tccli 3.0.1267.1__py2.py3-none-any.whl → 3.0.1269.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +5 -1
- tccli/services/aiart/aiart_client.py +106 -0
- tccli/services/aiart/v20221229/api.json +275 -0
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/antiddos/v20200309/api.json +194 -136
- tccli/services/antiddos/v20200309/examples.json +15 -15
- tccli/services/bi/v20220105/api.json +1 -1
- tccli/services/billing/billing_client.py +4 -163
- tccli/services/billing/v20180709/api.json +0 -489
- tccli/services/billing/v20180709/examples.json +0 -24
- tccli/services/cat/v20180409/api.json +3 -1
- tccli/services/cbs/v20170312/api.json +27 -0
- tccli/services/ccc/v20200210/api.json +11 -11
- tccli/services/ccc/v20200210/examples.json +2 -2
- tccli/services/cdb/v20170320/api.json +48 -18
- tccli/services/cdn/v20180606/api.json +3 -0
- tccli/services/cfw/v20190904/api.json +30 -30
- tccli/services/ckafka/v20190819/api.json +10 -0
- tccli/services/cloudaudit/v20190319/api.json +3 -3
- tccli/services/cloudaudit/v20190319/examples.json +1 -1
- tccli/services/csip/v20221121/api.json +38 -38
- tccli/services/cwp/cwp_client.py +4 -57
- tccli/services/cwp/v20180228/api.json +11 -185
- tccli/services/cwp/v20180228/examples.json +0 -8
- tccli/services/cynosdb/v20190107/api.json +1 -1
- tccli/services/cynosdb/v20190107/examples.json +1 -1
- tccli/services/dcdb/dcdb_client.py +122 -16
- tccli/services/dcdb/v20180411/api.json +222 -0
- tccli/services/dcdb/v20180411/examples.json +16 -0
- tccli/services/dlc/v20210125/api.json +145 -26
- tccli/services/dlc/v20210125/examples.json +18 -18
- tccli/services/domain/v20180808/api.json +8 -8
- tccli/services/domain/v20180808/examples.json +3 -3
- tccli/services/es/v20180416/api.json +9 -9
- tccli/services/ess/v20201111/api.json +1 -1
- tccli/services/essbasic/v20210526/api.json +3 -3
- tccli/services/essbasic/v20210526/examples.json +2 -2
- tccli/services/facefusion/v20220927/api.json +4 -4
- tccli/services/faceid/v20180301/api.json +5 -5
- tccli/services/faceid/v20180301/examples.json +6 -0
- tccli/services/gme/v20180711/api.json +118 -115
- tccli/services/gme/v20180711/examples.json +6 -6
- tccli/services/hunyuan/v20230901/api.json +9 -0
- tccli/services/iotexplorer/v20190423/api.json +4 -4
- tccli/services/iotexplorer/v20190423/examples.json +5 -5
- tccli/services/keewidb/v20220308/api.json +2 -2
- tccli/services/lcic/lcic_client.py +61 -8
- tccli/services/lcic/v20220817/api.json +230 -177
- tccli/services/lcic/v20220817/examples.json +10 -2
- tccli/services/lighthouse/v20200324/api.json +80 -71
- tccli/services/live/v20180801/api.json +60 -4
- tccli/services/lke/v20231130/api.json +31 -0
- tccli/services/lkeap/v20240522/api.json +55 -9
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/mna/mna_client.py +106 -0
- tccli/services/mna/v20210119/api.json +246 -0
- tccli/services/mna/v20210119/examples.json +16 -0
- tccli/services/monitor/monitor_client.py +62 -57
- tccli/services/monitor/v20230616/api.json +266 -0
- tccli/services/monitor/v20230616/examples.json +19 -0
- tccli/services/mqtt/mqtt_client.py +489 -12
- tccli/services/mqtt/v20240516/api.json +864 -3
- tccli/services/mqtt/v20240516/examples.json +72 -0
- tccli/services/ocr/ocr_client.py +53 -0
- tccli/services/ocr/v20181119/api.json +287 -23
- tccli/services/ocr/v20181119/examples.json +8 -0
- tccli/services/postgres/postgres_client.py +334 -16
- tccli/services/postgres/v20170312/api.json +718 -35
- tccli/services/postgres/v20170312/examples.json +72 -0
- tccli/services/rum/v20210622/api.json +1 -1
- tccli/services/smh/v20210712/api.json +50 -30
- tccli/services/ssl/v20191205/api.json +496 -493
- tccli/services/ssl/v20191205/examples.json +144 -24
- tccli/services/taf/taf_client.py +0 -159
- tccli/services/taf/v20200210/api.json +0 -665
- tccli/services/taf/v20200210/examples.json +0 -24
- tccli/services/tdmq/v20200217/api.json +97 -0
- tccli/services/teo/v20220901/api.json +5 -5
- tccli/services/thpc/v20230321/api.json +19 -0
- tccli/services/tione/v20211111/api.json +14 -3
- tccli/services/trabbit/__init__.py +4 -0
- tccli/services/trabbit/trabbit_client.py +1691 -0
- tccli/services/trabbit/v20230418/api.json +4773 -0
- tccli/services/trabbit/v20230418/examples.json +237 -0
- tccli/services/trocket/v20230308/api.json +130 -11
- tccli/services/trtc/v20190722/api.json +8 -8
- tccli/services/trtc/v20190722/examples.json +2 -2
- tccli/services/vclm/v20240523/api.json +0 -450
- tccli/services/vclm/v20240523/examples.json +0 -48
- tccli/services/vclm/vclm_client.py +0 -159
- tccli/services/vpc/v20170312/api.json +46 -39
- tccli/services/vpc/v20170312/examples.json +3 -3
- tccli/services/wedata/v20210820/api.json +240 -42
- tccli/services/wedata/v20210820/examples.json +17 -3
- tccli/services/wedata/wedata_client.py +53 -0
- {tccli-3.0.1267.1.dist-info → tccli-3.0.1269.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1267.1.dist-info → tccli-3.0.1269.1.dist-info}/RECORD +101 -95
- {tccli-3.0.1267.1.dist-info → tccli-3.0.1269.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1267.1.dist-info → tccli-3.0.1269.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1267.1.dist-info → tccli-3.0.1269.1.dist-info}/license_files/LICENSE +0 -0
@@ -17,6 +17,58 @@ from tencentcloud.postgres.v20170312 import models as models_v20170312
|
|
17
17
|
from jmespath import search
|
18
18
|
import time
|
19
19
|
|
20
|
+
def doDescribeTasks(args, parsed_globals):
|
21
|
+
g_param = parse_global_arg(parsed_globals)
|
22
|
+
|
23
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
24
|
+
cred = credential.CVMRoleCredential()
|
25
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
26
|
+
cred = credential.STSAssumeRoleCredential(
|
27
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
28
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
29
|
+
)
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
31
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
32
|
+
else:
|
33
|
+
cred = credential.Credential(
|
34
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
35
|
+
)
|
36
|
+
http_profile = HttpProfile(
|
37
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
38
|
+
reqMethod="POST",
|
39
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
40
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
41
|
+
)
|
42
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
43
|
+
if g_param[OptionsDefine.Language]:
|
44
|
+
profile.language = g_param[OptionsDefine.Language]
|
45
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
46
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
47
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
48
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
49
|
+
model = models.DescribeTasksRequest()
|
50
|
+
model.from_json_string(json.dumps(args))
|
51
|
+
start_time = time.time()
|
52
|
+
while True:
|
53
|
+
rsp = client.DescribeTasks(model)
|
54
|
+
result = rsp.to_json_string()
|
55
|
+
try:
|
56
|
+
json_obj = json.loads(result)
|
57
|
+
except TypeError as e:
|
58
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
59
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
60
|
+
break
|
61
|
+
cur_time = time.time()
|
62
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
63
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
64
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
65
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
66
|
+
else:
|
67
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
68
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
69
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
70
|
+
|
71
|
+
|
20
72
|
def doDescribeDatabaseObjects(args, parsed_globals):
|
21
73
|
g_param = parse_global_arg(parsed_globals)
|
22
74
|
|
@@ -797,7 +849,7 @@ def doModifyDBInstanceSpec(args, parsed_globals):
|
|
797
849
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
798
850
|
|
799
851
|
|
800
|
-
def
|
852
|
+
def doModifyBackupDownloadRestriction(args, parsed_globals):
|
801
853
|
g_param = parse_global_arg(parsed_globals)
|
802
854
|
|
803
855
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -826,11 +878,11 @@ def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
|
826
878
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
827
879
|
client._sdkVersion += ("_CLI_" + __version__)
|
828
880
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
829
|
-
model = models.
|
881
|
+
model = models.ModifyBackupDownloadRestrictionRequest()
|
830
882
|
model.from_json_string(json.dumps(args))
|
831
883
|
start_time = time.time()
|
832
884
|
while True:
|
833
|
-
rsp = client.
|
885
|
+
rsp = client.ModifyBackupDownloadRestriction(model)
|
834
886
|
result = rsp.to_json_string()
|
835
887
|
try:
|
836
888
|
json_obj = json.loads(result)
|
@@ -2929,7 +2981,7 @@ def doDescribeEncryptionKeys(args, parsed_globals):
|
|
2929
2981
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2930
2982
|
|
2931
2983
|
|
2932
|
-
def
|
2984
|
+
def doModifyDBInstancesProject(args, parsed_globals):
|
2933
2985
|
g_param = parse_global_arg(parsed_globals)
|
2934
2986
|
|
2935
2987
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2958,11 +3010,11 @@ def doDeleteReadOnlyGroup(args, parsed_globals):
|
|
2958
3010
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
2959
3011
|
client._sdkVersion += ("_CLI_" + __version__)
|
2960
3012
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2961
|
-
model = models.
|
3013
|
+
model = models.ModifyDBInstancesProjectRequest()
|
2962
3014
|
model.from_json_string(json.dumps(args))
|
2963
3015
|
start_time = time.time()
|
2964
3016
|
while True:
|
2965
|
-
rsp = client.
|
3017
|
+
rsp = client.ModifyDBInstancesProject(model)
|
2966
3018
|
result = rsp.to_json_string()
|
2967
3019
|
try:
|
2968
3020
|
json_obj = json.loads(result)
|
@@ -3189,7 +3241,7 @@ def doDeleteDBInstanceNetworkAccess(args, parsed_globals):
|
|
3189
3241
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3190
3242
|
|
3191
3243
|
|
3192
|
-
def
|
3244
|
+
def doDeleteReadOnlyGroup(args, parsed_globals):
|
3193
3245
|
g_param = parse_global_arg(parsed_globals)
|
3194
3246
|
|
3195
3247
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3218,11 +3270,11 @@ def doModifyDBInstancesProject(args, parsed_globals):
|
|
3218
3270
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
3219
3271
|
client._sdkVersion += ("_CLI_" + __version__)
|
3220
3272
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3221
|
-
model = models.
|
3273
|
+
model = models.DeleteReadOnlyGroupRequest()
|
3222
3274
|
model.from_json_string(json.dumps(args))
|
3223
3275
|
start_time = time.time()
|
3224
3276
|
while True:
|
3225
|
-
rsp = client.
|
3277
|
+
rsp = client.DeleteReadOnlyGroup(model)
|
3226
3278
|
result = rsp.to_json_string()
|
3227
3279
|
try:
|
3228
3280
|
json_obj = json.loads(result)
|
@@ -4177,6 +4229,58 @@ def doRemoveDBInstanceFromReadOnlyGroup(args, parsed_globals):
|
|
4177
4229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4178
4230
|
|
4179
4231
|
|
4232
|
+
def doCreateBackupPlan(args, parsed_globals):
|
4233
|
+
g_param = parse_global_arg(parsed_globals)
|
4234
|
+
|
4235
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4236
|
+
cred = credential.CVMRoleCredential()
|
4237
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4238
|
+
cred = credential.STSAssumeRoleCredential(
|
4239
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4240
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4241
|
+
)
|
4242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4243
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4244
|
+
else:
|
4245
|
+
cred = credential.Credential(
|
4246
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4247
|
+
)
|
4248
|
+
http_profile = HttpProfile(
|
4249
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4250
|
+
reqMethod="POST",
|
4251
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4252
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4253
|
+
)
|
4254
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4255
|
+
if g_param[OptionsDefine.Language]:
|
4256
|
+
profile.language = g_param[OptionsDefine.Language]
|
4257
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4258
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4259
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4260
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4261
|
+
model = models.CreateBackupPlanRequest()
|
4262
|
+
model.from_json_string(json.dumps(args))
|
4263
|
+
start_time = time.time()
|
4264
|
+
while True:
|
4265
|
+
rsp = client.CreateBackupPlan(model)
|
4266
|
+
result = rsp.to_json_string()
|
4267
|
+
try:
|
4268
|
+
json_obj = json.loads(result)
|
4269
|
+
except TypeError as e:
|
4270
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4271
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4272
|
+
break
|
4273
|
+
cur_time = time.time()
|
4274
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4275
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4276
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4277
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4278
|
+
else:
|
4279
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4280
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4281
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4282
|
+
|
4283
|
+
|
4180
4284
|
def doDescribeParamsEvent(args, parsed_globals):
|
4181
4285
|
g_param = parse_global_arg(parsed_globals)
|
4182
4286
|
|
@@ -4385,6 +4489,58 @@ def doSwitchDBInstancePrimary(args, parsed_globals):
|
|
4385
4489
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4386
4490
|
|
4387
4491
|
|
4492
|
+
def doModifyReadOnlyDBInstanceWeight(args, parsed_globals):
|
4493
|
+
g_param = parse_global_arg(parsed_globals)
|
4494
|
+
|
4495
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4496
|
+
cred = credential.CVMRoleCredential()
|
4497
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4498
|
+
cred = credential.STSAssumeRoleCredential(
|
4499
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4500
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4501
|
+
)
|
4502
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4503
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4504
|
+
else:
|
4505
|
+
cred = credential.Credential(
|
4506
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4507
|
+
)
|
4508
|
+
http_profile = HttpProfile(
|
4509
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4510
|
+
reqMethod="POST",
|
4511
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4512
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4513
|
+
)
|
4514
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4515
|
+
if g_param[OptionsDefine.Language]:
|
4516
|
+
profile.language = g_param[OptionsDefine.Language]
|
4517
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4518
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4519
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4520
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4521
|
+
model = models.ModifyReadOnlyDBInstanceWeightRequest()
|
4522
|
+
model.from_json_string(json.dumps(args))
|
4523
|
+
start_time = time.time()
|
4524
|
+
while True:
|
4525
|
+
rsp = client.ModifyReadOnlyDBInstanceWeight(model)
|
4526
|
+
result = rsp.to_json_string()
|
4527
|
+
try:
|
4528
|
+
json_obj = json.loads(result)
|
4529
|
+
except TypeError as e:
|
4530
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4531
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4532
|
+
break
|
4533
|
+
cur_time = time.time()
|
4534
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4535
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4536
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4537
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4538
|
+
else:
|
4539
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4540
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4541
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4542
|
+
|
4543
|
+
|
4388
4544
|
def doDescribeBackupPlans(args, parsed_globals):
|
4389
4545
|
g_param = parse_global_arg(parsed_globals)
|
4390
4546
|
|
@@ -4697,6 +4853,58 @@ def doModifyBackupPlan(args, parsed_globals):
|
|
4697
4853
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4698
4854
|
|
4699
4855
|
|
4856
|
+
def doModifyDBInstanceSSLConfig(args, parsed_globals):
|
4857
|
+
g_param = parse_global_arg(parsed_globals)
|
4858
|
+
|
4859
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4860
|
+
cred = credential.CVMRoleCredential()
|
4861
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4862
|
+
cred = credential.STSAssumeRoleCredential(
|
4863
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4864
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4865
|
+
)
|
4866
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4867
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4868
|
+
else:
|
4869
|
+
cred = credential.Credential(
|
4870
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4871
|
+
)
|
4872
|
+
http_profile = HttpProfile(
|
4873
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4874
|
+
reqMethod="POST",
|
4875
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4876
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4877
|
+
)
|
4878
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4879
|
+
if g_param[OptionsDefine.Language]:
|
4880
|
+
profile.language = g_param[OptionsDefine.Language]
|
4881
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4882
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
4883
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4884
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4885
|
+
model = models.ModifyDBInstanceSSLConfigRequest()
|
4886
|
+
model.from_json_string(json.dumps(args))
|
4887
|
+
start_time = time.time()
|
4888
|
+
while True:
|
4889
|
+
rsp = client.ModifyDBInstanceSSLConfig(model)
|
4890
|
+
result = rsp.to_json_string()
|
4891
|
+
try:
|
4892
|
+
json_obj = json.loads(result)
|
4893
|
+
except TypeError as e:
|
4894
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4895
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4896
|
+
break
|
4897
|
+
cur_time = time.time()
|
4898
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4899
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4900
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4901
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4902
|
+
else:
|
4903
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4904
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4905
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4906
|
+
|
4907
|
+
|
4700
4908
|
def doInitDBInstances(args, parsed_globals):
|
4701
4909
|
g_param = parse_global_arg(parsed_globals)
|
4702
4910
|
|
@@ -4853,6 +5061,110 @@ def doDescribeZones(args, parsed_globals):
|
|
4853
5061
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4854
5062
|
|
4855
5063
|
|
5064
|
+
def doDescribeDBInstanceSSLConfig(args, parsed_globals):
|
5065
|
+
g_param = parse_global_arg(parsed_globals)
|
5066
|
+
|
5067
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5068
|
+
cred = credential.CVMRoleCredential()
|
5069
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5070
|
+
cred = credential.STSAssumeRoleCredential(
|
5071
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5072
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5073
|
+
)
|
5074
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5075
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5076
|
+
else:
|
5077
|
+
cred = credential.Credential(
|
5078
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5079
|
+
)
|
5080
|
+
http_profile = HttpProfile(
|
5081
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5082
|
+
reqMethod="POST",
|
5083
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5084
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5085
|
+
)
|
5086
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5087
|
+
if g_param[OptionsDefine.Language]:
|
5088
|
+
profile.language = g_param[OptionsDefine.Language]
|
5089
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5090
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
5091
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5092
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5093
|
+
model = models.DescribeDBInstanceSSLConfigRequest()
|
5094
|
+
model.from_json_string(json.dumps(args))
|
5095
|
+
start_time = time.time()
|
5096
|
+
while True:
|
5097
|
+
rsp = client.DescribeDBInstanceSSLConfig(model)
|
5098
|
+
result = rsp.to_json_string()
|
5099
|
+
try:
|
5100
|
+
json_obj = json.loads(result)
|
5101
|
+
except TypeError as e:
|
5102
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5103
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5104
|
+
break
|
5105
|
+
cur_time = time.time()
|
5106
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5107
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5108
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5109
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5110
|
+
else:
|
5111
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5112
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5113
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5114
|
+
|
5115
|
+
|
5116
|
+
def doDeleteBackupPlan(args, parsed_globals):
|
5117
|
+
g_param = parse_global_arg(parsed_globals)
|
5118
|
+
|
5119
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5120
|
+
cred = credential.CVMRoleCredential()
|
5121
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5122
|
+
cred = credential.STSAssumeRoleCredential(
|
5123
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5124
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5125
|
+
)
|
5126
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5127
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5128
|
+
else:
|
5129
|
+
cred = credential.Credential(
|
5130
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5131
|
+
)
|
5132
|
+
http_profile = HttpProfile(
|
5133
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5134
|
+
reqMethod="POST",
|
5135
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5136
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5137
|
+
)
|
5138
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5139
|
+
if g_param[OptionsDefine.Language]:
|
5140
|
+
profile.language = g_param[OptionsDefine.Language]
|
5141
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5142
|
+
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
5143
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5144
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5145
|
+
model = models.DeleteBackupPlanRequest()
|
5146
|
+
model.from_json_string(json.dumps(args))
|
5147
|
+
start_time = time.time()
|
5148
|
+
while True:
|
5149
|
+
rsp = client.DeleteBackupPlan(model)
|
5150
|
+
result = rsp.to_json_string()
|
5151
|
+
try:
|
5152
|
+
json_obj = json.loads(result)
|
5153
|
+
except TypeError as e:
|
5154
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5155
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5156
|
+
break
|
5157
|
+
cur_time = time.time()
|
5158
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5159
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5160
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5161
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5162
|
+
else:
|
5163
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5164
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5165
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5166
|
+
|
5167
|
+
|
4856
5168
|
def doInquiryPriceUpgradeDBInstance(args, parsed_globals):
|
4857
5169
|
g_param = parse_global_arg(parsed_globals)
|
4858
5170
|
|
@@ -5009,7 +5321,7 @@ def doInquiryPriceRenewDBInstance(args, parsed_globals):
|
|
5009
5321
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5010
5322
|
|
5011
5323
|
|
5012
|
-
def
|
5324
|
+
def doModifyDBInstanceSecurityGroups(args, parsed_globals):
|
5013
5325
|
g_param = parse_global_arg(parsed_globals)
|
5014
5326
|
|
5015
5327
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5038,11 +5350,11 @@ def doModifyBackupDownloadRestriction(args, parsed_globals):
|
|
5038
5350
|
client = mod.PostgresClient(cred, g_param[OptionsDefine.Region], profile)
|
5039
5351
|
client._sdkVersion += ("_CLI_" + __version__)
|
5040
5352
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5041
|
-
model = models.
|
5353
|
+
model = models.ModifyDBInstanceSecurityGroupsRequest()
|
5042
5354
|
model.from_json_string(json.dumps(args))
|
5043
5355
|
start_time = time.time()
|
5044
5356
|
while True:
|
5045
|
-
rsp = client.
|
5357
|
+
rsp = client.ModifyDBInstanceSecurityGroups(model)
|
5046
5358
|
result = rsp.to_json_string()
|
5047
5359
|
try:
|
5048
5360
|
json_obj = json.loads(result)
|
@@ -5384,6 +5696,7 @@ MODELS_MAP = {
|
|
5384
5696
|
}
|
5385
5697
|
|
5386
5698
|
ACTION_MAP = {
|
5699
|
+
"DescribeTasks": doDescribeTasks,
|
5387
5700
|
"DescribeDatabaseObjects": doDescribeDatabaseObjects,
|
5388
5701
|
"ModifyDBInstanceChargeType": doModifyDBInstanceChargeType,
|
5389
5702
|
"DescribeDBErrlogs": doDescribeDBErrlogs,
|
@@ -5399,7 +5712,7 @@ ACTION_MAP = {
|
|
5399
5712
|
"DeleteServerlessDBInstance": doDeleteServerlessDBInstance,
|
5400
5713
|
"CreateDBInstanceNetworkAccess": doCreateDBInstanceNetworkAccess,
|
5401
5714
|
"ModifyDBInstanceSpec": doModifyDBInstanceSpec,
|
5402
|
-
"
|
5715
|
+
"ModifyBackupDownloadRestriction": doModifyBackupDownloadRestriction,
|
5403
5716
|
"ModifyMaintainTimeWindow": doModifyMaintainTimeWindow,
|
5404
5717
|
"RenewInstance": doRenewInstance,
|
5405
5718
|
"DescribeDatabases": doDescribeDatabases,
|
@@ -5440,12 +5753,12 @@ ACTION_MAP = {
|
|
5440
5753
|
"RebalanceReadOnlyGroup": doRebalanceReadOnlyGroup,
|
5441
5754
|
"DescribeBackupDownloadURL": doDescribeBackupDownloadURL,
|
5442
5755
|
"DescribeEncryptionKeys": doDescribeEncryptionKeys,
|
5443
|
-
"
|
5756
|
+
"ModifyDBInstancesProject": doModifyDBInstancesProject,
|
5444
5757
|
"UpgradeDBInstanceKernelVersion": doUpgradeDBInstanceKernelVersion,
|
5445
5758
|
"ResetAccountPassword": doResetAccountPassword,
|
5446
5759
|
"RestoreDBInstanceObjects": doRestoreDBInstanceObjects,
|
5447
5760
|
"DeleteDBInstanceNetworkAccess": doDeleteDBInstanceNetworkAccess,
|
5448
|
-
"
|
5761
|
+
"DeleteReadOnlyGroup": doDeleteReadOnlyGroup,
|
5449
5762
|
"DescribeDBXlogs": doDescribeDBXlogs,
|
5450
5763
|
"RestartDBInstance": doRestartDBInstance,
|
5451
5764
|
"CreateDBInstances": doCreateDBInstances,
|
@@ -5464,23 +5777,28 @@ ACTION_MAP = {
|
|
5464
5777
|
"DescribeBackupDownloadRestriction": doDescribeBackupDownloadRestriction,
|
5465
5778
|
"ModifyReadOnlyGroupConfig": doModifyReadOnlyGroupConfig,
|
5466
5779
|
"RemoveDBInstanceFromReadOnlyGroup": doRemoveDBInstanceFromReadOnlyGroup,
|
5780
|
+
"CreateBackupPlan": doCreateBackupPlan,
|
5467
5781
|
"DescribeParamsEvent": doDescribeParamsEvent,
|
5468
5782
|
"DescribeClasses": doDescribeClasses,
|
5469
5783
|
"DescribeOrders": doDescribeOrders,
|
5470
5784
|
"SwitchDBInstancePrimary": doSwitchDBInstancePrimary,
|
5785
|
+
"ModifyReadOnlyDBInstanceWeight": doModifyReadOnlyDBInstanceWeight,
|
5471
5786
|
"DescribeBackupPlans": doDescribeBackupPlans,
|
5472
5787
|
"ModifySwitchTimePeriod": doModifySwitchTimePeriod,
|
5473
5788
|
"OpenDBExtranetAccess": doOpenDBExtranetAccess,
|
5474
5789
|
"ModifyDatabaseOwner": doModifyDatabaseOwner,
|
5475
5790
|
"DeleteAccount": doDeleteAccount,
|
5476
5791
|
"ModifyBackupPlan": doModifyBackupPlan,
|
5792
|
+
"ModifyDBInstanceSSLConfig": doModifyDBInstanceSSLConfig,
|
5477
5793
|
"InitDBInstances": doInitDBInstances,
|
5478
5794
|
"CreateReadOnlyGroupNetworkAccess": doCreateReadOnlyGroupNetworkAccess,
|
5479
5795
|
"DescribeZones": doDescribeZones,
|
5796
|
+
"DescribeDBInstanceSSLConfig": doDescribeDBInstanceSSLConfig,
|
5797
|
+
"DeleteBackupPlan": doDeleteBackupPlan,
|
5480
5798
|
"InquiryPriceUpgradeDBInstance": doInquiryPriceUpgradeDBInstance,
|
5481
5799
|
"CreateReadOnlyGroup": doCreateReadOnlyGroup,
|
5482
5800
|
"InquiryPriceRenewDBInstance": doInquiryPriceRenewDBInstance,
|
5483
|
-
"
|
5801
|
+
"ModifyDBInstanceSecurityGroups": doModifyDBInstanceSecurityGroups,
|
5484
5802
|
"DescribeDBVersions": doDescribeDBVersions,
|
5485
5803
|
"LockAccount": doLockAccount,
|
5486
5804
|
"DescribeReadOnlyGroups": doDescribeReadOnlyGroups,
|