tccli 3.0.1405.1__py2.py3-none-any.whl → 3.0.1407.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/batch/v20170312/api.json +1 -1
- tccli/services/cdb/v20170320/api.json +31 -21
- tccli/services/cdn/v20180606/api.json +1 -1
- tccli/services/cloudhsm/v20191112/api.json +10 -10
- tccli/services/cls/v20201016/api.json +40 -31
- tccli/services/cls/v20201016/examples.json +8 -2
- tccli/services/ctem/v20231128/api.json +30 -0
- tccli/services/dbbrain/v20210527/api.json +17 -7
- tccli/services/dbbrain/v20210527/examples.json +1 -1
- tccli/services/dts/v20211206/api.json +16 -6
- tccli/services/emr/v20190103/api.json +9 -0
- tccli/services/es/es_client.py +57 -4
- tccli/services/es/v20250101/api.json +133 -0
- tccli/services/es/v20250101/examples.json +8 -0
- tccli/services/ess/ess_client.py +212 -0
- tccli/services/ess/v20201111/api.json +508 -24
- tccli/services/ess/v20201111/examples.json +41 -3
- tccli/services/essbasic/v20210526/api.json +12 -3
- tccli/services/essbasic/v20210526/examples.json +2 -2
- tccli/services/gwlb/gwlb_client.py +53 -0
- tccli/services/gwlb/v20240906/api.json +80 -0
- tccli/services/gwlb/v20240906/examples.json +8 -0
- tccli/services/hunyuan/v20230901/api.json +2 -2
- tccli/services/ioa/ioa_client.py +220 -8
- tccli/services/ioa/v20220601/api.json +559 -0
- tccli/services/ioa/v20220601/examples.json +38 -0
- tccli/services/iotexplorer/iotexplorer_client.py +220 -8
- tccli/services/iotexplorer/v20190423/api.json +959 -12
- tccli/services/iotexplorer/v20190423/examples.json +68 -0
- tccli/services/lcic/v20220817/api.json +2 -2
- tccli/services/lke/v20231130/api.json +1 -1
- tccli/services/lke/v20231130/examples.json +2 -2
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +7 -1
- tccli/services/monitor/monitor_client.py +53 -0
- tccli/services/monitor/v20180724/api.json +248 -0
- tccli/services/monitor/v20180724/examples.json +8 -0
- tccli/services/mps/v20190612/api.json +384 -2
- tccli/services/mqtt/v20240516/api.json +10 -0
- tccli/services/mqtt/v20240516/examples.json +3 -9
- tccli/services/nlp/v20190408/api.json +6 -6
- tccli/services/oceanus/oceanus_client.py +110 -4
- tccli/services/oceanus/v20190422/api.json +152 -8
- tccli/services/oceanus/v20190422/examples.json +16 -0
- tccli/services/ocr/v20181119/api.json +10 -0
- tccli/services/privatedns/privatedns_client.py +641 -58
- tccli/services/privatedns/v20201028/api.json +923 -12
- tccli/services/privatedns/v20201028/examples.json +88 -0
- tccli/services/redis/v20180412/api.json +1 -1
- tccli/services/teo/v20220901/api.json +206 -66
- tccli/services/teo/v20220901/examples.json +32 -8
- tccli/services/tione/v20211111/api.json +1 -1
- tccli/services/tke/v20180525/api.json +23 -14
- tccli/services/tke/v20180525/examples.json +1 -1
- tccli/services/trtc/v20190722/api.json +9 -9
- tccli/services/trtc/v20190722/examples.json +1 -1
- tccli/services/tse/v20201207/api.json +30 -1
- tccli/services/vpc/v20170312/api.json +11 -2
- tccli/services/wedata/v20210820/api.json +1281 -601
- tccli/services/wedata/v20210820/examples.json +127 -157
- tccli/services/wedata/v20250806/api.json +480 -18
- tccli/services/wedata/v20250806/examples.json +38 -6
- tccli/services/wedata/wedata_client.py +216 -4
- {tccli-3.0.1405.1.dist-info → tccli-3.0.1407.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1405.1.dist-info → tccli-3.0.1407.1.dist-info}/RECORD +70 -70
- {tccli-3.0.1405.1.dist-info → tccli-3.0.1407.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1405.1.dist-info → tccli-3.0.1407.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1405.1.dist-info → tccli-3.0.1407.1.dist-info}/license_files/LICENSE +0 -0
|
@@ -121,6 +121,422 @@ def doDescribePrivateZone(args, parsed_globals):
|
|
|
121
121
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
122
122
|
|
|
123
123
|
|
|
124
|
+
def doDeleteForwardRule(args, parsed_globals):
|
|
125
|
+
g_param = parse_global_arg(parsed_globals)
|
|
126
|
+
|
|
127
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
128
|
+
cred = credential.CVMRoleCredential()
|
|
129
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
130
|
+
cred = credential.STSAssumeRoleCredential(
|
|
131
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
|
+
)
|
|
134
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
|
+
else:
|
|
137
|
+
cred = credential.Credential(
|
|
138
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
139
|
+
)
|
|
140
|
+
http_profile = HttpProfile(
|
|
141
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
142
|
+
reqMethod="POST",
|
|
143
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
|
+
)
|
|
146
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
147
|
+
if g_param[OptionsDefine.Language]:
|
|
148
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
149
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
150
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
151
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
152
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
153
|
+
model = models.DeleteForwardRuleRequest()
|
|
154
|
+
model.from_json_string(json.dumps(args))
|
|
155
|
+
start_time = time.time()
|
|
156
|
+
while True:
|
|
157
|
+
rsp = client.DeleteForwardRule(model)
|
|
158
|
+
result = rsp.to_json_string()
|
|
159
|
+
try:
|
|
160
|
+
json_obj = json.loads(result)
|
|
161
|
+
except TypeError as e:
|
|
162
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
163
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
164
|
+
break
|
|
165
|
+
cur_time = time.time()
|
|
166
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
167
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
168
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
169
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
170
|
+
else:
|
|
171
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
172
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
173
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
174
|
+
|
|
175
|
+
|
|
176
|
+
def doDeleteEndPoint(args, parsed_globals):
|
|
177
|
+
g_param = parse_global_arg(parsed_globals)
|
|
178
|
+
|
|
179
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
180
|
+
cred = credential.CVMRoleCredential()
|
|
181
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
182
|
+
cred = credential.STSAssumeRoleCredential(
|
|
183
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
|
+
)
|
|
186
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
|
+
else:
|
|
189
|
+
cred = credential.Credential(
|
|
190
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
191
|
+
)
|
|
192
|
+
http_profile = HttpProfile(
|
|
193
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
194
|
+
reqMethod="POST",
|
|
195
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
|
+
)
|
|
198
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
199
|
+
if g_param[OptionsDefine.Language]:
|
|
200
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
201
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
202
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
203
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
204
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
205
|
+
model = models.DeleteEndPointRequest()
|
|
206
|
+
model.from_json_string(json.dumps(args))
|
|
207
|
+
start_time = time.time()
|
|
208
|
+
while True:
|
|
209
|
+
rsp = client.DeleteEndPoint(model)
|
|
210
|
+
result = rsp.to_json_string()
|
|
211
|
+
try:
|
|
212
|
+
json_obj = json.loads(result)
|
|
213
|
+
except TypeError as e:
|
|
214
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
215
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
216
|
+
break
|
|
217
|
+
cur_time = time.time()
|
|
218
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
219
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
220
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
221
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
222
|
+
else:
|
|
223
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
224
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
225
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
|
+
|
|
227
|
+
|
|
228
|
+
def doDescribeQuotaUsage(args, parsed_globals):
|
|
229
|
+
g_param = parse_global_arg(parsed_globals)
|
|
230
|
+
|
|
231
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
232
|
+
cred = credential.CVMRoleCredential()
|
|
233
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
234
|
+
cred = credential.STSAssumeRoleCredential(
|
|
235
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
|
+
)
|
|
238
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
|
+
else:
|
|
241
|
+
cred = credential.Credential(
|
|
242
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
243
|
+
)
|
|
244
|
+
http_profile = HttpProfile(
|
|
245
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
246
|
+
reqMethod="POST",
|
|
247
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
|
+
)
|
|
250
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
251
|
+
if g_param[OptionsDefine.Language]:
|
|
252
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
253
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
+
model = models.DescribeQuotaUsageRequest()
|
|
258
|
+
model.from_json_string(json.dumps(args))
|
|
259
|
+
start_time = time.time()
|
|
260
|
+
while True:
|
|
261
|
+
rsp = client.DescribeQuotaUsage(model)
|
|
262
|
+
result = rsp.to_json_string()
|
|
263
|
+
try:
|
|
264
|
+
json_obj = json.loads(result)
|
|
265
|
+
except TypeError as e:
|
|
266
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
267
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
268
|
+
break
|
|
269
|
+
cur_time = time.time()
|
|
270
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
271
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
272
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
273
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
274
|
+
else:
|
|
275
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
276
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
277
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
|
+
|
|
279
|
+
|
|
280
|
+
def doDescribeAuditLog(args, parsed_globals):
|
|
281
|
+
g_param = parse_global_arg(parsed_globals)
|
|
282
|
+
|
|
283
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
284
|
+
cred = credential.CVMRoleCredential()
|
|
285
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
286
|
+
cred = credential.STSAssumeRoleCredential(
|
|
287
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
|
+
)
|
|
290
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
|
+
else:
|
|
293
|
+
cred = credential.Credential(
|
|
294
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
295
|
+
)
|
|
296
|
+
http_profile = HttpProfile(
|
|
297
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
298
|
+
reqMethod="POST",
|
|
299
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
|
+
)
|
|
302
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
303
|
+
if g_param[OptionsDefine.Language]:
|
|
304
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
305
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
306
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
+
model = models.DescribeAuditLogRequest()
|
|
310
|
+
model.from_json_string(json.dumps(args))
|
|
311
|
+
start_time = time.time()
|
|
312
|
+
while True:
|
|
313
|
+
rsp = client.DescribeAuditLog(model)
|
|
314
|
+
result = rsp.to_json_string()
|
|
315
|
+
try:
|
|
316
|
+
json_obj = json.loads(result)
|
|
317
|
+
except TypeError as e:
|
|
318
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
319
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
320
|
+
break
|
|
321
|
+
cur_time = time.time()
|
|
322
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
323
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
324
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
325
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
326
|
+
else:
|
|
327
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
328
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
329
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
|
+
|
|
331
|
+
|
|
332
|
+
def doCreatePrivateZoneRecord(args, parsed_globals):
|
|
333
|
+
g_param = parse_global_arg(parsed_globals)
|
|
334
|
+
|
|
335
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
336
|
+
cred = credential.CVMRoleCredential()
|
|
337
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
338
|
+
cred = credential.STSAssumeRoleCredential(
|
|
339
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
|
+
)
|
|
342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
|
+
else:
|
|
345
|
+
cred = credential.Credential(
|
|
346
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
347
|
+
)
|
|
348
|
+
http_profile = HttpProfile(
|
|
349
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
350
|
+
reqMethod="POST",
|
|
351
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
|
+
)
|
|
354
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
355
|
+
if g_param[OptionsDefine.Language]:
|
|
356
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
357
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
+
model = models.CreatePrivateZoneRecordRequest()
|
|
362
|
+
model.from_json_string(json.dumps(args))
|
|
363
|
+
start_time = time.time()
|
|
364
|
+
while True:
|
|
365
|
+
rsp = client.CreatePrivateZoneRecord(model)
|
|
366
|
+
result = rsp.to_json_string()
|
|
367
|
+
try:
|
|
368
|
+
json_obj = json.loads(result)
|
|
369
|
+
except TypeError as e:
|
|
370
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
371
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
372
|
+
break
|
|
373
|
+
cur_time = time.time()
|
|
374
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
375
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
376
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
377
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
378
|
+
else:
|
|
379
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
380
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
381
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
|
+
|
|
383
|
+
|
|
384
|
+
def doCreatePrivateZone(args, parsed_globals):
|
|
385
|
+
g_param = parse_global_arg(parsed_globals)
|
|
386
|
+
|
|
387
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
388
|
+
cred = credential.CVMRoleCredential()
|
|
389
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
390
|
+
cred = credential.STSAssumeRoleCredential(
|
|
391
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
|
+
)
|
|
394
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
|
+
else:
|
|
397
|
+
cred = credential.Credential(
|
|
398
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
399
|
+
)
|
|
400
|
+
http_profile = HttpProfile(
|
|
401
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
402
|
+
reqMethod="POST",
|
|
403
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
|
+
)
|
|
406
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
407
|
+
if g_param[OptionsDefine.Language]:
|
|
408
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
409
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
410
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
+
model = models.CreatePrivateZoneRequest()
|
|
414
|
+
model.from_json_string(json.dumps(args))
|
|
415
|
+
start_time = time.time()
|
|
416
|
+
while True:
|
|
417
|
+
rsp = client.CreatePrivateZone(model)
|
|
418
|
+
result = rsp.to_json_string()
|
|
419
|
+
try:
|
|
420
|
+
json_obj = json.loads(result)
|
|
421
|
+
except TypeError as e:
|
|
422
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
423
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
424
|
+
break
|
|
425
|
+
cur_time = time.time()
|
|
426
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
427
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
428
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
429
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
430
|
+
else:
|
|
431
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
432
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
433
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
|
+
|
|
435
|
+
|
|
436
|
+
def doDescribePrivateZoneList(args, parsed_globals):
|
|
437
|
+
g_param = parse_global_arg(parsed_globals)
|
|
438
|
+
|
|
439
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
440
|
+
cred = credential.CVMRoleCredential()
|
|
441
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
442
|
+
cred = credential.STSAssumeRoleCredential(
|
|
443
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
|
+
)
|
|
446
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
|
+
else:
|
|
449
|
+
cred = credential.Credential(
|
|
450
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
451
|
+
)
|
|
452
|
+
http_profile = HttpProfile(
|
|
453
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
454
|
+
reqMethod="POST",
|
|
455
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
|
+
)
|
|
458
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
459
|
+
if g_param[OptionsDefine.Language]:
|
|
460
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
461
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
462
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
+
model = models.DescribePrivateZoneListRequest()
|
|
466
|
+
model.from_json_string(json.dumps(args))
|
|
467
|
+
start_time = time.time()
|
|
468
|
+
while True:
|
|
469
|
+
rsp = client.DescribePrivateZoneList(model)
|
|
470
|
+
result = rsp.to_json_string()
|
|
471
|
+
try:
|
|
472
|
+
json_obj = json.loads(result)
|
|
473
|
+
except TypeError as e:
|
|
474
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
475
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
476
|
+
break
|
|
477
|
+
cur_time = time.time()
|
|
478
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
479
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
480
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
481
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
482
|
+
else:
|
|
483
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
484
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
485
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
|
+
|
|
487
|
+
|
|
488
|
+
def doModifyInboundEndpoint(args, parsed_globals):
|
|
489
|
+
g_param = parse_global_arg(parsed_globals)
|
|
490
|
+
|
|
491
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
492
|
+
cred = credential.CVMRoleCredential()
|
|
493
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
494
|
+
cred = credential.STSAssumeRoleCredential(
|
|
495
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
|
+
)
|
|
498
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
|
+
else:
|
|
501
|
+
cred = credential.Credential(
|
|
502
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
503
|
+
)
|
|
504
|
+
http_profile = HttpProfile(
|
|
505
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
506
|
+
reqMethod="POST",
|
|
507
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
|
+
)
|
|
510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
511
|
+
if g_param[OptionsDefine.Language]:
|
|
512
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
513
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
+
model = models.ModifyInboundEndpointRequest()
|
|
518
|
+
model.from_json_string(json.dumps(args))
|
|
519
|
+
start_time = time.time()
|
|
520
|
+
while True:
|
|
521
|
+
rsp = client.ModifyInboundEndpoint(model)
|
|
522
|
+
result = rsp.to_json_string()
|
|
523
|
+
try:
|
|
524
|
+
json_obj = json.loads(result)
|
|
525
|
+
except TypeError as e:
|
|
526
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
527
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
528
|
+
break
|
|
529
|
+
cur_time = time.time()
|
|
530
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
531
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
532
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
533
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
534
|
+
else:
|
|
535
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
536
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
537
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
|
+
|
|
539
|
+
|
|
124
540
|
def doDescribePrivateZoneRecordList(args, parsed_globals):
|
|
125
541
|
g_param = parse_global_arg(parsed_globals)
|
|
126
542
|
|
|
@@ -173,7 +589,7 @@ def doDescribePrivateZoneRecordList(args, parsed_globals):
|
|
|
173
589
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
174
590
|
|
|
175
591
|
|
|
176
|
-
def
|
|
592
|
+
def doAddSpecifyPrivateZoneVpc(args, parsed_globals):
|
|
177
593
|
g_param = parse_global_arg(parsed_globals)
|
|
178
594
|
|
|
179
595
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -202,11 +618,11 @@ def doDescribeQuotaUsage(args, parsed_globals):
|
|
|
202
618
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
203
619
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
204
620
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
205
|
-
model = models.
|
|
621
|
+
model = models.AddSpecifyPrivateZoneVpcRequest()
|
|
206
622
|
model.from_json_string(json.dumps(args))
|
|
207
623
|
start_time = time.time()
|
|
208
624
|
while True:
|
|
209
|
-
rsp = client.
|
|
625
|
+
rsp = client.AddSpecifyPrivateZoneVpc(model)
|
|
210
626
|
result = rsp.to_json_string()
|
|
211
627
|
try:
|
|
212
628
|
json_obj = json.loads(result)
|
|
@@ -225,7 +641,7 @@ def doDescribeQuotaUsage(args, parsed_globals):
|
|
|
225
641
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
642
|
|
|
227
643
|
|
|
228
|
-
def
|
|
644
|
+
def doModifyForwardRule(args, parsed_globals):
|
|
229
645
|
g_param = parse_global_arg(parsed_globals)
|
|
230
646
|
|
|
231
647
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -254,11 +670,11 @@ def doDescribeAuditLog(args, parsed_globals):
|
|
|
254
670
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
671
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
672
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
673
|
+
model = models.ModifyForwardRuleRequest()
|
|
258
674
|
model.from_json_string(json.dumps(args))
|
|
259
675
|
start_time = time.time()
|
|
260
676
|
while True:
|
|
261
|
-
rsp = client.
|
|
677
|
+
rsp = client.ModifyForwardRule(model)
|
|
262
678
|
result = rsp.to_json_string()
|
|
263
679
|
try:
|
|
264
680
|
json_obj = json.loads(result)
|
|
@@ -277,7 +693,7 @@ def doDescribeAuditLog(args, parsed_globals):
|
|
|
277
693
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
694
|
|
|
279
695
|
|
|
280
|
-
def
|
|
696
|
+
def doQueryAsyncBindVpcStatus(args, parsed_globals):
|
|
281
697
|
g_param = parse_global_arg(parsed_globals)
|
|
282
698
|
|
|
283
699
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -306,11 +722,11 @@ def doCreatePrivateZoneRecord(args, parsed_globals):
|
|
|
306
722
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
723
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
724
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
725
|
+
model = models.QueryAsyncBindVpcStatusRequest()
|
|
310
726
|
model.from_json_string(json.dumps(args))
|
|
311
727
|
start_time = time.time()
|
|
312
728
|
while True:
|
|
313
|
-
rsp = client.
|
|
729
|
+
rsp = client.QueryAsyncBindVpcStatus(model)
|
|
314
730
|
result = rsp.to_json_string()
|
|
315
731
|
try:
|
|
316
732
|
json_obj = json.loads(result)
|
|
@@ -329,7 +745,7 @@ def doCreatePrivateZoneRecord(args, parsed_globals):
|
|
|
329
745
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
746
|
|
|
331
747
|
|
|
332
|
-
def
|
|
748
|
+
def doModifyPrivateZone(args, parsed_globals):
|
|
333
749
|
g_param = parse_global_arg(parsed_globals)
|
|
334
750
|
|
|
335
751
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -358,11 +774,11 @@ def doCreatePrivateZone(args, parsed_globals):
|
|
|
358
774
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
775
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
776
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.
|
|
777
|
+
model = models.ModifyPrivateZoneRequest()
|
|
362
778
|
model.from_json_string(json.dumps(args))
|
|
363
779
|
start_time = time.time()
|
|
364
780
|
while True:
|
|
365
|
-
rsp = client.
|
|
781
|
+
rsp = client.ModifyPrivateZone(model)
|
|
366
782
|
result = rsp.to_json_string()
|
|
367
783
|
try:
|
|
368
784
|
json_obj = json.loads(result)
|
|
@@ -381,7 +797,7 @@ def doCreatePrivateZone(args, parsed_globals):
|
|
|
381
797
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
798
|
|
|
383
799
|
|
|
384
|
-
def
|
|
800
|
+
def doModifyPrivateZoneRecord(args, parsed_globals):
|
|
385
801
|
g_param = parse_global_arg(parsed_globals)
|
|
386
802
|
|
|
387
803
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -410,11 +826,11 @@ def doDescribePrivateZoneList(args, parsed_globals):
|
|
|
410
826
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
827
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
828
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
829
|
+
model = models.ModifyPrivateZoneRecordRequest()
|
|
414
830
|
model.from_json_string(json.dumps(args))
|
|
415
831
|
start_time = time.time()
|
|
416
832
|
while True:
|
|
417
|
-
rsp = client.
|
|
833
|
+
rsp = client.ModifyPrivateZoneRecord(model)
|
|
418
834
|
result = rsp.to_json_string()
|
|
419
835
|
try:
|
|
420
836
|
json_obj = json.loads(result)
|
|
@@ -433,7 +849,7 @@ def doDescribePrivateZoneList(args, parsed_globals):
|
|
|
433
849
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
850
|
|
|
435
851
|
|
|
436
|
-
def
|
|
852
|
+
def doDeletePrivateDNSAccount(args, parsed_globals):
|
|
437
853
|
g_param = parse_global_arg(parsed_globals)
|
|
438
854
|
|
|
439
855
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -462,11 +878,11 @@ def doAddSpecifyPrivateZoneVpc(args, parsed_globals):
|
|
|
462
878
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
879
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
880
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
-
model = models.
|
|
881
|
+
model = models.DeletePrivateDNSAccountRequest()
|
|
466
882
|
model.from_json_string(json.dumps(args))
|
|
467
883
|
start_time = time.time()
|
|
468
884
|
while True:
|
|
469
|
-
rsp = client.
|
|
885
|
+
rsp = client.DeletePrivateDNSAccount(model)
|
|
470
886
|
result = rsp.to_json_string()
|
|
471
887
|
try:
|
|
472
888
|
json_obj = json.loads(result)
|
|
@@ -485,7 +901,7 @@ def doAddSpecifyPrivateZoneVpc(args, parsed_globals):
|
|
|
485
901
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
902
|
|
|
487
903
|
|
|
488
|
-
def
|
|
904
|
+
def doCreateExtendEndpoint(args, parsed_globals):
|
|
489
905
|
g_param = parse_global_arg(parsed_globals)
|
|
490
906
|
|
|
491
907
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -514,11 +930,11 @@ def doQueryAsyncBindVpcStatus(args, parsed_globals):
|
|
|
514
930
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
931
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
932
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
933
|
+
model = models.CreateExtendEndpointRequest()
|
|
518
934
|
model.from_json_string(json.dumps(args))
|
|
519
935
|
start_time = time.time()
|
|
520
936
|
while True:
|
|
521
|
-
rsp = client.
|
|
937
|
+
rsp = client.CreateExtendEndpoint(model)
|
|
522
938
|
result = rsp.to_json_string()
|
|
523
939
|
try:
|
|
524
940
|
json_obj = json.loads(result)
|
|
@@ -537,7 +953,7 @@ def doQueryAsyncBindVpcStatus(args, parsed_globals):
|
|
|
537
953
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
954
|
|
|
539
955
|
|
|
540
|
-
def
|
|
956
|
+
def doSubscribePrivateZoneService(args, parsed_globals):
|
|
541
957
|
g_param = parse_global_arg(parsed_globals)
|
|
542
958
|
|
|
543
959
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -566,11 +982,11 @@ def doModifyPrivateZone(args, parsed_globals):
|
|
|
566
982
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
983
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
984
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
985
|
+
model = models.SubscribePrivateZoneServiceRequest()
|
|
570
986
|
model.from_json_string(json.dumps(args))
|
|
571
987
|
start_time = time.time()
|
|
572
988
|
while True:
|
|
573
|
-
rsp = client.
|
|
989
|
+
rsp = client.SubscribePrivateZoneService(model)
|
|
574
990
|
result = rsp.to_json_string()
|
|
575
991
|
try:
|
|
576
992
|
json_obj = json.loads(result)
|
|
@@ -589,7 +1005,7 @@ def doModifyPrivateZone(args, parsed_globals):
|
|
|
589
1005
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
1006
|
|
|
591
1007
|
|
|
592
|
-
def
|
|
1008
|
+
def doDescribeDashboard(args, parsed_globals):
|
|
593
1009
|
g_param = parse_global_arg(parsed_globals)
|
|
594
1010
|
|
|
595
1011
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -618,11 +1034,11 @@ def doModifyPrivateZoneRecord(args, parsed_globals):
|
|
|
618
1034
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
1035
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
1036
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
1037
|
+
model = models.DescribeDashboardRequest()
|
|
622
1038
|
model.from_json_string(json.dumps(args))
|
|
623
1039
|
start_time = time.time()
|
|
624
1040
|
while True:
|
|
625
|
-
rsp = client.
|
|
1041
|
+
rsp = client.DescribeDashboard(model)
|
|
626
1042
|
result = rsp.to_json_string()
|
|
627
1043
|
try:
|
|
628
1044
|
json_obj = json.loads(result)
|
|
@@ -641,7 +1057,7 @@ def doModifyPrivateZoneRecord(args, parsed_globals):
|
|
|
641
1057
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
1058
|
|
|
643
1059
|
|
|
644
|
-
def
|
|
1060
|
+
def doModifyPrivateZoneVpc(args, parsed_globals):
|
|
645
1061
|
g_param = parse_global_arg(parsed_globals)
|
|
646
1062
|
|
|
647
1063
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -670,11 +1086,11 @@ def doDeletePrivateDNSAccount(args, parsed_globals):
|
|
|
670
1086
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
1087
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
1088
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
1089
|
+
model = models.ModifyPrivateZoneVpcRequest()
|
|
674
1090
|
model.from_json_string(json.dumps(args))
|
|
675
1091
|
start_time = time.time()
|
|
676
1092
|
while True:
|
|
677
|
-
rsp = client.
|
|
1093
|
+
rsp = client.ModifyPrivateZoneVpc(model)
|
|
678
1094
|
result = rsp.to_json_string()
|
|
679
1095
|
try:
|
|
680
1096
|
json_obj = json.loads(result)
|
|
@@ -693,7 +1109,7 @@ def doDeletePrivateDNSAccount(args, parsed_globals):
|
|
|
693
1109
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
1110
|
|
|
695
1111
|
|
|
696
|
-
def
|
|
1112
|
+
def doDeletePrivateZone(args, parsed_globals):
|
|
697
1113
|
g_param = parse_global_arg(parsed_globals)
|
|
698
1114
|
|
|
699
1115
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -722,11 +1138,11 @@ def doSubscribePrivateZoneService(args, parsed_globals):
|
|
|
722
1138
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
1139
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
1140
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
1141
|
+
model = models.DeletePrivateZoneRequest()
|
|
726
1142
|
model.from_json_string(json.dumps(args))
|
|
727
1143
|
start_time = time.time()
|
|
728
1144
|
while True:
|
|
729
|
-
rsp = client.
|
|
1145
|
+
rsp = client.DeletePrivateZone(model)
|
|
730
1146
|
result = rsp.to_json_string()
|
|
731
1147
|
try:
|
|
732
1148
|
json_obj = json.loads(result)
|
|
@@ -745,7 +1161,7 @@ def doSubscribePrivateZoneService(args, parsed_globals):
|
|
|
745
1161
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
1162
|
|
|
747
1163
|
|
|
748
|
-
def
|
|
1164
|
+
def doDescribeAccountVpcList(args, parsed_globals):
|
|
749
1165
|
g_param = parse_global_arg(parsed_globals)
|
|
750
1166
|
|
|
751
1167
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -774,11 +1190,11 @@ def doDescribeDashboard(args, parsed_globals):
|
|
|
774
1190
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
1191
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
1192
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
1193
|
+
model = models.DescribeAccountVpcListRequest()
|
|
778
1194
|
model.from_json_string(json.dumps(args))
|
|
779
1195
|
start_time = time.time()
|
|
780
1196
|
while True:
|
|
781
|
-
rsp = client.
|
|
1197
|
+
rsp = client.DescribeAccountVpcList(model)
|
|
782
1198
|
result = rsp.to_json_string()
|
|
783
1199
|
try:
|
|
784
1200
|
json_obj = json.loads(result)
|
|
@@ -797,7 +1213,7 @@ def doDescribeDashboard(args, parsed_globals):
|
|
|
797
1213
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
1214
|
|
|
799
1215
|
|
|
800
|
-
def
|
|
1216
|
+
def doDescribeRecord(args, parsed_globals):
|
|
801
1217
|
g_param = parse_global_arg(parsed_globals)
|
|
802
1218
|
|
|
803
1219
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -826,11 +1242,11 @@ def doModifyPrivateZoneVpc(args, parsed_globals):
|
|
|
826
1242
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
1243
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
1244
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
1245
|
+
model = models.DescribeRecordRequest()
|
|
830
1246
|
model.from_json_string(json.dumps(args))
|
|
831
1247
|
start_time = time.time()
|
|
832
1248
|
while True:
|
|
833
|
-
rsp = client.
|
|
1249
|
+
rsp = client.DescribeRecord(model)
|
|
834
1250
|
result = rsp.to_json_string()
|
|
835
1251
|
try:
|
|
836
1252
|
json_obj = json.loads(result)
|
|
@@ -849,7 +1265,7 @@ def doModifyPrivateZoneVpc(args, parsed_globals):
|
|
|
849
1265
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
1266
|
|
|
851
1267
|
|
|
852
|
-
def
|
|
1268
|
+
def doCreateInboundEndpoint(args, parsed_globals):
|
|
853
1269
|
g_param = parse_global_arg(parsed_globals)
|
|
854
1270
|
|
|
855
1271
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -878,11 +1294,11 @@ def doDeletePrivateZone(args, parsed_globals):
|
|
|
878
1294
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
1295
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
1296
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
1297
|
+
model = models.CreateInboundEndpointRequest()
|
|
882
1298
|
model.from_json_string(json.dumps(args))
|
|
883
1299
|
start_time = time.time()
|
|
884
1300
|
while True:
|
|
885
|
-
rsp = client.
|
|
1301
|
+
rsp = client.CreateInboundEndpoint(model)
|
|
886
1302
|
result = rsp.to_json_string()
|
|
887
1303
|
try:
|
|
888
1304
|
json_obj = json.loads(result)
|
|
@@ -901,7 +1317,7 @@ def doDeletePrivateZone(args, parsed_globals):
|
|
|
901
1317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
1318
|
|
|
903
1319
|
|
|
904
|
-
def
|
|
1320
|
+
def doModifyRecordsStatus(args, parsed_globals):
|
|
905
1321
|
g_param = parse_global_arg(parsed_globals)
|
|
906
1322
|
|
|
907
1323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -930,11 +1346,11 @@ def doDescribeAccountVpcList(args, parsed_globals):
|
|
|
930
1346
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
1347
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
1348
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
1349
|
+
model = models.ModifyRecordsStatusRequest()
|
|
934
1350
|
model.from_json_string(json.dumps(args))
|
|
935
1351
|
start_time = time.time()
|
|
936
1352
|
while True:
|
|
937
|
-
rsp = client.
|
|
1353
|
+
rsp = client.ModifyRecordsStatus(model)
|
|
938
1354
|
result = rsp.to_json_string()
|
|
939
1355
|
try:
|
|
940
1356
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1369,7 @@ def doDescribeAccountVpcList(args, parsed_globals):
|
|
|
953
1369
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1370
|
|
|
955
1371
|
|
|
956
|
-
def
|
|
1372
|
+
def doDeleteSpecifyPrivateZoneVpc(args, parsed_globals):
|
|
957
1373
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1374
|
|
|
959
1375
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -982,11 +1398,11 @@ def doDescribeRecord(args, parsed_globals):
|
|
|
982
1398
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1399
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1400
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1401
|
+
model = models.DeleteSpecifyPrivateZoneVpcRequest()
|
|
986
1402
|
model.from_json_string(json.dumps(args))
|
|
987
1403
|
start_time = time.time()
|
|
988
1404
|
while True:
|
|
989
|
-
rsp = client.
|
|
1405
|
+
rsp = client.DeleteSpecifyPrivateZoneVpc(model)
|
|
990
1406
|
result = rsp.to_json_string()
|
|
991
1407
|
try:
|
|
992
1408
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1421,7 @@ def doDescribeRecord(args, parsed_globals):
|
|
|
1005
1421
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1422
|
|
|
1007
1423
|
|
|
1008
|
-
def
|
|
1424
|
+
def doCreateForwardRule(args, parsed_globals):
|
|
1009
1425
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1426
|
|
|
1011
1427
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1034,11 +1450,11 @@ def doModifyRecordsStatus(args, parsed_globals):
|
|
|
1034
1450
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1451
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1452
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1453
|
+
model = models.CreateForwardRuleRequest()
|
|
1038
1454
|
model.from_json_string(json.dumps(args))
|
|
1039
1455
|
start_time = time.time()
|
|
1040
1456
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1457
|
+
rsp = client.CreateForwardRule(model)
|
|
1042
1458
|
result = rsp.to_json_string()
|
|
1043
1459
|
try:
|
|
1044
1460
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1473,7 @@ def doModifyRecordsStatus(args, parsed_globals):
|
|
|
1057
1473
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1474
|
|
|
1059
1475
|
|
|
1060
|
-
def
|
|
1476
|
+
def doDescribePrivateZoneService(args, parsed_globals):
|
|
1061
1477
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1478
|
|
|
1063
1479
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1086,11 +1502,11 @@ def doDeleteSpecifyPrivateZoneVpc(args, parsed_globals):
|
|
|
1086
1502
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1503
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1504
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1505
|
+
model = models.DescribePrivateZoneServiceRequest()
|
|
1090
1506
|
model.from_json_string(json.dumps(args))
|
|
1091
1507
|
start_time = time.time()
|
|
1092
1508
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1509
|
+
rsp = client.DescribePrivateZoneService(model)
|
|
1094
1510
|
result = rsp.to_json_string()
|
|
1095
1511
|
try:
|
|
1096
1512
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1525,7 @@ def doDeleteSpecifyPrivateZoneVpc(args, parsed_globals):
|
|
|
1109
1525
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1526
|
|
|
1111
1527
|
|
|
1112
|
-
def
|
|
1528
|
+
def doDescribeExtendEndpointList(args, parsed_globals):
|
|
1113
1529
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1530
|
|
|
1115
1531
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1138,11 +1554,115 @@ def doDescribePrivateZoneService(args, parsed_globals):
|
|
|
1138
1554
|
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1555
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1556
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1557
|
+
model = models.DescribeExtendEndpointListRequest()
|
|
1142
1558
|
model.from_json_string(json.dumps(args))
|
|
1143
1559
|
start_time = time.time()
|
|
1144
1560
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1561
|
+
rsp = client.DescribeExtendEndpointList(model)
|
|
1562
|
+
result = rsp.to_json_string()
|
|
1563
|
+
try:
|
|
1564
|
+
json_obj = json.loads(result)
|
|
1565
|
+
except TypeError as e:
|
|
1566
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1567
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1568
|
+
break
|
|
1569
|
+
cur_time = time.time()
|
|
1570
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1571
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1572
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1573
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1574
|
+
else:
|
|
1575
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1576
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1577
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
|
+
|
|
1579
|
+
|
|
1580
|
+
def doDescribeForwardRuleList(args, parsed_globals):
|
|
1581
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1582
|
+
|
|
1583
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1584
|
+
cred = credential.CVMRoleCredential()
|
|
1585
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1586
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1587
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
|
+
)
|
|
1590
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
|
+
else:
|
|
1593
|
+
cred = credential.Credential(
|
|
1594
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1595
|
+
)
|
|
1596
|
+
http_profile = HttpProfile(
|
|
1597
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1598
|
+
reqMethod="POST",
|
|
1599
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
|
+
)
|
|
1602
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1603
|
+
if g_param[OptionsDefine.Language]:
|
|
1604
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1605
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1606
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1607
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1608
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1609
|
+
model = models.DescribeForwardRuleListRequest()
|
|
1610
|
+
model.from_json_string(json.dumps(args))
|
|
1611
|
+
start_time = time.time()
|
|
1612
|
+
while True:
|
|
1613
|
+
rsp = client.DescribeForwardRuleList(model)
|
|
1614
|
+
result = rsp.to_json_string()
|
|
1615
|
+
try:
|
|
1616
|
+
json_obj = json.loads(result)
|
|
1617
|
+
except TypeError as e:
|
|
1618
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1619
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1620
|
+
break
|
|
1621
|
+
cur_time = time.time()
|
|
1622
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1623
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1624
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1625
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1626
|
+
else:
|
|
1627
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1628
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1629
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1630
|
+
|
|
1631
|
+
|
|
1632
|
+
def doDescribeInboundEndpointList(args, parsed_globals):
|
|
1633
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1634
|
+
|
|
1635
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1636
|
+
cred = credential.CVMRoleCredential()
|
|
1637
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1638
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1639
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
|
+
)
|
|
1642
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
|
+
else:
|
|
1645
|
+
cred = credential.Credential(
|
|
1646
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1647
|
+
)
|
|
1648
|
+
http_profile = HttpProfile(
|
|
1649
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1650
|
+
reqMethod="POST",
|
|
1651
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
|
+
)
|
|
1654
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1655
|
+
if g_param[OptionsDefine.Language]:
|
|
1656
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1657
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1658
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1659
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1660
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1661
|
+
model = models.DescribeInboundEndpointListRequest()
|
|
1662
|
+
model.from_json_string(json.dumps(args))
|
|
1663
|
+
start_time = time.time()
|
|
1664
|
+
while True:
|
|
1665
|
+
rsp = client.DescribeInboundEndpointList(model)
|
|
1146
1666
|
result = rsp.to_json_string()
|
|
1147
1667
|
try:
|
|
1148
1668
|
json_obj = json.loads(result)
|
|
@@ -1265,6 +1785,58 @@ def doDescribeRequestData(args, parsed_globals):
|
|
|
1265
1785
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1786
|
|
|
1267
1787
|
|
|
1788
|
+
def doDeleteInboundEndpoint(args, parsed_globals):
|
|
1789
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1790
|
+
|
|
1791
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1792
|
+
cred = credential.CVMRoleCredential()
|
|
1793
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1794
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1795
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
|
+
)
|
|
1798
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
|
+
else:
|
|
1801
|
+
cred = credential.Credential(
|
|
1802
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1803
|
+
)
|
|
1804
|
+
http_profile = HttpProfile(
|
|
1805
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1806
|
+
reqMethod="POST",
|
|
1807
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
|
+
)
|
|
1810
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1811
|
+
if g_param[OptionsDefine.Language]:
|
|
1812
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1813
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1814
|
+
client = mod.PrivatednsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
+
model = models.DeleteInboundEndpointRequest()
|
|
1818
|
+
model.from_json_string(json.dumps(args))
|
|
1819
|
+
start_time = time.time()
|
|
1820
|
+
while True:
|
|
1821
|
+
rsp = client.DeleteInboundEndpoint(model)
|
|
1822
|
+
result = rsp.to_json_string()
|
|
1823
|
+
try:
|
|
1824
|
+
json_obj = json.loads(result)
|
|
1825
|
+
except TypeError as e:
|
|
1826
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1827
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1828
|
+
break
|
|
1829
|
+
cur_time = time.time()
|
|
1830
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1831
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1832
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1833
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1834
|
+
else:
|
|
1835
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1836
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1837
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1838
|
+
|
|
1839
|
+
|
|
1268
1840
|
def doDescribePrivateDNSAccountList(args, parsed_globals):
|
|
1269
1841
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1842
|
|
|
@@ -1330,28 +1902,39 @@ MODELS_MAP = {
|
|
|
1330
1902
|
ACTION_MAP = {
|
|
1331
1903
|
"CreatePrivateDNSAccount": doCreatePrivateDNSAccount,
|
|
1332
1904
|
"DescribePrivateZone": doDescribePrivateZone,
|
|
1333
|
-
"
|
|
1905
|
+
"DeleteForwardRule": doDeleteForwardRule,
|
|
1906
|
+
"DeleteEndPoint": doDeleteEndPoint,
|
|
1334
1907
|
"DescribeQuotaUsage": doDescribeQuotaUsage,
|
|
1335
1908
|
"DescribeAuditLog": doDescribeAuditLog,
|
|
1336
1909
|
"CreatePrivateZoneRecord": doCreatePrivateZoneRecord,
|
|
1337
1910
|
"CreatePrivateZone": doCreatePrivateZone,
|
|
1338
1911
|
"DescribePrivateZoneList": doDescribePrivateZoneList,
|
|
1912
|
+
"ModifyInboundEndpoint": doModifyInboundEndpoint,
|
|
1913
|
+
"DescribePrivateZoneRecordList": doDescribePrivateZoneRecordList,
|
|
1339
1914
|
"AddSpecifyPrivateZoneVpc": doAddSpecifyPrivateZoneVpc,
|
|
1915
|
+
"ModifyForwardRule": doModifyForwardRule,
|
|
1340
1916
|
"QueryAsyncBindVpcStatus": doQueryAsyncBindVpcStatus,
|
|
1341
1917
|
"ModifyPrivateZone": doModifyPrivateZone,
|
|
1342
1918
|
"ModifyPrivateZoneRecord": doModifyPrivateZoneRecord,
|
|
1343
1919
|
"DeletePrivateDNSAccount": doDeletePrivateDNSAccount,
|
|
1920
|
+
"CreateExtendEndpoint": doCreateExtendEndpoint,
|
|
1344
1921
|
"SubscribePrivateZoneService": doSubscribePrivateZoneService,
|
|
1345
1922
|
"DescribeDashboard": doDescribeDashboard,
|
|
1346
1923
|
"ModifyPrivateZoneVpc": doModifyPrivateZoneVpc,
|
|
1347
1924
|
"DeletePrivateZone": doDeletePrivateZone,
|
|
1348
1925
|
"DescribeAccountVpcList": doDescribeAccountVpcList,
|
|
1349
1926
|
"DescribeRecord": doDescribeRecord,
|
|
1927
|
+
"CreateInboundEndpoint": doCreateInboundEndpoint,
|
|
1350
1928
|
"ModifyRecordsStatus": doModifyRecordsStatus,
|
|
1351
1929
|
"DeleteSpecifyPrivateZoneVpc": doDeleteSpecifyPrivateZoneVpc,
|
|
1930
|
+
"CreateForwardRule": doCreateForwardRule,
|
|
1352
1931
|
"DescribePrivateZoneService": doDescribePrivateZoneService,
|
|
1932
|
+
"DescribeExtendEndpointList": doDescribeExtendEndpointList,
|
|
1933
|
+
"DescribeForwardRuleList": doDescribeForwardRuleList,
|
|
1934
|
+
"DescribeInboundEndpointList": doDescribeInboundEndpointList,
|
|
1353
1935
|
"DeletePrivateZoneRecord": doDeletePrivateZoneRecord,
|
|
1354
1936
|
"DescribeRequestData": doDescribeRequestData,
|
|
1937
|
+
"DeleteInboundEndpoint": doDeleteInboundEndpoint,
|
|
1355
1938
|
"DescribePrivateDNSAccountList": doDescribePrivateDNSAccountList,
|
|
1356
1939
|
|
|
1357
1940
|
}
|