tccli 3.0.1373.1__py2.py3-none-any.whl → 3.0.1375.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/ai3d/v20250513/api.json +1 -1
- tccli/services/cbs/v20170312/api.json +11 -2
- tccli/services/ccc/v20200210/api.json +17 -8
- tccli/services/cls/v20201016/api.json +167 -31
- tccli/services/cls/v20201016/examples.json +2 -2
- tccli/services/csip/v20221121/api.json +1 -1
- tccli/services/cwp/v20180228/api.json +5 -5
- tccli/services/dlc/dlc_client.py +399 -28
- tccli/services/dlc/v20210125/api.json +557 -0
- tccli/services/dlc/v20210125/examples.json +56 -0
- tccli/services/emr/v20190103/api.json +2 -2
- tccli/services/es/v20180416/api.json +49 -0
- tccli/services/ess/v20201111/api.json +87 -0
- tccli/services/essbasic/v20210526/api.json +77 -0
- tccli/services/ioa/v20220601/api.json +48 -29
- tccli/services/lighthouse/v20200324/examples.json +3 -3
- tccli/services/live/v20180801/examples.json +1 -1
- tccli/services/lke/v20231130/api.json +1344 -246
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/mps/v20190612/api.json +34 -6
- tccli/services/ocr/v20181119/api.json +10 -0
- tccli/services/partners/v20180321/api.json +4 -4
- tccli/services/postgres/v20170312/api.json +1 -1
- tccli/services/rce/v20201103/api.json +1 -1
- tccli/services/sqlserver/v20180328/api.json +19 -17
- tccli/services/sqlserver/v20180328/examples.json +2 -2
- tccli/services/tbaas/v20180416/api.json +30 -30
- tccli/services/tbaas/v20180416/examples.json +4 -4
- tccli/services/tcaplusdb/v20190823/api.json +926 -900
- tccli/services/tcaplusdb/v20190823/examples.json +56 -56
- tccli/services/tcss/v20201101/api.json +4 -4
- tccli/services/tdmq/tdmq_client.py +53 -0
- tccli/services/tdmq/v20200217/api.json +35 -11
- tccli/services/tdmq/v20200217/examples.json +9 -1
- tccli/services/trabbit/v20230418/api.json +9 -0
- tccli/services/trocket/v20230308/api.json +2 -2
- tccli/services/tse/v20201207/api.json +9 -0
- tccli/services/tsf/v20180326/api.json +195 -98
- tccli/services/vod/v20180717/api.json +270 -6
- tccli/services/vod/v20180717/examples.json +32 -0
- tccli/services/vod/vod_client.py +212 -0
- {tccli-3.0.1373.1.dist-info → tccli-3.0.1375.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1373.1.dist-info → tccli-3.0.1375.1.dist-info}/RECORD +47 -47
- {tccli-3.0.1373.1.dist-info → tccli-3.0.1375.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1373.1.dist-info → tccli-3.0.1375.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1373.1.dist-info → tccli-3.0.1375.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/dlc/dlc_client.py
CHANGED
@@ -589,6 +589,58 @@ def doCreateNotebookSession(args, parsed_globals):
|
|
589
589
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
590
590
|
|
591
591
|
|
592
|
+
def doDescribeDataMaskStrategies(args, parsed_globals):
|
593
|
+
g_param = parse_global_arg(parsed_globals)
|
594
|
+
|
595
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
596
|
+
cred = credential.CVMRoleCredential()
|
597
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
598
|
+
cred = credential.STSAssumeRoleCredential(
|
599
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
600
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
601
|
+
)
|
602
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
603
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
604
|
+
else:
|
605
|
+
cred = credential.Credential(
|
606
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
607
|
+
)
|
608
|
+
http_profile = HttpProfile(
|
609
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
610
|
+
reqMethod="POST",
|
611
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
612
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
613
|
+
)
|
614
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
615
|
+
if g_param[OptionsDefine.Language]:
|
616
|
+
profile.language = g_param[OptionsDefine.Language]
|
617
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
618
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
619
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
620
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
621
|
+
model = models.DescribeDataMaskStrategiesRequest()
|
622
|
+
model.from_json_string(json.dumps(args))
|
623
|
+
start_time = time.time()
|
624
|
+
while True:
|
625
|
+
rsp = client.DescribeDataMaskStrategies(model)
|
626
|
+
result = rsp.to_json_string()
|
627
|
+
try:
|
628
|
+
json_obj = json.loads(result)
|
629
|
+
except TypeError as e:
|
630
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
631
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
632
|
+
break
|
633
|
+
cur_time = time.time()
|
634
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
635
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
636
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
637
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
638
|
+
else:
|
639
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
640
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
641
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
642
|
+
|
643
|
+
|
592
644
|
def doDeleteWorkGroup(args, parsed_globals):
|
593
645
|
g_param = parse_global_arg(parsed_globals)
|
594
646
|
|
@@ -1161,6 +1213,58 @@ def doCancelTask(args, parsed_globals):
|
|
1161
1213
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1162
1214
|
|
1163
1215
|
|
1216
|
+
def doDeleteDataMaskStrategy(args, parsed_globals):
|
1217
|
+
g_param = parse_global_arg(parsed_globals)
|
1218
|
+
|
1219
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1220
|
+
cred = credential.CVMRoleCredential()
|
1221
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1222
|
+
cred = credential.STSAssumeRoleCredential(
|
1223
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1224
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1225
|
+
)
|
1226
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1227
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1228
|
+
else:
|
1229
|
+
cred = credential.Credential(
|
1230
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1231
|
+
)
|
1232
|
+
http_profile = HttpProfile(
|
1233
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1234
|
+
reqMethod="POST",
|
1235
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1236
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1237
|
+
)
|
1238
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1239
|
+
if g_param[OptionsDefine.Language]:
|
1240
|
+
profile.language = g_param[OptionsDefine.Language]
|
1241
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1242
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
1243
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1244
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1245
|
+
model = models.DeleteDataMaskStrategyRequest()
|
1246
|
+
model.from_json_string(json.dumps(args))
|
1247
|
+
start_time = time.time()
|
1248
|
+
while True:
|
1249
|
+
rsp = client.DeleteDataMaskStrategy(model)
|
1250
|
+
result = rsp.to_json_string()
|
1251
|
+
try:
|
1252
|
+
json_obj = json.loads(result)
|
1253
|
+
except TypeError as e:
|
1254
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1255
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1256
|
+
break
|
1257
|
+
cur_time = time.time()
|
1258
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1259
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1260
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1261
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1262
|
+
else:
|
1263
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1264
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1265
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1266
|
+
|
1267
|
+
|
1164
1268
|
def doDescribeDLCCatalogAccess(args, parsed_globals):
|
1165
1269
|
g_param = parse_global_arg(parsed_globals)
|
1166
1270
|
|
@@ -1265,7 +1369,7 @@ def doDescribeDMSTables(args, parsed_globals):
|
|
1265
1369
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1266
1370
|
|
1267
1371
|
|
1268
|
-
def
|
1372
|
+
def doCreateSparkSubmitTask(args, parsed_globals):
|
1269
1373
|
g_param = parse_global_arg(parsed_globals)
|
1270
1374
|
|
1271
1375
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1294,11 +1398,11 @@ def doDescribeNativeSparkSessions(args, parsed_globals):
|
|
1294
1398
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
1295
1399
|
client._sdkVersion += ("_CLI_" + __version__)
|
1296
1400
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1297
|
-
model = models.
|
1401
|
+
model = models.CreateSparkSubmitTaskRequest()
|
1298
1402
|
model.from_json_string(json.dumps(args))
|
1299
1403
|
start_time = time.time()
|
1300
1404
|
while True:
|
1301
|
-
rsp = client.
|
1405
|
+
rsp = client.CreateSparkSubmitTask(model)
|
1302
1406
|
result = rsp.to_json_string()
|
1303
1407
|
try:
|
1304
1408
|
json_obj = json.loads(result)
|
@@ -2773,6 +2877,110 @@ def doDescribeScripts(args, parsed_globals):
|
|
2773
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2774
2878
|
|
2775
2879
|
|
2880
|
+
def doCreateDataMaskStrategy(args, parsed_globals):
|
2881
|
+
g_param = parse_global_arg(parsed_globals)
|
2882
|
+
|
2883
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2884
|
+
cred = credential.CVMRoleCredential()
|
2885
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2886
|
+
cred = credential.STSAssumeRoleCredential(
|
2887
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2888
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2889
|
+
)
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2891
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2892
|
+
else:
|
2893
|
+
cred = credential.Credential(
|
2894
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2895
|
+
)
|
2896
|
+
http_profile = HttpProfile(
|
2897
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2898
|
+
reqMethod="POST",
|
2899
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2900
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2901
|
+
)
|
2902
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2903
|
+
if g_param[OptionsDefine.Language]:
|
2904
|
+
profile.language = g_param[OptionsDefine.Language]
|
2905
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2906
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
2907
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2908
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2909
|
+
model = models.CreateDataMaskStrategyRequest()
|
2910
|
+
model.from_json_string(json.dumps(args))
|
2911
|
+
start_time = time.time()
|
2912
|
+
while True:
|
2913
|
+
rsp = client.CreateDataMaskStrategy(model)
|
2914
|
+
result = rsp.to_json_string()
|
2915
|
+
try:
|
2916
|
+
json_obj = json.loads(result)
|
2917
|
+
except TypeError as e:
|
2918
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2919
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2920
|
+
break
|
2921
|
+
cur_time = time.time()
|
2922
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2923
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2924
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2925
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2926
|
+
else:
|
2927
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2928
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2929
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2930
|
+
|
2931
|
+
|
2932
|
+
def doDescribeClusterMonitorInfos(args, parsed_globals):
|
2933
|
+
g_param = parse_global_arg(parsed_globals)
|
2934
|
+
|
2935
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2936
|
+
cred = credential.CVMRoleCredential()
|
2937
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2938
|
+
cred = credential.STSAssumeRoleCredential(
|
2939
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2940
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2941
|
+
)
|
2942
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2943
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2944
|
+
else:
|
2945
|
+
cred = credential.Credential(
|
2946
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2947
|
+
)
|
2948
|
+
http_profile = HttpProfile(
|
2949
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2950
|
+
reqMethod="POST",
|
2951
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2952
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2953
|
+
)
|
2954
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2955
|
+
if g_param[OptionsDefine.Language]:
|
2956
|
+
profile.language = g_param[OptionsDefine.Language]
|
2957
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2958
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
2959
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2960
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2961
|
+
model = models.DescribeClusterMonitorInfosRequest()
|
2962
|
+
model.from_json_string(json.dumps(args))
|
2963
|
+
start_time = time.time()
|
2964
|
+
while True:
|
2965
|
+
rsp = client.DescribeClusterMonitorInfos(model)
|
2966
|
+
result = rsp.to_json_string()
|
2967
|
+
try:
|
2968
|
+
json_obj = json.loads(result)
|
2969
|
+
except TypeError as e:
|
2970
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2971
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2972
|
+
break
|
2973
|
+
cur_time = time.time()
|
2974
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2975
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2976
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2977
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2978
|
+
else:
|
2979
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2980
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2981
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2982
|
+
|
2983
|
+
|
2776
2984
|
def doModifyWorkGroup(args, parsed_globals):
|
2777
2985
|
g_param = parse_global_arg(parsed_globals)
|
2778
2986
|
|
@@ -3761,6 +3969,58 @@ def doCreateUserVpcConnection(args, parsed_globals):
|
|
3761
3969
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3762
3970
|
|
3763
3971
|
|
3972
|
+
def doDescribeUDFPolicy(args, parsed_globals):
|
3973
|
+
g_param = parse_global_arg(parsed_globals)
|
3974
|
+
|
3975
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3976
|
+
cred = credential.CVMRoleCredential()
|
3977
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3978
|
+
cred = credential.STSAssumeRoleCredential(
|
3979
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3980
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3981
|
+
)
|
3982
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3983
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3984
|
+
else:
|
3985
|
+
cred = credential.Credential(
|
3986
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3987
|
+
)
|
3988
|
+
http_profile = HttpProfile(
|
3989
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3990
|
+
reqMethod="POST",
|
3991
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
3992
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3993
|
+
)
|
3994
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3995
|
+
if g_param[OptionsDefine.Language]:
|
3996
|
+
profile.language = g_param[OptionsDefine.Language]
|
3997
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3998
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
3999
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4000
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4001
|
+
model = models.DescribeUDFPolicyRequest()
|
4002
|
+
model.from_json_string(json.dumps(args))
|
4003
|
+
start_time = time.time()
|
4004
|
+
while True:
|
4005
|
+
rsp = client.DescribeUDFPolicy(model)
|
4006
|
+
result = rsp.to_json_string()
|
4007
|
+
try:
|
4008
|
+
json_obj = json.loads(result)
|
4009
|
+
except TypeError as e:
|
4010
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4011
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4012
|
+
break
|
4013
|
+
cur_time = time.time()
|
4014
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4015
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4016
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4017
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4018
|
+
else:
|
4019
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4020
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4021
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4022
|
+
|
4023
|
+
|
3764
4024
|
def doDescribeNotebookSessionStatements(args, parsed_globals):
|
3765
4025
|
g_param = parse_global_arg(parsed_globals)
|
3766
4026
|
|
@@ -5789,7 +6049,7 @@ def doGetOptimizerPolicy(args, parsed_globals):
|
|
5789
6049
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5790
6050
|
|
5791
6051
|
|
5792
|
-
def
|
6052
|
+
def doDescribeUserInfo(args, parsed_globals):
|
5793
6053
|
g_param = parse_global_arg(parsed_globals)
|
5794
6054
|
|
5795
6055
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5818,11 +6078,11 @@ def doDeleteUserVpcConnection(args, parsed_globals):
|
|
5818
6078
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
5819
6079
|
client._sdkVersion += ("_CLI_" + __version__)
|
5820
6080
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5821
|
-
model = models.
|
6081
|
+
model = models.DescribeUserInfoRequest()
|
5822
6082
|
model.from_json_string(json.dumps(args))
|
5823
6083
|
start_time = time.time()
|
5824
6084
|
while True:
|
5825
|
-
rsp = client.
|
6085
|
+
rsp = client.DescribeUserInfo(model)
|
5826
6086
|
result = rsp.to_json_string()
|
5827
6087
|
try:
|
5828
6088
|
json_obj = json.loads(result)
|
@@ -6621,6 +6881,58 @@ def doDetachUserPolicy(args, parsed_globals):
|
|
6621
6881
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6622
6882
|
|
6623
6883
|
|
6884
|
+
def doUpdateUDFPolicy(args, parsed_globals):
|
6885
|
+
g_param = parse_global_arg(parsed_globals)
|
6886
|
+
|
6887
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6888
|
+
cred = credential.CVMRoleCredential()
|
6889
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6890
|
+
cred = credential.STSAssumeRoleCredential(
|
6891
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6892
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6893
|
+
)
|
6894
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6895
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6896
|
+
else:
|
6897
|
+
cred = credential.Credential(
|
6898
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6899
|
+
)
|
6900
|
+
http_profile = HttpProfile(
|
6901
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6902
|
+
reqMethod="POST",
|
6903
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6904
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6905
|
+
)
|
6906
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6907
|
+
if g_param[OptionsDefine.Language]:
|
6908
|
+
profile.language = g_param[OptionsDefine.Language]
|
6909
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6910
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
6911
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6912
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6913
|
+
model = models.UpdateUDFPolicyRequest()
|
6914
|
+
model.from_json_string(json.dumps(args))
|
6915
|
+
start_time = time.time()
|
6916
|
+
while True:
|
6917
|
+
rsp = client.UpdateUDFPolicy(model)
|
6918
|
+
result = rsp.to_json_string()
|
6919
|
+
try:
|
6920
|
+
json_obj = json.loads(result)
|
6921
|
+
except TypeError as e:
|
6922
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6923
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6924
|
+
break
|
6925
|
+
cur_time = time.time()
|
6926
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6927
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6928
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6929
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6930
|
+
else:
|
6931
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6932
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6933
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6934
|
+
|
6935
|
+
|
6624
6936
|
def doDescribeDataEngineEvents(args, parsed_globals):
|
6625
6937
|
g_param = parse_global_arg(parsed_globals)
|
6626
6938
|
|
@@ -7193,6 +7505,58 @@ def doCreateExportTask(args, parsed_globals):
|
|
7193
7505
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7194
7506
|
|
7195
7507
|
|
7508
|
+
def doCreateDataEngine(args, parsed_globals):
|
7509
|
+
g_param = parse_global_arg(parsed_globals)
|
7510
|
+
|
7511
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7512
|
+
cred = credential.CVMRoleCredential()
|
7513
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7514
|
+
cred = credential.STSAssumeRoleCredential(
|
7515
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7516
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7517
|
+
)
|
7518
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7519
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7520
|
+
else:
|
7521
|
+
cred = credential.Credential(
|
7522
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7523
|
+
)
|
7524
|
+
http_profile = HttpProfile(
|
7525
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7526
|
+
reqMethod="POST",
|
7527
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7528
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7529
|
+
)
|
7530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7531
|
+
if g_param[OptionsDefine.Language]:
|
7532
|
+
profile.language = g_param[OptionsDefine.Language]
|
7533
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7534
|
+
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
7535
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7536
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7537
|
+
model = models.CreateDataEngineRequest()
|
7538
|
+
model.from_json_string(json.dumps(args))
|
7539
|
+
start_time = time.time()
|
7540
|
+
while True:
|
7541
|
+
rsp = client.CreateDataEngine(model)
|
7542
|
+
result = rsp.to_json_string()
|
7543
|
+
try:
|
7544
|
+
json_obj = json.loads(result)
|
7545
|
+
except TypeError as e:
|
7546
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7547
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7548
|
+
break
|
7549
|
+
cur_time = time.time()
|
7550
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7551
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7552
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7553
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7554
|
+
else:
|
7555
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7556
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7557
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7558
|
+
|
7559
|
+
|
7196
7560
|
def doRegisterThirdPartyAccessUser(args, parsed_globals):
|
7197
7561
|
g_param = parse_global_arg(parsed_globals)
|
7198
7562
|
|
@@ -7401,7 +7765,7 @@ def doUpdateNetworkConnection(args, parsed_globals):
|
|
7401
7765
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7402
7766
|
|
7403
7767
|
|
7404
|
-
def
|
7768
|
+
def doDescribeSparkAppTasks(args, parsed_globals):
|
7405
7769
|
g_param = parse_global_arg(parsed_globals)
|
7406
7770
|
|
7407
7771
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7430,11 +7794,11 @@ def doCreateDataEngine(args, parsed_globals):
|
|
7430
7794
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
7431
7795
|
client._sdkVersion += ("_CLI_" + __version__)
|
7432
7796
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7433
|
-
model = models.
|
7797
|
+
model = models.DescribeSparkAppTasksRequest()
|
7434
7798
|
model.from_json_string(json.dumps(args))
|
7435
7799
|
start_time = time.time()
|
7436
7800
|
while True:
|
7437
|
-
rsp = client.
|
7801
|
+
rsp = client.DescribeSparkAppTasks(model)
|
7438
7802
|
result = rsp.to_json_string()
|
7439
7803
|
try:
|
7440
7804
|
json_obj = json.loads(result)
|
@@ -7505,7 +7869,7 @@ def doUnbindWorkGroupsFromUser(args, parsed_globals):
|
|
7505
7869
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7506
7870
|
|
7507
7871
|
|
7508
|
-
def
|
7872
|
+
def doDescribeNativeSparkSessions(args, parsed_globals):
|
7509
7873
|
g_param = parse_global_arg(parsed_globals)
|
7510
7874
|
|
7511
7875
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7534,11 +7898,11 @@ def doCreateSparkSubmitTask(args, parsed_globals):
|
|
7534
7898
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
7535
7899
|
client._sdkVersion += ("_CLI_" + __version__)
|
7536
7900
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7537
|
-
model = models.
|
7901
|
+
model = models.DescribeNativeSparkSessionsRequest()
|
7538
7902
|
model.from_json_string(json.dumps(args))
|
7539
7903
|
start_time = time.time()
|
7540
7904
|
while True:
|
7541
|
-
rsp = client.
|
7905
|
+
rsp = client.DescribeNativeSparkSessions(model)
|
7542
7906
|
result = rsp.to_json_string()
|
7543
7907
|
try:
|
7544
7908
|
json_obj = json.loads(result)
|
@@ -7765,7 +8129,7 @@ def doDescribeNotebookSessionStatement(args, parsed_globals):
|
|
7765
8129
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7766
8130
|
|
7767
8131
|
|
7768
|
-
def
|
8132
|
+
def doAttachDataMaskPolicy(args, parsed_globals):
|
7769
8133
|
g_param = parse_global_arg(parsed_globals)
|
7770
8134
|
|
7771
8135
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7794,11 +8158,11 @@ def doDescribeClusterMonitorInfos(args, parsed_globals):
|
|
7794
8158
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
7795
8159
|
client._sdkVersion += ("_CLI_" + __version__)
|
7796
8160
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7797
|
-
model = models.
|
8161
|
+
model = models.AttachDataMaskPolicyRequest()
|
7798
8162
|
model.from_json_string(json.dumps(args))
|
7799
8163
|
start_time = time.time()
|
7800
8164
|
while True:
|
7801
|
-
rsp = client.
|
8165
|
+
rsp = client.AttachDataMaskPolicy(model)
|
7802
8166
|
result = rsp.to_json_string()
|
7803
8167
|
try:
|
7804
8168
|
json_obj = json.loads(result)
|
@@ -8493,7 +8857,7 @@ def doCancelNotebookSessionStatement(args, parsed_globals):
|
|
8493
8857
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8494
8858
|
|
8495
8859
|
|
8496
|
-
def
|
8860
|
+
def doDeleteUserVpcConnection(args, parsed_globals):
|
8497
8861
|
g_param = parse_global_arg(parsed_globals)
|
8498
8862
|
|
8499
8863
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8522,11 +8886,11 @@ def doDescribeUserInfo(args, parsed_globals):
|
|
8522
8886
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
8523
8887
|
client._sdkVersion += ("_CLI_" + __version__)
|
8524
8888
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8525
|
-
model = models.
|
8889
|
+
model = models.DeleteUserVpcConnectionRequest()
|
8526
8890
|
model.from_json_string(json.dumps(args))
|
8527
8891
|
start_time = time.time()
|
8528
8892
|
while True:
|
8529
|
-
rsp = client.
|
8893
|
+
rsp = client.DeleteUserVpcConnection(model)
|
8530
8894
|
result = rsp.to_json_string()
|
8531
8895
|
try:
|
8532
8896
|
json_obj = json.loads(result)
|
@@ -8649,7 +9013,7 @@ def doDescribeSparkAppJob(args, parsed_globals):
|
|
8649
9013
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8650
9014
|
|
8651
9015
|
|
8652
|
-
def
|
9016
|
+
def doUpdateDataMaskStrategy(args, parsed_globals):
|
8653
9017
|
g_param = parse_global_arg(parsed_globals)
|
8654
9018
|
|
8655
9019
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8678,11 +9042,11 @@ def doDescribeSparkAppTasks(args, parsed_globals):
|
|
8678
9042
|
client = mod.DlcClient(cred, g_param[OptionsDefine.Region], profile)
|
8679
9043
|
client._sdkVersion += ("_CLI_" + __version__)
|
8680
9044
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8681
|
-
model = models.
|
9045
|
+
model = models.UpdateDataMaskStrategyRequest()
|
8682
9046
|
model.from_json_string(json.dumps(args))
|
8683
9047
|
start_time = time.time()
|
8684
9048
|
while True:
|
8685
|
-
rsp = client.
|
9049
|
+
rsp = client.UpdateDataMaskStrategy(model)
|
8686
9050
|
result = rsp.to_json_string()
|
8687
9051
|
try:
|
8688
9052
|
json_obj = json.loads(result)
|
@@ -9035,6 +9399,7 @@ ACTION_MAP = {
|
|
9035
9399
|
"DescribeTaskMonitorInfos": doDescribeTaskMonitorInfos,
|
9036
9400
|
"DescribeNotebookSession": doDescribeNotebookSession,
|
9037
9401
|
"CreateNotebookSession": doCreateNotebookSession,
|
9402
|
+
"DescribeDataMaskStrategies": doDescribeDataMaskStrategies,
|
9038
9403
|
"DeleteWorkGroup": doDeleteWorkGroup,
|
9039
9404
|
"UnlockMetaData": doUnlockMetaData,
|
9040
9405
|
"DescribeDataEngine": doDescribeDataEngine,
|
@@ -9046,9 +9411,10 @@ ACTION_MAP = {
|
|
9046
9411
|
"DescribeNotebookSessions": doDescribeNotebookSessions,
|
9047
9412
|
"DescribeDMSPartitions": doDescribeDMSPartitions,
|
9048
9413
|
"CancelTask": doCancelTask,
|
9414
|
+
"DeleteDataMaskStrategy": doDeleteDataMaskStrategy,
|
9049
9415
|
"DescribeDLCCatalogAccess": doDescribeDLCCatalogAccess,
|
9050
9416
|
"DescribeDMSTables": doDescribeDMSTables,
|
9051
|
-
"
|
9417
|
+
"CreateSparkSubmitTask": doCreateSparkSubmitTask,
|
9052
9418
|
"DescribeUserType": doDescribeUserType,
|
9053
9419
|
"UpdateStandardEngineResourceGroupResourceInfo": doUpdateStandardEngineResourceGroupResourceInfo,
|
9054
9420
|
"DescribeNetworkConnections": doDescribeNetworkConnections,
|
@@ -9077,6 +9443,8 @@ ACTION_MAP = {
|
|
9077
9443
|
"DescribeUsers": doDescribeUsers,
|
9078
9444
|
"CreateTasks": doCreateTasks,
|
9079
9445
|
"DescribeScripts": doDescribeScripts,
|
9446
|
+
"CreateDataMaskStrategy": doCreateDataMaskStrategy,
|
9447
|
+
"DescribeClusterMonitorInfos": doDescribeClusterMonitorInfos,
|
9080
9448
|
"ModifyWorkGroup": doModifyWorkGroup,
|
9081
9449
|
"DescribeTablesName": doDescribeTablesName,
|
9082
9450
|
"DeleteCHDFSBindingProduct": doDeleteCHDFSBindingProduct,
|
@@ -9096,6 +9464,7 @@ ACTION_MAP = {
|
|
9096
9464
|
"DescribeSubUserAccessPolicy": doDescribeSubUserAccessPolicy,
|
9097
9465
|
"CreateSparkSessionBatchSQL": doCreateSparkSessionBatchSQL,
|
9098
9466
|
"CreateUserVpcConnection": doCreateUserVpcConnection,
|
9467
|
+
"DescribeUDFPolicy": doDescribeUDFPolicy,
|
9099
9468
|
"DescribeNotebookSessionStatements": doDescribeNotebookSessionStatements,
|
9100
9469
|
"GrantDLCCatalogAccess": doGrantDLCCatalogAccess,
|
9101
9470
|
"SuspendResumeDataEngine": doSuspendResumeDataEngine,
|
@@ -9135,7 +9504,7 @@ ACTION_MAP = {
|
|
9135
9504
|
"DescribeSparkSessionBatchSqlLog": doDescribeSparkSessionBatchSqlLog,
|
9136
9505
|
"DescribeTable": doDescribeTable,
|
9137
9506
|
"GetOptimizerPolicy": doGetOptimizerPolicy,
|
9138
|
-
"
|
9507
|
+
"DescribeUserInfo": doDescribeUserInfo,
|
9139
9508
|
"DeleteNativeSparkSession": doDeleteNativeSparkSession,
|
9140
9509
|
"CheckDataEngineConfigPairsValidity": doCheckDataEngineConfigPairsValidity,
|
9141
9510
|
"DescribeUserVpcConnection": doDescribeUserVpcConnection,
|
@@ -9151,6 +9520,7 @@ ACTION_MAP = {
|
|
9151
9520
|
"DescribeSparkSessionBatchSQLCost": doDescribeSparkSessionBatchSQLCost,
|
9152
9521
|
"UpgradeDataEngineImage": doUpgradeDataEngineImage,
|
9153
9522
|
"DetachUserPolicy": doDetachUserPolicy,
|
9523
|
+
"UpdateUDFPolicy": doUpdateUDFPolicy,
|
9154
9524
|
"DescribeDataEngineEvents": doDescribeDataEngineEvents,
|
9155
9525
|
"DetachWorkGroupPolicy": doDetachWorkGroupPolicy,
|
9156
9526
|
"DeleteNotebookSession": doDeleteNotebookSession,
|
@@ -9162,18 +9532,19 @@ ACTION_MAP = {
|
|
9162
9532
|
"CreateTable": doCreateTable,
|
9163
9533
|
"DescribeTaskResult": doDescribeTaskResult,
|
9164
9534
|
"CreateExportTask": doCreateExportTask,
|
9535
|
+
"CreateDataEngine": doCreateDataEngine,
|
9165
9536
|
"RegisterThirdPartyAccessUser": doRegisterThirdPartyAccessUser,
|
9166
9537
|
"DescribeTasksAnalysis": doDescribeTasksAnalysis,
|
9167
9538
|
"DeleteUsersFromWorkGroup": doDeleteUsersFromWorkGroup,
|
9168
9539
|
"UpdateNetworkConnection": doUpdateNetworkConnection,
|
9169
|
-
"
|
9540
|
+
"DescribeSparkAppTasks": doDescribeSparkAppTasks,
|
9170
9541
|
"UnbindWorkGroupsFromUser": doUnbindWorkGroupsFromUser,
|
9171
|
-
"
|
9542
|
+
"DescribeNativeSparkSessions": doDescribeNativeSparkSessions,
|
9172
9543
|
"DescribeWorkGroups": doDescribeWorkGroups,
|
9173
9544
|
"CreateScript": doCreateScript,
|
9174
9545
|
"RestartDataEngine": doRestartDataEngine,
|
9175
9546
|
"DescribeNotebookSessionStatement": doDescribeNotebookSessionStatement,
|
9176
|
-
"
|
9547
|
+
"AttachDataMaskPolicy": doAttachDataMaskPolicy,
|
9177
9548
|
"RenewDataEngine": doRenewDataEngine,
|
9178
9549
|
"ModifySparkApp": doModifySparkApp,
|
9179
9550
|
"DescribeViews": doDescribeViews,
|
@@ -9187,10 +9558,10 @@ ACTION_MAP = {
|
|
9187
9558
|
"ModifyDataEngineDescription": doModifyDataEngineDescription,
|
9188
9559
|
"DropDMSTable": doDropDMSTable,
|
9189
9560
|
"CancelNotebookSessionStatement": doCancelNotebookSessionStatement,
|
9190
|
-
"
|
9561
|
+
"DeleteUserVpcConnection": doDeleteUserVpcConnection,
|
9191
9562
|
"DescribeStoreLocation": doDescribeStoreLocation,
|
9192
9563
|
"DescribeSparkAppJob": doDescribeSparkAppJob,
|
9193
|
-
"
|
9564
|
+
"UpdateDataMaskStrategy": doUpdateDataMaskStrategy,
|
9194
9565
|
"DescribeDataEnginePythonSparkImages": doDescribeDataEnginePythonSparkImages,
|
9195
9566
|
"DescribeStandardEngineResourceGroups": doDescribeStandardEngineResourceGroups,
|
9196
9567
|
"ListTaskJobLogDetail": doListTaskJobLogDetail,
|