tccli 3.0.1189.1__py2.py3-none-any.whl → 3.0.1191.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/command.py +7 -1
  3. tccli/configure.py +11 -3
  4. tccli/loaders.py +43 -8
  5. tccli/oauth.py +115 -0
  6. tccli/plugin.py +30 -0
  7. tccli/plugins/__init__.py +0 -0
  8. tccli/plugins/auth/__init__.py +59 -0
  9. tccli/plugins/auth/browser_flow.py +88 -0
  10. tccli/plugins/auth/login.py +130 -0
  11. tccli/plugins/auth/logout.py +21 -0
  12. tccli/plugins/auth/texts.py +30 -0
  13. tccli/plugins/test/__init__.py +87 -0
  14. tccli/plugins/test/add.py +31 -0
  15. tccli/services/__init__.py +2 -1
  16. tccli/services/apm/v20210622/api.json +19 -0
  17. tccli/services/cam/cam_client.py +138 -32
  18. tccli/services/cam/v20190116/api.json +203 -0
  19. tccli/services/cam/v20190116/examples.json +16 -0
  20. tccli/services/cdb/v20170320/api.json +4 -4
  21. tccli/services/cfg/v20210820/api.json +1 -1
  22. tccli/services/cfw/v20190904/api.json +82 -2
  23. tccli/services/dasb/dasb_client.py +53 -0
  24. tccli/services/dasb/v20191018/api.json +168 -0
  25. tccli/services/dasb/v20191018/examples.json +8 -0
  26. tccli/services/dlc/v20210125/api.json +287 -37
  27. tccli/services/dlc/v20210125/examples.json +18 -18
  28. tccli/services/dsgc/v20190723/api.json +13 -3
  29. tccli/services/emr/v20190103/api.json +1 -1
  30. tccli/services/ess/v20201111/api.json +56 -23
  31. tccli/services/ess/v20201111/examples.json +7 -1
  32. tccli/services/essbasic/v20210526/api.json +28 -1
  33. tccli/services/essbasic/v20210526/examples.json +6 -0
  34. tccli/services/iotexplorer/v20190423/api.json +2 -2
  35. tccli/services/iss/iss_client.py +118 -65
  36. tccli/services/iss/v20230517/api.json +78 -0
  37. tccli/services/iss/v20230517/examples.json +8 -0
  38. tccli/services/mps/v20190612/api.json +257 -8
  39. tccli/services/ocr/v20181119/api.json +10 -0
  40. tccli/services/region/v20220627/api.json +11 -11
  41. tccli/services/region/v20220627/examples.json +1 -1
  42. tccli/services/sms/v20210111/api.json +9 -9
  43. tccli/services/ssl/v20191205/api.json +3 -3
  44. tccli/services/ssl/v20191205/examples.json +2 -2
  45. tccli/services/tat/v20201028/api.json +10 -0
  46. tccli/services/tcb/v20180608/api.json +2 -2
  47. tccli/services/tdmq/v20200217/api.json +2 -2
  48. tccli/services/tdmq/v20200217/examples.json +2 -2
  49. tccli/services/tke/tke_client.py +364 -46
  50. tccli/services/tke/v20180525/api.json +9 -0
  51. tccli/services/tke/v20220501/api.json +525 -0
  52. tccli/services/tke/v20220501/examples.json +54 -0
  53. tccli/services/tmt/v20180321/api.json +2 -2
  54. tccli/services/vdb/v20230616/api.json +29 -1
  55. tccli/services/vod/v20180717/api.json +30 -9
  56. tccli/services/vod/v20180717/examples.json +1 -1
  57. tccli/services/vod/v20240718/api.json +121 -0
  58. tccli/services/vod/v20240718/examples.json +31 -0
  59. tccli/services/vod/vod_client.py +58 -0
  60. tccli/services/vpc/v20170312/api.json +9 -0
  61. tccli/services/wedata/v20210820/api.json +1 -1
  62. {tccli-3.0.1189.1.dist-info → tccli-3.0.1191.1.dist-info}/METADATA +2 -2
  63. {tccli-3.0.1189.1.dist-info → tccli-3.0.1191.1.dist-info}/RECORD +66 -54
  64. {tccli-3.0.1189.1.dist-info → tccli-3.0.1191.1.dist-info}/WHEEL +0 -0
  65. {tccli-3.0.1189.1.dist-info → tccli-3.0.1191.1.dist-info}/entry_points.txt +0 -0
  66. {tccli-3.0.1189.1.dist-info → tccli-3.0.1191.1.dist-info}/license_files/LICENSE +0 -0
@@ -435,6 +435,58 @@ def doModifyClusterAsGroupOptionAttribute(args, parsed_globals):
435
435
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
436
436
 
437
437
 
438
+ def doDescribeHealthCheckPolicyBindings(args, parsed_globals):
439
+ g_param = parse_global_arg(parsed_globals)
440
+
441
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
442
+ cred = credential.CVMRoleCredential()
443
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
444
+ cred = credential.STSAssumeRoleCredential(
445
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
446
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
447
+ )
448
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
449
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
450
+ else:
451
+ cred = credential.Credential(
452
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
453
+ )
454
+ http_profile = HttpProfile(
455
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
456
+ reqMethod="POST",
457
+ endpoint=g_param[OptionsDefine.Endpoint],
458
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
459
+ )
460
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
461
+ if g_param[OptionsDefine.Language]:
462
+ profile.language = g_param[OptionsDefine.Language]
463
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
464
+ client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
465
+ client._sdkVersion += ("_CLI_" + __version__)
466
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
467
+ model = models.DescribeHealthCheckPolicyBindingsRequest()
468
+ model.from_json_string(json.dumps(args))
469
+ start_time = time.time()
470
+ while True:
471
+ rsp = client.DescribeHealthCheckPolicyBindings(model)
472
+ result = rsp.to_json_string()
473
+ try:
474
+ json_obj = json.loads(result)
475
+ except TypeError as e:
476
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
477
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
478
+ break
479
+ cur_time = time.time()
480
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
481
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
482
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
483
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
484
+ else:
485
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
486
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
487
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
488
+
489
+
438
490
  def doEnableVpcCniNetworkType(args, parsed_globals):
439
491
  g_param = parse_global_arg(parsed_globals)
440
492
 
@@ -1423,6 +1475,58 @@ def doDescribeReservedInstances(args, parsed_globals):
1423
1475
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1424
1476
 
1425
1477
 
1478
+ def doModifyHealthCheckPolicy(args, parsed_globals):
1479
+ g_param = parse_global_arg(parsed_globals)
1480
+
1481
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1482
+ cred = credential.CVMRoleCredential()
1483
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1484
+ cred = credential.STSAssumeRoleCredential(
1485
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1486
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1487
+ )
1488
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1489
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1490
+ else:
1491
+ cred = credential.Credential(
1492
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1493
+ )
1494
+ http_profile = HttpProfile(
1495
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1496
+ reqMethod="POST",
1497
+ endpoint=g_param[OptionsDefine.Endpoint],
1498
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1499
+ )
1500
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1501
+ if g_param[OptionsDefine.Language]:
1502
+ profile.language = g_param[OptionsDefine.Language]
1503
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1504
+ client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
1505
+ client._sdkVersion += ("_CLI_" + __version__)
1506
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1507
+ model = models.ModifyHealthCheckPolicyRequest()
1508
+ model.from_json_string(json.dumps(args))
1509
+ start_time = time.time()
1510
+ while True:
1511
+ rsp = client.ModifyHealthCheckPolicy(model)
1512
+ result = rsp.to_json_string()
1513
+ try:
1514
+ json_obj = json.loads(result)
1515
+ except TypeError as e:
1516
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1517
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1518
+ break
1519
+ cur_time = time.time()
1520
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1521
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1522
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1523
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1524
+ else:
1525
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1526
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1527
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1528
+
1529
+
1426
1530
  def doDeleteClusterVirtualNode(args, parsed_globals):
1427
1531
  g_param = parse_global_arg(parsed_globals)
1428
1532
 
@@ -2359,7 +2463,7 @@ def doModifyClusterVirtualNodePool(args, parsed_globals):
2359
2463
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2360
2464
 
2361
2465
 
2362
- def doUpdateImageCache(args, parsed_globals):
2466
+ def doDescribeClusterNodePools(args, parsed_globals):
2363
2467
  g_param = parse_global_arg(parsed_globals)
2364
2468
 
2365
2469
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2388,11 +2492,11 @@ def doUpdateImageCache(args, parsed_globals):
2388
2492
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
2389
2493
  client._sdkVersion += ("_CLI_" + __version__)
2390
2494
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2391
- model = models.UpdateImageCacheRequest()
2495
+ model = models.DescribeClusterNodePoolsRequest()
2392
2496
  model.from_json_string(json.dumps(args))
2393
2497
  start_time = time.time()
2394
2498
  while True:
2395
- rsp = client.UpdateImageCache(model)
2499
+ rsp = client.DescribeClusterNodePools(model)
2396
2500
  result = rsp.to_json_string()
2397
2501
  try:
2398
2502
  json_obj = json.loads(result)
@@ -3191,6 +3295,58 @@ def doDeletePrometheusTemplateSync(args, parsed_globals):
3191
3295
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3192
3296
 
3193
3297
 
3298
+ def doDescribeHealthCheckTemplate(args, parsed_globals):
3299
+ g_param = parse_global_arg(parsed_globals)
3300
+
3301
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3302
+ cred = credential.CVMRoleCredential()
3303
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3304
+ cred = credential.STSAssumeRoleCredential(
3305
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3306
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3307
+ )
3308
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3309
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3310
+ else:
3311
+ cred = credential.Credential(
3312
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3313
+ )
3314
+ http_profile = HttpProfile(
3315
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3316
+ reqMethod="POST",
3317
+ endpoint=g_param[OptionsDefine.Endpoint],
3318
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3319
+ )
3320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3321
+ if g_param[OptionsDefine.Language]:
3322
+ profile.language = g_param[OptionsDefine.Language]
3323
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3324
+ client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
3325
+ client._sdkVersion += ("_CLI_" + __version__)
3326
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3327
+ model = models.DescribeHealthCheckTemplateRequest()
3328
+ model.from_json_string(json.dumps(args))
3329
+ start_time = time.time()
3330
+ while True:
3331
+ rsp = client.DescribeHealthCheckTemplate(model)
3332
+ result = rsp.to_json_string()
3333
+ try:
3334
+ json_obj = json.loads(result)
3335
+ except TypeError as e:
3336
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3337
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3338
+ break
3339
+ cur_time = time.time()
3340
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3341
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3342
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3343
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3344
+ else:
3345
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3346
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3347
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3348
+
3349
+
3194
3350
  def doCreateClusterInstances(args, parsed_globals):
3195
3351
  g_param = parse_global_arg(parsed_globals)
3196
3352
 
@@ -4543,7 +4699,7 @@ def doDeleteEKSContainerInstances(args, parsed_globals):
4543
4699
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4544
4700
 
4545
4701
 
4546
- def doDescribeClusterInstances(args, parsed_globals):
4702
+ def doUninstallEdgeLogAgent(args, parsed_globals):
4547
4703
  g_param = parse_global_arg(parsed_globals)
4548
4704
 
4549
4705
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4572,11 +4728,11 @@ def doDescribeClusterInstances(args, parsed_globals):
4572
4728
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
4573
4729
  client._sdkVersion += ("_CLI_" + __version__)
4574
4730
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4575
- model = models.DescribeClusterInstancesRequest()
4731
+ model = models.UninstallEdgeLogAgentRequest()
4576
4732
  model.from_json_string(json.dumps(args))
4577
4733
  start_time = time.time()
4578
4734
  while True:
4579
- rsp = client.DescribeClusterInstances(model)
4735
+ rsp = client.UninstallEdgeLogAgent(model)
4580
4736
  result = rsp.to_json_string()
4581
4737
  try:
4582
4738
  json_obj = json.loads(result)
@@ -5271,7 +5427,7 @@ def doDrainClusterVirtualNode(args, parsed_globals):
5271
5427
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5272
5428
 
5273
5429
 
5274
- def doRestartEKSContainerInstances(args, parsed_globals):
5430
+ def doCreateHealthCheckPolicy(args, parsed_globals):
5275
5431
  g_param = parse_global_arg(parsed_globals)
5276
5432
 
5277
5433
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -5300,11 +5456,11 @@ def doRestartEKSContainerInstances(args, parsed_globals):
5300
5456
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
5301
5457
  client._sdkVersion += ("_CLI_" + __version__)
5302
5458
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
5303
- model = models.RestartEKSContainerInstancesRequest()
5459
+ model = models.CreateHealthCheckPolicyRequest()
5304
5460
  model.from_json_string(json.dumps(args))
5305
5461
  start_time = time.time()
5306
5462
  while True:
5307
- rsp = client.RestartEKSContainerInstances(model)
5463
+ rsp = client.CreateHealthCheckPolicy(model)
5308
5464
  result = rsp.to_json_string()
5309
5465
  try:
5310
5466
  json_obj = json.loads(result)
@@ -6207,6 +6363,58 @@ def doDescribePrometheusTemplateSync(args, parsed_globals):
6207
6363
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6208
6364
 
6209
6365
 
6366
+ def doDisableVpcCniNetworkType(args, parsed_globals):
6367
+ g_param = parse_global_arg(parsed_globals)
6368
+
6369
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
6370
+ cred = credential.CVMRoleCredential()
6371
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
6372
+ cred = credential.STSAssumeRoleCredential(
6373
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
6374
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
6375
+ )
6376
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6377
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
6378
+ else:
6379
+ cred = credential.Credential(
6380
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
6381
+ )
6382
+ http_profile = HttpProfile(
6383
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
6384
+ reqMethod="POST",
6385
+ endpoint=g_param[OptionsDefine.Endpoint],
6386
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
6387
+ )
6388
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6389
+ if g_param[OptionsDefine.Language]:
6390
+ profile.language = g_param[OptionsDefine.Language]
6391
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
6392
+ client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
6393
+ client._sdkVersion += ("_CLI_" + __version__)
6394
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
6395
+ model = models.DisableVpcCniNetworkTypeRequest()
6396
+ model.from_json_string(json.dumps(args))
6397
+ start_time = time.time()
6398
+ while True:
6399
+ rsp = client.DisableVpcCniNetworkType(model)
6400
+ result = rsp.to_json_string()
6401
+ try:
6402
+ json_obj = json.loads(result)
6403
+ except TypeError as e:
6404
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
6405
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
6406
+ break
6407
+ cur_time = time.time()
6408
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
6409
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
6410
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
6411
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
6412
+ else:
6413
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
6414
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
6415
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6416
+
6417
+
6210
6418
  def doDescribePrometheusInstance(args, parsed_globals):
6211
6419
  g_param = parse_global_arg(parsed_globals)
6212
6420
 
@@ -6519,7 +6727,7 @@ def doAcquireClusterAdminRole(args, parsed_globals):
6519
6727
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6520
6728
 
6521
6729
 
6522
- def doUninstallEdgeLogAgent(args, parsed_globals):
6730
+ def doDescribeClusterInstances(args, parsed_globals):
6523
6731
  g_param = parse_global_arg(parsed_globals)
6524
6732
 
6525
6733
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -6548,11 +6756,11 @@ def doUninstallEdgeLogAgent(args, parsed_globals):
6548
6756
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
6549
6757
  client._sdkVersion += ("_CLI_" + __version__)
6550
6758
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
6551
- model = models.UninstallEdgeLogAgentRequest()
6759
+ model = models.DescribeClusterInstancesRequest()
6552
6760
  model.from_json_string(json.dumps(args))
6553
6761
  start_time = time.time()
6554
6762
  while True:
6555
- rsp = client.UninstallEdgeLogAgent(model)
6763
+ rsp = client.DescribeClusterInstances(model)
6556
6764
  result = rsp.to_json_string()
6557
6765
  try:
6558
6766
  json_obj = json.loads(result)
@@ -7351,6 +7559,58 @@ def doScaleOutClusterMaster(args, parsed_globals):
7351
7559
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7352
7560
 
7353
7561
 
7562
+ def doDeleteHealthCheckPolicy(args, parsed_globals):
7563
+ g_param = parse_global_arg(parsed_globals)
7564
+
7565
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
7566
+ cred = credential.CVMRoleCredential()
7567
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
7568
+ cred = credential.STSAssumeRoleCredential(
7569
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
7570
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
7571
+ )
7572
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
7573
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
7574
+ else:
7575
+ cred = credential.Credential(
7576
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
7577
+ )
7578
+ http_profile = HttpProfile(
7579
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
7580
+ reqMethod="POST",
7581
+ endpoint=g_param[OptionsDefine.Endpoint],
7582
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
7583
+ )
7584
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
7585
+ if g_param[OptionsDefine.Language]:
7586
+ profile.language = g_param[OptionsDefine.Language]
7587
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
7588
+ client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
7589
+ client._sdkVersion += ("_CLI_" + __version__)
7590
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
7591
+ model = models.DeleteHealthCheckPolicyRequest()
7592
+ model.from_json_string(json.dumps(args))
7593
+ start_time = time.time()
7594
+ while True:
7595
+ rsp = client.DeleteHealthCheckPolicy(model)
7596
+ result = rsp.to_json_string()
7597
+ try:
7598
+ json_obj = json.loads(result)
7599
+ except TypeError as e:
7600
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
7601
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
7602
+ break
7603
+ cur_time = time.time()
7604
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
7605
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
7606
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
7607
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
7608
+ else:
7609
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
7610
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
7611
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7612
+
7613
+
7354
7614
  def doCreatePrometheusAlertRule(args, parsed_globals):
7355
7615
  g_param = parse_global_arg(parsed_globals)
7356
7616
 
@@ -8287,7 +8547,7 @@ def doGetMostSuitableImageCache(args, parsed_globals):
8287
8547
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
8288
8548
 
8289
8549
 
8290
- def doDescribeClusterNodePools(args, parsed_globals):
8550
+ def doDescribeClusterEndpoints(args, parsed_globals):
8291
8551
  g_param = parse_global_arg(parsed_globals)
8292
8552
 
8293
8553
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -8316,11 +8576,11 @@ def doDescribeClusterNodePools(args, parsed_globals):
8316
8576
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
8317
8577
  client._sdkVersion += ("_CLI_" + __version__)
8318
8578
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
8319
- model = models.DescribeClusterNodePoolsRequest()
8579
+ model = models.DescribeClusterEndpointsRequest()
8320
8580
  model.from_json_string(json.dumps(args))
8321
8581
  start_time = time.time()
8322
8582
  while True:
8323
- rsp = client.DescribeClusterNodePools(model)
8583
+ rsp = client.DescribeClusterEndpoints(model)
8324
8584
  result = rsp.to_json_string()
8325
8585
  try:
8326
8586
  json_obj = json.loads(result)
@@ -9119,6 +9379,58 @@ def doDeleteNodePool(args, parsed_globals):
9119
9379
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9120
9380
 
9121
9381
 
9382
+ def doDescribeHealthCheckPolicies(args, parsed_globals):
9383
+ g_param = parse_global_arg(parsed_globals)
9384
+
9385
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
9386
+ cred = credential.CVMRoleCredential()
9387
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
9388
+ cred = credential.STSAssumeRoleCredential(
9389
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
9390
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
9391
+ )
9392
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
9393
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
9394
+ else:
9395
+ cred = credential.Credential(
9396
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
9397
+ )
9398
+ http_profile = HttpProfile(
9399
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
9400
+ reqMethod="POST",
9401
+ endpoint=g_param[OptionsDefine.Endpoint],
9402
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
9403
+ )
9404
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
9405
+ if g_param[OptionsDefine.Language]:
9406
+ profile.language = g_param[OptionsDefine.Language]
9407
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
9408
+ client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
9409
+ client._sdkVersion += ("_CLI_" + __version__)
9410
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
9411
+ model = models.DescribeHealthCheckPoliciesRequest()
9412
+ model.from_json_string(json.dumps(args))
9413
+ start_time = time.time()
9414
+ while True:
9415
+ rsp = client.DescribeHealthCheckPolicies(model)
9416
+ result = rsp.to_json_string()
9417
+ try:
9418
+ json_obj = json.loads(result)
9419
+ except TypeError as e:
9420
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
9421
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
9422
+ break
9423
+ cur_time = time.time()
9424
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
9425
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
9426
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
9427
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
9428
+ else:
9429
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
9430
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
9431
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9432
+
9433
+
9122
9434
  def doCreatePrometheusAlertPolicy(args, parsed_globals):
9123
9435
  g_param = parse_global_arg(parsed_globals)
9124
9436
 
@@ -10939,7 +11251,7 @@ def doDescribeRIUtilizationDetail(args, parsed_globals):
10939
11251
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
10940
11252
 
10941
11253
 
10942
- def doDisableVpcCniNetworkType(args, parsed_globals):
11254
+ def doUpdateImageCache(args, parsed_globals):
10943
11255
  g_param = parse_global_arg(parsed_globals)
10944
11256
 
10945
11257
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -10968,11 +11280,11 @@ def doDisableVpcCniNetworkType(args, parsed_globals):
10968
11280
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
10969
11281
  client._sdkVersion += ("_CLI_" + __version__)
10970
11282
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
10971
- model = models.DisableVpcCniNetworkTypeRequest()
11283
+ model = models.UpdateImageCacheRequest()
10972
11284
  model.from_json_string(json.dumps(args))
10973
11285
  start_time = time.time()
10974
11286
  while True:
10975
- rsp = client.DisableVpcCniNetworkType(model)
11287
+ rsp = client.UpdateImageCache(model)
10976
11288
  result = rsp.to_json_string()
10977
11289
  try:
10978
11290
  json_obj = json.loads(result)
@@ -11095,7 +11407,7 @@ def doDescribePrometheusInstancesOverview(args, parsed_globals):
11095
11407
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11096
11408
 
11097
11409
 
11098
- def doDescribeNodePools(args, parsed_globals):
11410
+ def doRestartEKSContainerInstances(args, parsed_globals):
11099
11411
  g_param = parse_global_arg(parsed_globals)
11100
11412
 
11101
11413
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11124,11 +11436,11 @@ def doDescribeNodePools(args, parsed_globals):
11124
11436
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11125
11437
  client._sdkVersion += ("_CLI_" + __version__)
11126
11438
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11127
- model = models.DescribeNodePoolsRequest()
11439
+ model = models.RestartEKSContainerInstancesRequest()
11128
11440
  model.from_json_string(json.dumps(args))
11129
11441
  start_time = time.time()
11130
11442
  while True:
11131
- rsp = client.DescribeNodePools(model)
11443
+ rsp = client.RestartEKSContainerInstances(model)
11132
11444
  result = rsp.to_json_string()
11133
11445
  try:
11134
11446
  json_obj = json.loads(result)
@@ -11147,7 +11459,7 @@ def doDescribeNodePools(args, parsed_globals):
11147
11459
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11148
11460
 
11149
11461
 
11150
- def doDeletePrometheusTempSync(args, parsed_globals):
11462
+ def doDescribeNodePools(args, parsed_globals):
11151
11463
  g_param = parse_global_arg(parsed_globals)
11152
11464
 
11153
11465
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11176,11 +11488,11 @@ def doDeletePrometheusTempSync(args, parsed_globals):
11176
11488
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11177
11489
  client._sdkVersion += ("_CLI_" + __version__)
11178
11490
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11179
- model = models.DeletePrometheusTempSyncRequest()
11491
+ model = models.DescribeNodePoolsRequest()
11180
11492
  model.from_json_string(json.dumps(args))
11181
11493
  start_time = time.time()
11182
11494
  while True:
11183
- rsp = client.DeletePrometheusTempSync(model)
11495
+ rsp = client.DescribeNodePools(model)
11184
11496
  result = rsp.to_json_string()
11185
11497
  try:
11186
11498
  json_obj = json.loads(result)
@@ -11199,7 +11511,7 @@ def doDeletePrometheusTempSync(args, parsed_globals):
11199
11511
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11200
11512
 
11201
11513
 
11202
- def doDeletePrometheusAlertPolicy(args, parsed_globals):
11514
+ def doDeletePrometheusTempSync(args, parsed_globals):
11203
11515
  g_param = parse_global_arg(parsed_globals)
11204
11516
 
11205
11517
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11228,11 +11540,11 @@ def doDeletePrometheusAlertPolicy(args, parsed_globals):
11228
11540
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11229
11541
  client._sdkVersion += ("_CLI_" + __version__)
11230
11542
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11231
- model = models.DeletePrometheusAlertPolicyRequest()
11543
+ model = models.DeletePrometheusTempSyncRequest()
11232
11544
  model.from_json_string(json.dumps(args))
11233
11545
  start_time = time.time()
11234
11546
  while True:
11235
- rsp = client.DeletePrometheusAlertPolicy(model)
11547
+ rsp = client.DeletePrometheusTempSync(model)
11236
11548
  result = rsp.to_json_string()
11237
11549
  try:
11238
11550
  json_obj = json.loads(result)
@@ -11251,7 +11563,7 @@ def doDeletePrometheusAlertPolicy(args, parsed_globals):
11251
11563
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11252
11564
 
11253
11565
 
11254
- def doRunPrometheusInstance(args, parsed_globals):
11566
+ def doDeletePrometheusAlertPolicy(args, parsed_globals):
11255
11567
  g_param = parse_global_arg(parsed_globals)
11256
11568
 
11257
11569
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11280,11 +11592,11 @@ def doRunPrometheusInstance(args, parsed_globals):
11280
11592
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11281
11593
  client._sdkVersion += ("_CLI_" + __version__)
11282
11594
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11283
- model = models.RunPrometheusInstanceRequest()
11595
+ model = models.DeletePrometheusAlertPolicyRequest()
11284
11596
  model.from_json_string(json.dumps(args))
11285
11597
  start_time = time.time()
11286
11598
  while True:
11287
- rsp = client.RunPrometheusInstance(model)
11599
+ rsp = client.DeletePrometheusAlertPolicy(model)
11288
11600
  result = rsp.to_json_string()
11289
11601
  try:
11290
11602
  json_obj = json.loads(result)
@@ -11303,7 +11615,7 @@ def doRunPrometheusInstance(args, parsed_globals):
11303
11615
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11304
11616
 
11305
11617
 
11306
- def doUpdateEKSCluster(args, parsed_globals):
11618
+ def doRunPrometheusInstance(args, parsed_globals):
11307
11619
  g_param = parse_global_arg(parsed_globals)
11308
11620
 
11309
11621
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11332,11 +11644,11 @@ def doUpdateEKSCluster(args, parsed_globals):
11332
11644
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11333
11645
  client._sdkVersion += ("_CLI_" + __version__)
11334
11646
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11335
- model = models.UpdateEKSClusterRequest()
11647
+ model = models.RunPrometheusInstanceRequest()
11336
11648
  model.from_json_string(json.dumps(args))
11337
11649
  start_time = time.time()
11338
11650
  while True:
11339
- rsp = client.UpdateEKSCluster(model)
11651
+ rsp = client.RunPrometheusInstance(model)
11340
11652
  result = rsp.to_json_string()
11341
11653
  try:
11342
11654
  json_obj = json.loads(result)
@@ -11355,7 +11667,7 @@ def doUpdateEKSCluster(args, parsed_globals):
11355
11667
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11356
11668
 
11357
11669
 
11358
- def doModifyPrometheusConfig(args, parsed_globals):
11670
+ def doUpdateEKSCluster(args, parsed_globals):
11359
11671
  g_param = parse_global_arg(parsed_globals)
11360
11672
 
11361
11673
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11384,11 +11696,11 @@ def doModifyPrometheusConfig(args, parsed_globals):
11384
11696
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11385
11697
  client._sdkVersion += ("_CLI_" + __version__)
11386
11698
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11387
- model = models.ModifyPrometheusConfigRequest()
11699
+ model = models.UpdateEKSClusterRequest()
11388
11700
  model.from_json_string(json.dumps(args))
11389
11701
  start_time = time.time()
11390
11702
  while True:
11391
- rsp = client.ModifyPrometheusConfig(model)
11703
+ rsp = client.UpdateEKSCluster(model)
11392
11704
  result = rsp.to_json_string()
11393
11705
  try:
11394
11706
  json_obj = json.loads(result)
@@ -11407,7 +11719,7 @@ def doModifyPrometheusConfig(args, parsed_globals):
11407
11719
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11408
11720
 
11409
11721
 
11410
- def doDescribeClusterEndpoints(args, parsed_globals):
11722
+ def doModifyPrometheusConfig(args, parsed_globals):
11411
11723
  g_param = parse_global_arg(parsed_globals)
11412
11724
 
11413
11725
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11436,11 +11748,11 @@ def doDescribeClusterEndpoints(args, parsed_globals):
11436
11748
  client = mod.TkeClient(cred, g_param[OptionsDefine.Region], profile)
11437
11749
  client._sdkVersion += ("_CLI_" + __version__)
11438
11750
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11439
- model = models.DescribeClusterEndpointsRequest()
11751
+ model = models.ModifyPrometheusConfigRequest()
11440
11752
  model.from_json_string(json.dumps(args))
11441
11753
  start_time = time.time()
11442
11754
  while True:
11443
- rsp = client.DescribeClusterEndpoints(model)
11755
+ rsp = client.ModifyPrometheusConfig(model)
11444
11756
  result = rsp.to_json_string()
11445
11757
  try:
11446
11758
  json_obj = json.loads(result)
@@ -11792,6 +12104,7 @@ ACTION_MAP = {
11792
12104
  "CreateClusterVirtualNodePool": doCreateClusterVirtualNodePool,
11793
12105
  "GetTkeAppChartList": doGetTkeAppChartList,
11794
12106
  "ModifyClusterAsGroupOptionAttribute": doModifyClusterAsGroupOptionAttribute,
12107
+ "DescribeHealthCheckPolicyBindings": doDescribeHealthCheckPolicyBindings,
11795
12108
  "EnableVpcCniNetworkType": doEnableVpcCniNetworkType,
11796
12109
  "DeleteCluster": doDeleteCluster,
11797
12110
  "UpdateEdgeClusterVersion": doUpdateEdgeClusterVersion,
@@ -11811,6 +12124,7 @@ ACTION_MAP = {
11811
12124
  "ModifyPrometheusAgentExternalLabels": doModifyPrometheusAgentExternalLabels,
11812
12125
  "DescribePodsBySpec": doDescribePodsBySpec,
11813
12126
  "DescribeReservedInstances": doDescribeReservedInstances,
12127
+ "ModifyHealthCheckPolicy": doModifyHealthCheckPolicy,
11814
12128
  "DeleteClusterVirtualNode": doDeleteClusterVirtualNode,
11815
12129
  "DeleteBackupStorageLocation": doDeleteBackupStorageLocation,
11816
12130
  "DescribeAvailableTKEEdgeVersion": doDescribeAvailableTKEEdgeVersion,
@@ -11829,7 +12143,7 @@ ACTION_MAP = {
11829
12143
  "EnableClusterAudit": doEnableClusterAudit,
11830
12144
  "CreateBackupStorageLocation": doCreateBackupStorageLocation,
11831
12145
  "ModifyClusterVirtualNodePool": doModifyClusterVirtualNodePool,
11832
- "UpdateImageCache": doUpdateImageCache,
12146
+ "DescribeClusterNodePools": doDescribeClusterNodePools,
11833
12147
  "CreateClusterNodePool": doCreateClusterNodePool,
11834
12148
  "DescribeClusterPendingReleases": doDescribeClusterPendingReleases,
11835
12149
  "DescribeTKEEdgeClusterStatus": doDescribeTKEEdgeClusterStatus,
@@ -11845,6 +12159,7 @@ ACTION_MAP = {
11845
12159
  "DescribeClusterNodePoolDetail": doDescribeClusterNodePoolDetail,
11846
12160
  "DeletePrometheusTemp": doDeletePrometheusTemp,
11847
12161
  "DeletePrometheusTemplateSync": doDeletePrometheusTemplateSync,
12162
+ "DescribeHealthCheckTemplate": doDescribeHealthCheckTemplate,
11848
12163
  "CreateClusterInstances": doCreateClusterInstances,
11849
12164
  "ModifyClusterAttribute": doModifyClusterAttribute,
11850
12165
  "DeleteClusterAsGroups": doDeleteClusterAsGroups,
@@ -11871,7 +12186,7 @@ ACTION_MAP = {
11871
12186
  "DisableClusterDeletionProtection": doDisableClusterDeletionProtection,
11872
12187
  "DescribePrometheusTargets": doDescribePrometheusTargets,
11873
12188
  "DeleteEKSContainerInstances": doDeleteEKSContainerInstances,
11874
- "DescribeClusterInstances": doDescribeClusterInstances,
12189
+ "UninstallEdgeLogAgent": doUninstallEdgeLogAgent,
11875
12190
  "DescribeEdgeCVMInstances": doDescribeEdgeCVMInstances,
11876
12191
  "DescribeClusterLevelAttribute": doDescribeClusterLevelAttribute,
11877
12192
  "DescribeAddonValues": doDescribeAddonValues,
@@ -11885,7 +12200,7 @@ ACTION_MAP = {
11885
12200
  "DeleteAddon": doDeleteAddon,
11886
12201
  "CreateEksLogConfig": doCreateEksLogConfig,
11887
12202
  "DrainClusterVirtualNode": doDrainClusterVirtualNode,
11888
- "RestartEKSContainerInstances": doRestartEKSContainerInstances,
12203
+ "CreateHealthCheckPolicy": doCreateHealthCheckPolicy,
11889
12204
  "DescribeTKEEdgeScript": doDescribeTKEEdgeScript,
11890
12205
  "DescribeEKSContainerInstanceRegions": doDescribeEKSContainerInstanceRegions,
11891
12206
  "DescribePrometheusClusterAgents": doDescribePrometheusClusterAgents,
@@ -11903,13 +12218,14 @@ ACTION_MAP = {
11903
12218
  "ListClusterInspectionResultsItems": doListClusterInspectionResultsItems,
11904
12219
  "EnableEncryptionProtection": doEnableEncryptionProtection,
11905
12220
  "DescribePrometheusTemplateSync": doDescribePrometheusTemplateSync,
12221
+ "DisableVpcCniNetworkType": doDisableVpcCniNetworkType,
11906
12222
  "DescribePrometheusInstance": doDescribePrometheusInstance,
11907
12223
  "CreatePrometheusGlobalNotification": doCreatePrometheusGlobalNotification,
11908
12224
  "DescribeClusterEndpointVipStatus": doDescribeClusterEndpointVipStatus,
11909
12225
  "DescribeEKSContainerInstances": doDescribeEKSContainerInstances,
11910
12226
  "DescribeLogSwitches": doDescribeLogSwitches,
11911
12227
  "AcquireClusterAdminRole": doAcquireClusterAdminRole,
11912
- "UninstallEdgeLogAgent": doUninstallEdgeLogAgent,
12228
+ "DescribeClusterInstances": doDescribeClusterInstances,
11913
12229
  "DescribeExternalClusterSpec": doDescribeExternalClusterSpec,
11914
12230
  "DescribeClusterReleaseHistory": doDescribeClusterReleaseHistory,
11915
12231
  "ModifyClusterNodePool": doModifyClusterNodePool,
@@ -11925,6 +12241,7 @@ ACTION_MAP = {
11925
12241
  "DeleteECMInstances": doDeleteECMInstances,
11926
12242
  "DescribePrometheusAgentInstances": doDescribePrometheusAgentInstances,
11927
12243
  "ScaleOutClusterMaster": doScaleOutClusterMaster,
12244
+ "DeleteHealthCheckPolicy": doDeleteHealthCheckPolicy,
11928
12245
  "CreatePrometheusAlertRule": doCreatePrometheusAlertRule,
11929
12246
  "DeletePrometheusRecordRuleYaml": doDeletePrometheusRecordRuleYaml,
11930
12247
  "DescribeBackupStorageLocations": doDescribeBackupStorageLocations,
@@ -11943,7 +12260,7 @@ ACTION_MAP = {
11943
12260
  "DescribeECMInstances": doDescribeECMInstances,
11944
12261
  "DeleteTKEEdgeCluster": doDeleteTKEEdgeCluster,
11945
12262
  "GetMostSuitableImageCache": doGetMostSuitableImageCache,
11946
- "DescribeClusterNodePools": doDescribeClusterNodePools,
12263
+ "DescribeClusterEndpoints": doDescribeClusterEndpoints,
11947
12264
  "CreatePrometheusClusterAgent": doCreatePrometheusClusterAgent,
11948
12265
  "CreatePrometheusConfig": doCreatePrometheusConfig,
11949
12266
  "DescribeEKSClusterCredential": doDescribeEKSClusterCredential,
@@ -11959,6 +12276,7 @@ ACTION_MAP = {
11959
12276
  "CreatePrometheusDashboard": doCreatePrometheusDashboard,
11960
12277
  "DescribePrometheusOverviews": doDescribePrometheusOverviews,
11961
12278
  "DeleteNodePool": doDeleteNodePool,
12279
+ "DescribeHealthCheckPolicies": doDescribeHealthCheckPolicies,
11962
12280
  "CreatePrometheusAlertPolicy": doCreatePrometheusAlertPolicy,
11963
12281
  "DescribeImages": doDescribeImages,
11964
12282
  "ModifyClusterAuthenticationOptions": doModifyClusterAuthenticationOptions,
@@ -11994,16 +12312,16 @@ ACTION_MAP = {
11994
12312
  "EnableClusterDeletionProtection": doEnableClusterDeletionProtection,
11995
12313
  "UpdateTKEEdgeCluster": doUpdateTKEEdgeCluster,
11996
12314
  "DescribeRIUtilizationDetail": doDescribeRIUtilizationDetail,
11997
- "DisableVpcCniNetworkType": doDisableVpcCniNetworkType,
12315
+ "UpdateImageCache": doUpdateImageCache,
11998
12316
  "DescribeAddon": doDescribeAddon,
11999
12317
  "DescribePrometheusInstancesOverview": doDescribePrometheusInstancesOverview,
12318
+ "RestartEKSContainerInstances": doRestartEKSContainerInstances,
12000
12319
  "DescribeNodePools": doDescribeNodePools,
12001
12320
  "DeletePrometheusTempSync": doDeletePrometheusTempSync,
12002
12321
  "DeletePrometheusAlertPolicy": doDeletePrometheusAlertPolicy,
12003
12322
  "RunPrometheusInstance": doRunPrometheusInstance,
12004
12323
  "UpdateEKSCluster": doUpdateEKSCluster,
12005
12324
  "ModifyPrometheusConfig": doModifyPrometheusConfig,
12006
- "DescribeClusterEndpoints": doDescribeClusterEndpoints,
12007
12325
  "DescribePostNodeResources": doDescribePostNodeResources,
12008
12326
  "InstallLogAgent": doInstallLogAgent,
12009
12327
  "CheckEdgeClusterCIDR": doCheckEdgeClusterCIDR,