(
|
2211
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2212
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2213
|
+
)
|
2214
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2215
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2216
|
+
else:
|
2217
|
+
cred = credential.Credential(
|
2218
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2219
|
+
)
|
2220
|
+
http_profile = HttpProfile(
|
2221
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2222
|
+
reqMethod="POST",
|
2223
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2224
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2225
|
+
)
|
2226
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2227
|
+
if g_param[OptionsDefine.Language]:
|
2228
|
+
profile.language = g_param[OptionsDefine.Language]
|
2229
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2230
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
2231
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2232
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2233
|
+
model = models.DescribeDataBackupOverviewRequest()
|
2234
|
+
model.from_json_string(json.dumps(args))
|
2235
|
+
start_time = time.time()
|
2236
|
+
while True:
|
2237
|
+
rsp = client.DescribeDataBackupOverview(model)
|
2238
|
+
result = rsp.to_json_string()
|
2239
|
+
try:
|
2240
|
+
json_obj = json.loads(result)
|
2241
|
+
except TypeError as e:
|
2242
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2243
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2244
|
+
break
|
2245
|
+
cur_time = time.time()
|
2246
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2247
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2248
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2249
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2250
|
+
else:
|
2251
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2252
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2253
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2254
|
+
|
2255
|
+
|
2100
2256
|
def doReleaseIsolatedDBInstances(args, parsed_globals):
|
2101
2257
|
g_param = parse_global_arg(parsed_globals)
|
2102
2258
|
|
@@ -2461,7 +2617,7 @@ def doSwitchForUpgrade(args, parsed_globals):
|
|
2461
2617
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2462
2618
|
|
2463
2619
|
|
2464
|
-
def
|
2620
|
+
def doDeleteAuditRuleTemplates(args, parsed_globals):
|
2465
2621
|
g_param = parse_global_arg(parsed_globals)
|
2466
2622
|
|
2467
2623
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2490,11 +2646,11 @@ def doDeleteParamTemplate(args, parsed_globals):
|
|
2490
2646
|
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
2491
2647
|
client._sdkVersion += ("_CLI_" + __version__)
|
2492
2648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2493
|
-
model = models.
|
2649
|
+
model = models.DeleteAuditRuleTemplatesRequest()
|
2494
2650
|
model.from_json_string(json.dumps(args))
|
2495
2651
|
start_time = time.time()
|
2496
2652
|
while True:
|
2497
|
-
rsp = client.
|
2653
|
+
rsp = client.DeleteAuditRuleTemplates(model)
|
2498
2654
|
result = rsp.to_json_string()
|
2499
2655
|
try:
|
2500
2656
|
json_obj = json.loads(result)
|
@@ -2565,6 +2721,58 @@ def doDescribeBackups(args, parsed_globals):
|
|
2565
2721
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2566
2722
|
|
2567
2723
|
|
2724
|
+
def doDescribeAuditInstanceList(args, parsed_globals):
|
2725
|
+
g_param = parse_global_arg(parsed_globals)
|
2726
|
+
|
2727
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2728
|
+
cred = credential.CVMRoleCredential()
|
2729
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2730
|
+
cred = credential.STSAssumeRoleCredential(
|
2731
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2732
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
2733
|
+
)
|
2734
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2735
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2736
|
+
else:
|
2737
|
+
cred = credential.Credential(
|
2738
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2739
|
+
)
|
2740
|
+
http_profile = HttpProfile(
|
2741
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2742
|
+
reqMethod="POST",
|
2743
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2744
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2745
|
+
)
|
2746
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2747
|
+
if g_param[OptionsDefine.Language]:
|
2748
|
+
profile.language = g_param[OptionsDefine.Language]
|
2749
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2750
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
2751
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2752
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2753
|
+
model = models.DescribeAuditInstanceListRequest()
|
2754
|
+
model.from_json_string(json.dumps(args))
|
2755
|
+
start_time = time.time()
|
2756
|
+
while True:
|
2757
|
+
rsp = client.DescribeAuditInstanceList(model)
|
2758
|
+
result = rsp.to_json_string()
|
2759
|
+
try:
|
2760
|
+
json_obj = json.loads(result)
|
2761
|
+
except TypeError as e:
|
2762
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2763
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2764
|
+
break
|
2765
|
+
cur_time = time.time()
|
2766
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2767
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2768
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2769
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2770
|
+
else:
|
2771
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2772
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2773
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2774
|
+
|
2775
|
+
|
2568
2776
|
def doCreateParamTemplate(args, parsed_globals):
|
2569
2777
|
g_param = parse_global_arg(parsed_globals)
|
2570
2778
|
|
@@ -3033,7 +3241,7 @@ def doCreateCdbProxyAddress(args, parsed_globals):
|
|
3033
3241
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3034
3242
|
|
3035
3243
|
|
3036
|
-
def
|
3244
|
+
def doDeleteAuditPolicy(args, parsed_globals):
|
3037
3245
|
g_param = parse_global_arg(parsed_globals)
|
3038
3246
|
|
3039
3247
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3062,11 +3270,11 @@ def doCreateDatabase(args, parsed_globals):
|
|
3062
3270
|
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
3063
3271
|
client._sdkVersion += ("_CLI_" + __version__)
|
3064
3272
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3065
|
-
model = models.
|
3273
|
+
model = models.DeleteAuditPolicyRequest()
|
3066
3274
|
model.from_json_string(json.dumps(args))
|
3067
3275
|
start_time = time.time()
|
3068
3276
|
while True:
|
3069
|
-
rsp = client.
|
3277
|
+
rsp = client.DeleteAuditPolicy(model)
|
3070
3278
|
result = rsp.to_json_string()
|
3071
3279
|
try:
|
3072
3280
|
json_obj = json.loads(result)
|
@@ -5997,6 +6205,58 @@ def doResetRootAccount(args, parsed_globals):
|
|
5997
6205
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5998
6206
|
|
5999
6207
|
|
6208
|
+
def doModifyAuditRuleTemplates(args, parsed_globals):
|
6209
|
+
g_param = parse_global_arg(parsed_globals)
|
6210
|
+
|
6211
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6212
|
+
cred = credential.CVMRoleCredential()
|
6213
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6214
|
+
cred = credential.STSAssumeRoleCredential(
|
6215
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6216
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6217
|
+
)
|
6218
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6219
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6220
|
+
else:
|
6221
|
+
cred = credential.Credential(
|
6222
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6223
|
+
)
|
6224
|
+
http_profile = HttpProfile(
|
6225
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6226
|
+
reqMethod="POST",
|
6227
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6228
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6229
|
+
)
|
6230
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6231
|
+
if g_param[OptionsDefine.Language]:
|
6232
|
+
profile.language = g_param[OptionsDefine.Language]
|
6233
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6234
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
6235
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6236
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6237
|
+
model = models.ModifyAuditRuleTemplatesRequest()
|
6238
|
+
model.from_json_string(json.dumps(args))
|
6239
|
+
start_time = time.time()
|
6240
|
+
while True:
|
6241
|
+
rsp = client.ModifyAuditRuleTemplates(model)
|
6242
|
+
result = rsp.to_json_string()
|
6243
|
+
try:
|
6244
|
+
json_obj = json.loads(result)
|
6245
|
+
except TypeError as e:
|
6246
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6247
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6248
|
+
break
|
6249
|
+
cur_time = time.time()
|
6250
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6251
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6252
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6253
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6254
|
+
else:
|
6255
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6256
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6257
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6258
|
+
|
6259
|
+
|
6000
6260
|
def doModifyAccountPassword(args, parsed_globals):
|
6001
6261
|
g_param = parse_global_arg(parsed_globals)
|
6002
6262
|
|
@@ -6309,6 +6569,58 @@ def doDeleteAuditLogFile(args, parsed_globals):
|
|
6309
6569
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6310
6570
|
|
6311
6571
|
|
6572
|
+
def doDescribeAuditRuleTemplates(args, parsed_globals):
|
6573
|
+
g_param = parse_global_arg(parsed_globals)
|
6574
|
+
|
6575
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6576
|
+
cred = credential.CVMRoleCredential()
|
6577
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6578
|
+
cred = credential.STSAssumeRoleCredential(
|
6579
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6580
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6581
|
+
)
|
6582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6583
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6584
|
+
else:
|
6585
|
+
cred = credential.Credential(
|
6586
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6587
|
+
)
|
6588
|
+
http_profile = HttpProfile(
|
6589
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6590
|
+
reqMethod="POST",
|
6591
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6592
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6593
|
+
)
|
6594
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6595
|
+
if g_param[OptionsDefine.Language]:
|
6596
|
+
profile.language = g_param[OptionsDefine.Language]
|
6597
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6598
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
6599
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6600
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6601
|
+
model = models.DescribeAuditRuleTemplatesRequest()
|
6602
|
+
model.from_json_string(json.dumps(args))
|
6603
|
+
start_time = time.time()
|
6604
|
+
while True:
|
6605
|
+
rsp = client.DescribeAuditRuleTemplates(model)
|
6606
|
+
result = rsp.to_json_string()
|
6607
|
+
try:
|
6608
|
+
json_obj = json.loads(result)
|
6609
|
+
except TypeError as e:
|
6610
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6611
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6612
|
+
break
|
6613
|
+
cur_time = time.time()
|
6614
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6615
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6616
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6617
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6618
|
+
else:
|
6619
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6620
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6621
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6622
|
+
|
6623
|
+
|
6312
6624
|
def doModifyBackupConfig(args, parsed_globals):
|
6313
6625
|
g_param = parse_global_arg(parsed_globals)
|
6314
6626
|
|
@@ -6621,6 +6933,58 @@ def doDescribeDBInstanceLogToCLS(args, parsed_globals):
|
|
6621
6933
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6622
6934
|
|
6623
6935
|
|
6936
|
+
def doDescribeAuditRuleTemplateModifyHistory(args, parsed_globals):
|
6937
|
+
g_param = parse_global_arg(parsed_globals)
|
6938
|
+
|
6939
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6940
|
+
cred = credential.CVMRoleCredential()
|
6941
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6942
|
+
cred = credential.STSAssumeRoleCredential(
|
6943
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6944
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
6945
|
+
)
|
6946
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6947
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6948
|
+
else:
|
6949
|
+
cred = credential.Credential(
|
6950
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6951
|
+
)
|
6952
|
+
http_profile = HttpProfile(
|
6953
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6954
|
+
reqMethod="POST",
|
6955
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6956
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6957
|
+
)
|
6958
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6959
|
+
if g_param[OptionsDefine.Language]:
|
6960
|
+
profile.language = g_param[OptionsDefine.Language]
|
6961
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6962
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
6963
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6964
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6965
|
+
model = models.DescribeAuditRuleTemplateModifyHistoryRequest()
|
6966
|
+
model.from_json_string(json.dumps(args))
|
6967
|
+
start_time = time.time()
|
6968
|
+
while True:
|
6969
|
+
rsp = client.DescribeAuditRuleTemplateModifyHistory(model)
|
6970
|
+
result = rsp.to_json_string()
|
6971
|
+
try:
|
6972
|
+
json_obj = json.loads(result)
|
6973
|
+
except TypeError as e:
|
6974
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6975
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6976
|
+
break
|
6977
|
+
cur_time = time.time()
|
6978
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6979
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6980
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6981
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6982
|
+
else:
|
6983
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6984
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6985
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6986
|
+
|
6987
|
+
|
6624
6988
|
def doCreateCdbProxy(args, parsed_globals):
|
6625
6989
|
g_param = parse_global_arg(parsed_globals)
|
6626
6990
|
|
@@ -6777,6 +7141,58 @@ def doSwitchCDBProxy(args, parsed_globals):
|
|
6777
7141
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6778
7142
|
|
6779
7143
|
|
7144
|
+
def doModifyAuditService(args, parsed_globals):
|
7145
|
+
g_param = parse_global_arg(parsed_globals)
|
7146
|
+
|
7147
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7148
|
+
cred = credential.CVMRoleCredential()
|
7149
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7150
|
+
cred = credential.STSAssumeRoleCredential(
|
7151
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7152
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7153
|
+
)
|
7154
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7155
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7156
|
+
else:
|
7157
|
+
cred = credential.Credential(
|
7158
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7159
|
+
)
|
7160
|
+
http_profile = HttpProfile(
|
7161
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7162
|
+
reqMethod="POST",
|
7163
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7164
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7165
|
+
)
|
7166
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7167
|
+
if g_param[OptionsDefine.Language]:
|
7168
|
+
profile.language = g_param[OptionsDefine.Language]
|
7169
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7170
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
7171
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7172
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7173
|
+
model = models.ModifyAuditServiceRequest()
|
7174
|
+
model.from_json_string(json.dumps(args))
|
7175
|
+
start_time = time.time()
|
7176
|
+
while True:
|
7177
|
+
rsp = client.ModifyAuditService(model)
|
7178
|
+
result = rsp.to_json_string()
|
7179
|
+
try:
|
7180
|
+
json_obj = json.loads(result)
|
7181
|
+
except TypeError as e:
|
7182
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7183
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7184
|
+
break
|
7185
|
+
cur_time = time.time()
|
7186
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7187
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7188
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7189
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7190
|
+
else:
|
7191
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7192
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7193
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7194
|
+
|
7195
|
+
|
6780
7196
|
def doRenewDBInstance(args, parsed_globals):
|
6781
7197
|
g_param = parse_global_arg(parsed_globals)
|
6782
7198
|
|
@@ -7245,6 +7661,58 @@ def doDescribeSupportedPrivileges(args, parsed_globals):
|
|
7245
7661
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7246
7662
|
|
7247
7663
|
|
7664
|
+
def doDeleteParamTemplate(args, parsed_globals):
|
7665
|
+
g_param = parse_global_arg(parsed_globals)
|
7666
|
+
|
7667
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7668
|
+
cred = credential.CVMRoleCredential()
|
7669
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7670
|
+
cred = credential.STSAssumeRoleCredential(
|
7671
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7672
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7673
|
+
)
|
7674
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7675
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7676
|
+
else:
|
7677
|
+
cred = credential.Credential(
|
7678
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7679
|
+
)
|
7680
|
+
http_profile = HttpProfile(
|
7681
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7682
|
+
reqMethod="POST",
|
7683
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7684
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7685
|
+
)
|
7686
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7687
|
+
if g_param[OptionsDefine.Language]:
|
7688
|
+
profile.language = g_param[OptionsDefine.Language]
|
7689
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7690
|
+
client = mod.CdbClient(cred, g_param[OptionsDefine.Region], profile)
|
7691
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7692
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7693
|
+
model = models.DeleteParamTemplateRequest()
|
7694
|
+
model.from_json_string(json.dumps(args))
|
7695
|
+
start_time = time.time()
|
7696
|
+
while True:
|
7697
|
+
rsp = client.DeleteParamTemplate(model)
|
7698
|
+
result = rsp.to_json_string()
|
7699
|
+
try:
|
7700
|
+
json_obj = json.loads(result)
|
7701
|
+
except TypeError as e:
|
7702
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7703
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7704
|
+
break
|
7705
|
+
cur_time = time.time()
|
7706
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7707
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7708
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7709
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7710
|
+
else:
|
7711
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7712
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7713
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7714
|
+
|
7715
|
+
|
7248
7716
|
def doCreateDeployGroup(args, parsed_globals):
|
7249
7717
|
g_param = parse_global_arg(parsed_globals)
|
7250
7718
|
|
@@ -7780,7 +8248,7 @@ ACTION_MAP = {
|
|
7780
8248
|
"CreateRoInstanceIp": doCreateRoInstanceIp,
|
7781
8249
|
"CreateAuditPolicy": doCreateAuditPolicy,
|
7782
8250
|
"DescribeDBFeatures": doDescribeDBFeatures,
|
7783
|
-
"
|
8251
|
+
"CreateAuditRuleTemplate": doCreateAuditRuleTemplate,
|
7784
8252
|
"BalanceRoGroupLoad": doBalanceRoGroupLoad,
|
7785
8253
|
"IsolateDBInstance": doIsolateDBInstance,
|
7786
8254
|
"DescribeAccounts": doDescribeAccounts,
|
@@ -7792,6 +8260,7 @@ ACTION_MAP = {
|
|
7792
8260
|
"StopCpuExpand": doStopCpuExpand,
|
7793
8261
|
"ModifyDBInstanceName": doModifyDBInstanceName,
|
7794
8262
|
"DescribeCdbZoneConfig": doDescribeCdbZoneConfig,
|
8263
|
+
"CloseAuditService": doCloseAuditService,
|
7795
8264
|
"StopRollback": doStopRollback,
|
7796
8265
|
"DescribeRoGroups": doDescribeRoGroups,
|
7797
8266
|
"OfflineIsolatedInstances": doOfflineIsolatedInstances,
|
@@ -7802,20 +8271,22 @@ ACTION_MAP = {
|
|
7802
8271
|
"CloseCdbProxyAddress": doCloseCdbProxyAddress,
|
7803
8272
|
"DescribeTasks": doDescribeTasks,
|
7804
8273
|
"DescribeBackupConfig": doDescribeBackupConfig,
|
8274
|
+
"OpenDBInstanceEncryption": doOpenDBInstanceEncryption,
|
7805
8275
|
"CloseWanService": doCloseWanService,
|
7806
8276
|
"DescribeDefaultParams": doDescribeDefaultParams,
|
7807
8277
|
"DescribeAuditPolicies": doDescribeAuditPolicies,
|
7808
|
-
"
|
8278
|
+
"DeleteDatabase": doDeleteDatabase,
|
7809
8279
|
"DescribeTagsOfInstanceIds": doDescribeTagsOfInstanceIds,
|
7810
8280
|
"DescribeDatabases": doDescribeDatabases,
|
7811
8281
|
"DescribeErrorLogData": doDescribeErrorLogData,
|
7812
8282
|
"SwitchDBInstanceMasterSlave": doSwitchDBInstanceMasterSlave,
|
7813
|
-
"
|
8283
|
+
"CreateDatabase": doCreateDatabase,
|
7814
8284
|
"DisassociateSecurityGroups": doDisassociateSecurityGroups,
|
7815
8285
|
"ModifyCdbProxyParam": doModifyCdbProxyParam,
|
7816
8286
|
"DescribeTables": doDescribeTables,
|
7817
8287
|
"DeleteTimeWindow": doDeleteTimeWindow,
|
7818
8288
|
"DescribeAccountPrivileges": doDescribeAccountPrivileges,
|
8289
|
+
"DescribeDataBackupOverview": doDescribeDataBackupOverview,
|
7819
8290
|
"ReleaseIsolatedDBInstances": doReleaseIsolatedDBInstances,
|
7820
8291
|
"CreateCloneInstance": doCreateCloneInstance,
|
7821
8292
|
"ModifyAuditConfig": doModifyAuditConfig,
|
@@ -7823,8 +8294,9 @@ ACTION_MAP = {
|
|
7823
8294
|
"ModifyTimeWindow": doModifyTimeWindow,
|
7824
8295
|
"DeleteDeployGroups": doDeleteDeployGroups,
|
7825
8296
|
"SwitchForUpgrade": doSwitchForUpgrade,
|
7826
|
-
"
|
8297
|
+
"DeleteAuditRuleTemplates": doDeleteAuditRuleTemplates,
|
7827
8298
|
"DescribeBackups": doDescribeBackups,
|
8299
|
+
"DescribeAuditInstanceList": doDescribeAuditInstanceList,
|
7828
8300
|
"CreateParamTemplate": doCreateParamTemplate,
|
7829
8301
|
"CreateDBInstanceHour": doCreateDBInstanceHour,
|
7830
8302
|
"AddTimeWindow": doAddTimeWindow,
|
@@ -7834,7 +8306,7 @@ ACTION_MAP = {
|
|
7834
8306
|
"ModifyDBInstanceVipVport": doModifyDBInstanceVipVport,
|
7835
8307
|
"DescribeDBInstanceConfig": doDescribeDBInstanceConfig,
|
7836
8308
|
"CreateCdbProxyAddress": doCreateCdbProxyAddress,
|
7837
|
-
"
|
8309
|
+
"DeleteAuditPolicy": doDeleteAuditPolicy,
|
7838
8310
|
"DescribeProjectSecurityGroups": doDescribeProjectSecurityGroups,
|
7839
8311
|
"DescribeSlowLogs": doDescribeSlowLogs,
|
7840
8312
|
"InquiryPriceUpgradeInstances": doInquiryPriceUpgradeInstances,
|
@@ -7891,21 +8363,25 @@ ACTION_MAP = {
|
|
7891
8363
|
"ModifyRoGroupInfo": doModifyRoGroupInfo,
|
7892
8364
|
"DescribeBackupDownloadRestriction": doDescribeBackupDownloadRestriction,
|
7893
8365
|
"ResetRootAccount": doResetRootAccount,
|
8366
|
+
"ModifyAuditRuleTemplates": doModifyAuditRuleTemplates,
|
7894
8367
|
"ModifyAccountPassword": doModifyAccountPassword,
|
7895
8368
|
"DescribeUploadedFiles": doDescribeUploadedFiles,
|
7896
8369
|
"ModifyAccountDescription": doModifyAccountDescription,
|
7897
8370
|
"DescribeSlowLogData": doDescribeSlowLogData,
|
7898
8371
|
"OpenAuditService": doOpenAuditService,
|
7899
8372
|
"DeleteAuditLogFile": doDeleteAuditLogFile,
|
8373
|
+
"DescribeAuditRuleTemplates": doDescribeAuditRuleTemplates,
|
7900
8374
|
"ModifyBackupConfig": doModifyBackupConfig,
|
7901
8375
|
"DescribeAuditRules": doDescribeAuditRules,
|
7902
8376
|
"DescribeRemoteBackupConfig": doDescribeRemoteBackupConfig,
|
7903
8377
|
"ModifyCdbProxyAddressVipAndVPort": doModifyCdbProxyAddressVipAndVPort,
|
7904
8378
|
"InitDBInstances": doInitDBInstances,
|
7905
8379
|
"DescribeDBInstanceLogToCLS": doDescribeDBInstanceLogToCLS,
|
8380
|
+
"DescribeAuditRuleTemplateModifyHistory": doDescribeAuditRuleTemplateModifyHistory,
|
7906
8381
|
"CreateCdbProxy": doCreateCdbProxy,
|
7907
8382
|
"ModifyAutoRenewFlag": doModifyAutoRenewFlag,
|
7908
8383
|
"SwitchCDBProxy": doSwitchCDBProxy,
|
8384
|
+
"ModifyAuditService": doModifyAuditService,
|
7909
8385
|
"RenewDBInstance": doRenewDBInstance,
|
7910
8386
|
"StartBatchRollback": doStartBatchRollback,
|
7911
8387
|
"DescribeDeviceMonitorInfo": doDescribeDeviceMonitorInfo,
|
@@ -7915,6 +8391,7 @@ ACTION_MAP = {
|
|
7915
8391
|
"ModifyDBInstanceProject": doModifyDBInstanceProject,
|
7916
8392
|
"StartCpuExpand": doStartCpuExpand,
|
7917
8393
|
"DescribeSupportedPrivileges": doDescribeSupportedPrivileges,
|
8394
|
+
"DeleteParamTemplate": doDeleteParamTemplate,
|
7918
8395
|
"CreateDeployGroup": doCreateDeployGroup,
|
7919
8396
|
"DescribeBinlogs": doDescribeBinlogs,
|
7920
8397
|
"DescribeDBSecurityGroups": doDescribeDBSecurityGroups,
|