tccli 3.0.1113.1__py2.py3-none-any.whl → 3.0.1115.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/asr/v20190614/api.json +1 -1
- tccli/services/cat/v20180409/api.json +2 -2
- tccli/services/cat/v20180409/examples.json +2 -2
- tccli/services/cdwdoris/v20211228/api.json +9 -0
- tccli/services/cynosdb/v20190107/api.json +151 -50
- tccli/services/dasb/dasb_client.py +347 -29
- tccli/services/dasb/v20191018/api.json +966 -13
- tccli/services/dasb/v20191018/examples.json +48 -0
- tccli/services/dbbrain/dbbrain_client.py +110 -4
- tccli/services/dbbrain/v20210527/api.json +235 -5
- tccli/services/dbbrain/v20210527/examples.json +23 -1
- tccli/services/dlc/dlc_client.py +190 -31
- tccli/services/dlc/v20210125/api.json +176 -0
- tccli/services/dlc/v20210125/examples.json +24 -0
- tccli/services/dsgc/v20190723/api.json +30 -17
- tccli/services/dsgc/v20190723/examples.json +1 -1
- tccli/services/ess/ess_client.py +110 -4
- tccli/services/ess/v20201111/api.json +146 -1
- tccli/services/ess/v20201111/examples.json +17 -1
- tccli/services/essbasic/v20210526/api.json +12 -2
- tccli/services/essbasic/v20210526/examples.json +4 -4
- tccli/services/hunyuan/v20230901/api.json +6 -6
- tccli/services/hunyuan/v20230901/examples.json +6 -6
- tccli/services/iotexplorer/iotexplorer_client.py +326 -8
- tccli/services/iotexplorer/v20190423/api.json +583 -0
- tccli/services/iotexplorer/v20190423/examples.json +48 -0
- tccli/services/monitor/v20180724/api.json +27 -0
- tccli/services/mps/v20190612/api.json +67 -1
- tccli/services/svp/svp_client.py +159 -0
- tccli/services/svp/v20240125/api.json +723 -0
- tccli/services/svp/v20240125/examples.json +24 -0
- tccli/services/tdmq/v20200217/api.json +2 -2
- tccli/services/tione/v20211111/api.json +11 -0
- {tccli-3.0.1113.1.dist-info → tccli-3.0.1115.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1113.1.dist-info → tccli-3.0.1115.1.dist-info}/RECORD +39 -39
- {tccli-3.0.1113.1.dist-info → tccli-3.0.1115.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1113.1.dist-info → tccli-3.0.1115.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1113.1.dist-info → tccli-3.0.1115.1.dist-info}/license_files/LICENSE +0 -0
@@ -173,6 +173,58 @@ def doModifyOAuthSetting(args, parsed_globals):
|
|
173
173
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
174
174
|
|
175
175
|
|
176
|
+
def doDeleteDeviceGroupMembers(args, parsed_globals):
|
177
|
+
g_param = parse_global_arg(parsed_globals)
|
178
|
+
|
179
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
180
|
+
cred = credential.CVMRoleCredential()
|
181
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
182
|
+
cred = credential.STSAssumeRoleCredential(
|
183
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
184
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
185
|
+
)
|
186
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
187
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
188
|
+
else:
|
189
|
+
cred = credential.Credential(
|
190
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
191
|
+
)
|
192
|
+
http_profile = HttpProfile(
|
193
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
194
|
+
reqMethod="POST",
|
195
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
196
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
197
|
+
)
|
198
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
199
|
+
if g_param[OptionsDefine.Language]:
|
200
|
+
profile.language = g_param[OptionsDefine.Language]
|
201
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
202
|
+
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
203
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
204
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
205
|
+
model = models.DeleteDeviceGroupMembersRequest()
|
206
|
+
model.from_json_string(json.dumps(args))
|
207
|
+
start_time = time.time()
|
208
|
+
while True:
|
209
|
+
rsp = client.DeleteDeviceGroupMembers(model)
|
210
|
+
result = rsp.to_json_string()
|
211
|
+
try:
|
212
|
+
json_obj = json.loads(result)
|
213
|
+
except TypeError as e:
|
214
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
215
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
216
|
+
break
|
217
|
+
cur_time = time.time()
|
218
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
219
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
220
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
221
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
222
|
+
else:
|
223
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
224
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
225
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
226
|
+
|
227
|
+
|
176
228
|
def doDescribeLoginEvent(args, parsed_globals):
|
177
229
|
g_param = parse_global_arg(parsed_globals)
|
178
230
|
|
@@ -433,7 +485,7 @@ def doDeleteDevices(args, parsed_globals):
|
|
433
485
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
434
486
|
|
435
487
|
|
436
|
-
def
|
488
|
+
def doCreateChangePwdTask(args, parsed_globals):
|
437
489
|
g_param = parse_global_arg(parsed_globals)
|
438
490
|
|
439
491
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -462,11 +514,11 @@ def doAddUserGroupMembers(args, parsed_globals):
|
|
462
514
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
463
515
|
client._sdkVersion += ("_CLI_" + __version__)
|
464
516
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
465
|
-
model = models.
|
517
|
+
model = models.CreateChangePwdTaskRequest()
|
466
518
|
model.from_json_string(json.dumps(args))
|
467
519
|
start_time = time.time()
|
468
520
|
while True:
|
469
|
-
rsp = client.
|
521
|
+
rsp = client.CreateChangePwdTask(model)
|
470
522
|
result = rsp.to_json_string()
|
471
523
|
try:
|
472
524
|
json_obj = json.loads(result)
|
@@ -953,6 +1005,58 @@ def doDeleteUserGroupMembers(args, parsed_globals):
|
|
953
1005
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
954
1006
|
|
955
1007
|
|
1008
|
+
def doModifyChangePwdTask(args, parsed_globals):
|
1009
|
+
g_param = parse_global_arg(parsed_globals)
|
1010
|
+
|
1011
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1012
|
+
cred = credential.CVMRoleCredential()
|
1013
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1014
|
+
cred = credential.STSAssumeRoleCredential(
|
1015
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1016
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1017
|
+
)
|
1018
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1019
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1020
|
+
else:
|
1021
|
+
cred = credential.Credential(
|
1022
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1023
|
+
)
|
1024
|
+
http_profile = HttpProfile(
|
1025
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1026
|
+
reqMethod="POST",
|
1027
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1028
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1029
|
+
)
|
1030
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1031
|
+
if g_param[OptionsDefine.Language]:
|
1032
|
+
profile.language = g_param[OptionsDefine.Language]
|
1033
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1034
|
+
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1035
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1036
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1037
|
+
model = models.ModifyChangePwdTaskRequest()
|
1038
|
+
model.from_json_string(json.dumps(args))
|
1039
|
+
start_time = time.time()
|
1040
|
+
while True:
|
1041
|
+
rsp = client.ModifyChangePwdTask(model)
|
1042
|
+
result = rsp.to_json_string()
|
1043
|
+
try:
|
1044
|
+
json_obj = json.loads(result)
|
1045
|
+
except TypeError as e:
|
1046
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1047
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1048
|
+
break
|
1049
|
+
cur_time = time.time()
|
1050
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1051
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1052
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1053
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1054
|
+
else:
|
1055
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1056
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1057
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1058
|
+
|
1059
|
+
|
956
1060
|
def doCreateAssetSyncJob(args, parsed_globals):
|
957
1061
|
g_param = parse_global_arg(parsed_globals)
|
958
1062
|
|
@@ -1057,6 +1161,58 @@ def doCreateDeviceAccount(args, parsed_globals):
|
|
1057
1161
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1058
1162
|
|
1059
1163
|
|
1164
|
+
def doRunChangePwdTask(args, parsed_globals):
|
1165
|
+
g_param = parse_global_arg(parsed_globals)
|
1166
|
+
|
1167
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1168
|
+
cred = credential.CVMRoleCredential()
|
1169
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1170
|
+
cred = credential.STSAssumeRoleCredential(
|
1171
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1172
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1173
|
+
)
|
1174
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1175
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1176
|
+
else:
|
1177
|
+
cred = credential.Credential(
|
1178
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1179
|
+
)
|
1180
|
+
http_profile = HttpProfile(
|
1181
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1182
|
+
reqMethod="POST",
|
1183
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1184
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1185
|
+
)
|
1186
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1187
|
+
if g_param[OptionsDefine.Language]:
|
1188
|
+
profile.language = g_param[OptionsDefine.Language]
|
1189
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1190
|
+
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1191
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1192
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1193
|
+
model = models.RunChangePwdTaskRequest()
|
1194
|
+
model.from_json_string(json.dumps(args))
|
1195
|
+
start_time = time.time()
|
1196
|
+
while True:
|
1197
|
+
rsp = client.RunChangePwdTask(model)
|
1198
|
+
result = rsp.to_json_string()
|
1199
|
+
try:
|
1200
|
+
json_obj = json.loads(result)
|
1201
|
+
except TypeError as e:
|
1202
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1203
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1204
|
+
break
|
1205
|
+
cur_time = time.time()
|
1206
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1207
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1208
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1209
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1210
|
+
else:
|
1211
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1212
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1213
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1214
|
+
|
1215
|
+
|
1060
1216
|
def doResetDeviceAccountPassword(args, parsed_globals):
|
1061
1217
|
g_param = parse_global_arg(parsed_globals)
|
1062
1218
|
|
@@ -1213,6 +1369,110 @@ def doDeleteDeviceGroups(args, parsed_globals):
|
|
1213
1369
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1214
1370
|
|
1215
1371
|
|
1372
|
+
def doCreateUser(args, parsed_globals):
|
1373
|
+
g_param = parse_global_arg(parsed_globals)
|
1374
|
+
|
1375
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1376
|
+
cred = credential.CVMRoleCredential()
|
1377
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1378
|
+
cred = credential.STSAssumeRoleCredential(
|
1379
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1380
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1381
|
+
)
|
1382
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1383
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1384
|
+
else:
|
1385
|
+
cred = credential.Credential(
|
1386
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1387
|
+
)
|
1388
|
+
http_profile = HttpProfile(
|
1389
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1390
|
+
reqMethod="POST",
|
1391
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1392
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1393
|
+
)
|
1394
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1395
|
+
if g_param[OptionsDefine.Language]:
|
1396
|
+
profile.language = g_param[OptionsDefine.Language]
|
1397
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1398
|
+
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1399
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1400
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1401
|
+
model = models.CreateUserRequest()
|
1402
|
+
model.from_json_string(json.dumps(args))
|
1403
|
+
start_time = time.time()
|
1404
|
+
while True:
|
1405
|
+
rsp = client.CreateUser(model)
|
1406
|
+
result = rsp.to_json_string()
|
1407
|
+
try:
|
1408
|
+
json_obj = json.loads(result)
|
1409
|
+
except TypeError as e:
|
1410
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1411
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1412
|
+
break
|
1413
|
+
cur_time = time.time()
|
1414
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1415
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1416
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1417
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1418
|
+
else:
|
1419
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1420
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1421
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1422
|
+
|
1423
|
+
|
1424
|
+
def doAddUserGroupMembers(args, parsed_globals):
|
1425
|
+
g_param = parse_global_arg(parsed_globals)
|
1426
|
+
|
1427
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1428
|
+
cred = credential.CVMRoleCredential()
|
1429
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1430
|
+
cred = credential.STSAssumeRoleCredential(
|
1431
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1432
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1433
|
+
)
|
1434
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1435
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1436
|
+
else:
|
1437
|
+
cred = credential.Credential(
|
1438
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1439
|
+
)
|
1440
|
+
http_profile = HttpProfile(
|
1441
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1442
|
+
reqMethod="POST",
|
1443
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1444
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1445
|
+
)
|
1446
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1447
|
+
if g_param[OptionsDefine.Language]:
|
1448
|
+
profile.language = g_param[OptionsDefine.Language]
|
1449
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1450
|
+
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1451
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1452
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1453
|
+
model = models.AddUserGroupMembersRequest()
|
1454
|
+
model.from_json_string(json.dumps(args))
|
1455
|
+
start_time = time.time()
|
1456
|
+
while True:
|
1457
|
+
rsp = client.AddUserGroupMembers(model)
|
1458
|
+
result = rsp.to_json_string()
|
1459
|
+
try:
|
1460
|
+
json_obj = json.loads(result)
|
1461
|
+
except TypeError as e:
|
1462
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1463
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1464
|
+
break
|
1465
|
+
cur_time = time.time()
|
1466
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1467
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1468
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1469
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1470
|
+
else:
|
1471
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1472
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1473
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1474
|
+
|
1475
|
+
|
1216
1476
|
def doModifyAcl(args, parsed_globals):
|
1217
1477
|
g_param = parse_global_arg(parsed_globals)
|
1218
1478
|
|
@@ -1473,7 +1733,7 @@ def doCreateResource(args, parsed_globals):
|
|
1473
1733
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1474
1734
|
|
1475
1735
|
|
1476
|
-
def
|
1736
|
+
def doDescribeAcls(args, parsed_globals):
|
1477
1737
|
g_param = parse_global_arg(parsed_globals)
|
1478
1738
|
|
1479
1739
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1502,11 +1762,11 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
|
|
1502
1762
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1503
1763
|
client._sdkVersion += ("_CLI_" + __version__)
|
1504
1764
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1505
|
-
model = models.
|
1765
|
+
model = models.DescribeAclsRequest()
|
1506
1766
|
model.from_json_string(json.dumps(args))
|
1507
1767
|
start_time = time.time()
|
1508
1768
|
while True:
|
1509
|
-
rsp = client.
|
1769
|
+
rsp = client.DescribeAcls(model)
|
1510
1770
|
result = rsp.to_json_string()
|
1511
1771
|
try:
|
1512
1772
|
json_obj = json.loads(result)
|
@@ -1525,7 +1785,7 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
|
|
1525
1785
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1526
1786
|
|
1527
1787
|
|
1528
|
-
def
|
1788
|
+
def doSearchAuditLog(args, parsed_globals):
|
1529
1789
|
g_param = parse_global_arg(parsed_globals)
|
1530
1790
|
|
1531
1791
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1554,11 +1814,11 @@ def doDescribeAcls(args, parsed_globals):
|
|
1554
1814
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1555
1815
|
client._sdkVersion += ("_CLI_" + __version__)
|
1556
1816
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1557
|
-
model = models.
|
1817
|
+
model = models.SearchAuditLogRequest()
|
1558
1818
|
model.from_json_string(json.dumps(args))
|
1559
1819
|
start_time = time.time()
|
1560
1820
|
while True:
|
1561
|
-
rsp = client.
|
1821
|
+
rsp = client.SearchAuditLog(model)
|
1562
1822
|
result = rsp.to_json_string()
|
1563
1823
|
try:
|
1564
1824
|
json_obj = json.loads(result)
|
@@ -1577,7 +1837,7 @@ def doDescribeAcls(args, parsed_globals):
|
|
1577
1837
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1578
1838
|
|
1579
1839
|
|
1580
|
-
def
|
1840
|
+
def doAddDeviceGroupMembers(args, parsed_globals):
|
1581
1841
|
g_param = parse_global_arg(parsed_globals)
|
1582
1842
|
|
1583
1843
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1606,11 +1866,11 @@ def doCreateUser(args, parsed_globals):
|
|
1606
1866
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1607
1867
|
client._sdkVersion += ("_CLI_" + __version__)
|
1608
1868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1609
|
-
model = models.
|
1869
|
+
model = models.AddDeviceGroupMembersRequest()
|
1610
1870
|
model.from_json_string(json.dumps(args))
|
1611
1871
|
start_time = time.time()
|
1612
1872
|
while True:
|
1613
|
-
rsp = client.
|
1873
|
+
rsp = client.AddDeviceGroupMembers(model)
|
1614
1874
|
result = rsp.to_json_string()
|
1615
1875
|
try:
|
1616
1876
|
json_obj = json.loads(result)
|
@@ -1629,7 +1889,7 @@ def doCreateUser(args, parsed_globals):
|
|
1629
1889
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1630
1890
|
|
1631
1891
|
|
1632
|
-
def
|
1892
|
+
def doModifyCmdTemplate(args, parsed_globals):
|
1633
1893
|
g_param = parse_global_arg(parsed_globals)
|
1634
1894
|
|
1635
1895
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1658,11 +1918,11 @@ def doAddDeviceGroupMembers(args, parsed_globals):
|
|
1658
1918
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1659
1919
|
client._sdkVersion += ("_CLI_" + __version__)
|
1660
1920
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1661
|
-
model = models.
|
1921
|
+
model = models.ModifyCmdTemplateRequest()
|
1662
1922
|
model.from_json_string(json.dumps(args))
|
1663
1923
|
start_time = time.time()
|
1664
1924
|
while True:
|
1665
|
-
rsp = client.
|
1925
|
+
rsp = client.ModifyCmdTemplate(model)
|
1666
1926
|
result = rsp.to_json_string()
|
1667
1927
|
try:
|
1668
1928
|
json_obj = json.loads(result)
|
@@ -1681,7 +1941,7 @@ def doAddDeviceGroupMembers(args, parsed_globals):
|
|
1681
1941
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1682
1942
|
|
1683
1943
|
|
1684
|
-
def
|
1944
|
+
def doDeleteChangePwdTask(args, parsed_globals):
|
1685
1945
|
g_param = parse_global_arg(parsed_globals)
|
1686
1946
|
|
1687
1947
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1710,11 +1970,11 @@ def doModifyCmdTemplate(args, parsed_globals):
|
|
1710
1970
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
1711
1971
|
client._sdkVersion += ("_CLI_" + __version__)
|
1712
1972
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1713
|
-
model = models.
|
1973
|
+
model = models.DeleteChangePwdTaskRequest()
|
1714
1974
|
model.from_json_string(json.dumps(args))
|
1715
1975
|
start_time = time.time()
|
1716
1976
|
while True:
|
1717
|
-
rsp = client.
|
1977
|
+
rsp = client.DeleteChangePwdTask(model)
|
1718
1978
|
result = rsp.to_json_string()
|
1719
1979
|
try:
|
1720
1980
|
json_obj = json.loads(result)
|
@@ -2201,7 +2461,7 @@ def doDeleteCmdTemplates(args, parsed_globals):
|
|
2201
2461
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2202
2462
|
|
2203
2463
|
|
2204
|
-
def
|
2464
|
+
def doDescribeAssetSyncStatus(args, parsed_globals):
|
2205
2465
|
g_param = parse_global_arg(parsed_globals)
|
2206
2466
|
|
2207
2467
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2230,11 +2490,11 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
|
|
2230
2490
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
2231
2491
|
client._sdkVersion += ("_CLI_" + __version__)
|
2232
2492
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2233
|
-
model = models.
|
2493
|
+
model = models.DescribeAssetSyncStatusRequest()
|
2234
2494
|
model.from_json_string(json.dumps(args))
|
2235
2495
|
start_time = time.time()
|
2236
2496
|
while True:
|
2237
|
-
rsp = client.
|
2497
|
+
rsp = client.DescribeAssetSyncStatus(model)
|
2238
2498
|
result = rsp.to_json_string()
|
2239
2499
|
try:
|
2240
2500
|
json_obj = json.loads(result)
|
@@ -2565,6 +2825,58 @@ def doImportExternalDevice(args, parsed_globals):
|
|
2565
2825
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2566
2826
|
|
2567
2827
|
|
2828
|
+
def doDescribeChangePwdTask(args, parsed_globals):
|
2829
|
+
g_param = parse_global_arg(parsed_globals)
|
2830
|
+
|
2831
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2832
|
+
cred = credential.CVMRoleCredential()
|
2833
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2834
|
+
cred = credential.STSAssumeRoleCredential(
|
2835
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2836
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2837
|
+
)
|
2838
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2839
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2840
|
+
else:
|
2841
|
+
cred = credential.Credential(
|
2842
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2843
|
+
)
|
2844
|
+
http_profile = HttpProfile(
|
2845
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2846
|
+
reqMethod="POST",
|
2847
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2848
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2849
|
+
)
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2851
|
+
if g_param[OptionsDefine.Language]:
|
2852
|
+
profile.language = g_param[OptionsDefine.Language]
|
2853
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2854
|
+
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
2855
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2856
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2857
|
+
model = models.DescribeChangePwdTaskRequest()
|
2858
|
+
model.from_json_string(json.dumps(args))
|
2859
|
+
start_time = time.time()
|
2860
|
+
while True:
|
2861
|
+
rsp = client.DescribeChangePwdTask(model)
|
2862
|
+
result = rsp.to_json_string()
|
2863
|
+
try:
|
2864
|
+
json_obj = json.loads(result)
|
2865
|
+
except TypeError as e:
|
2866
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2867
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2868
|
+
break
|
2869
|
+
cur_time = time.time()
|
2870
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2871
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2872
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2873
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2874
|
+
else:
|
2875
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2876
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2877
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2878
|
+
|
2879
|
+
|
2568
2880
|
def doSearchFile(args, parsed_globals):
|
2569
2881
|
g_param = parse_global_arg(parsed_globals)
|
2570
2882
|
|
@@ -2721,7 +3033,7 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
|
|
2721
3033
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2722
3034
|
|
2723
3035
|
|
2724
|
-
def
|
3036
|
+
def doDescribeChangePwdTaskDetail(args, parsed_globals):
|
2725
3037
|
g_param = parse_global_arg(parsed_globals)
|
2726
3038
|
|
2727
3039
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2750,11 +3062,11 @@ def doSearchAuditLog(args, parsed_globals):
|
|
2750
3062
|
client = mod.DasbClient(cred, g_param[OptionsDefine.Region], profile)
|
2751
3063
|
client._sdkVersion += ("_CLI_" + __version__)
|
2752
3064
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2753
|
-
model = models.
|
3065
|
+
model = models.DescribeChangePwdTaskDetailRequest()
|
2754
3066
|
model.from_json_string(json.dumps(args))
|
2755
3067
|
start_time = time.time()
|
2756
3068
|
while True:
|
2757
|
-
rsp = client.
|
3069
|
+
rsp = client.DescribeChangePwdTaskDetail(model)
|
2758
3070
|
result = rsp.to_json_string()
|
2759
3071
|
try:
|
2760
3072
|
json_obj = json.loads(result)
|
@@ -2943,12 +3255,13 @@ ACTION_MAP = {
|
|
2943
3255
|
"ModifyDeviceGroup": doModifyDeviceGroup,
|
2944
3256
|
"DescribeDeviceGroupMembers": doDescribeDeviceGroupMembers,
|
2945
3257
|
"ModifyOAuthSetting": doModifyOAuthSetting,
|
3258
|
+
"DeleteDeviceGroupMembers": doDeleteDeviceGroupMembers,
|
2946
3259
|
"DescribeLoginEvent": doDescribeLoginEvent,
|
2947
3260
|
"CreateDeviceGroup": doCreateDeviceGroup,
|
2948
3261
|
"DeleteDeviceAccounts": doDeleteDeviceAccounts,
|
2949
3262
|
"ResetUser": doResetUser,
|
2950
3263
|
"DeleteDevices": doDeleteDevices,
|
2951
|
-
"
|
3264
|
+
"CreateChangePwdTask": doCreateChangePwdTask,
|
2952
3265
|
"DescribeUserGroups": doDescribeUserGroups,
|
2953
3266
|
"DeployResource": doDeployResource,
|
2954
3267
|
"ModifyDevice": doModifyDevice,
|
@@ -2958,21 +3271,25 @@ ACTION_MAP = {
|
|
2958
3271
|
"DeleteAcls": doDeleteAcls,
|
2959
3272
|
"DescribeResources": doDescribeResources,
|
2960
3273
|
"DeleteUserGroupMembers": doDeleteUserGroupMembers,
|
3274
|
+
"ModifyChangePwdTask": doModifyChangePwdTask,
|
2961
3275
|
"CreateAssetSyncJob": doCreateAssetSyncJob,
|
2962
3276
|
"CreateDeviceAccount": doCreateDeviceAccount,
|
3277
|
+
"RunChangePwdTask": doRunChangePwdTask,
|
2963
3278
|
"ResetDeviceAccountPassword": doResetDeviceAccountPassword,
|
2964
3279
|
"ModifyUserGroup": doModifyUserGroup,
|
2965
3280
|
"DeleteDeviceGroups": doDeleteDeviceGroups,
|
3281
|
+
"CreateUser": doCreateUser,
|
3282
|
+
"AddUserGroupMembers": doAddUserGroupMembers,
|
2966
3283
|
"ModifyAcl": doModifyAcl,
|
2967
3284
|
"DeleteUsers": doDeleteUsers,
|
2968
3285
|
"CreateAcl": doCreateAcl,
|
2969
3286
|
"SearchCommandBySid": doSearchCommandBySid,
|
2970
3287
|
"CreateResource": doCreateResource,
|
2971
|
-
"DescribeAssetSyncStatus": doDescribeAssetSyncStatus,
|
2972
3288
|
"DescribeAcls": doDescribeAcls,
|
2973
|
-
"
|
3289
|
+
"SearchAuditLog": doSearchAuditLog,
|
2974
3290
|
"AddDeviceGroupMembers": doAddDeviceGroupMembers,
|
2975
3291
|
"ModifyCmdTemplate": doModifyCmdTemplate,
|
3292
|
+
"DeleteChangePwdTask": doDeleteChangePwdTask,
|
2976
3293
|
"DescribeOperationEvent": doDescribeOperationEvent,
|
2977
3294
|
"DescribeDeviceAccounts": doDescribeDeviceAccounts,
|
2978
3295
|
"DeleteUserGroups": doDeleteUserGroups,
|
@@ -2982,17 +3299,18 @@ ACTION_MAP = {
|
|
2982
3299
|
"DescribeCmdTemplates": doDescribeCmdTemplates,
|
2983
3300
|
"DescribeDasbImageIds": doDescribeDasbImageIds,
|
2984
3301
|
"DeleteCmdTemplates": doDeleteCmdTemplates,
|
2985
|
-
"
|
3302
|
+
"DescribeAssetSyncStatus": doDescribeAssetSyncStatus,
|
2986
3303
|
"DescribeDeviceGroups": doDescribeDeviceGroups,
|
2987
3304
|
"DescribeUsers": doDescribeUsers,
|
2988
3305
|
"DescribeDevices": doDescribeDevices,
|
2989
3306
|
"DescribeUserGroupMembers": doDescribeUserGroupMembers,
|
2990
3307
|
"SearchFileBySid": doSearchFileBySid,
|
2991
3308
|
"ImportExternalDevice": doImportExternalDevice,
|
3309
|
+
"DescribeChangePwdTask": doDescribeChangePwdTask,
|
2992
3310
|
"SearchFile": doSearchFile,
|
2993
3311
|
"CreateUserGroup": doCreateUserGroup,
|
2994
3312
|
"ResetDeviceAccountPrivateKey": doResetDeviceAccountPrivateKey,
|
2995
|
-
"
|
3313
|
+
"DescribeChangePwdTaskDetail": doDescribeChangePwdTaskDetail,
|
2996
3314
|
"BindDeviceAccountPrivateKey": doBindDeviceAccountPrivateKey,
|
2997
3315
|
"SearchCommand": doSearchCommand,
|
2998
3316
|
"SearchSessionCommand": doSearchSessionCommand,
|