tccli 3.0.1155.1__py2.py3-none-any.whl → 3.0.1157.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/autoscaling/v20180419/api.json +48 -20
- tccli/services/cam/v20190116/api.json +10 -0
- tccli/services/ccc/v20200210/api.json +10 -0
- tccli/services/ccc/v20200210/examples.json +1 -1
- tccli/services/cdb/v20170320/api.json +38 -1
- tccli/services/cdwch/v20200915/api.json +27 -0
- tccli/services/cdwdoris/v20211228/api.json +27 -0
- tccli/services/cynosdb/v20190107/api.json +1 -1
- tccli/services/dts/v20211206/api.json +9 -0
- tccli/services/ess/ess_client.py +53 -0
- tccli/services/ess/v20201111/api.json +91 -0
- tccli/services/ess/v20201111/examples.json +8 -0
- tccli/services/gaap/v20180529/api.json +17 -17
- tccli/services/gaap/v20180529/examples.json +7 -13
- tccli/services/hunyuan/v20230901/api.json +2 -2
- tccli/services/iss/v20230517/api.json +6 -6
- tccli/services/mongodb/mongodb_client.py +273 -8
- tccli/services/mongodb/v20190725/api.json +486 -6
- tccli/services/mongodb/v20190725/examples.json +40 -0
- tccli/services/monitor/v20180724/api.json +23 -23
- tccli/services/monitor/v20180724/examples.json +12 -12
- tccli/services/mps/v20190612/api.json +2 -2
- tccli/services/mps/v20190612/examples.json +2 -2
- tccli/services/oceanus/v20190422/api.json +9 -0
- tccli/services/postgres/postgres_client.py +395 -24
- tccli/services/postgres/v20170312/api.json +549 -0
- tccli/services/postgres/v20170312/examples.json +92 -0
- tccli/services/rce/v20201103/api.json +78 -0
- tccli/services/tcr/v20190924/api.json +71 -45
- tccli/services/tcr/v20190924/examples.json +9 -9
- tccli/services/tem/v20210701/api.json +21 -3
- tccli/services/tem/v20210701/examples.json +1 -7
- tccli/services/thpc/thpc_client.py +110 -4
- tccli/services/thpc/v20230321/api.json +170 -35
- tccli/services/thpc/v20230321/examples.json +17 -1
- tccli/services/tke/v20220501/api.json +10 -0
- tccli/services/vclm/v20240523/api.json +9 -0
- tccli/services/vpc/v20170312/api.json +74 -15
- tccli/services/waf/v20180125/api.json +421 -72
- tccli/services/waf/v20180125/examples.json +6 -6
- tccli/services/wedata/v20210820/api.json +45 -7
- tccli/services/wedata/v20210820/examples.json +6 -0
- {tccli-3.0.1155.1.dist-info → tccli-3.0.1157.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1155.1.dist-info → tccli-3.0.1157.1.dist-info}/RECORD +48 -48
- {tccli-3.0.1155.1.dist-info → tccli-3.0.1157.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1155.1.dist-info → tccli-3.0.1157.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1155.1.dist-info → tccli-3.0.1157.1.dist-info}/license_files/LICENSE +0 -0
@@ -17,7 +17,7 @@ from tencentcloud.postgres.v20170312 import models as models_v20170312
|
|
17
17
|
from jmespath import search
|
18
18
|
import time
|
19
19
|
|
20
|
-
def
|
20
|
+
def doDescribeDatabaseObjects(args, parsed_globals):
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
22
22
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -46,11 +46,11 @@ def doCreateReadOnlyGroupNetworkAccess(args, parsed_globals):
|
|
46
46
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
47
47
|
client._sdkVersion += ("_CLI_" + __version__)
|
48
48
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
49
|
-
model = models.
|
49
|
+
model = models.DescribeDatabaseObjectsRequest()
|
50
50
|
model.from_json_string(json.dumps(args))
|
51
51
|
start_time = time.time()
|
52
52
|
while True:
|
53
|
-
rsp = client.
|
53
|
+
rsp = client.DescribeDatabaseObjects(model)
|
54
54
|
result = rsp.to_json_string()
|
55
55
|
try:
|
56
56
|
json_obj = json.loads(result)
|
@@ -225,7 +225,7 @@ def doDescribeDBInstanceHAConfig(args, parsed_globals):
|
|
225
225
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
226
226
|
|
227
227
|
|
228
|
-
def
|
228
|
+
def doDescribeBackupOverview(args, parsed_globals):
|
229
229
|
g_param = parse_global_arg(parsed_globals)
|
230
230
|
|
231
231
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -254,11 +254,11 @@ def doRebalanceReadOnlyGroup(args, parsed_globals):
|
|
254
254
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
255
255
|
client._sdkVersion += ("_CLI_" + __version__)
|
256
256
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
257
|
-
model = models.
|
257
|
+
model = models.DescribeBackupOverviewRequest()
|
258
258
|
model.from_json_string(json.dumps(args))
|
259
259
|
start_time = time.time()
|
260
260
|
while True:
|
261
|
-
rsp = client.
|
261
|
+
rsp = client.DescribeBackupOverview(model)
|
262
262
|
result = rsp.to_json_string()
|
263
263
|
try:
|
264
264
|
json_obj = json.loads(result)
|
@@ -745,7 +745,7 @@ def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
|
745
745
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
746
746
|
|
747
747
|
|
748
|
-
def
|
748
|
+
def doRenewInstance(args, parsed_globals):
|
749
749
|
g_param = parse_global_arg(parsed_globals)
|
750
750
|
|
751
751
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -774,11 +774,11 @@ def doCreateServerlessDBInstance(args, parsed_globals):
|
|
774
774
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
775
775
|
client._sdkVersion += ("_CLI_" + __version__)
|
776
776
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
777
|
-
model = models.
|
777
|
+
model = models.RenewInstanceRequest()
|
778
778
|
model.from_json_string(json.dumps(args))
|
779
779
|
start_time = time.time()
|
780
780
|
while True:
|
781
|
-
rsp = client.
|
781
|
+
rsp = client.RenewInstance(model)
|
782
782
|
result = rsp.to_json_string()
|
783
783
|
try:
|
784
784
|
json_obj = json.loads(result)
|
@@ -1005,6 +1005,58 @@ def doDescribeDBSlowlogs(args, parsed_globals):
|
|
1005
1005
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1006
1006
|
|
1007
1007
|
|
1008
|
+
def doDescribeAccountPrivileges(args, parsed_globals):
|
1009
|
+
g_param = parse_global_arg(parsed_globals)
|
1010
|
+
|
1011
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1012
|
+
cred = credential.CVMRoleCredential()
|
1013
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1014
|
+
cred = credential.STSAssumeRoleCredential(
|
1015
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1016
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1017
|
+
)
|
1018
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1019
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1020
|
+
else:
|
1021
|
+
cred = credential.Credential(
|
1022
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1023
|
+
)
|
1024
|
+
http_profile = HttpProfile(
|
1025
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1026
|
+
reqMethod="POST",
|
1027
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1028
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1029
|
+
)
|
1030
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1031
|
+
if g_param[OptionsDefine.Language]:
|
1032
|
+
profile.language = g_param[OptionsDefine.Language]
|
1033
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1034
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
1035
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1036
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1037
|
+
model = models.DescribeAccountPrivilegesRequest()
|
1038
|
+
model.from_json_string(json.dumps(args))
|
1039
|
+
start_time = time.time()
|
1040
|
+
while True:
|
1041
|
+
rsp = client.DescribeAccountPrivileges(model)
|
1042
|
+
result = rsp.to_json_string()
|
1043
|
+
try:
|
1044
|
+
json_obj = json.loads(result)
|
1045
|
+
except TypeError as e:
|
1046
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1047
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1048
|
+
break
|
1049
|
+
cur_time = time.time()
|
1050
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1051
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1052
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1053
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1054
|
+
else:
|
1055
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1056
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1057
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1058
|
+
|
1059
|
+
|
1008
1060
|
def doDeleteReadOnlyGroupNetworkAccess(args, parsed_globals):
|
1009
1061
|
g_param = parse_global_arg(parsed_globals)
|
1010
1062
|
|
@@ -1109,6 +1161,58 @@ def doDescribeDefaultParameters(args, parsed_globals):
|
|
1109
1161
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1110
1162
|
|
1111
1163
|
|
1164
|
+
def doUnlockAccount(args, parsed_globals):
|
1165
|
+
g_param = parse_global_arg(parsed_globals)
|
1166
|
+
|
1167
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1168
|
+
cred = credential.CVMRoleCredential()
|
1169
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1170
|
+
cred = credential.STSAssumeRoleCredential(
|
1171
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1172
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1173
|
+
)
|
1174
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1175
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1176
|
+
else:
|
1177
|
+
cred = credential.Credential(
|
1178
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1179
|
+
)
|
1180
|
+
http_profile = HttpProfile(
|
1181
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1182
|
+
reqMethod="POST",
|
1183
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1184
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1185
|
+
)
|
1186
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1187
|
+
if g_param[OptionsDefine.Language]:
|
1188
|
+
profile.language = g_param[OptionsDefine.Language]
|
1189
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1190
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
1191
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1192
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1193
|
+
model = models.UnlockAccountRequest()
|
1194
|
+
model.from_json_string(json.dumps(args))
|
1195
|
+
start_time = time.time()
|
1196
|
+
while True:
|
1197
|
+
rsp = client.UnlockAccount(model)
|
1198
|
+
result = rsp.to_json_string()
|
1199
|
+
try:
|
1200
|
+
json_obj = json.loads(result)
|
1201
|
+
except TypeError as e:
|
1202
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1203
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1204
|
+
break
|
1205
|
+
cur_time = time.time()
|
1206
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1207
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1208
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1209
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1210
|
+
else:
|
1211
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1212
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1213
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1214
|
+
|
1215
|
+
|
1112
1216
|
def doDestroyDBInstance(args, parsed_globals):
|
1113
1217
|
g_param = parse_global_arg(parsed_globals)
|
1114
1218
|
|
@@ -1577,7 +1681,7 @@ def doModifyDBInstanceDeployment(args, parsed_globals):
|
|
1577
1681
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1578
1682
|
|
1579
1683
|
|
1580
|
-
def
|
1684
|
+
def doCreateServerlessDBInstance(args, parsed_globals):
|
1581
1685
|
g_param = parse_global_arg(parsed_globals)
|
1582
1686
|
|
1583
1687
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1606,11 +1710,63 @@ def doRenewInstance(args, parsed_globals):
|
|
1606
1710
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
1607
1711
|
client._sdkVersion += ("_CLI_" + __version__)
|
1608
1712
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1609
|
-
model = models.
|
1713
|
+
model = models.CreateServerlessDBInstanceRequest()
|
1610
1714
|
model.from_json_string(json.dumps(args))
|
1611
1715
|
start_time = time.time()
|
1612
1716
|
while True:
|
1613
|
-
rsp = client.
|
1717
|
+
rsp = client.CreateServerlessDBInstance(model)
|
1718
|
+
result = rsp.to_json_string()
|
1719
|
+
try:
|
1720
|
+
json_obj = json.loads(result)
|
1721
|
+
except TypeError as e:
|
1722
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1723
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1724
|
+
break
|
1725
|
+
cur_time = time.time()
|
1726
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1727
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1728
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1729
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1730
|
+
else:
|
1731
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1732
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1733
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1734
|
+
|
1735
|
+
|
1736
|
+
def doCreateAccount(args, parsed_globals):
|
1737
|
+
g_param = parse_global_arg(parsed_globals)
|
1738
|
+
|
1739
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1740
|
+
cred = credential.CVMRoleCredential()
|
1741
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1742
|
+
cred = credential.STSAssumeRoleCredential(
|
1743
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1744
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1745
|
+
)
|
1746
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1747
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1748
|
+
else:
|
1749
|
+
cred = credential.Credential(
|
1750
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1751
|
+
)
|
1752
|
+
http_profile = HttpProfile(
|
1753
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1754
|
+
reqMethod="POST",
|
1755
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1756
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1757
|
+
)
|
1758
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1759
|
+
if g_param[OptionsDefine.Language]:
|
1760
|
+
profile.language = g_param[OptionsDefine.Language]
|
1761
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1762
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
1763
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1764
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1765
|
+
model = models.CreateAccountRequest()
|
1766
|
+
model.from_json_string(json.dumps(args))
|
1767
|
+
start_time = time.time()
|
1768
|
+
while True:
|
1769
|
+
rsp = client.CreateAccount(model)
|
1614
1770
|
result = rsp.to_json_string()
|
1615
1771
|
try:
|
1616
1772
|
json_obj = json.loads(result)
|
@@ -2409,7 +2565,7 @@ def doUpgradeDBInstanceMajorVersion(args, parsed_globals):
|
|
2409
2565
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2410
2566
|
|
2411
2567
|
|
2412
|
-
def
|
2568
|
+
def doRebalanceReadOnlyGroup(args, parsed_globals):
|
2413
2569
|
g_param = parse_global_arg(parsed_globals)
|
2414
2570
|
|
2415
2571
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2438,11 +2594,11 @@ def doDescribeBackupOverview(args, parsed_globals):
|
|
2438
2594
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
2439
2595
|
client._sdkVersion += ("_CLI_" + __version__)
|
2440
2596
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2441
|
-
model = models.
|
2597
|
+
model = models.RebalanceReadOnlyGroupRequest()
|
2442
2598
|
model.from_json_string(json.dumps(args))
|
2443
2599
|
start_time = time.time()
|
2444
2600
|
while True:
|
2445
|
-
rsp = client.
|
2601
|
+
rsp = client.RebalanceReadOnlyGroup(model)
|
2446
2602
|
result = rsp.to_json_string()
|
2447
2603
|
try:
|
2448
2604
|
json_obj = json.loads(result)
|
@@ -3241,7 +3397,7 @@ def doModifyBaseBackupExpireTime(args, parsed_globals):
|
|
3241
3397
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3242
3398
|
|
3243
3399
|
|
3244
|
-
def
|
3400
|
+
def doModifyAccountPrivileges(args, parsed_globals):
|
3245
3401
|
g_param = parse_global_arg(parsed_globals)
|
3246
3402
|
|
3247
3403
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3270,11 +3426,11 @@ def doCreateReadOnlyGroup(args, parsed_globals):
|
|
3270
3426
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
3271
3427
|
client._sdkVersion += ("_CLI_" + __version__)
|
3272
3428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3273
|
-
model = models.
|
3429
|
+
model = models.ModifyAccountPrivilegesRequest()
|
3274
3430
|
model.from_json_string(json.dumps(args))
|
3275
3431
|
start_time = time.time()
|
3276
3432
|
while True:
|
3277
|
-
rsp = client.
|
3433
|
+
rsp = client.ModifyAccountPrivileges(model)
|
3278
3434
|
result = rsp.to_json_string()
|
3279
3435
|
try:
|
3280
3436
|
json_obj = json.loads(result)
|
@@ -4177,6 +4333,58 @@ def doOpenDBExtranetAccess(args, parsed_globals):
|
|
4177
4333
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4178
4334
|
|
4179
4335
|
|
4336
|
+
def doDeleteAccount(args, parsed_globals):
|
4337
|
+
g_param = parse_global_arg(parsed_globals)
|
4338
|
+
|
4339
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4340
|
+
cred = credential.CVMRoleCredential()
|
4341
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4342
|
+
cred = credential.STSAssumeRoleCredential(
|
4343
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4344
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4345
|
+
)
|
4346
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4347
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4348
|
+
else:
|
4349
|
+
cred = credential.Credential(
|
4350
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4351
|
+
)
|
4352
|
+
http_profile = HttpProfile(
|
4353
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4354
|
+
reqMethod="POST",
|
4355
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4356
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4357
|
+
)
|
4358
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4359
|
+
if g_param[OptionsDefine.Language]:
|
4360
|
+
profile.language = g_param[OptionsDefine.Language]
|
4361
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4362
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4363
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4364
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4365
|
+
model = models.DeleteAccountRequest()
|
4366
|
+
model.from_json_string(json.dumps(args))
|
4367
|
+
start_time = time.time()
|
4368
|
+
while True:
|
4369
|
+
rsp = client.DeleteAccount(model)
|
4370
|
+
result = rsp.to_json_string()
|
4371
|
+
try:
|
4372
|
+
json_obj = json.loads(result)
|
4373
|
+
except TypeError as e:
|
4374
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4375
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4376
|
+
break
|
4377
|
+
cur_time = time.time()
|
4378
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4379
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4380
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4381
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4382
|
+
else:
|
4383
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4384
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4385
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4386
|
+
|
4387
|
+
|
4180
4388
|
def doModifyBackupPlan(args, parsed_globals):
|
4181
4389
|
g_param = parse_global_arg(parsed_globals)
|
4182
4390
|
|
@@ -4281,6 +4489,58 @@ def doInitDBInstances(args, parsed_globals):
|
|
4281
4489
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4282
4490
|
|
4283
4491
|
|
4492
|
+
def doCreateReadOnlyGroupNetworkAccess(args, parsed_globals):
|
4493
|
+
g_param = parse_global_arg(parsed_globals)
|
4494
|
+
|
4495
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4496
|
+
cred = credential.CVMRoleCredential()
|
4497
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4498
|
+
cred = credential.STSAssumeRoleCredential(
|
4499
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4500
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4501
|
+
)
|
4502
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4503
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4504
|
+
else:
|
4505
|
+
cred = credential.Credential(
|
4506
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4507
|
+
)
|
4508
|
+
http_profile = HttpProfile(
|
4509
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4510
|
+
reqMethod="POST",
|
4511
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4512
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4513
|
+
)
|
4514
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4515
|
+
if g_param[OptionsDefine.Language]:
|
4516
|
+
profile.language = g_param[OptionsDefine.Language]
|
4517
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4518
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4519
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4520
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4521
|
+
model = models.CreateReadOnlyGroupNetworkAccessRequest()
|
4522
|
+
model.from_json_string(json.dumps(args))
|
4523
|
+
start_time = time.time()
|
4524
|
+
while True:
|
4525
|
+
rsp = client.CreateReadOnlyGroupNetworkAccess(model)
|
4526
|
+
result = rsp.to_json_string()
|
4527
|
+
try:
|
4528
|
+
json_obj = json.loads(result)
|
4529
|
+
except TypeError as e:
|
4530
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4531
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4532
|
+
break
|
4533
|
+
cur_time = time.time()
|
4534
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4535
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4536
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4537
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4538
|
+
else:
|
4539
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4540
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4541
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4542
|
+
|
4543
|
+
|
4284
4544
|
def doDescribeZones(args, parsed_globals):
|
4285
4545
|
g_param = parse_global_arg(parsed_globals)
|
4286
4546
|
|
@@ -4385,6 +4645,58 @@ def doInquiryPriceUpgradeDBInstance(args, parsed_globals):
|
|
4385
4645
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4386
4646
|
|
4387
4647
|
|
4648
|
+
def doCreateReadOnlyGroup(args, parsed_globals):
|
4649
|
+
g_param = parse_global_arg(parsed_globals)
|
4650
|
+
|
4651
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4652
|
+
cred = credential.CVMRoleCredential()
|
4653
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4654
|
+
cred = credential.STSAssumeRoleCredential(
|
4655
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4656
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4657
|
+
)
|
4658
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4659
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4660
|
+
else:
|
4661
|
+
cred = credential.Credential(
|
4662
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4663
|
+
)
|
4664
|
+
http_profile = HttpProfile(
|
4665
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4666
|
+
reqMethod="POST",
|
4667
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4668
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4669
|
+
)
|
4670
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4671
|
+
if g_param[OptionsDefine.Language]:
|
4672
|
+
profile.language = g_param[OptionsDefine.Language]
|
4673
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4674
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4675
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4676
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4677
|
+
model = models.CreateReadOnlyGroupRequest()
|
4678
|
+
model.from_json_string(json.dumps(args))
|
4679
|
+
start_time = time.time()
|
4680
|
+
while True:
|
4681
|
+
rsp = client.CreateReadOnlyGroup(model)
|
4682
|
+
result = rsp.to_json_string()
|
4683
|
+
try:
|
4684
|
+
json_obj = json.loads(result)
|
4685
|
+
except TypeError as e:
|
4686
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4687
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4688
|
+
break
|
4689
|
+
cur_time = time.time()
|
4690
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4691
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4692
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4693
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4694
|
+
else:
|
4695
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4696
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4697
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4698
|
+
|
4699
|
+
|
4388
4700
|
def doInquiryPriceRenewDBInstance(args, parsed_globals):
|
4389
4701
|
g_param = parse_global_arg(parsed_globals)
|
4390
4702
|
|
@@ -4541,6 +4853,58 @@ def doDescribeDBVersions(args, parsed_globals):
|
|
4541
4853
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4542
4854
|
|
4543
4855
|
|
4856
|
+
def doLockAccount(args, parsed_globals):
|
4857
|
+
g_param = parse_global_arg(parsed_globals)
|
4858
|
+
|
4859
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4860
|
+
cred = credential.CVMRoleCredential()
|
4861
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4862
|
+
cred = credential.STSAssumeRoleCredential(
|
4863
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4864
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4865
|
+
)
|
4866
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4867
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4868
|
+
else:
|
4869
|
+
cred = credential.Credential(
|
4870
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4871
|
+
)
|
4872
|
+
http_profile = HttpProfile(
|
4873
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4874
|
+
reqMethod="POST",
|
4875
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4876
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4877
|
+
)
|
4878
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4879
|
+
if g_param[OptionsDefine.Language]:
|
4880
|
+
profile.language = g_param[OptionsDefine.Language]
|
4881
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4882
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4883
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4884
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4885
|
+
model = models.LockAccountRequest()
|
4886
|
+
model.from_json_string(json.dumps(args))
|
4887
|
+
start_time = time.time()
|
4888
|
+
while True:
|
4889
|
+
rsp = client.LockAccount(model)
|
4890
|
+
result = rsp.to_json_string()
|
4891
|
+
try:
|
4892
|
+
json_obj = json.loads(result)
|
4893
|
+
except TypeError as e:
|
4894
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4895
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4896
|
+
break
|
4897
|
+
cur_time = time.time()
|
4898
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4899
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4900
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4901
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4902
|
+
else:
|
4903
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4904
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4905
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4906
|
+
|
4907
|
+
|
4544
4908
|
def doDescribeReadOnlyGroups(args, parsed_globals):
|
4545
4909
|
g_param = parse_global_arg(parsed_globals)
|
4546
4910
|
|
@@ -4760,11 +5124,11 @@ MODELS_MAP = {
|
|
4760
5124
|
}
|
4761
5125
|
|
4762
5126
|
ACTION_MAP = {
|
4763
|
-
"
|
5127
|
+
"DescribeDatabaseObjects": doDescribeDatabaseObjects,
|
4764
5128
|
"ModifyDBInstanceChargeType": doModifyDBInstanceChargeType,
|
4765
5129
|
"DescribeDBErrlogs": doDescribeDBErrlogs,
|
4766
5130
|
"DescribeDBInstanceHAConfig": doDescribeDBInstanceHAConfig,
|
4767
|
-
"
|
5131
|
+
"DescribeBackupOverview": doDescribeBackupOverview,
|
4768
5132
|
"ModifyAccountRemark": doModifyAccountRemark,
|
4769
5133
|
"SetAutoRenewFlag": doSetAutoRenewFlag,
|
4770
5134
|
"ModifyDBInstanceName": doModifyDBInstanceName,
|
@@ -4774,13 +5138,15 @@ ACTION_MAP = {
|
|
4774
5138
|
"CreateDBInstanceNetworkAccess": doCreateDBInstanceNetworkAccess,
|
4775
5139
|
"ModifyDBInstanceSpec": doModifyDBInstanceSpec,
|
4776
5140
|
"ModifyDBInstanceSecurityGroups": doModifyDBInstanceSecurityGroups,
|
4777
|
-
"
|
5141
|
+
"RenewInstance": doRenewInstance,
|
4778
5142
|
"DescribeDatabases": doDescribeDatabases,
|
4779
5143
|
"DescribeSlowQueryAnalysis": doDescribeSlowQueryAnalysis,
|
4780
5144
|
"DescribeProductConfig": doDescribeProductConfig,
|
4781
5145
|
"DescribeDBSlowlogs": doDescribeDBSlowlogs,
|
5146
|
+
"DescribeAccountPrivileges": doDescribeAccountPrivileges,
|
4782
5147
|
"DeleteReadOnlyGroupNetworkAccess": doDeleteReadOnlyGroupNetworkAccess,
|
4783
5148
|
"DescribeDefaultParameters": doDescribeDefaultParameters,
|
5149
|
+
"UnlockAccount": doUnlockAccount,
|
4784
5150
|
"DestroyDBInstance": doDestroyDBInstance,
|
4785
5151
|
"DescribeDBBackups": doDescribeDBBackups,
|
4786
5152
|
"DescribeParameterTemplates": doDescribeParameterTemplates,
|
@@ -4790,7 +5156,8 @@ ACTION_MAP = {
|
|
4790
5156
|
"DescribeParameterTemplateAttributes": doDescribeParameterTemplateAttributes,
|
4791
5157
|
"CloseServerlessDBExtranetAccess": doCloseServerlessDBExtranetAccess,
|
4792
5158
|
"ModifyDBInstanceDeployment": doModifyDBInstanceDeployment,
|
4793
|
-
"
|
5159
|
+
"CreateServerlessDBInstance": doCreateServerlessDBInstance,
|
5160
|
+
"CreateAccount": doCreateAccount,
|
4794
5161
|
"ModifyDBInstanceParameters": doModifyDBInstanceParameters,
|
4795
5162
|
"DescribeBaseBackups": doDescribeBaseBackups,
|
4796
5163
|
"DescribeAvailableRecoveryTime": doDescribeAvailableRecoveryTime,
|
@@ -4806,7 +5173,7 @@ ACTION_MAP = {
|
|
4806
5173
|
"CreateReadOnlyDBInstance": doCreateReadOnlyDBInstance,
|
4807
5174
|
"DescribeBackupSummaries": doDescribeBackupSummaries,
|
4808
5175
|
"UpgradeDBInstanceMajorVersion": doUpgradeDBInstanceMajorVersion,
|
4809
|
-
"
|
5176
|
+
"RebalanceReadOnlyGroup": doRebalanceReadOnlyGroup,
|
4810
5177
|
"DescribeBackupDownloadURL": doDescribeBackupDownloadURL,
|
4811
5178
|
"DescribeEncryptionKeys": doDescribeEncryptionKeys,
|
4812
5179
|
"DeleteReadOnlyGroup": doDeleteReadOnlyGroup,
|
@@ -4822,7 +5189,7 @@ ACTION_MAP = {
|
|
4822
5189
|
"DescribeDBInstances": doDescribeDBInstances,
|
4823
5190
|
"IsolateDBInstances": doIsolateDBInstances,
|
4824
5191
|
"ModifyBaseBackupExpireTime": doModifyBaseBackupExpireTime,
|
4825
|
-
"
|
5192
|
+
"ModifyAccountPrivileges": doModifyAccountPrivileges,
|
4826
5193
|
"DescribeSlowQueryList": doDescribeSlowQueryList,
|
4827
5194
|
"DescribeLogBackups": doDescribeLogBackups,
|
4828
5195
|
"CloseDBExtranetAccess": doCloseDBExtranetAccess,
|
@@ -4840,13 +5207,17 @@ ACTION_MAP = {
|
|
4840
5207
|
"DescribeBackupPlans": doDescribeBackupPlans,
|
4841
5208
|
"ModifySwitchTimePeriod": doModifySwitchTimePeriod,
|
4842
5209
|
"OpenDBExtranetAccess": doOpenDBExtranetAccess,
|
5210
|
+
"DeleteAccount": doDeleteAccount,
|
4843
5211
|
"ModifyBackupPlan": doModifyBackupPlan,
|
4844
5212
|
"InitDBInstances": doInitDBInstances,
|
5213
|
+
"CreateReadOnlyGroupNetworkAccess": doCreateReadOnlyGroupNetworkAccess,
|
4845
5214
|
"DescribeZones": doDescribeZones,
|
4846
5215
|
"InquiryPriceUpgradeDBInstance": doInquiryPriceUpgradeDBInstance,
|
5216
|
+
"CreateReadOnlyGroup": doCreateReadOnlyGroup,
|
4847
5217
|
"InquiryPriceRenewDBInstance": doInquiryPriceRenewDBInstance,
|
4848
5218
|
"ModifyBackupDownloadRestriction": doModifyBackupDownloadRestriction,
|
4849
5219
|
"DescribeDBVersions": doDescribeDBVersions,
|
5220
|
+
"LockAccount": doLockAccount,
|
4850
5221
|
"DescribeReadOnlyGroups": doDescribeReadOnlyGroups,
|
4851
5222
|
"DescribeDBInstanceAttribute": doDescribeDBInstanceAttribute,
|
4852
5223
|
"UpgradeDBInstance": doUpgradeDBInstance,
|