tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/dts/dts_client.py
CHANGED
|
@@ -19,7 +19,7 @@ from tencentcloud.dts.v20180330 import models as models_v20180330
|
|
|
19
19
|
from jmespath import search
|
|
20
20
|
import time
|
|
21
21
|
|
|
22
|
-
def
|
|
22
|
+
def doModifyMigrationJob(args, parsed_globals):
|
|
23
23
|
g_param = parse_global_arg(parsed_globals)
|
|
24
24
|
|
|
25
25
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -29,7 +29,10 @@ def doResumeSubscribe(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -41,18 +44,18 @@ def doResumeSubscribe(args, parsed_globals):
|
|
|
41
44
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
42
45
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
43
46
|
)
|
|
44
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
47
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
45
48
|
if g_param[OptionsDefine.Language]:
|
|
46
49
|
profile.language = g_param[OptionsDefine.Language]
|
|
47
50
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
48
51
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
49
52
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
50
53
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
51
|
-
model = models.
|
|
54
|
+
model = models.ModifyMigrationJobRequest()
|
|
52
55
|
model.from_json_string(json.dumps(args))
|
|
53
56
|
start_time = time.time()
|
|
54
57
|
while True:
|
|
55
|
-
rsp = client.
|
|
58
|
+
rsp = client.ModifyMigrationJob(model)
|
|
56
59
|
result = rsp.to_json_string()
|
|
57
60
|
try:
|
|
58
61
|
json_obj = json.loads(result)
|
|
@@ -71,7 +74,7 @@ def doResumeSubscribe(args, parsed_globals):
|
|
|
71
74
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
72
75
|
|
|
73
76
|
|
|
74
|
-
def
|
|
77
|
+
def doDescribeSyncJobs(args, parsed_globals):
|
|
75
78
|
g_param = parse_global_arg(parsed_globals)
|
|
76
79
|
|
|
77
80
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -81,7 +84,10 @@ def doDestroyIsolatedSubscribe(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -93,18 +99,18 @@ def doDestroyIsolatedSubscribe(args, parsed_globals):
|
|
|
93
99
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
94
100
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
95
101
|
)
|
|
96
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
102
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
97
103
|
if g_param[OptionsDefine.Language]:
|
|
98
104
|
profile.language = g_param[OptionsDefine.Language]
|
|
99
105
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
100
106
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
101
107
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
102
108
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
103
|
-
model = models.
|
|
109
|
+
model = models.DescribeSyncJobsRequest()
|
|
104
110
|
model.from_json_string(json.dumps(args))
|
|
105
111
|
start_time = time.time()
|
|
106
112
|
while True:
|
|
107
|
-
rsp = client.
|
|
113
|
+
rsp = client.DescribeSyncJobs(model)
|
|
108
114
|
result = rsp.to_json_string()
|
|
109
115
|
try:
|
|
110
116
|
json_obj = json.loads(result)
|
|
@@ -123,7 +129,7 @@ def doDestroyIsolatedSubscribe(args, parsed_globals):
|
|
|
123
129
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
124
130
|
|
|
125
131
|
|
|
126
|
-
def
|
|
132
|
+
def doModifyMigrateRateLimit(args, parsed_globals):
|
|
127
133
|
g_param = parse_global_arg(parsed_globals)
|
|
128
134
|
|
|
129
135
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -133,7 +139,10 @@ def doModifySubscribeConsumeTime(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -145,18 +154,18 @@ def doModifySubscribeConsumeTime(args, parsed_globals):
|
|
|
145
154
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
146
155
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
147
156
|
)
|
|
148
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
157
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
149
158
|
if g_param[OptionsDefine.Language]:
|
|
150
159
|
profile.language = g_param[OptionsDefine.Language]
|
|
151
160
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
152
161
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
153
162
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
154
163
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
155
|
-
model = models.
|
|
164
|
+
model = models.ModifyMigrateRateLimitRequest()
|
|
156
165
|
model.from_json_string(json.dumps(args))
|
|
157
166
|
start_time = time.time()
|
|
158
167
|
while True:
|
|
159
|
-
rsp = client.
|
|
168
|
+
rsp = client.ModifyMigrateRateLimit(model)
|
|
160
169
|
result = rsp.to_json_string()
|
|
161
170
|
try:
|
|
162
171
|
json_obj = json.loads(result)
|
|
@@ -175,7 +184,7 @@ def doModifySubscribeConsumeTime(args, parsed_globals):
|
|
|
175
184
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
176
185
|
|
|
177
186
|
|
|
178
|
-
def
|
|
187
|
+
def doDescribeSubscribeReturnable(args, parsed_globals):
|
|
179
188
|
g_param = parse_global_arg(parsed_globals)
|
|
180
189
|
|
|
181
190
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -185,7 +194,10 @@ def doCreateModifyCheckSyncJob(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -197,18 +209,18 @@ def doCreateModifyCheckSyncJob(args, parsed_globals):
|
|
|
197
209
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
198
210
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
199
211
|
)
|
|
200
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
212
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
201
213
|
if g_param[OptionsDefine.Language]:
|
|
202
214
|
profile.language = g_param[OptionsDefine.Language]
|
|
203
215
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
204
216
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
205
217
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
206
218
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
207
|
-
model = models.
|
|
219
|
+
model = models.DescribeSubscribeReturnableRequest()
|
|
208
220
|
model.from_json_string(json.dumps(args))
|
|
209
221
|
start_time = time.time()
|
|
210
222
|
while True:
|
|
211
|
-
rsp = client.
|
|
223
|
+
rsp = client.DescribeSubscribeReturnable(model)
|
|
212
224
|
result = rsp.to_json_string()
|
|
213
225
|
try:
|
|
214
226
|
json_obj = json.loads(result)
|
|
@@ -227,7 +239,7 @@ def doCreateModifyCheckSyncJob(args, parsed_globals):
|
|
|
227
239
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
228
240
|
|
|
229
241
|
|
|
230
|
-
def
|
|
242
|
+
def doModifyCompareTask(args, parsed_globals):
|
|
231
243
|
g_param = parse_global_arg(parsed_globals)
|
|
232
244
|
|
|
233
245
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -237,7 +249,10 @@ def doModifyMigrationJob(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -249,18 +264,18 @@ def doModifyMigrationJob(args, parsed_globals):
|
|
|
249
264
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
250
265
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
251
266
|
)
|
|
252
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
267
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
253
268
|
if g_param[OptionsDefine.Language]:
|
|
254
269
|
profile.language = g_param[OptionsDefine.Language]
|
|
255
270
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
256
271
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
257
272
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
258
273
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
259
|
-
model = models.
|
|
274
|
+
model = models.ModifyCompareTaskRequest()
|
|
260
275
|
model.from_json_string(json.dumps(args))
|
|
261
276
|
start_time = time.time()
|
|
262
277
|
while True:
|
|
263
|
-
rsp = client.
|
|
278
|
+
rsp = client.ModifyCompareTask(model)
|
|
264
279
|
result = rsp.to_json_string()
|
|
265
280
|
try:
|
|
266
281
|
json_obj = json.loads(result)
|
|
@@ -279,7 +294,7 @@ def doModifyMigrationJob(args, parsed_globals):
|
|
|
279
294
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
280
295
|
|
|
281
296
|
|
|
282
|
-
def
|
|
297
|
+
def doCreateConsumerGroup(args, parsed_globals):
|
|
283
298
|
g_param = parse_global_arg(parsed_globals)
|
|
284
299
|
|
|
285
300
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -289,7 +304,10 @@ def doDescribeSyncJobs(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -301,18 +319,18 @@ def doDescribeSyncJobs(args, parsed_globals):
|
|
|
301
319
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
302
320
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
303
321
|
)
|
|
304
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
322
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
305
323
|
if g_param[OptionsDefine.Language]:
|
|
306
324
|
profile.language = g_param[OptionsDefine.Language]
|
|
307
325
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
308
326
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
309
327
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
310
328
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
311
|
-
model = models.
|
|
329
|
+
model = models.CreateConsumerGroupRequest()
|
|
312
330
|
model.from_json_string(json.dumps(args))
|
|
313
331
|
start_time = time.time()
|
|
314
332
|
while True:
|
|
315
|
-
rsp = client.
|
|
333
|
+
rsp = client.CreateConsumerGroup(model)
|
|
316
334
|
result = rsp.to_json_string()
|
|
317
335
|
try:
|
|
318
336
|
json_obj = json.loads(result)
|
|
@@ -331,7 +349,7 @@ def doDescribeSyncJobs(args, parsed_globals):
|
|
|
331
349
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
332
350
|
|
|
333
351
|
|
|
334
|
-
def
|
|
352
|
+
def doModifySubscribeObjects(args, parsed_globals):
|
|
335
353
|
g_param = parse_global_arg(parsed_globals)
|
|
336
354
|
|
|
337
355
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -341,7 +359,10 @@ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -353,18 +374,18 @@ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
|
|
|
353
374
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
354
375
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
355
376
|
)
|
|
356
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
377
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
357
378
|
if g_param[OptionsDefine.Language]:
|
|
358
379
|
profile.language = g_param[OptionsDefine.Language]
|
|
359
380
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
360
381
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
361
382
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
362
383
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
363
|
-
model = models.
|
|
384
|
+
model = models.ModifySubscribeObjectsRequest()
|
|
364
385
|
model.from_json_string(json.dumps(args))
|
|
365
386
|
start_time = time.time()
|
|
366
387
|
while True:
|
|
367
|
-
rsp = client.
|
|
388
|
+
rsp = client.ModifySubscribeObjects(model)
|
|
368
389
|
result = rsp.to_json_string()
|
|
369
390
|
try:
|
|
370
391
|
json_obj = json.loads(result)
|
|
@@ -383,7 +404,7 @@ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
|
|
|
383
404
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
384
405
|
|
|
385
406
|
|
|
386
|
-
def
|
|
407
|
+
def doDeleteConsumerGroup(args, parsed_globals):
|
|
387
408
|
g_param = parse_global_arg(parsed_globals)
|
|
388
409
|
|
|
389
410
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -393,7 +414,10 @@ def doCreateMigrationService(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -405,18 +429,18 @@ def doCreateMigrationService(args, parsed_globals):
|
|
|
405
429
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
406
430
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
407
431
|
)
|
|
408
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
432
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
409
433
|
if g_param[OptionsDefine.Language]:
|
|
410
434
|
profile.language = g_param[OptionsDefine.Language]
|
|
411
435
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
412
436
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
413
437
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
414
438
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
415
|
-
model = models.
|
|
439
|
+
model = models.DeleteConsumerGroupRequest()
|
|
416
440
|
model.from_json_string(json.dumps(args))
|
|
417
441
|
start_time = time.time()
|
|
418
442
|
while True:
|
|
419
|
-
rsp = client.
|
|
443
|
+
rsp = client.DeleteConsumerGroup(model)
|
|
420
444
|
result = rsp.to_json_string()
|
|
421
445
|
try:
|
|
422
446
|
json_obj = json.loads(result)
|
|
@@ -435,7 +459,7 @@ def doCreateMigrationService(args, parsed_globals):
|
|
|
435
459
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
436
460
|
|
|
437
461
|
|
|
438
|
-
def
|
|
462
|
+
def doModifySubscribeAutoRenewFlag(args, parsed_globals):
|
|
439
463
|
g_param = parse_global_arg(parsed_globals)
|
|
440
464
|
|
|
441
465
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -445,7 +469,10 @@ def doDescribeSubscribeJobs(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -457,18 +484,18 @@ def doDescribeSubscribeJobs(args, parsed_globals):
|
|
|
457
484
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
458
485
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
459
486
|
)
|
|
460
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
487
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
461
488
|
if g_param[OptionsDefine.Language]:
|
|
462
489
|
profile.language = g_param[OptionsDefine.Language]
|
|
463
490
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
464
491
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
465
492
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
466
493
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
467
|
-
model = models.
|
|
494
|
+
model = models.ModifySubscribeAutoRenewFlagRequest()
|
|
468
495
|
model.from_json_string(json.dumps(args))
|
|
469
496
|
start_time = time.time()
|
|
470
497
|
while True:
|
|
471
|
-
rsp = client.
|
|
498
|
+
rsp = client.ModifySubscribeAutoRenewFlag(model)
|
|
472
499
|
result = rsp.to_json_string()
|
|
473
500
|
try:
|
|
474
501
|
json_obj = json.loads(result)
|
|
@@ -487,7 +514,7 @@ def doDescribeSubscribeJobs(args, parsed_globals):
|
|
|
487
514
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
488
515
|
|
|
489
516
|
|
|
490
|
-
def
|
|
517
|
+
def doResumeMigrateJob(args, parsed_globals):
|
|
491
518
|
g_param = parse_global_arg(parsed_globals)
|
|
492
519
|
|
|
493
520
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -497,7 +524,10 @@ def doModifyMigrateRateLimit(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -509,18 +539,18 @@ def doModifyMigrateRateLimit(args, parsed_globals):
|
|
|
509
539
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
510
540
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
511
541
|
)
|
|
512
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
542
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
513
543
|
if g_param[OptionsDefine.Language]:
|
|
514
544
|
profile.language = g_param[OptionsDefine.Language]
|
|
515
545
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
516
546
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
517
547
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
518
548
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
519
|
-
model = models.
|
|
549
|
+
model = models.ResumeMigrateJobRequest()
|
|
520
550
|
model.from_json_string(json.dumps(args))
|
|
521
551
|
start_time = time.time()
|
|
522
552
|
while True:
|
|
523
|
-
rsp = client.
|
|
553
|
+
rsp = client.ResumeMigrateJob(model)
|
|
524
554
|
result = rsp.to_json_string()
|
|
525
555
|
try:
|
|
526
556
|
json_obj = json.loads(result)
|
|
@@ -539,7 +569,7 @@ def doModifyMigrateRateLimit(args, parsed_globals):
|
|
|
539
569
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
540
570
|
|
|
541
571
|
|
|
542
|
-
def
|
|
572
|
+
def doDescribeMigrateJobs(args, parsed_globals):
|
|
543
573
|
g_param = parse_global_arg(parsed_globals)
|
|
544
574
|
|
|
545
575
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -549,7 +579,10 @@ def doDeleteMigrateJob(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -561,18 +594,18 @@ def doDeleteMigrateJob(args, parsed_globals):
|
|
|
561
594
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
562
595
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
563
596
|
)
|
|
564
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
597
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
565
598
|
if g_param[OptionsDefine.Language]:
|
|
566
599
|
profile.language = g_param[OptionsDefine.Language]
|
|
567
600
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
568
601
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
569
602
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
570
603
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
571
|
-
model = models.
|
|
604
|
+
model = models.DescribeMigrateJobsRequest()
|
|
572
605
|
model.from_json_string(json.dumps(args))
|
|
573
606
|
start_time = time.time()
|
|
574
607
|
while True:
|
|
575
|
-
rsp = client.
|
|
608
|
+
rsp = client.DescribeMigrateJobs(model)
|
|
576
609
|
result = rsp.to_json_string()
|
|
577
610
|
try:
|
|
578
611
|
json_obj = json.loads(result)
|
|
@@ -591,7 +624,7 @@ def doDeleteMigrateJob(args, parsed_globals):
|
|
|
591
624
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
592
625
|
|
|
593
626
|
|
|
594
|
-
def
|
|
627
|
+
def doModifySyncCompareTaskName(args, parsed_globals):
|
|
595
628
|
g_param = parse_global_arg(parsed_globals)
|
|
596
629
|
|
|
597
630
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -601,7 +634,10 @@ def doDescribeSubscribeReturnable(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -613,18 +649,18 @@ def doDescribeSubscribeReturnable(args, parsed_globals):
|
|
|
613
649
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
614
650
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
615
651
|
)
|
|
616
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
652
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
617
653
|
if g_param[OptionsDefine.Language]:
|
|
618
654
|
profile.language = g_param[OptionsDefine.Language]
|
|
619
655
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
620
656
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
621
657
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
622
658
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
623
|
-
model = models.
|
|
659
|
+
model = models.ModifySyncCompareTaskNameRequest()
|
|
624
660
|
model.from_json_string(json.dumps(args))
|
|
625
661
|
start_time = time.time()
|
|
626
662
|
while True:
|
|
627
|
-
rsp = client.
|
|
663
|
+
rsp = client.ModifySyncCompareTaskName(model)
|
|
628
664
|
result = rsp.to_json_string()
|
|
629
665
|
try:
|
|
630
666
|
json_obj = json.loads(result)
|
|
@@ -643,7 +679,7 @@ def doDescribeSubscribeReturnable(args, parsed_globals):
|
|
|
643
679
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
644
680
|
|
|
645
681
|
|
|
646
|
-
def
|
|
682
|
+
def doDescribeSubscribeCheckJob(args, parsed_globals):
|
|
647
683
|
g_param = parse_global_arg(parsed_globals)
|
|
648
684
|
|
|
649
685
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -653,7 +689,10 @@ def doIsolateSyncJob(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -665,18 +704,18 @@ def doIsolateSyncJob(args, parsed_globals):
|
|
|
665
704
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
666
705
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
667
706
|
)
|
|
668
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
707
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
669
708
|
if g_param[OptionsDefine.Language]:
|
|
670
709
|
profile.language = g_param[OptionsDefine.Language]
|
|
671
710
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
672
711
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
673
712
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
674
713
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
675
|
-
model = models.
|
|
714
|
+
model = models.DescribeSubscribeCheckJobRequest()
|
|
676
715
|
model.from_json_string(json.dumps(args))
|
|
677
716
|
start_time = time.time()
|
|
678
717
|
while True:
|
|
679
|
-
rsp = client.
|
|
718
|
+
rsp = client.DescribeSubscribeCheckJob(model)
|
|
680
719
|
result = rsp.to_json_string()
|
|
681
720
|
try:
|
|
682
721
|
json_obj = json.loads(result)
|
|
@@ -695,7 +734,7 @@ def doIsolateSyncJob(args, parsed_globals):
|
|
|
695
734
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
696
735
|
|
|
697
736
|
|
|
698
|
-
def
|
|
737
|
+
def doContinueSyncJob(args, parsed_globals):
|
|
699
738
|
g_param = parse_global_arg(parsed_globals)
|
|
700
739
|
|
|
701
740
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -705,7 +744,10 @@ def doStopCompare(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -717,18 +759,18 @@ def doStopCompare(args, parsed_globals):
|
|
|
717
759
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
718
760
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
719
761
|
)
|
|
720
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
762
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
721
763
|
if g_param[OptionsDefine.Language]:
|
|
722
764
|
profile.language = g_param[OptionsDefine.Language]
|
|
723
765
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
724
766
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
725
767
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
726
768
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
727
|
-
model = models.
|
|
769
|
+
model = models.ContinueSyncJobRequest()
|
|
728
770
|
model.from_json_string(json.dumps(args))
|
|
729
771
|
start_time = time.time()
|
|
730
772
|
while True:
|
|
731
|
-
rsp = client.
|
|
773
|
+
rsp = client.ContinueSyncJob(model)
|
|
732
774
|
result = rsp.to_json_string()
|
|
733
775
|
try:
|
|
734
776
|
json_obj = json.loads(result)
|
|
@@ -747,7 +789,7 @@ def doStopCompare(args, parsed_globals):
|
|
|
747
789
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
748
790
|
|
|
749
791
|
|
|
750
|
-
def
|
|
792
|
+
def doStopSyncJob(args, parsed_globals):
|
|
751
793
|
g_param = parse_global_arg(parsed_globals)
|
|
752
794
|
|
|
753
795
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -757,7 +799,10 @@ def doCreateSyncJob(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -769,18 +814,18 @@ def doCreateSyncJob(args, parsed_globals):
|
|
|
769
814
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
770
815
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
771
816
|
)
|
|
772
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
817
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
773
818
|
if g_param[OptionsDefine.Language]:
|
|
774
819
|
profile.language = g_param[OptionsDefine.Language]
|
|
775
820
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
776
821
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
777
822
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
778
823
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
779
|
-
model = models.
|
|
824
|
+
model = models.StopSyncJobRequest()
|
|
780
825
|
model.from_json_string(json.dumps(args))
|
|
781
826
|
start_time = time.time()
|
|
782
827
|
while True:
|
|
783
|
-
rsp = client.
|
|
828
|
+
rsp = client.StopSyncJob(model)
|
|
784
829
|
result = rsp.to_json_string()
|
|
785
830
|
try:
|
|
786
831
|
json_obj = json.loads(result)
|
|
@@ -799,7 +844,7 @@ def doCreateSyncJob(args, parsed_globals):
|
|
|
799
844
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
800
845
|
|
|
801
846
|
|
|
802
|
-
def
|
|
847
|
+
def doDescribeMigrateDBInstances(args, parsed_globals):
|
|
803
848
|
g_param = parse_global_arg(parsed_globals)
|
|
804
849
|
|
|
805
850
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -809,7 +854,10 @@ def doConfigureSubscribeJob(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -821,18 +869,18 @@ def doConfigureSubscribeJob(args, parsed_globals):
|
|
|
821
869
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
822
870
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
823
871
|
)
|
|
824
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
872
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
825
873
|
if g_param[OptionsDefine.Language]:
|
|
826
874
|
profile.language = g_param[OptionsDefine.Language]
|
|
827
875
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
828
876
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
829
877
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
830
878
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
831
|
-
model = models.
|
|
879
|
+
model = models.DescribeMigrateDBInstancesRequest()
|
|
832
880
|
model.from_json_string(json.dumps(args))
|
|
833
881
|
start_time = time.time()
|
|
834
882
|
while True:
|
|
835
|
-
rsp = client.
|
|
883
|
+
rsp = client.DescribeMigrateDBInstances(model)
|
|
836
884
|
result = rsp.to_json_string()
|
|
837
885
|
try:
|
|
838
886
|
json_obj = json.loads(result)
|
|
@@ -851,7 +899,7 @@ def doConfigureSubscribeJob(args, parsed_globals):
|
|
|
851
899
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
852
900
|
|
|
853
901
|
|
|
854
|
-
def
|
|
902
|
+
def doCreateMigrateJob(args, parsed_globals):
|
|
855
903
|
g_param = parse_global_arg(parsed_globals)
|
|
856
904
|
|
|
857
905
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -861,7 +909,10 @@ def doDescribeConsumerGroups(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -873,18 +924,18 @@ def doDescribeConsumerGroups(args, parsed_globals):
|
|
|
873
924
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
874
925
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
875
926
|
)
|
|
876
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
877
928
|
if g_param[OptionsDefine.Language]:
|
|
878
929
|
profile.language = g_param[OptionsDefine.Language]
|
|
879
930
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
880
931
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
881
932
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
882
933
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
883
|
-
model = models.
|
|
934
|
+
model = models.CreateMigrateJobRequest()
|
|
884
935
|
model.from_json_string(json.dumps(args))
|
|
885
936
|
start_time = time.time()
|
|
886
937
|
while True:
|
|
887
|
-
rsp = client.
|
|
938
|
+
rsp = client.CreateMigrateJob(model)
|
|
888
939
|
result = rsp.to_json_string()
|
|
889
940
|
try:
|
|
890
941
|
json_obj = json.loads(result)
|
|
@@ -903,7 +954,7 @@ def doDescribeConsumerGroups(args, parsed_globals):
|
|
|
903
954
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
904
955
|
|
|
905
956
|
|
|
906
|
-
def
|
|
957
|
+
def doCreateMigrateCheckJob(args, parsed_globals):
|
|
907
958
|
g_param = parse_global_arg(parsed_globals)
|
|
908
959
|
|
|
909
960
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -913,7 +964,10 @@ def doCreateConsumerGroup(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -925,18 +979,18 @@ def doCreateConsumerGroup(args, parsed_globals):
|
|
|
925
979
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
926
980
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
927
981
|
)
|
|
928
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
929
983
|
if g_param[OptionsDefine.Language]:
|
|
930
984
|
profile.language = g_param[OptionsDefine.Language]
|
|
931
985
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
932
986
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
933
987
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
934
988
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
935
|
-
model = models.
|
|
989
|
+
model = models.CreateMigrateCheckJobRequest()
|
|
936
990
|
model.from_json_string(json.dumps(args))
|
|
937
991
|
start_time = time.time()
|
|
938
992
|
while True:
|
|
939
|
-
rsp = client.
|
|
993
|
+
rsp = client.CreateMigrateCheckJob(model)
|
|
940
994
|
result = rsp.to_json_string()
|
|
941
995
|
try:
|
|
942
996
|
json_obj = json.loads(result)
|
|
@@ -955,7 +1009,7 @@ def doCreateConsumerGroup(args, parsed_globals):
|
|
|
955
1009
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
956
1010
|
|
|
957
1011
|
|
|
958
|
-
def
|
|
1012
|
+
def doDescribeCompareTasks(args, parsed_globals):
|
|
959
1013
|
g_param = parse_global_arg(parsed_globals)
|
|
960
1014
|
|
|
961
1015
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -965,7 +1019,10 @@ def doResetConsumerGroupOffset(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -977,18 +1034,18 @@ def doResetConsumerGroupOffset(args, parsed_globals):
|
|
|
977
1034
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
1035
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
1036
|
)
|
|
980
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1037
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
1038
|
if g_param[OptionsDefine.Language]:
|
|
982
1039
|
profile.language = g_param[OptionsDefine.Language]
|
|
983
1040
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
984
1041
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
985
1042
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
986
1043
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
987
|
-
model = models.
|
|
1044
|
+
model = models.DescribeCompareTasksRequest()
|
|
988
1045
|
model.from_json_string(json.dumps(args))
|
|
989
1046
|
start_time = time.time()
|
|
990
1047
|
while True:
|
|
991
|
-
rsp = client.
|
|
1048
|
+
rsp = client.DescribeCompareTasks(model)
|
|
992
1049
|
result = rsp.to_json_string()
|
|
993
1050
|
try:
|
|
994
1051
|
json_obj = json.loads(result)
|
|
@@ -1007,7 +1064,7 @@ def doResetConsumerGroupOffset(args, parsed_globals):
|
|
|
1007
1064
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1008
1065
|
|
|
1009
1066
|
|
|
1010
|
-
def
|
|
1067
|
+
def doSkipSyncCheckItem(args, parsed_globals):
|
|
1011
1068
|
g_param = parse_global_arg(parsed_globals)
|
|
1012
1069
|
|
|
1013
1070
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1017,7 +1074,10 @@ def doDeleteCompareTask(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1029,18 +1089,18 @@ def doDeleteCompareTask(args, parsed_globals):
|
|
|
1029
1089
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1030
1090
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1031
1091
|
)
|
|
1032
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1092
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1033
1093
|
if g_param[OptionsDefine.Language]:
|
|
1034
1094
|
profile.language = g_param[OptionsDefine.Language]
|
|
1035
1095
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1036
1096
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1037
1097
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1038
1098
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1039
|
-
model = models.
|
|
1099
|
+
model = models.SkipSyncCheckItemRequest()
|
|
1040
1100
|
model.from_json_string(json.dumps(args))
|
|
1041
1101
|
start_time = time.time()
|
|
1042
1102
|
while True:
|
|
1043
|
-
rsp = client.
|
|
1103
|
+
rsp = client.SkipSyncCheckItem(model)
|
|
1044
1104
|
result = rsp.to_json_string()
|
|
1045
1105
|
try:
|
|
1046
1106
|
json_obj = json.loads(result)
|
|
@@ -1059,7 +1119,7 @@ def doDeleteCompareTask(args, parsed_globals):
|
|
|
1059
1119
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1060
1120
|
|
|
1061
1121
|
|
|
1062
|
-
def
|
|
1122
|
+
def doDescribeMigrationJobs(args, parsed_globals):
|
|
1063
1123
|
g_param = parse_global_arg(parsed_globals)
|
|
1064
1124
|
|
|
1065
1125
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1069,7 +1129,10 @@ def doStartSubscribe(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1081,18 +1144,18 @@ def doStartSubscribe(args, parsed_globals):
|
|
|
1081
1144
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1082
1145
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1083
1146
|
)
|
|
1084
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1147
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1085
1148
|
if g_param[OptionsDefine.Language]:
|
|
1086
1149
|
profile.language = g_param[OptionsDefine.Language]
|
|
1087
1150
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1088
1151
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1089
1152
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1090
1153
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1091
|
-
model = models.
|
|
1154
|
+
model = models.DescribeMigrationJobsRequest()
|
|
1092
1155
|
model.from_json_string(json.dumps(args))
|
|
1093
1156
|
start_time = time.time()
|
|
1094
1157
|
while True:
|
|
1095
|
-
rsp = client.
|
|
1158
|
+
rsp = client.DescribeMigrationJobs(model)
|
|
1096
1159
|
result = rsp.to_json_string()
|
|
1097
1160
|
try:
|
|
1098
1161
|
json_obj = json.loads(result)
|
|
@@ -1111,7 +1174,7 @@ def doStartSubscribe(args, parsed_globals):
|
|
|
1111
1174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1112
1175
|
|
|
1113
1176
|
|
|
1114
|
-
def
|
|
1177
|
+
def doRecoverSyncJob(args, parsed_globals):
|
|
1115
1178
|
g_param = parse_global_arg(parsed_globals)
|
|
1116
1179
|
|
|
1117
1180
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1121,7 +1184,10 @@ def doStartSyncJob(args, parsed_globals):
|
|
|
1121
1184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1186
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1192
|
else:
|
|
1127
1193
|
cred = credential.Credential(
|
|
@@ -1133,18 +1199,18 @@ def doStartSyncJob(args, parsed_globals):
|
|
|
1133
1199
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
1200
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
1201
|
)
|
|
1136
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1137
1203
|
if g_param[OptionsDefine.Language]:
|
|
1138
1204
|
profile.language = g_param[OptionsDefine.Language]
|
|
1139
1205
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1140
1206
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1141
1207
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1142
1208
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1143
|
-
model = models.
|
|
1209
|
+
model = models.RecoverSyncJobRequest()
|
|
1144
1210
|
model.from_json_string(json.dumps(args))
|
|
1145
1211
|
start_time = time.time()
|
|
1146
1212
|
while True:
|
|
1147
|
-
rsp = client.
|
|
1213
|
+
rsp = client.RecoverSyncJob(model)
|
|
1148
1214
|
result = rsp.to_json_string()
|
|
1149
1215
|
try:
|
|
1150
1216
|
json_obj = json.loads(result)
|
|
@@ -1163,7 +1229,7 @@ def doStartSyncJob(args, parsed_globals):
|
|
|
1163
1229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1164
1230
|
|
|
1165
1231
|
|
|
1166
|
-
def
|
|
1232
|
+
def doResetSubscribe(args, parsed_globals):
|
|
1167
1233
|
g_param = parse_global_arg(parsed_globals)
|
|
1168
1234
|
|
|
1169
1235
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1173,7 +1239,10 @@ def doCreateCheckSyncJob(args, parsed_globals):
|
|
|
1173
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1241
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1247
|
else:
|
|
1179
1248
|
cred = credential.Credential(
|
|
@@ -1185,18 +1254,18 @@ def doCreateCheckSyncJob(args, parsed_globals):
|
|
|
1185
1254
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1186
1255
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1187
1256
|
)
|
|
1188
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1257
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1189
1258
|
if g_param[OptionsDefine.Language]:
|
|
1190
1259
|
profile.language = g_param[OptionsDefine.Language]
|
|
1191
1260
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1192
1261
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1193
1262
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1194
1263
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1195
|
-
model = models.
|
|
1264
|
+
model = models.ResetSubscribeRequest()
|
|
1196
1265
|
model.from_json_string(json.dumps(args))
|
|
1197
1266
|
start_time = time.time()
|
|
1198
1267
|
while True:
|
|
1199
|
-
rsp = client.
|
|
1268
|
+
rsp = client.ResetSubscribe(model)
|
|
1200
1269
|
result = rsp.to_json_string()
|
|
1201
1270
|
try:
|
|
1202
1271
|
json_obj = json.loads(result)
|
|
@@ -1215,7 +1284,7 @@ def doCreateCheckSyncJob(args, parsed_globals):
|
|
|
1215
1284
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1216
1285
|
|
|
1217
1286
|
|
|
1218
|
-
def
|
|
1287
|
+
def doModifyMigrateJob(args, parsed_globals):
|
|
1219
1288
|
g_param = parse_global_arg(parsed_globals)
|
|
1220
1289
|
|
|
1221
1290
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1225,7 +1294,10 @@ def doDescribeCompareReport(args, parsed_globals):
|
|
|
1225
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1296
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1302
|
else:
|
|
1231
1303
|
cred = credential.Credential(
|
|
@@ -1237,18 +1309,18 @@ def doDescribeCompareReport(args, parsed_globals):
|
|
|
1237
1309
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1238
1310
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1239
1311
|
)
|
|
1240
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1312
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1241
1313
|
if g_param[OptionsDefine.Language]:
|
|
1242
1314
|
profile.language = g_param[OptionsDefine.Language]
|
|
1243
1315
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1244
1316
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1245
1317
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1246
1318
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1247
|
-
model = models.
|
|
1319
|
+
model = models.ModifyMigrateJobRequest()
|
|
1248
1320
|
model.from_json_string(json.dumps(args))
|
|
1249
1321
|
start_time = time.time()
|
|
1250
1322
|
while True:
|
|
1251
|
-
rsp = client.
|
|
1323
|
+
rsp = client.ModifyMigrateJob(model)
|
|
1252
1324
|
result = rsp.to_json_string()
|
|
1253
1325
|
try:
|
|
1254
1326
|
json_obj = json.loads(result)
|
|
@@ -1267,7 +1339,7 @@ def doDescribeCompareReport(args, parsed_globals):
|
|
|
1267
1339
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1268
1340
|
|
|
1269
1341
|
|
|
1270
|
-
def
|
|
1342
|
+
def doModifyMigrateJobSpec(args, parsed_globals):
|
|
1271
1343
|
g_param = parse_global_arg(parsed_globals)
|
|
1272
1344
|
|
|
1273
1345
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1277,7 +1349,10 @@ def doContinueMigrateJob(args, parsed_globals):
|
|
|
1277
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1351
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1357
|
else:
|
|
1283
1358
|
cred = credential.Credential(
|
|
@@ -1289,18 +1364,18 @@ def doContinueMigrateJob(args, parsed_globals):
|
|
|
1289
1364
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1290
1365
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1291
1366
|
)
|
|
1292
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1367
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1293
1368
|
if g_param[OptionsDefine.Language]:
|
|
1294
1369
|
profile.language = g_param[OptionsDefine.Language]
|
|
1295
1370
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1296
1371
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1297
1372
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1298
1373
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1299
|
-
model = models.
|
|
1374
|
+
model = models.ModifyMigrateJobSpecRequest()
|
|
1300
1375
|
model.from_json_string(json.dumps(args))
|
|
1301
1376
|
start_time = time.time()
|
|
1302
1377
|
while True:
|
|
1303
|
-
rsp = client.
|
|
1378
|
+
rsp = client.ModifyMigrateJobSpec(model)
|
|
1304
1379
|
result = rsp.to_json_string()
|
|
1305
1380
|
try:
|
|
1306
1381
|
json_obj = json.loads(result)
|
|
@@ -1319,7 +1394,7 @@ def doContinueMigrateJob(args, parsed_globals):
|
|
|
1319
1394
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1320
1395
|
|
|
1321
1396
|
|
|
1322
|
-
def
|
|
1397
|
+
def doOfflineIsolatedSubscribe(args, parsed_globals):
|
|
1323
1398
|
g_param = parse_global_arg(parsed_globals)
|
|
1324
1399
|
|
|
1325
1400
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1329,7 +1404,10 @@ def doPauseMigrateJob(args, parsed_globals):
|
|
|
1329
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1406
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1412
|
else:
|
|
1335
1413
|
cred = credential.Credential(
|
|
@@ -1341,18 +1419,18 @@ def doPauseMigrateJob(args, parsed_globals):
|
|
|
1341
1419
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1342
1420
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1343
1421
|
)
|
|
1344
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1422
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1345
1423
|
if g_param[OptionsDefine.Language]:
|
|
1346
1424
|
profile.language = g_param[OptionsDefine.Language]
|
|
1347
1425
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1348
1426
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1349
1427
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1350
1428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1351
|
-
model = models.
|
|
1429
|
+
model = models.OfflineIsolatedSubscribeRequest()
|
|
1352
1430
|
model.from_json_string(json.dumps(args))
|
|
1353
1431
|
start_time = time.time()
|
|
1354
1432
|
while True:
|
|
1355
|
-
rsp = client.
|
|
1433
|
+
rsp = client.OfflineIsolatedSubscribe(model)
|
|
1356
1434
|
result = rsp.to_json_string()
|
|
1357
1435
|
try:
|
|
1358
1436
|
json_obj = json.loads(result)
|
|
@@ -1371,7 +1449,7 @@ def doPauseMigrateJob(args, parsed_globals):
|
|
|
1371
1449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1372
1450
|
|
|
1373
1451
|
|
|
1374
|
-
def
|
|
1452
|
+
def doDescribeMigrationDetail(args, parsed_globals):
|
|
1375
1453
|
g_param = parse_global_arg(parsed_globals)
|
|
1376
1454
|
|
|
1377
1455
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1381,7 +1459,10 @@ def doDescribeMigrateCheckJob(args, parsed_globals):
|
|
|
1381
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1461
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1467
|
else:
|
|
1387
1468
|
cred = credential.Credential(
|
|
@@ -1393,18 +1474,18 @@ def doDescribeMigrateCheckJob(args, parsed_globals):
|
|
|
1393
1474
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1394
1475
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1395
1476
|
)
|
|
1396
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1477
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1397
1478
|
if g_param[OptionsDefine.Language]:
|
|
1398
1479
|
profile.language = g_param[OptionsDefine.Language]
|
|
1399
1480
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1400
1481
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1401
1482
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1402
1483
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1403
|
-
model = models.
|
|
1484
|
+
model = models.DescribeMigrationDetailRequest()
|
|
1404
1485
|
model.from_json_string(json.dumps(args))
|
|
1405
1486
|
start_time = time.time()
|
|
1406
1487
|
while True:
|
|
1407
|
-
rsp = client.
|
|
1488
|
+
rsp = client.DescribeMigrationDetail(model)
|
|
1408
1489
|
result = rsp.to_json_string()
|
|
1409
1490
|
try:
|
|
1410
1491
|
json_obj = json.loads(result)
|
|
@@ -1423,7 +1504,7 @@ def doDescribeMigrateCheckJob(args, parsed_globals):
|
|
|
1423
1504
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1424
1505
|
|
|
1425
1506
|
|
|
1426
|
-
def
|
|
1507
|
+
def doResumeSyncJob(args, parsed_globals):
|
|
1427
1508
|
g_param = parse_global_arg(parsed_globals)
|
|
1428
1509
|
|
|
1429
1510
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1433,7 +1514,10 @@ def doModifySubscribeObjects(args, parsed_globals):
|
|
|
1433
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1516
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1522
|
else:
|
|
1439
1523
|
cred = credential.Credential(
|
|
@@ -1445,18 +1529,18 @@ def doModifySubscribeObjects(args, parsed_globals):
|
|
|
1445
1529
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1446
1530
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1447
1531
|
)
|
|
1448
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1449
1533
|
if g_param[OptionsDefine.Language]:
|
|
1450
1534
|
profile.language = g_param[OptionsDefine.Language]
|
|
1451
1535
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1452
1536
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1453
1537
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1454
1538
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1455
|
-
model = models.
|
|
1539
|
+
model = models.ResumeSyncJobRequest()
|
|
1456
1540
|
model.from_json_string(json.dumps(args))
|
|
1457
1541
|
start_time = time.time()
|
|
1458
1542
|
while True:
|
|
1459
|
-
rsp = client.
|
|
1543
|
+
rsp = client.ResumeSyncJob(model)
|
|
1460
1544
|
result = rsp.to_json_string()
|
|
1461
1545
|
try:
|
|
1462
1546
|
json_obj = json.loads(result)
|
|
@@ -1475,7 +1559,7 @@ def doModifySubscribeObjects(args, parsed_globals):
|
|
|
1475
1559
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1476
1560
|
|
|
1477
1561
|
|
|
1478
|
-
def
|
|
1562
|
+
def doPauseMigrateJob(args, parsed_globals):
|
|
1479
1563
|
g_param = parse_global_arg(parsed_globals)
|
|
1480
1564
|
|
|
1481
1565
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1485,7 +1569,10 @@ def doConfigureSyncJob(args, parsed_globals):
|
|
|
1485
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1571
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1577
|
else:
|
|
1491
1578
|
cred = credential.Credential(
|
|
@@ -1497,18 +1584,18 @@ def doConfigureSyncJob(args, parsed_globals):
|
|
|
1497
1584
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1498
1585
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1499
1586
|
)
|
|
1500
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1587
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1501
1588
|
if g_param[OptionsDefine.Language]:
|
|
1502
1589
|
profile.language = g_param[OptionsDefine.Language]
|
|
1503
1590
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1504
1591
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1505
1592
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1506
1593
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1507
|
-
model = models.
|
|
1594
|
+
model = models.PauseMigrateJobRequest()
|
|
1508
1595
|
model.from_json_string(json.dumps(args))
|
|
1509
1596
|
start_time = time.time()
|
|
1510
1597
|
while True:
|
|
1511
|
-
rsp = client.
|
|
1598
|
+
rsp = client.PauseMigrateJob(model)
|
|
1512
1599
|
result = rsp.to_json_string()
|
|
1513
1600
|
try:
|
|
1514
1601
|
json_obj = json.loads(result)
|
|
@@ -1527,7 +1614,7 @@ def doConfigureSyncJob(args, parsed_globals):
|
|
|
1527
1614
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1528
1615
|
|
|
1529
1616
|
|
|
1530
|
-
def
|
|
1617
|
+
def doStartMigrateJob(args, parsed_globals):
|
|
1531
1618
|
g_param = parse_global_arg(parsed_globals)
|
|
1532
1619
|
|
|
1533
1620
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1537,7 +1624,10 @@ def doIsolateSubscribe(args, parsed_globals):
|
|
|
1537
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1626
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1632
|
else:
|
|
1543
1633
|
cred = credential.Credential(
|
|
@@ -1549,18 +1639,18 @@ def doIsolateSubscribe(args, parsed_globals):
|
|
|
1549
1639
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1550
1640
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1551
1641
|
)
|
|
1552
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1642
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1553
1643
|
if g_param[OptionsDefine.Language]:
|
|
1554
1644
|
profile.language = g_param[OptionsDefine.Language]
|
|
1555
1645
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1556
1646
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1557
1647
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1558
1648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1559
|
-
model = models.
|
|
1649
|
+
model = models.StartMigrateJobRequest()
|
|
1560
1650
|
model.from_json_string(json.dumps(args))
|
|
1561
1651
|
start_time = time.time()
|
|
1562
1652
|
while True:
|
|
1563
|
-
rsp = client.
|
|
1653
|
+
rsp = client.StartMigrateJob(model)
|
|
1564
1654
|
result = rsp.to_json_string()
|
|
1565
1655
|
try:
|
|
1566
1656
|
json_obj = json.loads(result)
|
|
@@ -1579,7 +1669,7 @@ def doIsolateSubscribe(args, parsed_globals):
|
|
|
1579
1669
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1580
1670
|
|
|
1581
1671
|
|
|
1582
|
-
def
|
|
1672
|
+
def doDestroySyncJob(args, parsed_globals):
|
|
1583
1673
|
g_param = parse_global_arg(parsed_globals)
|
|
1584
1674
|
|
|
1585
1675
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1589,7 +1679,10 @@ def doDestroyMigrateJob(args, parsed_globals):
|
|
|
1589
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1681
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1687
|
else:
|
|
1595
1688
|
cred = credential.Credential(
|
|
@@ -1601,18 +1694,18 @@ def doDestroyMigrateJob(args, parsed_globals):
|
|
|
1601
1694
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1602
1695
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1603
1696
|
)
|
|
1604
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1697
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1605
1698
|
if g_param[OptionsDefine.Language]:
|
|
1606
1699
|
profile.language = g_param[OptionsDefine.Language]
|
|
1607
1700
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1608
1701
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1609
1702
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1610
1703
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1611
|
-
model = models.
|
|
1704
|
+
model = models.DestroySyncJobRequest()
|
|
1612
1705
|
model.from_json_string(json.dumps(args))
|
|
1613
1706
|
start_time = time.time()
|
|
1614
1707
|
while True:
|
|
1615
|
-
rsp = client.
|
|
1708
|
+
rsp = client.DestroySyncJob(model)
|
|
1616
1709
|
result = rsp.to_json_string()
|
|
1617
1710
|
try:
|
|
1618
1711
|
json_obj = json.loads(result)
|
|
@@ -1631,7 +1724,7 @@ def doDestroyMigrateJob(args, parsed_globals):
|
|
|
1631
1724
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1632
1725
|
|
|
1633
1726
|
|
|
1634
|
-
def
|
|
1727
|
+
def doStopSyncCompare(args, parsed_globals):
|
|
1635
1728
|
g_param = parse_global_arg(parsed_globals)
|
|
1636
1729
|
|
|
1637
1730
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1641,7 +1734,10 @@ def doResetSyncJob(args, parsed_globals):
|
|
|
1641
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1736
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1742
|
else:
|
|
1647
1743
|
cred = credential.Credential(
|
|
@@ -1653,18 +1749,18 @@ def doResetSyncJob(args, parsed_globals):
|
|
|
1653
1749
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1654
1750
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1655
1751
|
)
|
|
1656
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1752
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1657
1753
|
if g_param[OptionsDefine.Language]:
|
|
1658
1754
|
profile.language = g_param[OptionsDefine.Language]
|
|
1659
1755
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1660
1756
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1661
1757
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1662
1758
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1663
|
-
model = models.
|
|
1759
|
+
model = models.StopSyncCompareRequest()
|
|
1664
1760
|
model.from_json_string(json.dumps(args))
|
|
1665
1761
|
start_time = time.time()
|
|
1666
1762
|
while True:
|
|
1667
|
-
rsp = client.
|
|
1763
|
+
rsp = client.StopSyncCompare(model)
|
|
1668
1764
|
result = rsp.to_json_string()
|
|
1669
1765
|
try:
|
|
1670
1766
|
json_obj = json.loads(result)
|
|
@@ -1683,7 +1779,7 @@ def doResetSyncJob(args, parsed_globals):
|
|
|
1683
1779
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1684
1780
|
|
|
1685
1781
|
|
|
1686
|
-
def
|
|
1782
|
+
def doResetSyncJob(args, parsed_globals):
|
|
1687
1783
|
g_param = parse_global_arg(parsed_globals)
|
|
1688
1784
|
|
|
1689
1785
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1693,7 +1789,10 @@ def doResizeSyncJob(args, parsed_globals):
|
|
|
1693
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1791
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1797
|
else:
|
|
1699
1798
|
cred = credential.Credential(
|
|
@@ -1705,18 +1804,18 @@ def doResizeSyncJob(args, parsed_globals):
|
|
|
1705
1804
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1706
1805
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1707
1806
|
)
|
|
1708
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1807
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1709
1808
|
if g_param[OptionsDefine.Language]:
|
|
1710
1809
|
profile.language = g_param[OptionsDefine.Language]
|
|
1711
1810
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1712
1811
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1713
1812
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1714
1813
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1715
|
-
model = models.
|
|
1814
|
+
model = models.ResetSyncJobRequest()
|
|
1716
1815
|
model.from_json_string(json.dumps(args))
|
|
1717
1816
|
start_time = time.time()
|
|
1718
1817
|
while True:
|
|
1719
|
-
rsp = client.
|
|
1818
|
+
rsp = client.ResetSyncJob(model)
|
|
1720
1819
|
result = rsp.to_json_string()
|
|
1721
1820
|
try:
|
|
1722
1821
|
json_obj = json.loads(result)
|
|
@@ -1735,7 +1834,7 @@ def doResizeSyncJob(args, parsed_globals):
|
|
|
1735
1834
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1736
1835
|
|
|
1737
1836
|
|
|
1738
|
-
def
|
|
1837
|
+
def doDestroyIsolatedSubscribe(args, parsed_globals):
|
|
1739
1838
|
g_param = parse_global_arg(parsed_globals)
|
|
1740
1839
|
|
|
1741
1840
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1745,7 +1844,10 @@ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
|
|
|
1745
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1846
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1852
|
else:
|
|
1751
1853
|
cred = credential.Credential(
|
|
@@ -1757,18 +1859,18 @@ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
|
|
|
1757
1859
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1758
1860
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1759
1861
|
)
|
|
1760
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1862
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1761
1863
|
if g_param[OptionsDefine.Language]:
|
|
1762
1864
|
profile.language = g_param[OptionsDefine.Language]
|
|
1763
1865
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1764
1866
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1765
1867
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1766
1868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1767
|
-
model = models.
|
|
1869
|
+
model = models.DestroyIsolatedSubscribeRequest()
|
|
1768
1870
|
model.from_json_string(json.dumps(args))
|
|
1769
1871
|
start_time = time.time()
|
|
1770
1872
|
while True:
|
|
1771
|
-
rsp = client.
|
|
1873
|
+
rsp = client.DestroyIsolatedSubscribe(model)
|
|
1772
1874
|
result = rsp.to_json_string()
|
|
1773
1875
|
try:
|
|
1774
1876
|
json_obj = json.loads(result)
|
|
@@ -1787,7 +1889,7 @@ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
|
|
|
1787
1889
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1788
1890
|
|
|
1789
1891
|
|
|
1790
|
-
def
|
|
1892
|
+
def doCreateModifyCheckSyncJob(args, parsed_globals):
|
|
1791
1893
|
g_param = parse_global_arg(parsed_globals)
|
|
1792
1894
|
|
|
1793
1895
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1797,7 +1899,10 @@ def doModifySyncJobConfig(args, parsed_globals):
|
|
|
1797
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1901
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1907
|
else:
|
|
1803
1908
|
cred = credential.Credential(
|
|
@@ -1809,18 +1914,18 @@ def doModifySyncJobConfig(args, parsed_globals):
|
|
|
1809
1914
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1810
1915
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1811
1916
|
)
|
|
1812
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1917
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1813
1918
|
if g_param[OptionsDefine.Language]:
|
|
1814
1919
|
profile.language = g_param[OptionsDefine.Language]
|
|
1815
1920
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1816
1921
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1817
1922
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1818
1923
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1819
|
-
model = models.
|
|
1924
|
+
model = models.CreateModifyCheckSyncJobRequest()
|
|
1820
1925
|
model.from_json_string(json.dumps(args))
|
|
1821
1926
|
start_time = time.time()
|
|
1822
1927
|
while True:
|
|
1823
|
-
rsp = client.
|
|
1928
|
+
rsp = client.CreateModifyCheckSyncJob(model)
|
|
1824
1929
|
result = rsp.to_json_string()
|
|
1825
1930
|
try:
|
|
1826
1931
|
json_obj = json.loads(result)
|
|
@@ -1839,7 +1944,7 @@ def doModifySyncJobConfig(args, parsed_globals):
|
|
|
1839
1944
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1840
1945
|
|
|
1841
1946
|
|
|
1842
|
-
def
|
|
1947
|
+
def doModifyMigrateRuntimeAttribute(args, parsed_globals):
|
|
1843
1948
|
g_param = parse_global_arg(parsed_globals)
|
|
1844
1949
|
|
|
1845
1950
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1849,7 +1954,10 @@ def doResumeMigrateJob(args, parsed_globals):
|
|
|
1849
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
1956
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
1962
|
else:
|
|
1855
1963
|
cred = credential.Credential(
|
|
@@ -1861,18 +1969,18 @@ def doResumeMigrateJob(args, parsed_globals):
|
|
|
1861
1969
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1862
1970
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1863
1971
|
)
|
|
1864
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1972
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1865
1973
|
if g_param[OptionsDefine.Language]:
|
|
1866
1974
|
profile.language = g_param[OptionsDefine.Language]
|
|
1867
1975
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1868
1976
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1869
1977
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1870
1978
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1871
|
-
model = models.
|
|
1979
|
+
model = models.ModifyMigrateRuntimeAttributeRequest()
|
|
1872
1980
|
model.from_json_string(json.dumps(args))
|
|
1873
1981
|
start_time = time.time()
|
|
1874
1982
|
while True:
|
|
1875
|
-
rsp = client.
|
|
1983
|
+
rsp = client.ModifyMigrateRuntimeAttribute(model)
|
|
1876
1984
|
result = rsp.to_json_string()
|
|
1877
1985
|
try:
|
|
1878
1986
|
json_obj = json.loads(result)
|
|
@@ -1891,7 +1999,7 @@ def doResumeMigrateJob(args, parsed_globals):
|
|
|
1891
1999
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1892
2000
|
|
|
1893
2001
|
|
|
1894
|
-
def
|
|
2002
|
+
def doCreateMigrationService(args, parsed_globals):
|
|
1895
2003
|
g_param = parse_global_arg(parsed_globals)
|
|
1896
2004
|
|
|
1897
2005
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1901,7 +2009,10 @@ def doStopMigrateJob(args, parsed_globals):
|
|
|
1901
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2011
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2017
|
else:
|
|
1907
2018
|
cred = credential.Credential(
|
|
@@ -1913,18 +2024,18 @@ def doStopMigrateJob(args, parsed_globals):
|
|
|
1913
2024
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1914
2025
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1915
2026
|
)
|
|
1916
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2027
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1917
2028
|
if g_param[OptionsDefine.Language]:
|
|
1918
2029
|
profile.language = g_param[OptionsDefine.Language]
|
|
1919
2030
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1920
2031
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1921
2032
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1922
2033
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1923
|
-
model = models.
|
|
2034
|
+
model = models.CreateMigrationServiceRequest()
|
|
1924
2035
|
model.from_json_string(json.dumps(args))
|
|
1925
2036
|
start_time = time.time()
|
|
1926
2037
|
while True:
|
|
1927
|
-
rsp = client.
|
|
2038
|
+
rsp = client.CreateMigrationService(model)
|
|
1928
2039
|
result = rsp.to_json_string()
|
|
1929
2040
|
try:
|
|
1930
2041
|
json_obj = json.loads(result)
|
|
@@ -1943,7 +2054,7 @@ def doStopMigrateJob(args, parsed_globals):
|
|
|
1943
2054
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1944
2055
|
|
|
1945
2056
|
|
|
1946
|
-
def
|
|
2057
|
+
def doDescribeSubscribeJobs(args, parsed_globals):
|
|
1947
2058
|
g_param = parse_global_arg(parsed_globals)
|
|
1948
2059
|
|
|
1949
2060
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1953,7 +2064,10 @@ def doPauseSyncJob(args, parsed_globals):
|
|
|
1953
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2066
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2072
|
else:
|
|
1959
2073
|
cred = credential.Credential(
|
|
@@ -1965,18 +2079,18 @@ def doPauseSyncJob(args, parsed_globals):
|
|
|
1965
2079
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1966
2080
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1967
2081
|
)
|
|
1968
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1969
2083
|
if g_param[OptionsDefine.Language]:
|
|
1970
2084
|
profile.language = g_param[OptionsDefine.Language]
|
|
1971
2085
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1972
2086
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1973
2087
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1974
2088
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1975
|
-
model = models.
|
|
2089
|
+
model = models.DescribeSubscribeJobsRequest()
|
|
1976
2090
|
model.from_json_string(json.dumps(args))
|
|
1977
2091
|
start_time = time.time()
|
|
1978
2092
|
while True:
|
|
1979
|
-
rsp = client.
|
|
2093
|
+
rsp = client.DescribeSubscribeJobs(model)
|
|
1980
2094
|
result = rsp.to_json_string()
|
|
1981
2095
|
try:
|
|
1982
2096
|
json_obj = json.loads(result)
|
|
@@ -1995,7 +2109,7 @@ def doPauseSyncJob(args, parsed_globals):
|
|
|
1995
2109
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1996
2110
|
|
|
1997
2111
|
|
|
1998
|
-
def
|
|
2112
|
+
def doStopCompare(args, parsed_globals):
|
|
1999
2113
|
g_param = parse_global_arg(parsed_globals)
|
|
2000
2114
|
|
|
2001
2115
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2005,7 +2119,10 @@ def doStartModifySyncJob(args, parsed_globals):
|
|
|
2005
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2121
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2127
|
else:
|
|
2011
2128
|
cred = credential.Credential(
|
|
@@ -2017,18 +2134,18 @@ def doStartModifySyncJob(args, parsed_globals):
|
|
|
2017
2134
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2018
2135
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2019
2136
|
)
|
|
2020
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2137
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2021
2138
|
if g_param[OptionsDefine.Language]:
|
|
2022
2139
|
profile.language = g_param[OptionsDefine.Language]
|
|
2023
2140
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2024
2141
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2025
2142
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2026
2143
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2027
|
-
model = models.
|
|
2144
|
+
model = models.StopCompareRequest()
|
|
2028
2145
|
model.from_json_string(json.dumps(args))
|
|
2029
2146
|
start_time = time.time()
|
|
2030
2147
|
while True:
|
|
2031
|
-
rsp = client.
|
|
2148
|
+
rsp = client.StopCompare(model)
|
|
2032
2149
|
result = rsp.to_json_string()
|
|
2033
2150
|
try:
|
|
2034
2151
|
json_obj = json.loads(result)
|
|
@@ -2047,7 +2164,7 @@ def doStartModifySyncJob(args, parsed_globals):
|
|
|
2047
2164
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2048
2165
|
|
|
2049
2166
|
|
|
2050
|
-
def
|
|
2167
|
+
def doResetConsumerGroupOffset(args, parsed_globals):
|
|
2051
2168
|
g_param = parse_global_arg(parsed_globals)
|
|
2052
2169
|
|
|
2053
2170
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2057,7 +2174,10 @@ def doDescribeSubscribes(args, parsed_globals):
|
|
|
2057
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2176
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2182
|
else:
|
|
2063
2183
|
cred = credential.Credential(
|
|
@@ -2069,18 +2189,18 @@ def doDescribeSubscribes(args, parsed_globals):
|
|
|
2069
2189
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2070
2190
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2071
2191
|
)
|
|
2072
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2192
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2073
2193
|
if g_param[OptionsDefine.Language]:
|
|
2074
2194
|
profile.language = g_param[OptionsDefine.Language]
|
|
2075
2195
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2076
2196
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2077
2197
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2078
2198
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2079
|
-
model = models.
|
|
2199
|
+
model = models.ResetConsumerGroupOffsetRequest()
|
|
2080
2200
|
model.from_json_string(json.dumps(args))
|
|
2081
2201
|
start_time = time.time()
|
|
2082
2202
|
while True:
|
|
2083
|
-
rsp = client.
|
|
2203
|
+
rsp = client.ResetConsumerGroupOffset(model)
|
|
2084
2204
|
result = rsp.to_json_string()
|
|
2085
2205
|
try:
|
|
2086
2206
|
json_obj = json.loads(result)
|
|
@@ -2099,7 +2219,7 @@ def doDescribeSubscribes(args, parsed_globals):
|
|
|
2099
2219
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2100
2220
|
|
|
2101
2221
|
|
|
2102
|
-
def
|
|
2222
|
+
def doContinueMigrateJob(args, parsed_globals):
|
|
2103
2223
|
g_param = parse_global_arg(parsed_globals)
|
|
2104
2224
|
|
|
2105
2225
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2109,7 +2229,10 @@ def doStartCompare(args, parsed_globals):
|
|
|
2109
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2231
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2237
|
else:
|
|
2115
2238
|
cred = credential.Credential(
|
|
@@ -2121,18 +2244,18 @@ def doStartCompare(args, parsed_globals):
|
|
|
2121
2244
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2122
2245
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2123
2246
|
)
|
|
2124
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2247
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2125
2248
|
if g_param[OptionsDefine.Language]:
|
|
2126
2249
|
profile.language = g_param[OptionsDefine.Language]
|
|
2127
2250
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2128
2251
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2129
2252
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2130
2253
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2131
|
-
model = models.
|
|
2254
|
+
model = models.ContinueMigrateJobRequest()
|
|
2132
2255
|
model.from_json_string(json.dumps(args))
|
|
2133
2256
|
start_time = time.time()
|
|
2134
2257
|
while True:
|
|
2135
|
-
rsp = client.
|
|
2258
|
+
rsp = client.ContinueMigrateJob(model)
|
|
2136
2259
|
result = rsp.to_json_string()
|
|
2137
2260
|
try:
|
|
2138
2261
|
json_obj = json.loads(result)
|
|
@@ -2151,7 +2274,7 @@ def doStartCompare(args, parsed_globals):
|
|
|
2151
2274
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2152
2275
|
|
|
2153
2276
|
|
|
2154
|
-
def
|
|
2277
|
+
def doStartSyncCompare(args, parsed_globals):
|
|
2155
2278
|
g_param = parse_global_arg(parsed_globals)
|
|
2156
2279
|
|
|
2157
2280
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2161,7 +2284,10 @@ def doDescribeSubscribeCheckJob(args, parsed_globals):
|
|
|
2161
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2286
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2292
|
else:
|
|
2167
2293
|
cred = credential.Credential(
|
|
@@ -2173,18 +2299,18 @@ def doDescribeSubscribeCheckJob(args, parsed_globals):
|
|
|
2173
2299
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2174
2300
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2175
2301
|
)
|
|
2176
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2302
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2177
2303
|
if g_param[OptionsDefine.Language]:
|
|
2178
2304
|
profile.language = g_param[OptionsDefine.Language]
|
|
2179
2305
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2180
2306
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2181
2307
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2182
2308
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2183
|
-
model = models.
|
|
2309
|
+
model = models.StartSyncCompareRequest()
|
|
2184
2310
|
model.from_json_string(json.dumps(args))
|
|
2185
2311
|
start_time = time.time()
|
|
2186
2312
|
while True:
|
|
2187
|
-
rsp = client.
|
|
2313
|
+
rsp = client.StartSyncCompare(model)
|
|
2188
2314
|
result = rsp.to_json_string()
|
|
2189
2315
|
try:
|
|
2190
2316
|
json_obj = json.loads(result)
|
|
@@ -2203,7 +2329,7 @@ def doDescribeSubscribeCheckJob(args, parsed_globals):
|
|
|
2203
2329
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2204
2330
|
|
|
2205
2331
|
|
|
2206
|
-
def
|
|
2332
|
+
def doDeleteSyncCompareTask(args, parsed_globals):
|
|
2207
2333
|
g_param = parse_global_arg(parsed_globals)
|
|
2208
2334
|
|
|
2209
2335
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2213,7 +2339,10 @@ def doContinueSyncJob(args, parsed_globals):
|
|
|
2213
2339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2214
2340
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2215
2341
|
)
|
|
2216
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2344
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2345
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2217
2346
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2218
2347
|
else:
|
|
2219
2348
|
cred = credential.Credential(
|
|
@@ -2225,18 +2354,18 @@ def doContinueSyncJob(args, parsed_globals):
|
|
|
2225
2354
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2226
2355
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2227
2356
|
)
|
|
2228
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2357
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2229
2358
|
if g_param[OptionsDefine.Language]:
|
|
2230
2359
|
profile.language = g_param[OptionsDefine.Language]
|
|
2231
2360
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2232
2361
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2233
2362
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2234
2363
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2235
|
-
model = models.
|
|
2364
|
+
model = models.DeleteSyncCompareTaskRequest()
|
|
2236
2365
|
model.from_json_string(json.dumps(args))
|
|
2237
2366
|
start_time = time.time()
|
|
2238
2367
|
while True:
|
|
2239
|
-
rsp = client.
|
|
2368
|
+
rsp = client.DeleteSyncCompareTask(model)
|
|
2240
2369
|
result = rsp.to_json_string()
|
|
2241
2370
|
try:
|
|
2242
2371
|
json_obj = json.loads(result)
|
|
@@ -2255,7 +2384,7 @@ def doContinueSyncJob(args, parsed_globals):
|
|
|
2255
2384
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2256
2385
|
|
|
2257
2386
|
|
|
2258
|
-
def
|
|
2387
|
+
def doModifySubscribeVipVport(args, parsed_globals):
|
|
2259
2388
|
g_param = parse_global_arg(parsed_globals)
|
|
2260
2389
|
|
|
2261
2390
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2265,7 +2394,10 @@ def doStopSyncJob(args, parsed_globals):
|
|
|
2265
2394
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2266
2395
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2267
2396
|
)
|
|
2268
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2397
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2399
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2400
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2269
2401
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2270
2402
|
else:
|
|
2271
2403
|
cred = credential.Credential(
|
|
@@ -2277,18 +2409,18 @@ def doStopSyncJob(args, parsed_globals):
|
|
|
2277
2409
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2278
2410
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2279
2411
|
)
|
|
2280
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2412
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2281
2413
|
if g_param[OptionsDefine.Language]:
|
|
2282
2414
|
profile.language = g_param[OptionsDefine.Language]
|
|
2283
2415
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2284
2416
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2285
2417
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2286
2418
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2287
|
-
model = models.
|
|
2419
|
+
model = models.ModifySubscribeVipVportRequest()
|
|
2288
2420
|
model.from_json_string(json.dumps(args))
|
|
2289
2421
|
start_time = time.time()
|
|
2290
2422
|
while True:
|
|
2291
|
-
rsp = client.
|
|
2423
|
+
rsp = client.ModifySubscribeVipVport(model)
|
|
2292
2424
|
result = rsp.to_json_string()
|
|
2293
2425
|
try:
|
|
2294
2426
|
json_obj = json.loads(result)
|
|
@@ -2307,7 +2439,7 @@ def doStopSyncJob(args, parsed_globals):
|
|
|
2307
2439
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2308
2440
|
|
|
2309
2441
|
|
|
2310
|
-
def
|
|
2442
|
+
def doStartSubscribe(args, parsed_globals):
|
|
2311
2443
|
g_param = parse_global_arg(parsed_globals)
|
|
2312
2444
|
|
|
2313
2445
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2317,7 +2449,10 @@ def doModifyConsumerGroupDescription(args, parsed_globals):
|
|
|
2317
2449
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2318
2450
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2319
2451
|
)
|
|
2320
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2452
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2454
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2455
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2321
2456
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2322
2457
|
else:
|
|
2323
2458
|
cred = credential.Credential(
|
|
@@ -2329,18 +2464,18 @@ def doModifyConsumerGroupDescription(args, parsed_globals):
|
|
|
2329
2464
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2330
2465
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2331
2466
|
)
|
|
2332
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2467
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2333
2468
|
if g_param[OptionsDefine.Language]:
|
|
2334
2469
|
profile.language = g_param[OptionsDefine.Language]
|
|
2335
2470
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2336
2471
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2337
2472
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2338
2473
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2339
|
-
model = models.
|
|
2474
|
+
model = models.StartSubscribeRequest()
|
|
2340
2475
|
model.from_json_string(json.dumps(args))
|
|
2341
2476
|
start_time = time.time()
|
|
2342
2477
|
while True:
|
|
2343
|
-
rsp = client.
|
|
2478
|
+
rsp = client.StartSubscribe(model)
|
|
2344
2479
|
result = rsp.to_json_string()
|
|
2345
2480
|
try:
|
|
2346
2481
|
json_obj = json.loads(result)
|
|
@@ -2359,7 +2494,7 @@ def doModifyConsumerGroupDescription(args, parsed_globals):
|
|
|
2359
2494
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2360
2495
|
|
|
2361
2496
|
|
|
2362
|
-
def
|
|
2497
|
+
def doDescribeSubscribeDetail(args, parsed_globals):
|
|
2363
2498
|
g_param = parse_global_arg(parsed_globals)
|
|
2364
2499
|
|
|
2365
2500
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2369,7 +2504,10 @@ def doDescribeMigrateDBInstances(args, parsed_globals):
|
|
|
2369
2504
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2370
2505
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2371
2506
|
)
|
|
2372
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2507
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2509
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2510
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2373
2511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2374
2512
|
else:
|
|
2375
2513
|
cred = credential.Credential(
|
|
@@ -2381,18 +2519,18 @@ def doDescribeMigrateDBInstances(args, parsed_globals):
|
|
|
2381
2519
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2382
2520
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2383
2521
|
)
|
|
2384
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2522
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2385
2523
|
if g_param[OptionsDefine.Language]:
|
|
2386
2524
|
profile.language = g_param[OptionsDefine.Language]
|
|
2387
2525
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2388
2526
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2389
2527
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2390
2528
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2391
|
-
model = models.
|
|
2529
|
+
model = models.DescribeSubscribeDetailRequest()
|
|
2392
2530
|
model.from_json_string(json.dumps(args))
|
|
2393
2531
|
start_time = time.time()
|
|
2394
2532
|
while True:
|
|
2395
|
-
rsp = client.
|
|
2533
|
+
rsp = client.DescribeSubscribeDetail(model)
|
|
2396
2534
|
result = rsp.to_json_string()
|
|
2397
2535
|
try:
|
|
2398
2536
|
json_obj = json.loads(result)
|
|
@@ -2411,7 +2549,7 @@ def doDescribeMigrateDBInstances(args, parsed_globals):
|
|
|
2411
2549
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2412
2550
|
|
|
2413
2551
|
|
|
2414
|
-
def
|
|
2552
|
+
def doModifySyncCompareTask(args, parsed_globals):
|
|
2415
2553
|
g_param = parse_global_arg(parsed_globals)
|
|
2416
2554
|
|
|
2417
2555
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2421,7 +2559,10 @@ def doSkipCheckItem(args, parsed_globals):
|
|
|
2421
2559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2422
2560
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2423
2561
|
)
|
|
2424
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2562
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2564
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2565
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2425
2566
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2426
2567
|
else:
|
|
2427
2568
|
cred = credential.Credential(
|
|
@@ -2433,18 +2574,18 @@ def doSkipCheckItem(args, parsed_globals):
|
|
|
2433
2574
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2434
2575
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2435
2576
|
)
|
|
2436
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2577
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2437
2578
|
if g_param[OptionsDefine.Language]:
|
|
2438
2579
|
profile.language = g_param[OptionsDefine.Language]
|
|
2439
2580
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2440
2581
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2441
2582
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2442
2583
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2443
|
-
model = models.
|
|
2584
|
+
model = models.ModifySyncCompareTaskRequest()
|
|
2444
2585
|
model.from_json_string(json.dumps(args))
|
|
2445
2586
|
start_time = time.time()
|
|
2446
2587
|
while True:
|
|
2447
|
-
rsp = client.
|
|
2588
|
+
rsp = client.ModifySyncCompareTask(model)
|
|
2448
2589
|
result = rsp.to_json_string()
|
|
2449
2590
|
try:
|
|
2450
2591
|
json_obj = json.loads(result)
|
|
@@ -2473,7 +2614,10 @@ def doDescribeSubscribeConf(args, parsed_globals):
|
|
|
2473
2614
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2474
2615
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2475
2616
|
)
|
|
2476
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2617
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2619
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2620
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2477
2621
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2478
2622
|
else:
|
|
2479
2623
|
cred = credential.Credential(
|
|
@@ -2485,7 +2629,7 @@ def doDescribeSubscribeConf(args, parsed_globals):
|
|
|
2485
2629
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2486
2630
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2487
2631
|
)
|
|
2488
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2632
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2489
2633
|
if g_param[OptionsDefine.Language]:
|
|
2490
2634
|
profile.language = g_param[OptionsDefine.Language]
|
|
2491
2635
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2515,7 +2659,7 @@ def doDescribeSubscribeConf(args, parsed_globals):
|
|
|
2515
2659
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2516
2660
|
|
|
2517
2661
|
|
|
2518
|
-
def
|
|
2662
|
+
def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
2519
2663
|
g_param = parse_global_arg(parsed_globals)
|
|
2520
2664
|
|
|
2521
2665
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2525,7 +2669,10 @@ def doModifyConsumerGroupPassword(args, parsed_globals):
|
|
|
2525
2669
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2526
2670
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2527
2671
|
)
|
|
2528
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2672
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2674
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2675
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2529
2676
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2530
2677
|
else:
|
|
2531
2678
|
cred = credential.Credential(
|
|
@@ -2537,18 +2684,18 @@ def doModifyConsumerGroupPassword(args, parsed_globals):
|
|
|
2537
2684
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2538
2685
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2539
2686
|
)
|
|
2540
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2687
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2541
2688
|
if g_param[OptionsDefine.Language]:
|
|
2542
2689
|
profile.language = g_param[OptionsDefine.Language]
|
|
2543
2690
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2544
2691
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2545
2692
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2546
2693
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2547
|
-
model = models.
|
|
2694
|
+
model = models.DescribeAsyncRequestInfoRequest()
|
|
2548
2695
|
model.from_json_string(json.dumps(args))
|
|
2549
2696
|
start_time = time.time()
|
|
2550
2697
|
while True:
|
|
2551
|
-
rsp = client.
|
|
2698
|
+
rsp = client.DescribeAsyncRequestInfo(model)
|
|
2552
2699
|
result = rsp.to_json_string()
|
|
2553
2700
|
try:
|
|
2554
2701
|
json_obj = json.loads(result)
|
|
@@ -2567,7 +2714,7 @@ def doModifyConsumerGroupPassword(args, parsed_globals):
|
|
|
2567
2714
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2568
2715
|
|
|
2569
2716
|
|
|
2570
|
-
def
|
|
2717
|
+
def doCreateSyncCompareTask(args, parsed_globals):
|
|
2571
2718
|
g_param = parse_global_arg(parsed_globals)
|
|
2572
2719
|
|
|
2573
2720
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2577,7 +2724,10 @@ def doCreateMigrateJob(args, parsed_globals):
|
|
|
2577
2724
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2578
2725
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2579
2726
|
)
|
|
2580
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2727
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2729
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2730
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2581
2731
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2582
2732
|
else:
|
|
2583
2733
|
cred = credential.Credential(
|
|
@@ -2589,18 +2739,18 @@ def doCreateMigrateJob(args, parsed_globals):
|
|
|
2589
2739
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2590
2740
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2591
2741
|
)
|
|
2592
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2742
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2593
2743
|
if g_param[OptionsDefine.Language]:
|
|
2594
2744
|
profile.language = g_param[OptionsDefine.Language]
|
|
2595
2745
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2596
2746
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2597
2747
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2598
2748
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2599
|
-
model = models.
|
|
2749
|
+
model = models.CreateSyncCompareTaskRequest()
|
|
2600
2750
|
model.from_json_string(json.dumps(args))
|
|
2601
2751
|
start_time = time.time()
|
|
2602
2752
|
while True:
|
|
2603
|
-
rsp = client.
|
|
2753
|
+
rsp = client.CreateSyncCompareTask(model)
|
|
2604
2754
|
result = rsp.to_json_string()
|
|
2605
2755
|
try:
|
|
2606
2756
|
json_obj = json.loads(result)
|
|
@@ -2619,7 +2769,7 @@ def doCreateMigrateJob(args, parsed_globals):
|
|
|
2619
2769
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2620
2770
|
|
|
2621
2771
|
|
|
2622
|
-
def
|
|
2772
|
+
def doCompleteMigrateJob(args, parsed_globals):
|
|
2623
2773
|
g_param = parse_global_arg(parsed_globals)
|
|
2624
2774
|
|
|
2625
2775
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2629,7 +2779,10 @@ def doModifySubscribeVipVport(args, parsed_globals):
|
|
|
2629
2779
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2630
2780
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2631
2781
|
)
|
|
2632
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2784
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2785
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2633
2786
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2634
2787
|
else:
|
|
2635
2788
|
cred = credential.Credential(
|
|
@@ -2641,18 +2794,18 @@ def doModifySubscribeVipVport(args, parsed_globals):
|
|
|
2641
2794
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2642
2795
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2643
2796
|
)
|
|
2644
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2797
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2645
2798
|
if g_param[OptionsDefine.Language]:
|
|
2646
2799
|
profile.language = g_param[OptionsDefine.Language]
|
|
2647
2800
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2648
2801
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2649
2802
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2650
2803
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2651
|
-
model = models.
|
|
2804
|
+
model = models.CompleteMigrateJobRequest()
|
|
2652
2805
|
model.from_json_string(json.dumps(args))
|
|
2653
2806
|
start_time = time.time()
|
|
2654
2807
|
while True:
|
|
2655
|
-
rsp = client.
|
|
2808
|
+
rsp = client.CompleteMigrateJob(model)
|
|
2656
2809
|
result = rsp.to_json_string()
|
|
2657
2810
|
try:
|
|
2658
2811
|
json_obj = json.loads(result)
|
|
@@ -2671,7 +2824,7 @@ def doModifySubscribeVipVport(args, parsed_globals):
|
|
|
2671
2824
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2672
2825
|
|
|
2673
2826
|
|
|
2674
|
-
def
|
|
2827
|
+
def doIsolateSyncJob(args, parsed_globals):
|
|
2675
2828
|
g_param = parse_global_arg(parsed_globals)
|
|
2676
2829
|
|
|
2677
2830
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2681,7 +2834,10 @@ def doCreateSubscribeCheckJob(args, parsed_globals):
|
|
|
2681
2834
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2682
2835
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2683
2836
|
)
|
|
2684
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2685
2841
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2686
2842
|
else:
|
|
2687
2843
|
cred = credential.Credential(
|
|
@@ -2693,18 +2849,18 @@ def doCreateSubscribeCheckJob(args, parsed_globals):
|
|
|
2693
2849
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2694
2850
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2695
2851
|
)
|
|
2696
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2697
2853
|
if g_param[OptionsDefine.Language]:
|
|
2698
2854
|
profile.language = g_param[OptionsDefine.Language]
|
|
2699
2855
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2700
2856
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2701
2857
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2702
2858
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2703
|
-
model = models.
|
|
2859
|
+
model = models.IsolateSyncJobRequest()
|
|
2704
2860
|
model.from_json_string(json.dumps(args))
|
|
2705
2861
|
start_time = time.time()
|
|
2706
2862
|
while True:
|
|
2707
|
-
rsp = client.
|
|
2863
|
+
rsp = client.IsolateSyncJob(model)
|
|
2708
2864
|
result = rsp.to_json_string()
|
|
2709
2865
|
try:
|
|
2710
2866
|
json_obj = json.loads(result)
|
|
@@ -2723,7 +2879,7 @@ def doCreateSubscribeCheckJob(args, parsed_globals):
|
|
|
2723
2879
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2724
2880
|
|
|
2725
2881
|
|
|
2726
|
-
def
|
|
2882
|
+
def doConfigureSubscribeJob(args, parsed_globals):
|
|
2727
2883
|
g_param = parse_global_arg(parsed_globals)
|
|
2728
2884
|
|
|
2729
2885
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2733,7 +2889,10 @@ def doCreateMigrateCheckJob(args, parsed_globals):
|
|
|
2733
2889
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2734
2890
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2735
2891
|
)
|
|
2736
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2892
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2894
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2895
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2737
2896
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2738
2897
|
else:
|
|
2739
2898
|
cred = credential.Credential(
|
|
@@ -2745,18 +2904,18 @@ def doCreateMigrateCheckJob(args, parsed_globals):
|
|
|
2745
2904
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2746
2905
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2747
2906
|
)
|
|
2748
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2907
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2749
2908
|
if g_param[OptionsDefine.Language]:
|
|
2750
2909
|
profile.language = g_param[OptionsDefine.Language]
|
|
2751
2910
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2752
2911
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2753
2912
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2754
2913
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2755
|
-
model = models.
|
|
2914
|
+
model = models.ConfigureSubscribeJobRequest()
|
|
2756
2915
|
model.from_json_string(json.dumps(args))
|
|
2757
2916
|
start_time = time.time()
|
|
2758
2917
|
while True:
|
|
2759
|
-
rsp = client.
|
|
2918
|
+
rsp = client.ConfigureSubscribeJob(model)
|
|
2760
2919
|
result = rsp.to_json_string()
|
|
2761
2920
|
try:
|
|
2762
2921
|
json_obj = json.loads(result)
|
|
@@ -2775,7 +2934,7 @@ def doCreateMigrateCheckJob(args, parsed_globals):
|
|
|
2775
2934
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2776
2935
|
|
|
2777
2936
|
|
|
2778
|
-
def
|
|
2937
|
+
def doDeleteCompareTask(args, parsed_globals):
|
|
2779
2938
|
g_param = parse_global_arg(parsed_globals)
|
|
2780
2939
|
|
|
2781
2940
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2785,7 +2944,10 @@ def doIsolateMigrateJob(args, parsed_globals):
|
|
|
2785
2944
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2786
2945
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2787
2946
|
)
|
|
2788
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2947
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2949
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2950
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2789
2951
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2790
2952
|
else:
|
|
2791
2953
|
cred = credential.Credential(
|
|
@@ -2797,18 +2959,18 @@ def doIsolateMigrateJob(args, parsed_globals):
|
|
|
2797
2959
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2798
2960
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2799
2961
|
)
|
|
2800
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2962
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2801
2963
|
if g_param[OptionsDefine.Language]:
|
|
2802
2964
|
profile.language = g_param[OptionsDefine.Language]
|
|
2803
2965
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2804
2966
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2805
2967
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2806
2968
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2807
|
-
model = models.
|
|
2969
|
+
model = models.DeleteCompareTaskRequest()
|
|
2808
2970
|
model.from_json_string(json.dumps(args))
|
|
2809
2971
|
start_time = time.time()
|
|
2810
2972
|
while True:
|
|
2811
|
-
rsp = client.
|
|
2973
|
+
rsp = client.DeleteCompareTask(model)
|
|
2812
2974
|
result = rsp.to_json_string()
|
|
2813
2975
|
try:
|
|
2814
2976
|
json_obj = json.loads(result)
|
|
@@ -2827,7 +2989,7 @@ def doIsolateMigrateJob(args, parsed_globals):
|
|
|
2827
2989
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2828
2990
|
|
|
2829
2991
|
|
|
2830
|
-
def
|
|
2992
|
+
def doStartSyncJob(args, parsed_globals):
|
|
2831
2993
|
g_param = parse_global_arg(parsed_globals)
|
|
2832
2994
|
|
|
2833
2995
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2837,7 +2999,10 @@ def doDescribeCheckSyncJobResult(args, parsed_globals):
|
|
|
2837
2999
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2838
3000
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2839
3001
|
)
|
|
2840
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3002
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3004
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3005
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
3006
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
3007
|
else:
|
|
2843
3008
|
cred = credential.Credential(
|
|
@@ -2849,18 +3014,18 @@ def doDescribeCheckSyncJobResult(args, parsed_globals):
|
|
|
2849
3014
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2850
3015
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2851
3016
|
)
|
|
2852
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3017
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2853
3018
|
if g_param[OptionsDefine.Language]:
|
|
2854
3019
|
profile.language = g_param[OptionsDefine.Language]
|
|
2855
3020
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2856
3021
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2857
3022
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2858
3023
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2859
|
-
model = models.
|
|
3024
|
+
model = models.StartSyncJobRequest()
|
|
2860
3025
|
model.from_json_string(json.dumps(args))
|
|
2861
3026
|
start_time = time.time()
|
|
2862
3027
|
while True:
|
|
2863
|
-
rsp = client.
|
|
3028
|
+
rsp = client.StartSyncJob(model)
|
|
2864
3029
|
result = rsp.to_json_string()
|
|
2865
3030
|
try:
|
|
2866
3031
|
json_obj = json.loads(result)
|
|
@@ -2879,7 +3044,7 @@ def doDescribeCheckSyncJobResult(args, parsed_globals):
|
|
|
2879
3044
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2880
3045
|
|
|
2881
3046
|
|
|
2882
|
-
def
|
|
3047
|
+
def doDescribeSyncCompareTasks(args, parsed_globals):
|
|
2883
3048
|
g_param = parse_global_arg(parsed_globals)
|
|
2884
3049
|
|
|
2885
3050
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2889,7 +3054,10 @@ def doDescribeCompareTasks(args, parsed_globals):
|
|
|
2889
3054
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
3055
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
3056
|
)
|
|
2892
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3057
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3059
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3060
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2893
3061
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2894
3062
|
else:
|
|
2895
3063
|
cred = credential.Credential(
|
|
@@ -2901,18 +3069,18 @@ def doDescribeCompareTasks(args, parsed_globals):
|
|
|
2901
3069
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2902
3070
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2903
3071
|
)
|
|
2904
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3072
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2905
3073
|
if g_param[OptionsDefine.Language]:
|
|
2906
3074
|
profile.language = g_param[OptionsDefine.Language]
|
|
2907
3075
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2908
3076
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2909
3077
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2910
3078
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2911
|
-
model = models.
|
|
3079
|
+
model = models.DescribeSyncCompareTasksRequest()
|
|
2912
3080
|
model.from_json_string(json.dumps(args))
|
|
2913
3081
|
start_time = time.time()
|
|
2914
3082
|
while True:
|
|
2915
|
-
rsp = client.
|
|
3083
|
+
rsp = client.DescribeSyncCompareTasks(model)
|
|
2916
3084
|
result = rsp.to_json_string()
|
|
2917
3085
|
try:
|
|
2918
3086
|
json_obj = json.loads(result)
|
|
@@ -2931,7 +3099,7 @@ def doDescribeCompareTasks(args, parsed_globals):
|
|
|
2931
3099
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2932
3100
|
|
|
2933
3101
|
|
|
2934
|
-
def
|
|
3102
|
+
def doCreateCheckSyncJob(args, parsed_globals):
|
|
2935
3103
|
g_param = parse_global_arg(parsed_globals)
|
|
2936
3104
|
|
|
2937
3105
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2941,7 +3109,10 @@ def doSkipSyncCheckItem(args, parsed_globals):
|
|
|
2941
3109
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2942
3110
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2943
3111
|
)
|
|
2944
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3112
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3114
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3115
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2945
3116
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2946
3117
|
else:
|
|
2947
3118
|
cred = credential.Credential(
|
|
@@ -2953,18 +3124,18 @@ def doSkipSyncCheckItem(args, parsed_globals):
|
|
|
2953
3124
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2954
3125
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2955
3126
|
)
|
|
2956
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3127
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2957
3128
|
if g_param[OptionsDefine.Language]:
|
|
2958
3129
|
profile.language = g_param[OptionsDefine.Language]
|
|
2959
3130
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2960
3131
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2961
3132
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2962
3133
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2963
|
-
model = models.
|
|
3134
|
+
model = models.CreateCheckSyncJobRequest()
|
|
2964
3135
|
model.from_json_string(json.dumps(args))
|
|
2965
3136
|
start_time = time.time()
|
|
2966
3137
|
while True:
|
|
2967
|
-
rsp = client.
|
|
3138
|
+
rsp = client.CreateCheckSyncJob(model)
|
|
2968
3139
|
result = rsp.to_json_string()
|
|
2969
3140
|
try:
|
|
2970
3141
|
json_obj = json.loads(result)
|
|
@@ -2983,7 +3154,7 @@ def doSkipSyncCheckItem(args, parsed_globals):
|
|
|
2983
3154
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2984
3155
|
|
|
2985
3156
|
|
|
2986
|
-
def
|
|
3157
|
+
def doDescribeCompareReport(args, parsed_globals):
|
|
2987
3158
|
g_param = parse_global_arg(parsed_globals)
|
|
2988
3159
|
|
|
2989
3160
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2993,7 +3164,10 @@ def doDescribeSubscribeDetail(args, parsed_globals):
|
|
|
2993
3164
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2994
3165
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2995
3166
|
)
|
|
2996
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3167
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3169
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3170
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2997
3171
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2998
3172
|
else:
|
|
2999
3173
|
cred = credential.Credential(
|
|
@@ -3005,18 +3179,18 @@ def doDescribeSubscribeDetail(args, parsed_globals):
|
|
|
3005
3179
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3006
3180
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3007
3181
|
)
|
|
3008
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3182
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3009
3183
|
if g_param[OptionsDefine.Language]:
|
|
3010
3184
|
profile.language = g_param[OptionsDefine.Language]
|
|
3011
3185
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3012
3186
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3013
3187
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3014
3188
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3015
|
-
model = models.
|
|
3189
|
+
model = models.DescribeCompareReportRequest()
|
|
3016
3190
|
model.from_json_string(json.dumps(args))
|
|
3017
3191
|
start_time = time.time()
|
|
3018
3192
|
while True:
|
|
3019
|
-
rsp = client.
|
|
3193
|
+
rsp = client.DescribeCompareReport(model)
|
|
3020
3194
|
result = rsp.to_json_string()
|
|
3021
3195
|
try:
|
|
3022
3196
|
json_obj = json.loads(result)
|
|
@@ -3035,7 +3209,7 @@ def doDescribeSubscribeDetail(args, parsed_globals):
|
|
|
3035
3209
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3036
3210
|
|
|
3037
3211
|
|
|
3038
|
-
def
|
|
3212
|
+
def doDescribeMigrateCheckJob(args, parsed_globals):
|
|
3039
3213
|
g_param = parse_global_arg(parsed_globals)
|
|
3040
3214
|
|
|
3041
3215
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3045,7 +3219,10 @@ def doDeleteConsumerGroup(args, parsed_globals):
|
|
|
3045
3219
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3046
3220
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3047
3221
|
)
|
|
3048
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3222
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3224
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3225
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3049
3226
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3050
3227
|
else:
|
|
3051
3228
|
cred = credential.Credential(
|
|
@@ -3057,18 +3234,18 @@ def doDeleteConsumerGroup(args, parsed_globals):
|
|
|
3057
3234
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3058
3235
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3059
3236
|
)
|
|
3060
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3237
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3061
3238
|
if g_param[OptionsDefine.Language]:
|
|
3062
3239
|
profile.language = g_param[OptionsDefine.Language]
|
|
3063
3240
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3064
3241
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3065
3242
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3066
3243
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3067
|
-
model = models.
|
|
3244
|
+
model = models.DescribeMigrateCheckJobRequest()
|
|
3068
3245
|
model.from_json_string(json.dumps(args))
|
|
3069
3246
|
start_time = time.time()
|
|
3070
3247
|
while True:
|
|
3071
|
-
rsp = client.
|
|
3248
|
+
rsp = client.DescribeMigrateCheckJob(model)
|
|
3072
3249
|
result = rsp.to_json_string()
|
|
3073
3250
|
try:
|
|
3074
3251
|
json_obj = json.loads(result)
|
|
@@ -3087,7 +3264,7 @@ def doDeleteConsumerGroup(args, parsed_globals):
|
|
|
3087
3264
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3088
3265
|
|
|
3089
3266
|
|
|
3090
|
-
def
|
|
3267
|
+
def doConfigureSyncJob(args, parsed_globals):
|
|
3091
3268
|
g_param = parse_global_arg(parsed_globals)
|
|
3092
3269
|
|
|
3093
3270
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3097,7 +3274,10 @@ def doDescribeMigrationJobs(args, parsed_globals):
|
|
|
3097
3274
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3098
3275
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3099
3276
|
)
|
|
3100
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3277
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3279
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3280
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3101
3281
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3102
3282
|
else:
|
|
3103
3283
|
cred = credential.Credential(
|
|
@@ -3109,18 +3289,18 @@ def doDescribeMigrationJobs(args, parsed_globals):
|
|
|
3109
3289
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3110
3290
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3111
3291
|
)
|
|
3112
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3292
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3113
3293
|
if g_param[OptionsDefine.Language]:
|
|
3114
3294
|
profile.language = g_param[OptionsDefine.Language]
|
|
3115
3295
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3116
3296
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3117
3297
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3118
3298
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3119
|
-
model = models.
|
|
3299
|
+
model = models.ConfigureSyncJobRequest()
|
|
3120
3300
|
model.from_json_string(json.dumps(args))
|
|
3121
3301
|
start_time = time.time()
|
|
3122
3302
|
while True:
|
|
3123
|
-
rsp = client.
|
|
3303
|
+
rsp = client.ConfigureSyncJob(model)
|
|
3124
3304
|
result = rsp.to_json_string()
|
|
3125
3305
|
try:
|
|
3126
3306
|
json_obj = json.loads(result)
|
|
@@ -3139,7 +3319,7 @@ def doDescribeMigrationJobs(args, parsed_globals):
|
|
|
3139
3319
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3140
3320
|
|
|
3141
3321
|
|
|
3142
|
-
def
|
|
3322
|
+
def doModifySyncJobConfig(args, parsed_globals):
|
|
3143
3323
|
g_param = parse_global_arg(parsed_globals)
|
|
3144
3324
|
|
|
3145
3325
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3149,7 +3329,10 @@ def doRecoverMigrateJob(args, parsed_globals):
|
|
|
3149
3329
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3150
3330
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3151
3331
|
)
|
|
3152
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3334
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3335
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3153
3336
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3154
3337
|
else:
|
|
3155
3338
|
cred = credential.Credential(
|
|
@@ -3161,18 +3344,18 @@ def doRecoverMigrateJob(args, parsed_globals):
|
|
|
3161
3344
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3162
3345
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3163
3346
|
)
|
|
3164
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3347
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3165
3348
|
if g_param[OptionsDefine.Language]:
|
|
3166
3349
|
profile.language = g_param[OptionsDefine.Language]
|
|
3167
3350
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3168
3351
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3169
3352
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3170
3353
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3171
|
-
model = models.
|
|
3354
|
+
model = models.ModifySyncJobConfigRequest()
|
|
3172
3355
|
model.from_json_string(json.dumps(args))
|
|
3173
3356
|
start_time = time.time()
|
|
3174
3357
|
while True:
|
|
3175
|
-
rsp = client.
|
|
3358
|
+
rsp = client.ModifySyncJobConfig(model)
|
|
3176
3359
|
result = rsp.to_json_string()
|
|
3177
3360
|
try:
|
|
3178
3361
|
json_obj = json.loads(result)
|
|
@@ -3191,7 +3374,7 @@ def doRecoverMigrateJob(args, parsed_globals):
|
|
|
3191
3374
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3192
3375
|
|
|
3193
3376
|
|
|
3194
|
-
def
|
|
3377
|
+
def doDescribeSyncCompareReport(args, parsed_globals):
|
|
3195
3378
|
g_param = parse_global_arg(parsed_globals)
|
|
3196
3379
|
|
|
3197
3380
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3201,7 +3384,10 @@ def doDescribeMigrateJobs(args, parsed_globals):
|
|
|
3201
3384
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3202
3385
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3203
3386
|
)
|
|
3204
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3387
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3389
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3390
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3205
3391
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3206
3392
|
else:
|
|
3207
3393
|
cred = credential.Credential(
|
|
@@ -3213,18 +3399,18 @@ def doDescribeMigrateJobs(args, parsed_globals):
|
|
|
3213
3399
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3214
3400
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3215
3401
|
)
|
|
3216
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3402
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3217
3403
|
if g_param[OptionsDefine.Language]:
|
|
3218
3404
|
profile.language = g_param[OptionsDefine.Language]
|
|
3219
3405
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3220
3406
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3221
3407
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3222
3408
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3223
|
-
model = models.
|
|
3409
|
+
model = models.DescribeSyncCompareReportRequest()
|
|
3224
3410
|
model.from_json_string(json.dumps(args))
|
|
3225
3411
|
start_time = time.time()
|
|
3226
3412
|
while True:
|
|
3227
|
-
rsp = client.
|
|
3413
|
+
rsp = client.DescribeSyncCompareReport(model)
|
|
3228
3414
|
result = rsp.to_json_string()
|
|
3229
3415
|
try:
|
|
3230
3416
|
json_obj = json.loads(result)
|
|
@@ -3243,7 +3429,7 @@ def doDescribeMigrateJobs(args, parsed_globals):
|
|
|
3243
3429
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3244
3430
|
|
|
3245
3431
|
|
|
3246
|
-
def
|
|
3432
|
+
def doModifyConsumerGroupDescription(args, parsed_globals):
|
|
3247
3433
|
g_param = parse_global_arg(parsed_globals)
|
|
3248
3434
|
|
|
3249
3435
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3253,7 +3439,10 @@ def doCreateSubscribe(args, parsed_globals):
|
|
|
3253
3439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3254
3440
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3255
3441
|
)
|
|
3256
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3442
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3444
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3445
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3257
3446
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3258
3447
|
else:
|
|
3259
3448
|
cred = credential.Credential(
|
|
@@ -3265,18 +3454,18 @@ def doCreateSubscribe(args, parsed_globals):
|
|
|
3265
3454
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3266
3455
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3267
3456
|
)
|
|
3268
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3457
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3269
3458
|
if g_param[OptionsDefine.Language]:
|
|
3270
3459
|
profile.language = g_param[OptionsDefine.Language]
|
|
3271
3460
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3272
3461
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3273
3462
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3274
3463
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3275
|
-
model = models.
|
|
3464
|
+
model = models.ModifyConsumerGroupDescriptionRequest()
|
|
3276
3465
|
model.from_json_string(json.dumps(args))
|
|
3277
3466
|
start_time = time.time()
|
|
3278
3467
|
while True:
|
|
3279
|
-
rsp = client.
|
|
3468
|
+
rsp = client.ModifyConsumerGroupDescription(model)
|
|
3280
3469
|
result = rsp.to_json_string()
|
|
3281
3470
|
try:
|
|
3282
3471
|
json_obj = json.loads(result)
|
|
@@ -3295,7 +3484,7 @@ def doCreateSubscribe(args, parsed_globals):
|
|
|
3295
3484
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3296
3485
|
|
|
3297
3486
|
|
|
3298
|
-
def
|
|
3487
|
+
def doModifyConsumerGroupPassword(args, parsed_globals):
|
|
3299
3488
|
g_param = parse_global_arg(parsed_globals)
|
|
3300
3489
|
|
|
3301
3490
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3305,7 +3494,10 @@ def doRecoverSyncJob(args, parsed_globals):
|
|
|
3305
3494
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3306
3495
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3307
3496
|
)
|
|
3308
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3497
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3499
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3500
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3309
3501
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3310
3502
|
else:
|
|
3311
3503
|
cred = credential.Credential(
|
|
@@ -3317,18 +3509,18 @@ def doRecoverSyncJob(args, parsed_globals):
|
|
|
3317
3509
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3318
3510
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3319
3511
|
)
|
|
3320
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3512
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3321
3513
|
if g_param[OptionsDefine.Language]:
|
|
3322
3514
|
profile.language = g_param[OptionsDefine.Language]
|
|
3323
3515
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3324
3516
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3325
3517
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3326
3518
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3327
|
-
model = models.
|
|
3519
|
+
model = models.ModifyConsumerGroupPasswordRequest()
|
|
3328
3520
|
model.from_json_string(json.dumps(args))
|
|
3329
3521
|
start_time = time.time()
|
|
3330
3522
|
while True:
|
|
3331
|
-
rsp = client.
|
|
3523
|
+
rsp = client.ModifyConsumerGroupPassword(model)
|
|
3332
3524
|
result = rsp.to_json_string()
|
|
3333
3525
|
try:
|
|
3334
3526
|
json_obj = json.loads(result)
|
|
@@ -3347,7 +3539,7 @@ def doRecoverSyncJob(args, parsed_globals):
|
|
|
3347
3539
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3348
3540
|
|
|
3349
3541
|
|
|
3350
|
-
def
|
|
3542
|
+
def doModifySubscribeConsumeTime(args, parsed_globals):
|
|
3351
3543
|
g_param = parse_global_arg(parsed_globals)
|
|
3352
3544
|
|
|
3353
3545
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3357,7 +3549,10 @@ def doResetSubscribe(args, parsed_globals):
|
|
|
3357
3549
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3358
3550
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3359
3551
|
)
|
|
3360
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3552
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3554
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3555
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3361
3556
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3362
3557
|
else:
|
|
3363
3558
|
cred = credential.Credential(
|
|
@@ -3369,18 +3564,18 @@ def doResetSubscribe(args, parsed_globals):
|
|
|
3369
3564
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3370
3565
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3371
3566
|
)
|
|
3372
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3567
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3373
3568
|
if g_param[OptionsDefine.Language]:
|
|
3374
3569
|
profile.language = g_param[OptionsDefine.Language]
|
|
3375
3570
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3376
3571
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3377
3572
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3378
3573
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3379
|
-
model = models.
|
|
3574
|
+
model = models.ModifySubscribeConsumeTimeRequest()
|
|
3380
3575
|
model.from_json_string(json.dumps(args))
|
|
3381
3576
|
start_time = time.time()
|
|
3382
3577
|
while True:
|
|
3383
|
-
rsp = client.
|
|
3578
|
+
rsp = client.ModifySubscribeConsumeTime(model)
|
|
3384
3579
|
result = rsp.to_json_string()
|
|
3385
3580
|
try:
|
|
3386
3581
|
json_obj = json.loads(result)
|
|
@@ -3399,7 +3594,7 @@ def doResetSubscribe(args, parsed_globals):
|
|
|
3399
3594
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3400
3595
|
|
|
3401
3596
|
|
|
3402
|
-
def
|
|
3597
|
+
def doDescribeCheckSyncJobResult(args, parsed_globals):
|
|
3403
3598
|
g_param = parse_global_arg(parsed_globals)
|
|
3404
3599
|
|
|
3405
3600
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3409,7 +3604,10 @@ def doActivateSubscribe(args, parsed_globals):
|
|
|
3409
3604
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3410
3605
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3411
3606
|
)
|
|
3412
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3607
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3609
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3610
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3413
3611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3414
3612
|
else:
|
|
3415
3613
|
cred = credential.Credential(
|
|
@@ -3421,18 +3619,18 @@ def doActivateSubscribe(args, parsed_globals):
|
|
|
3421
3619
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3422
3620
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3423
3621
|
)
|
|
3424
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3622
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3425
3623
|
if g_param[OptionsDefine.Language]:
|
|
3426
3624
|
profile.language = g_param[OptionsDefine.Language]
|
|
3427
3625
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3428
3626
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3429
3627
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3430
3628
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3431
|
-
model = models.
|
|
3629
|
+
model = models.DescribeCheckSyncJobResultRequest()
|
|
3432
3630
|
model.from_json_string(json.dumps(args))
|
|
3433
3631
|
start_time = time.time()
|
|
3434
3632
|
while True:
|
|
3435
|
-
rsp = client.
|
|
3633
|
+
rsp = client.DescribeCheckSyncJobResult(model)
|
|
3436
3634
|
result = rsp.to_json_string()
|
|
3437
3635
|
try:
|
|
3438
3636
|
json_obj = json.loads(result)
|
|
@@ -3451,7 +3649,7 @@ def doActivateSubscribe(args, parsed_globals):
|
|
|
3451
3649
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3452
3650
|
|
|
3453
3651
|
|
|
3454
|
-
def
|
|
3652
|
+
def doDestroyMigrateJob(args, parsed_globals):
|
|
3455
3653
|
g_param = parse_global_arg(parsed_globals)
|
|
3456
3654
|
|
|
3457
3655
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3461,7 +3659,10 @@ def doModifyMigrateJobSpec(args, parsed_globals):
|
|
|
3461
3659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3462
3660
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3463
3661
|
)
|
|
3464
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3662
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3664
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3665
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3465
3666
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3466
3667
|
else:
|
|
3467
3668
|
cred = credential.Credential(
|
|
@@ -3473,18 +3674,18 @@ def doModifyMigrateJobSpec(args, parsed_globals):
|
|
|
3473
3674
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3474
3675
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3475
3676
|
)
|
|
3476
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3677
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3477
3678
|
if g_param[OptionsDefine.Language]:
|
|
3478
3679
|
profile.language = g_param[OptionsDefine.Language]
|
|
3479
3680
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3480
3681
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3481
3682
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3482
3683
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3483
|
-
model = models.
|
|
3684
|
+
model = models.DestroyMigrateJobRequest()
|
|
3484
3685
|
model.from_json_string(json.dumps(args))
|
|
3485
3686
|
start_time = time.time()
|
|
3486
3687
|
while True:
|
|
3487
|
-
rsp = client.
|
|
3688
|
+
rsp = client.DestroyMigrateJob(model)
|
|
3488
3689
|
result = rsp.to_json_string()
|
|
3489
3690
|
try:
|
|
3490
3691
|
json_obj = json.loads(result)
|
|
@@ -3513,7 +3714,10 @@ def doDescribeModifyCheckSyncJobResult(args, parsed_globals):
|
|
|
3513
3714
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3514
3715
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3515
3716
|
)
|
|
3516
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3717
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3719
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3720
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3517
3721
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3518
3722
|
else:
|
|
3519
3723
|
cred = credential.Credential(
|
|
@@ -3525,7 +3729,7 @@ def doDescribeModifyCheckSyncJobResult(args, parsed_globals):
|
|
|
3525
3729
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3526
3730
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3527
3731
|
)
|
|
3528
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3732
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3529
3733
|
if g_param[OptionsDefine.Language]:
|
|
3530
3734
|
profile.language = g_param[OptionsDefine.Language]
|
|
3531
3735
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3565,7 +3769,10 @@ def doModifySubscribeName(args, parsed_globals):
|
|
|
3565
3769
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3566
3770
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3567
3771
|
)
|
|
3568
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3772
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3774
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3775
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3569
3776
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3570
3777
|
else:
|
|
3571
3778
|
cred = credential.Credential(
|
|
@@ -3577,7 +3784,7 @@ def doModifySubscribeName(args, parsed_globals):
|
|
|
3577
3784
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3578
3785
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3579
3786
|
)
|
|
3580
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3787
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3581
3788
|
if g_param[OptionsDefine.Language]:
|
|
3582
3789
|
profile.language = g_param[OptionsDefine.Language]
|
|
3583
3790
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3607,7 +3814,7 @@ def doModifySubscribeName(args, parsed_globals):
|
|
|
3607
3814
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3608
3815
|
|
|
3609
3816
|
|
|
3610
|
-
def
|
|
3817
|
+
def doDescribeOffsetByTime(args, parsed_globals):
|
|
3611
3818
|
g_param = parse_global_arg(parsed_globals)
|
|
3612
3819
|
|
|
3613
3820
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3617,7 +3824,10 @@ def doModifyMigrateJob(args, parsed_globals):
|
|
|
3617
3824
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3618
3825
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3619
3826
|
)
|
|
3620
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3827
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3829
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3830
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3621
3831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3622
3832
|
else:
|
|
3623
3833
|
cred = credential.Credential(
|
|
@@ -3629,18 +3839,18 @@ def doModifyMigrateJob(args, parsed_globals):
|
|
|
3629
3839
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3630
3840
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3631
3841
|
)
|
|
3632
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3842
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3633
3843
|
if g_param[OptionsDefine.Language]:
|
|
3634
3844
|
profile.language = g_param[OptionsDefine.Language]
|
|
3635
3845
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3636
3846
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3637
3847
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3638
3848
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3639
|
-
model = models.
|
|
3849
|
+
model = models.DescribeOffsetByTimeRequest()
|
|
3640
3850
|
model.from_json_string(json.dumps(args))
|
|
3641
3851
|
start_time = time.time()
|
|
3642
3852
|
while True:
|
|
3643
|
-
rsp = client.
|
|
3853
|
+
rsp = client.DescribeOffsetByTime(model)
|
|
3644
3854
|
result = rsp.to_json_string()
|
|
3645
3855
|
try:
|
|
3646
3856
|
json_obj = json.loads(result)
|
|
@@ -3659,7 +3869,7 @@ def doModifyMigrateJob(args, parsed_globals):
|
|
|
3659
3869
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3660
3870
|
|
|
3661
3871
|
|
|
3662
|
-
def
|
|
3872
|
+
def doIsolateMigrateJob(args, parsed_globals):
|
|
3663
3873
|
g_param = parse_global_arg(parsed_globals)
|
|
3664
3874
|
|
|
3665
3875
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3669,7 +3879,10 @@ def doCreateCompareTask(args, parsed_globals):
|
|
|
3669
3879
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3670
3880
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3671
3881
|
)
|
|
3672
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3882
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3884
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3885
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3673
3886
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3674
3887
|
else:
|
|
3675
3888
|
cred = credential.Credential(
|
|
@@ -3681,18 +3894,18 @@ def doCreateCompareTask(args, parsed_globals):
|
|
|
3681
3894
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3682
3895
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3683
3896
|
)
|
|
3684
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3897
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3685
3898
|
if g_param[OptionsDefine.Language]:
|
|
3686
3899
|
profile.language = g_param[OptionsDefine.Language]
|
|
3687
3900
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3688
3901
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3689
3902
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3690
3903
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3691
|
-
model = models.
|
|
3904
|
+
model = models.IsolateMigrateJobRequest()
|
|
3692
3905
|
model.from_json_string(json.dumps(args))
|
|
3693
3906
|
start_time = time.time()
|
|
3694
3907
|
while True:
|
|
3695
|
-
rsp = client.
|
|
3908
|
+
rsp = client.IsolateMigrateJob(model)
|
|
3696
3909
|
result = rsp.to_json_string()
|
|
3697
3910
|
try:
|
|
3698
3911
|
json_obj = json.loads(result)
|
|
@@ -3711,7 +3924,7 @@ def doCreateCompareTask(args, parsed_globals):
|
|
|
3711
3924
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3712
3925
|
|
|
3713
3926
|
|
|
3714
|
-
def
|
|
3927
|
+
def doModifyCompareTaskName(args, parsed_globals):
|
|
3715
3928
|
g_param = parse_global_arg(parsed_globals)
|
|
3716
3929
|
|
|
3717
3930
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3721,7 +3934,10 @@ def doOfflineIsolatedSubscribe(args, parsed_globals):
|
|
|
3721
3934
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3722
3935
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3723
3936
|
)
|
|
3724
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3937
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3939
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3940
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3725
3941
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3726
3942
|
else:
|
|
3727
3943
|
cred = credential.Credential(
|
|
@@ -3733,18 +3949,18 @@ def doOfflineIsolatedSubscribe(args, parsed_globals):
|
|
|
3733
3949
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3734
3950
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3735
3951
|
)
|
|
3736
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3952
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3737
3953
|
if g_param[OptionsDefine.Language]:
|
|
3738
3954
|
profile.language = g_param[OptionsDefine.Language]
|
|
3739
3955
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3740
3956
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3741
3957
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3742
3958
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3743
|
-
model = models.
|
|
3959
|
+
model = models.ModifyCompareTaskNameRequest()
|
|
3744
3960
|
model.from_json_string(json.dumps(args))
|
|
3745
3961
|
start_time = time.time()
|
|
3746
3962
|
while True:
|
|
3747
|
-
rsp = client.
|
|
3963
|
+
rsp = client.ModifyCompareTaskName(model)
|
|
3748
3964
|
result = rsp.to_json_string()
|
|
3749
3965
|
try:
|
|
3750
3966
|
json_obj = json.loads(result)
|
|
@@ -3763,7 +3979,7 @@ def doOfflineIsolatedSubscribe(args, parsed_globals):
|
|
|
3763
3979
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3764
3980
|
|
|
3765
3981
|
|
|
3766
|
-
def
|
|
3982
|
+
def doResumeSubscribe(args, parsed_globals):
|
|
3767
3983
|
g_param = parse_global_arg(parsed_globals)
|
|
3768
3984
|
|
|
3769
3985
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3773,7 +3989,10 @@ def doDescribeMigrationDetail(args, parsed_globals):
|
|
|
3773
3989
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3774
3990
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3775
3991
|
)
|
|
3776
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3992
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3994
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3995
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3777
3996
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3778
3997
|
else:
|
|
3779
3998
|
cred = credential.Credential(
|
|
@@ -3785,18 +4004,18 @@ def doDescribeMigrationDetail(args, parsed_globals):
|
|
|
3785
4004
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3786
4005
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3787
4006
|
)
|
|
3788
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4007
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3789
4008
|
if g_param[OptionsDefine.Language]:
|
|
3790
4009
|
profile.language = g_param[OptionsDefine.Language]
|
|
3791
4010
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3792
4011
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3793
4012
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3794
4013
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3795
|
-
model = models.
|
|
4014
|
+
model = models.ResumeSubscribeRequest()
|
|
3796
4015
|
model.from_json_string(json.dumps(args))
|
|
3797
4016
|
start_time = time.time()
|
|
3798
4017
|
while True:
|
|
3799
|
-
rsp = client.
|
|
4018
|
+
rsp = client.ResumeSubscribe(model)
|
|
3800
4019
|
result = rsp.to_json_string()
|
|
3801
4020
|
try:
|
|
3802
4021
|
json_obj = json.loads(result)
|
|
@@ -3815,7 +4034,7 @@ def doDescribeMigrationDetail(args, parsed_globals):
|
|
|
3815
4034
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3816
4035
|
|
|
3817
4036
|
|
|
3818
|
-
def
|
|
4037
|
+
def doStartModifySyncJob(args, parsed_globals):
|
|
3819
4038
|
g_param = parse_global_arg(parsed_globals)
|
|
3820
4039
|
|
|
3821
4040
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3825,7 +4044,10 @@ def doDescribeOffsetByTime(args, parsed_globals):
|
|
|
3825
4044
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3826
4045
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3827
4046
|
)
|
|
3828
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4047
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4049
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4050
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
4051
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
4052
|
else:
|
|
3831
4053
|
cred = credential.Credential(
|
|
@@ -3837,18 +4059,18 @@ def doDescribeOffsetByTime(args, parsed_globals):
|
|
|
3837
4059
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3838
4060
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3839
4061
|
)
|
|
3840
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4062
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3841
4063
|
if g_param[OptionsDefine.Language]:
|
|
3842
4064
|
profile.language = g_param[OptionsDefine.Language]
|
|
3843
4065
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3844
4066
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3845
4067
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3846
4068
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3847
|
-
model = models.
|
|
4069
|
+
model = models.StartModifySyncJobRequest()
|
|
3848
4070
|
model.from_json_string(json.dumps(args))
|
|
3849
4071
|
start_time = time.time()
|
|
3850
4072
|
while True:
|
|
3851
|
-
rsp = client.
|
|
4073
|
+
rsp = client.StartModifySyncJob(model)
|
|
3852
4074
|
result = rsp.to_json_string()
|
|
3853
4075
|
try:
|
|
3854
4076
|
json_obj = json.loads(result)
|
|
@@ -3867,7 +4089,7 @@ def doDescribeOffsetByTime(args, parsed_globals):
|
|
|
3867
4089
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3868
4090
|
|
|
3869
4091
|
|
|
3870
|
-
def
|
|
4092
|
+
def doActivateSubscribe(args, parsed_globals):
|
|
3871
4093
|
g_param = parse_global_arg(parsed_globals)
|
|
3872
4094
|
|
|
3873
4095
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3877,7 +4099,10 @@ def doModifySyncRateLimit(args, parsed_globals):
|
|
|
3877
4099
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3878
4100
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3879
4101
|
)
|
|
3880
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3881
4106
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3882
4107
|
else:
|
|
3883
4108
|
cred = credential.Credential(
|
|
@@ -3889,18 +4114,18 @@ def doModifySyncRateLimit(args, parsed_globals):
|
|
|
3889
4114
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3890
4115
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3891
4116
|
)
|
|
3892
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4117
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3893
4118
|
if g_param[OptionsDefine.Language]:
|
|
3894
4119
|
profile.language = g_param[OptionsDefine.Language]
|
|
3895
4120
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3896
4121
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3897
4122
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3898
4123
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3899
|
-
model = models.
|
|
4124
|
+
model = models.ActivateSubscribeRequest()
|
|
3900
4125
|
model.from_json_string(json.dumps(args))
|
|
3901
4126
|
start_time = time.time()
|
|
3902
4127
|
while True:
|
|
3903
|
-
rsp = client.
|
|
4128
|
+
rsp = client.ActivateSubscribe(model)
|
|
3904
4129
|
result = rsp.to_json_string()
|
|
3905
4130
|
try:
|
|
3906
4131
|
json_obj = json.loads(result)
|
|
@@ -3919,7 +4144,7 @@ def doModifySyncRateLimit(args, parsed_globals):
|
|
|
3919
4144
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3920
4145
|
|
|
3921
4146
|
|
|
3922
|
-
def
|
|
4147
|
+
def doCreateSyncJob(args, parsed_globals):
|
|
3923
4148
|
g_param = parse_global_arg(parsed_globals)
|
|
3924
4149
|
|
|
3925
4150
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3929,7 +4154,10 @@ def doResumeSyncJob(args, parsed_globals):
|
|
|
3929
4154
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3930
4155
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3931
4156
|
)
|
|
3932
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4157
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4159
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4160
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3933
4161
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3934
4162
|
else:
|
|
3935
4163
|
cred = credential.Credential(
|
|
@@ -3941,18 +4169,18 @@ def doResumeSyncJob(args, parsed_globals):
|
|
|
3941
4169
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3942
4170
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3943
4171
|
)
|
|
3944
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4172
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3945
4173
|
if g_param[OptionsDefine.Language]:
|
|
3946
4174
|
profile.language = g_param[OptionsDefine.Language]
|
|
3947
4175
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3948
4176
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3949
4177
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3950
4178
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3951
|
-
model = models.
|
|
4179
|
+
model = models.CreateSyncJobRequest()
|
|
3952
4180
|
model.from_json_string(json.dumps(args))
|
|
3953
4181
|
start_time = time.time()
|
|
3954
4182
|
while True:
|
|
3955
|
-
rsp = client.
|
|
4183
|
+
rsp = client.CreateSyncJob(model)
|
|
3956
4184
|
result = rsp.to_json_string()
|
|
3957
4185
|
try:
|
|
3958
4186
|
json_obj = json.loads(result)
|
|
@@ -3971,7 +4199,7 @@ def doResumeSyncJob(args, parsed_globals):
|
|
|
3971
4199
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3972
4200
|
|
|
3973
4201
|
|
|
3974
|
-
def
|
|
4202
|
+
def doDescribeConsumerGroups(args, parsed_globals):
|
|
3975
4203
|
g_param = parse_global_arg(parsed_globals)
|
|
3976
4204
|
|
|
3977
4205
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3981,7 +4209,10 @@ def doDescribeMigrationCheckJob(args, parsed_globals):
|
|
|
3981
4209
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3982
4210
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3983
4211
|
)
|
|
3984
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4212
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4214
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4215
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3985
4216
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3986
4217
|
else:
|
|
3987
4218
|
cred = credential.Credential(
|
|
@@ -3993,18 +4224,18 @@ def doDescribeMigrationCheckJob(args, parsed_globals):
|
|
|
3993
4224
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3994
4225
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3995
4226
|
)
|
|
3996
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4227
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3997
4228
|
if g_param[OptionsDefine.Language]:
|
|
3998
4229
|
profile.language = g_param[OptionsDefine.Language]
|
|
3999
4230
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4000
4231
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4001
4232
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4002
4233
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4003
|
-
model = models.
|
|
4234
|
+
model = models.DescribeConsumerGroupsRequest()
|
|
4004
4235
|
model.from_json_string(json.dumps(args))
|
|
4005
4236
|
start_time = time.time()
|
|
4006
4237
|
while True:
|
|
4007
|
-
rsp = client.
|
|
4238
|
+
rsp = client.DescribeConsumerGroups(model)
|
|
4008
4239
|
result = rsp.to_json_string()
|
|
4009
4240
|
try:
|
|
4010
4241
|
json_obj = json.loads(result)
|
|
@@ -4023,7 +4254,7 @@ def doDescribeMigrationCheckJob(args, parsed_globals):
|
|
|
4023
4254
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4024
4255
|
|
|
4025
4256
|
|
|
4026
|
-
def
|
|
4257
|
+
def doDeleteMigrateJob(args, parsed_globals):
|
|
4027
4258
|
g_param = parse_global_arg(parsed_globals)
|
|
4028
4259
|
|
|
4029
4260
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4033,7 +4264,10 @@ def doStartMigrateJob(args, parsed_globals):
|
|
|
4033
4264
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4034
4265
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4035
4266
|
)
|
|
4036
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4267
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4269
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4270
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4037
4271
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4038
4272
|
else:
|
|
4039
4273
|
cred = credential.Credential(
|
|
@@ -4045,18 +4279,18 @@ def doStartMigrateJob(args, parsed_globals):
|
|
|
4045
4279
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4046
4280
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4047
4281
|
)
|
|
4048
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4282
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4049
4283
|
if g_param[OptionsDefine.Language]:
|
|
4050
4284
|
profile.language = g_param[OptionsDefine.Language]
|
|
4051
4285
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4052
4286
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4053
4287
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4054
4288
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4055
|
-
model = models.
|
|
4289
|
+
model = models.DeleteMigrateJobRequest()
|
|
4056
4290
|
model.from_json_string(json.dumps(args))
|
|
4057
4291
|
start_time = time.time()
|
|
4058
4292
|
while True:
|
|
4059
|
-
rsp = client.
|
|
4293
|
+
rsp = client.DeleteMigrateJob(model)
|
|
4060
4294
|
result = rsp.to_json_string()
|
|
4061
4295
|
try:
|
|
4062
4296
|
json_obj = json.loads(result)
|
|
@@ -4075,7 +4309,7 @@ def doStartMigrateJob(args, parsed_globals):
|
|
|
4075
4309
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4076
4310
|
|
|
4077
4311
|
|
|
4078
|
-
def
|
|
4312
|
+
def doResizeSyncJob(args, parsed_globals):
|
|
4079
4313
|
g_param = parse_global_arg(parsed_globals)
|
|
4080
4314
|
|
|
4081
4315
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4085,7 +4319,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
4085
4319
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4086
4320
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4087
4321
|
)
|
|
4088
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4322
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4324
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4325
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4089
4326
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4090
4327
|
else:
|
|
4091
4328
|
cred = credential.Credential(
|
|
@@ -4097,18 +4334,18 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
4097
4334
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4098
4335
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4099
4336
|
)
|
|
4100
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4337
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4101
4338
|
if g_param[OptionsDefine.Language]:
|
|
4102
4339
|
profile.language = g_param[OptionsDefine.Language]
|
|
4103
4340
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4104
4341
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4105
4342
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4106
4343
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4107
|
-
model = models.
|
|
4344
|
+
model = models.ResizeSyncJobRequest()
|
|
4108
4345
|
model.from_json_string(json.dumps(args))
|
|
4109
4346
|
start_time = time.time()
|
|
4110
4347
|
while True:
|
|
4111
|
-
rsp = client.
|
|
4348
|
+
rsp = client.ResizeSyncJob(model)
|
|
4112
4349
|
result = rsp.to_json_string()
|
|
4113
4350
|
try:
|
|
4114
4351
|
json_obj = json.loads(result)
|
|
@@ -4127,7 +4364,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
4127
4364
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4128
4365
|
|
|
4129
4366
|
|
|
4130
|
-
def
|
|
4367
|
+
def doStartCompare(args, parsed_globals):
|
|
4131
4368
|
g_param = parse_global_arg(parsed_globals)
|
|
4132
4369
|
|
|
4133
4370
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4137,7 +4374,10 @@ def doDestroySyncJob(args, parsed_globals):
|
|
|
4137
4374
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4138
4375
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4139
4376
|
)
|
|
4140
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4377
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4379
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4380
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4141
4381
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4142
4382
|
else:
|
|
4143
4383
|
cred = credential.Credential(
|
|
@@ -4149,18 +4389,18 @@ def doDestroySyncJob(args, parsed_globals):
|
|
|
4149
4389
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4150
4390
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4151
4391
|
)
|
|
4152
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4392
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4153
4393
|
if g_param[OptionsDefine.Language]:
|
|
4154
4394
|
profile.language = g_param[OptionsDefine.Language]
|
|
4155
4395
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4156
4396
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4157
4397
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4158
4398
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4159
|
-
model = models.
|
|
4399
|
+
model = models.StartCompareRequest()
|
|
4160
4400
|
model.from_json_string(json.dumps(args))
|
|
4161
4401
|
start_time = time.time()
|
|
4162
4402
|
while True:
|
|
4163
|
-
rsp = client.
|
|
4403
|
+
rsp = client.StartCompare(model)
|
|
4164
4404
|
result = rsp.to_json_string()
|
|
4165
4405
|
try:
|
|
4166
4406
|
json_obj = json.loads(result)
|
|
@@ -4179,7 +4419,7 @@ def doDestroySyncJob(args, parsed_globals):
|
|
|
4179
4419
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4180
4420
|
|
|
4181
4421
|
|
|
4182
|
-
def
|
|
4422
|
+
def doStopMigrateJob(args, parsed_globals):
|
|
4183
4423
|
g_param = parse_global_arg(parsed_globals)
|
|
4184
4424
|
|
|
4185
4425
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4189,7 +4429,10 @@ def doModifyCompareTaskName(args, parsed_globals):
|
|
|
4189
4429
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4190
4430
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4191
4431
|
)
|
|
4192
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4432
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4434
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4435
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4193
4436
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4194
4437
|
else:
|
|
4195
4438
|
cred = credential.Credential(
|
|
@@ -4201,18 +4444,18 @@ def doModifyCompareTaskName(args, parsed_globals):
|
|
|
4201
4444
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4202
4445
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4203
4446
|
)
|
|
4204
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4447
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4205
4448
|
if g_param[OptionsDefine.Language]:
|
|
4206
4449
|
profile.language = g_param[OptionsDefine.Language]
|
|
4207
4450
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4208
4451
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4209
4452
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4210
4453
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4211
|
-
model = models.
|
|
4454
|
+
model = models.StopMigrateJobRequest()
|
|
4212
4455
|
model.from_json_string(json.dumps(args))
|
|
4213
4456
|
start_time = time.time()
|
|
4214
4457
|
while True:
|
|
4215
|
-
rsp = client.
|
|
4458
|
+
rsp = client.StopMigrateJob(model)
|
|
4216
4459
|
result = rsp.to_json_string()
|
|
4217
4460
|
try:
|
|
4218
4461
|
json_obj = json.loads(result)
|
|
@@ -4231,7 +4474,7 @@ def doModifyCompareTaskName(args, parsed_globals):
|
|
|
4231
4474
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4232
4475
|
|
|
4233
4476
|
|
|
4234
|
-
def
|
|
4477
|
+
def doPauseSyncJob(args, parsed_globals):
|
|
4235
4478
|
g_param = parse_global_arg(parsed_globals)
|
|
4236
4479
|
|
|
4237
4480
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4241,7 +4484,10 @@ def doCompleteMigrateJob(args, parsed_globals):
|
|
|
4241
4484
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4242
4485
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4243
4486
|
)
|
|
4244
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4487
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4489
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4490
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4245
4491
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4246
4492
|
else:
|
|
4247
4493
|
cred = credential.Credential(
|
|
@@ -4253,18 +4499,18 @@ def doCompleteMigrateJob(args, parsed_globals):
|
|
|
4253
4499
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4254
4500
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4255
4501
|
)
|
|
4256
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4502
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4257
4503
|
if g_param[OptionsDefine.Language]:
|
|
4258
4504
|
profile.language = g_param[OptionsDefine.Language]
|
|
4259
4505
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4260
4506
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4261
4507
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4262
4508
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4263
|
-
model = models.
|
|
4509
|
+
model = models.PauseSyncJobRequest()
|
|
4264
4510
|
model.from_json_string(json.dumps(args))
|
|
4265
4511
|
start_time = time.time()
|
|
4266
4512
|
while True:
|
|
4267
|
-
rsp = client.
|
|
4513
|
+
rsp = client.PauseSyncJob(model)
|
|
4268
4514
|
result = rsp.to_json_string()
|
|
4269
4515
|
try:
|
|
4270
4516
|
json_obj = json.loads(result)
|
|
@@ -4283,7 +4529,7 @@ def doCompleteMigrateJob(args, parsed_globals):
|
|
|
4283
4529
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4284
4530
|
|
|
4285
4531
|
|
|
4286
|
-
def
|
|
4532
|
+
def doModifySyncRateLimit(args, parsed_globals):
|
|
4287
4533
|
g_param = parse_global_arg(parsed_globals)
|
|
4288
4534
|
|
|
4289
4535
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4293,7 +4539,10 @@ def doModifyMigrateName(args, parsed_globals):
|
|
|
4293
4539
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4294
4540
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4295
4541
|
)
|
|
4296
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4542
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4544
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4545
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4297
4546
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4298
4547
|
else:
|
|
4299
4548
|
cred = credential.Credential(
|
|
@@ -4305,18 +4554,18 @@ def doModifyMigrateName(args, parsed_globals):
|
|
|
4305
4554
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4306
4555
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4307
4556
|
)
|
|
4308
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4557
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4309
4558
|
if g_param[OptionsDefine.Language]:
|
|
4310
4559
|
profile.language = g_param[OptionsDefine.Language]
|
|
4311
4560
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4312
4561
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4313
4562
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4314
4563
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4315
|
-
model = models.
|
|
4564
|
+
model = models.ModifySyncRateLimitRequest()
|
|
4316
4565
|
model.from_json_string(json.dumps(args))
|
|
4317
4566
|
start_time = time.time()
|
|
4318
4567
|
while True:
|
|
4319
|
-
rsp = client.
|
|
4568
|
+
rsp = client.ModifySyncRateLimit(model)
|
|
4320
4569
|
result = rsp.to_json_string()
|
|
4321
4570
|
try:
|
|
4322
4571
|
json_obj = json.loads(result)
|
|
@@ -4335,7 +4584,7 @@ def doModifyMigrateName(args, parsed_globals):
|
|
|
4335
4584
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4336
4585
|
|
|
4337
4586
|
|
|
4338
|
-
def
|
|
4587
|
+
def doDescribeSubscribes(args, parsed_globals):
|
|
4339
4588
|
g_param = parse_global_arg(parsed_globals)
|
|
4340
4589
|
|
|
4341
4590
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4345,7 +4594,10 @@ def doModifyCompareTask(args, parsed_globals):
|
|
|
4345
4594
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4346
4595
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4347
4596
|
)
|
|
4348
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4597
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4599
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4600
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4349
4601
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4350
4602
|
else:
|
|
4351
4603
|
cred = credential.Credential(
|
|
@@ -4357,18 +4609,18 @@ def doModifyCompareTask(args, parsed_globals):
|
|
|
4357
4609
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4358
4610
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4359
4611
|
)
|
|
4360
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4612
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4361
4613
|
if g_param[OptionsDefine.Language]:
|
|
4362
4614
|
profile.language = g_param[OptionsDefine.Language]
|
|
4363
4615
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4364
4616
|
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4365
4617
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4366
4618
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4367
|
-
model = models.
|
|
4619
|
+
model = models.DescribeSubscribesRequest()
|
|
4368
4620
|
model.from_json_string(json.dumps(args))
|
|
4369
4621
|
start_time = time.time()
|
|
4370
4622
|
while True:
|
|
4371
|
-
rsp = client.
|
|
4623
|
+
rsp = client.DescribeSubscribes(model)
|
|
4372
4624
|
result = rsp.to_json_string()
|
|
4373
4625
|
try:
|
|
4374
4626
|
json_obj = json.loads(result)
|
|
@@ -4387,103 +4639,551 @@ def doModifyCompareTask(args, parsed_globals):
|
|
|
4387
4639
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4388
4640
|
|
|
4389
4641
|
|
|
4390
|
-
|
|
4391
|
-
|
|
4392
|
-
"v20180330": dts_client_v20180330,
|
|
4393
|
-
|
|
4394
|
-
}
|
|
4395
|
-
|
|
4396
|
-
MODELS_MAP = {
|
|
4397
|
-
"v20211206": models_v20211206,
|
|
4398
|
-
"v20180330": models_v20180330,
|
|
4399
|
-
|
|
4400
|
-
}
|
|
4642
|
+
def doSkipCheckItem(args, parsed_globals):
|
|
4643
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4401
4644
|
|
|
4402
|
-
|
|
4403
|
-
|
|
4404
|
-
|
|
4405
|
-
|
|
4406
|
-
|
|
4407
|
-
|
|
4408
|
-
|
|
4409
|
-
|
|
4410
|
-
|
|
4411
|
-
|
|
4412
|
-
|
|
4413
|
-
|
|
4414
|
-
|
|
4415
|
-
|
|
4416
|
-
|
|
4417
|
-
|
|
4418
|
-
|
|
4419
|
-
|
|
4420
|
-
|
|
4421
|
-
|
|
4422
|
-
|
|
4423
|
-
|
|
4424
|
-
"
|
|
4425
|
-
|
|
4426
|
-
|
|
4427
|
-
|
|
4428
|
-
|
|
4429
|
-
"
|
|
4430
|
-
|
|
4431
|
-
|
|
4432
|
-
|
|
4433
|
-
|
|
4434
|
-
|
|
4435
|
-
|
|
4436
|
-
|
|
4437
|
-
|
|
4438
|
-
|
|
4439
|
-
|
|
4440
|
-
|
|
4441
|
-
|
|
4442
|
-
|
|
4443
|
-
|
|
4645
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4646
|
+
cred = credential.CVMRoleCredential()
|
|
4647
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4648
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4649
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4650
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4651
|
+
)
|
|
4652
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4654
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4655
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4656
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4657
|
+
else:
|
|
4658
|
+
cred = credential.Credential(
|
|
4659
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4660
|
+
)
|
|
4661
|
+
http_profile = HttpProfile(
|
|
4662
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4663
|
+
reqMethod="POST",
|
|
4664
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4665
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4666
|
+
)
|
|
4667
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4668
|
+
if g_param[OptionsDefine.Language]:
|
|
4669
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4670
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4671
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4672
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4673
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4674
|
+
model = models.SkipCheckItemRequest()
|
|
4675
|
+
model.from_json_string(json.dumps(args))
|
|
4676
|
+
start_time = time.time()
|
|
4677
|
+
while True:
|
|
4678
|
+
rsp = client.SkipCheckItem(model)
|
|
4679
|
+
result = rsp.to_json_string()
|
|
4680
|
+
try:
|
|
4681
|
+
json_obj = json.loads(result)
|
|
4682
|
+
except TypeError as e:
|
|
4683
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4684
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4685
|
+
break
|
|
4686
|
+
cur_time = time.time()
|
|
4687
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4688
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4689
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4690
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4691
|
+
else:
|
|
4692
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4693
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4694
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4695
|
+
|
|
4696
|
+
|
|
4697
|
+
def doCreateSubscribeCheckJob(args, parsed_globals):
|
|
4698
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4699
|
+
|
|
4700
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4701
|
+
cred = credential.CVMRoleCredential()
|
|
4702
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4703
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4704
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4705
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4706
|
+
)
|
|
4707
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4709
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4710
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4711
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4712
|
+
else:
|
|
4713
|
+
cred = credential.Credential(
|
|
4714
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4715
|
+
)
|
|
4716
|
+
http_profile = HttpProfile(
|
|
4717
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4718
|
+
reqMethod="POST",
|
|
4719
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4720
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4721
|
+
)
|
|
4722
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4723
|
+
if g_param[OptionsDefine.Language]:
|
|
4724
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4725
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4726
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4727
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4728
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4729
|
+
model = models.CreateSubscribeCheckJobRequest()
|
|
4730
|
+
model.from_json_string(json.dumps(args))
|
|
4731
|
+
start_time = time.time()
|
|
4732
|
+
while True:
|
|
4733
|
+
rsp = client.CreateSubscribeCheckJob(model)
|
|
4734
|
+
result = rsp.to_json_string()
|
|
4735
|
+
try:
|
|
4736
|
+
json_obj = json.loads(result)
|
|
4737
|
+
except TypeError as e:
|
|
4738
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4739
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4740
|
+
break
|
|
4741
|
+
cur_time = time.time()
|
|
4742
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4743
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4744
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4745
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4746
|
+
else:
|
|
4747
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4748
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4749
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4750
|
+
|
|
4751
|
+
|
|
4752
|
+
def doRecoverMigrateJob(args, parsed_globals):
|
|
4753
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4754
|
+
|
|
4755
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4756
|
+
cred = credential.CVMRoleCredential()
|
|
4757
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4758
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4759
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4760
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4761
|
+
)
|
|
4762
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4764
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4765
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4766
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4767
|
+
else:
|
|
4768
|
+
cred = credential.Credential(
|
|
4769
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4770
|
+
)
|
|
4771
|
+
http_profile = HttpProfile(
|
|
4772
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4773
|
+
reqMethod="POST",
|
|
4774
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4775
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4776
|
+
)
|
|
4777
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4778
|
+
if g_param[OptionsDefine.Language]:
|
|
4779
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4780
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4781
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4782
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4783
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4784
|
+
model = models.RecoverMigrateJobRequest()
|
|
4785
|
+
model.from_json_string(json.dumps(args))
|
|
4786
|
+
start_time = time.time()
|
|
4787
|
+
while True:
|
|
4788
|
+
rsp = client.RecoverMigrateJob(model)
|
|
4789
|
+
result = rsp.to_json_string()
|
|
4790
|
+
try:
|
|
4791
|
+
json_obj = json.loads(result)
|
|
4792
|
+
except TypeError as e:
|
|
4793
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4794
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4795
|
+
break
|
|
4796
|
+
cur_time = time.time()
|
|
4797
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4798
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4799
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4800
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4801
|
+
else:
|
|
4802
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4803
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4804
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4805
|
+
|
|
4806
|
+
|
|
4807
|
+
def doCreateSubscribe(args, parsed_globals):
|
|
4808
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4809
|
+
|
|
4810
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4811
|
+
cred = credential.CVMRoleCredential()
|
|
4812
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4813
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4814
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4815
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4816
|
+
)
|
|
4817
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4819
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4820
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4821
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4822
|
+
else:
|
|
4823
|
+
cred = credential.Credential(
|
|
4824
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4825
|
+
)
|
|
4826
|
+
http_profile = HttpProfile(
|
|
4827
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4828
|
+
reqMethod="POST",
|
|
4829
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4830
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4831
|
+
)
|
|
4832
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4833
|
+
if g_param[OptionsDefine.Language]:
|
|
4834
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4835
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4836
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4837
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4838
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4839
|
+
model = models.CreateSubscribeRequest()
|
|
4840
|
+
model.from_json_string(json.dumps(args))
|
|
4841
|
+
start_time = time.time()
|
|
4842
|
+
while True:
|
|
4843
|
+
rsp = client.CreateSubscribe(model)
|
|
4844
|
+
result = rsp.to_json_string()
|
|
4845
|
+
try:
|
|
4846
|
+
json_obj = json.loads(result)
|
|
4847
|
+
except TypeError as e:
|
|
4848
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4849
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4850
|
+
break
|
|
4851
|
+
cur_time = time.time()
|
|
4852
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4853
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4854
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4855
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4856
|
+
else:
|
|
4857
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4858
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4859
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4860
|
+
|
|
4861
|
+
|
|
4862
|
+
def doCreateCompareTask(args, parsed_globals):
|
|
4863
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4864
|
+
|
|
4865
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4866
|
+
cred = credential.CVMRoleCredential()
|
|
4867
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4868
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4869
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4870
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4871
|
+
)
|
|
4872
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4874
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4875
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4876
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4877
|
+
else:
|
|
4878
|
+
cred = credential.Credential(
|
|
4879
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4880
|
+
)
|
|
4881
|
+
http_profile = HttpProfile(
|
|
4882
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4883
|
+
reqMethod="POST",
|
|
4884
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4885
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4886
|
+
)
|
|
4887
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4888
|
+
if g_param[OptionsDefine.Language]:
|
|
4889
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4890
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4891
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4892
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4893
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4894
|
+
model = models.CreateCompareTaskRequest()
|
|
4895
|
+
model.from_json_string(json.dumps(args))
|
|
4896
|
+
start_time = time.time()
|
|
4897
|
+
while True:
|
|
4898
|
+
rsp = client.CreateCompareTask(model)
|
|
4899
|
+
result = rsp.to_json_string()
|
|
4900
|
+
try:
|
|
4901
|
+
json_obj = json.loads(result)
|
|
4902
|
+
except TypeError as e:
|
|
4903
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4904
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4905
|
+
break
|
|
4906
|
+
cur_time = time.time()
|
|
4907
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4908
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4909
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4910
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4911
|
+
else:
|
|
4912
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4913
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4914
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4915
|
+
|
|
4916
|
+
|
|
4917
|
+
def doIsolateSubscribe(args, parsed_globals):
|
|
4918
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4919
|
+
|
|
4920
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4921
|
+
cred = credential.CVMRoleCredential()
|
|
4922
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4923
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4924
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4925
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4926
|
+
)
|
|
4927
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4929
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4930
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4931
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4932
|
+
else:
|
|
4933
|
+
cred = credential.Credential(
|
|
4934
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4935
|
+
)
|
|
4936
|
+
http_profile = HttpProfile(
|
|
4937
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4938
|
+
reqMethod="POST",
|
|
4939
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4940
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4941
|
+
)
|
|
4942
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4943
|
+
if g_param[OptionsDefine.Language]:
|
|
4944
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4945
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4946
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4947
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4948
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4949
|
+
model = models.IsolateSubscribeRequest()
|
|
4950
|
+
model.from_json_string(json.dumps(args))
|
|
4951
|
+
start_time = time.time()
|
|
4952
|
+
while True:
|
|
4953
|
+
rsp = client.IsolateSubscribe(model)
|
|
4954
|
+
result = rsp.to_json_string()
|
|
4955
|
+
try:
|
|
4956
|
+
json_obj = json.loads(result)
|
|
4957
|
+
except TypeError as e:
|
|
4958
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4959
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4960
|
+
break
|
|
4961
|
+
cur_time = time.time()
|
|
4962
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4963
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4964
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4965
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4966
|
+
else:
|
|
4967
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4968
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4969
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4970
|
+
|
|
4971
|
+
|
|
4972
|
+
def doDescribeMigrationCheckJob(args, parsed_globals):
|
|
4973
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4974
|
+
|
|
4975
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4976
|
+
cred = credential.CVMRoleCredential()
|
|
4977
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4978
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4979
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4980
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4981
|
+
)
|
|
4982
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4984
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4985
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4986
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4987
|
+
else:
|
|
4988
|
+
cred = credential.Credential(
|
|
4989
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4990
|
+
)
|
|
4991
|
+
http_profile = HttpProfile(
|
|
4992
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4993
|
+
reqMethod="POST",
|
|
4994
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4995
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4996
|
+
)
|
|
4997
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4998
|
+
if g_param[OptionsDefine.Language]:
|
|
4999
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5000
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5001
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5002
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5003
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5004
|
+
model = models.DescribeMigrationCheckJobRequest()
|
|
5005
|
+
model.from_json_string(json.dumps(args))
|
|
5006
|
+
start_time = time.time()
|
|
5007
|
+
while True:
|
|
5008
|
+
rsp = client.DescribeMigrationCheckJob(model)
|
|
5009
|
+
result = rsp.to_json_string()
|
|
5010
|
+
try:
|
|
5011
|
+
json_obj = json.loads(result)
|
|
5012
|
+
except TypeError as e:
|
|
5013
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5014
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5015
|
+
break
|
|
5016
|
+
cur_time = time.time()
|
|
5017
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5018
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5019
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5020
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5021
|
+
else:
|
|
5022
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5023
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5024
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5025
|
+
|
|
5026
|
+
|
|
5027
|
+
def doModifyMigrateName(args, parsed_globals):
|
|
5028
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5029
|
+
|
|
5030
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5031
|
+
cred = credential.CVMRoleCredential()
|
|
5032
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5033
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5034
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5035
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5036
|
+
)
|
|
5037
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5039
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5040
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5041
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5042
|
+
else:
|
|
5043
|
+
cred = credential.Credential(
|
|
5044
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5045
|
+
)
|
|
5046
|
+
http_profile = HttpProfile(
|
|
5047
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5048
|
+
reqMethod="POST",
|
|
5049
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5050
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5051
|
+
)
|
|
5052
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5053
|
+
if g_param[OptionsDefine.Language]:
|
|
5054
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5055
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5056
|
+
client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5057
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5058
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5059
|
+
model = models.ModifyMigrateNameRequest()
|
|
5060
|
+
model.from_json_string(json.dumps(args))
|
|
5061
|
+
start_time = time.time()
|
|
5062
|
+
while True:
|
|
5063
|
+
rsp = client.ModifyMigrateName(model)
|
|
5064
|
+
result = rsp.to_json_string()
|
|
5065
|
+
try:
|
|
5066
|
+
json_obj = json.loads(result)
|
|
5067
|
+
except TypeError as e:
|
|
5068
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5069
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5070
|
+
break
|
|
5071
|
+
cur_time = time.time()
|
|
5072
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5073
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5074
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5075
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5076
|
+
else:
|
|
5077
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5078
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5079
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5080
|
+
|
|
5081
|
+
|
|
5082
|
+
CLIENT_MAP = {
|
|
5083
|
+
"v20211206": dts_client_v20211206,
|
|
5084
|
+
"v20180330": dts_client_v20180330,
|
|
5085
|
+
|
|
5086
|
+
}
|
|
5087
|
+
|
|
5088
|
+
MODELS_MAP = {
|
|
5089
|
+
"v20211206": models_v20211206,
|
|
5090
|
+
"v20180330": models_v20180330,
|
|
5091
|
+
|
|
5092
|
+
}
|
|
5093
|
+
|
|
5094
|
+
ACTION_MAP = {
|
|
5095
|
+
"ModifyMigrationJob": doModifyMigrationJob,
|
|
5096
|
+
"DescribeSyncJobs": doDescribeSyncJobs,
|
|
5097
|
+
"ModifyMigrateRateLimit": doModifyMigrateRateLimit,
|
|
5098
|
+
"DescribeSubscribeReturnable": doDescribeSubscribeReturnable,
|
|
5099
|
+
"ModifyCompareTask": doModifyCompareTask,
|
|
5100
|
+
"CreateConsumerGroup": doCreateConsumerGroup,
|
|
5101
|
+
"ModifySubscribeObjects": doModifySubscribeObjects,
|
|
5102
|
+
"DeleteConsumerGroup": doDeleteConsumerGroup,
|
|
5103
|
+
"ModifySubscribeAutoRenewFlag": doModifySubscribeAutoRenewFlag,
|
|
5104
|
+
"ResumeMigrateJob": doResumeMigrateJob,
|
|
5105
|
+
"DescribeMigrateJobs": doDescribeMigrateJobs,
|
|
5106
|
+
"ModifySyncCompareTaskName": doModifySyncCompareTaskName,
|
|
4444
5107
|
"DescribeSubscribeCheckJob": doDescribeSubscribeCheckJob,
|
|
4445
5108
|
"ContinueSyncJob": doContinueSyncJob,
|
|
4446
5109
|
"StopSyncJob": doStopSyncJob,
|
|
4447
|
-
"ModifyConsumerGroupDescription": doModifyConsumerGroupDescription,
|
|
4448
5110
|
"DescribeMigrateDBInstances": doDescribeMigrateDBInstances,
|
|
4449
|
-
"SkipCheckItem": doSkipCheckItem,
|
|
4450
|
-
"DescribeSubscribeConf": doDescribeSubscribeConf,
|
|
4451
|
-
"ModifyConsumerGroupPassword": doModifyConsumerGroupPassword,
|
|
4452
5111
|
"CreateMigrateJob": doCreateMigrateJob,
|
|
4453
|
-
"ModifySubscribeVipVport": doModifySubscribeVipVport,
|
|
4454
|
-
"CreateSubscribeCheckJob": doCreateSubscribeCheckJob,
|
|
4455
5112
|
"CreateMigrateCheckJob": doCreateMigrateCheckJob,
|
|
4456
|
-
"IsolateMigrateJob": doIsolateMigrateJob,
|
|
4457
|
-
"DescribeCheckSyncJobResult": doDescribeCheckSyncJobResult,
|
|
4458
5113
|
"DescribeCompareTasks": doDescribeCompareTasks,
|
|
4459
5114
|
"SkipSyncCheckItem": doSkipSyncCheckItem,
|
|
4460
|
-
"DescribeSubscribeDetail": doDescribeSubscribeDetail,
|
|
4461
|
-
"DeleteConsumerGroup": doDeleteConsumerGroup,
|
|
4462
5115
|
"DescribeMigrationJobs": doDescribeMigrationJobs,
|
|
4463
|
-
"RecoverMigrateJob": doRecoverMigrateJob,
|
|
4464
|
-
"DescribeMigrateJobs": doDescribeMigrateJobs,
|
|
4465
|
-
"CreateSubscribe": doCreateSubscribe,
|
|
4466
5116
|
"RecoverSyncJob": doRecoverSyncJob,
|
|
4467
5117
|
"ResetSubscribe": doResetSubscribe,
|
|
4468
|
-
"ActivateSubscribe": doActivateSubscribe,
|
|
4469
|
-
"ModifyMigrateJobSpec": doModifyMigrateJobSpec,
|
|
4470
|
-
"DescribeModifyCheckSyncJobResult": doDescribeModifyCheckSyncJobResult,
|
|
4471
|
-
"ModifySubscribeName": doModifySubscribeName,
|
|
4472
5118
|
"ModifyMigrateJob": doModifyMigrateJob,
|
|
4473
|
-
"
|
|
5119
|
+
"ModifyMigrateJobSpec": doModifyMigrateJobSpec,
|
|
4474
5120
|
"OfflineIsolatedSubscribe": doOfflineIsolatedSubscribe,
|
|
4475
5121
|
"DescribeMigrationDetail": doDescribeMigrationDetail,
|
|
4476
|
-
"DescribeOffsetByTime": doDescribeOffsetByTime,
|
|
4477
|
-
"ModifySyncRateLimit": doModifySyncRateLimit,
|
|
4478
5122
|
"ResumeSyncJob": doResumeSyncJob,
|
|
4479
|
-
"
|
|
5123
|
+
"PauseMigrateJob": doPauseMigrateJob,
|
|
4480
5124
|
"StartMigrateJob": doStartMigrateJob,
|
|
4481
|
-
"DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
|
|
4482
5125
|
"DestroySyncJob": doDestroySyncJob,
|
|
4483
|
-
"
|
|
5126
|
+
"StopSyncCompare": doStopSyncCompare,
|
|
5127
|
+
"ResetSyncJob": doResetSyncJob,
|
|
5128
|
+
"DestroyIsolatedSubscribe": doDestroyIsolatedSubscribe,
|
|
5129
|
+
"CreateModifyCheckSyncJob": doCreateModifyCheckSyncJob,
|
|
5130
|
+
"ModifyMigrateRuntimeAttribute": doModifyMigrateRuntimeAttribute,
|
|
5131
|
+
"CreateMigrationService": doCreateMigrationService,
|
|
5132
|
+
"DescribeSubscribeJobs": doDescribeSubscribeJobs,
|
|
5133
|
+
"StopCompare": doStopCompare,
|
|
5134
|
+
"ResetConsumerGroupOffset": doResetConsumerGroupOffset,
|
|
5135
|
+
"ContinueMigrateJob": doContinueMigrateJob,
|
|
5136
|
+
"StartSyncCompare": doStartSyncCompare,
|
|
5137
|
+
"DeleteSyncCompareTask": doDeleteSyncCompareTask,
|
|
5138
|
+
"ModifySubscribeVipVport": doModifySubscribeVipVport,
|
|
5139
|
+
"StartSubscribe": doStartSubscribe,
|
|
5140
|
+
"DescribeSubscribeDetail": doDescribeSubscribeDetail,
|
|
5141
|
+
"ModifySyncCompareTask": doModifySyncCompareTask,
|
|
5142
|
+
"DescribeSubscribeConf": doDescribeSubscribeConf,
|
|
5143
|
+
"DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
|
|
5144
|
+
"CreateSyncCompareTask": doCreateSyncCompareTask,
|
|
4484
5145
|
"CompleteMigrateJob": doCompleteMigrateJob,
|
|
5146
|
+
"IsolateSyncJob": doIsolateSyncJob,
|
|
5147
|
+
"ConfigureSubscribeJob": doConfigureSubscribeJob,
|
|
5148
|
+
"DeleteCompareTask": doDeleteCompareTask,
|
|
5149
|
+
"StartSyncJob": doStartSyncJob,
|
|
5150
|
+
"DescribeSyncCompareTasks": doDescribeSyncCompareTasks,
|
|
5151
|
+
"CreateCheckSyncJob": doCreateCheckSyncJob,
|
|
5152
|
+
"DescribeCompareReport": doDescribeCompareReport,
|
|
5153
|
+
"DescribeMigrateCheckJob": doDescribeMigrateCheckJob,
|
|
5154
|
+
"ConfigureSyncJob": doConfigureSyncJob,
|
|
5155
|
+
"ModifySyncJobConfig": doModifySyncJobConfig,
|
|
5156
|
+
"DescribeSyncCompareReport": doDescribeSyncCompareReport,
|
|
5157
|
+
"ModifyConsumerGroupDescription": doModifyConsumerGroupDescription,
|
|
5158
|
+
"ModifyConsumerGroupPassword": doModifyConsumerGroupPassword,
|
|
5159
|
+
"ModifySubscribeConsumeTime": doModifySubscribeConsumeTime,
|
|
5160
|
+
"DescribeCheckSyncJobResult": doDescribeCheckSyncJobResult,
|
|
5161
|
+
"DestroyMigrateJob": doDestroyMigrateJob,
|
|
5162
|
+
"DescribeModifyCheckSyncJobResult": doDescribeModifyCheckSyncJobResult,
|
|
5163
|
+
"ModifySubscribeName": doModifySubscribeName,
|
|
5164
|
+
"DescribeOffsetByTime": doDescribeOffsetByTime,
|
|
5165
|
+
"IsolateMigrateJob": doIsolateMigrateJob,
|
|
5166
|
+
"ModifyCompareTaskName": doModifyCompareTaskName,
|
|
5167
|
+
"ResumeSubscribe": doResumeSubscribe,
|
|
5168
|
+
"StartModifySyncJob": doStartModifySyncJob,
|
|
5169
|
+
"ActivateSubscribe": doActivateSubscribe,
|
|
5170
|
+
"CreateSyncJob": doCreateSyncJob,
|
|
5171
|
+
"DescribeConsumerGroups": doDescribeConsumerGroups,
|
|
5172
|
+
"DeleteMigrateJob": doDeleteMigrateJob,
|
|
5173
|
+
"ResizeSyncJob": doResizeSyncJob,
|
|
5174
|
+
"StartCompare": doStartCompare,
|
|
5175
|
+
"StopMigrateJob": doStopMigrateJob,
|
|
5176
|
+
"PauseSyncJob": doPauseSyncJob,
|
|
5177
|
+
"ModifySyncRateLimit": doModifySyncRateLimit,
|
|
5178
|
+
"DescribeSubscribes": doDescribeSubscribes,
|
|
5179
|
+
"SkipCheckItem": doSkipCheckItem,
|
|
5180
|
+
"CreateSubscribeCheckJob": doCreateSubscribeCheckJob,
|
|
5181
|
+
"RecoverMigrateJob": doRecoverMigrateJob,
|
|
5182
|
+
"CreateSubscribe": doCreateSubscribe,
|
|
5183
|
+
"CreateCompareTask": doCreateCompareTask,
|
|
5184
|
+
"IsolateSubscribe": doIsolateSubscribe,
|
|
5185
|
+
"DescribeMigrationCheckJob": doDescribeMigrationCheckJob,
|
|
4485
5186
|
"ModifyMigrateName": doModifyMigrateName,
|
|
4486
|
-
"ModifyCompareTask": doModifyCompareTask,
|
|
4487
5187
|
|
|
4488
5188
|
}
|
|
4489
5189
|
|