tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -19,7 +19,7 @@ from tencentcloud.dts.v20180330 import models as models_v20180330
19
19
  from jmespath import search
20
20
  import time
21
21
 
22
- def doResumeSubscribe(args, parsed_globals):
22
+ def doModifyMigrationJob(args, parsed_globals):
23
23
  g_param = parse_global_arg(parsed_globals)
24
24
 
25
25
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -29,7 +29,10 @@ def doResumeSubscribe(args, parsed_globals):
29
29
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
30
30
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
31
31
  )
32
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
32
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
34
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
35
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
33
36
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
34
37
  else:
35
38
  cred = credential.Credential(
@@ -41,18 +44,18 @@ def doResumeSubscribe(args, parsed_globals):
41
44
  endpoint=g_param[OptionsDefine.Endpoint],
42
45
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
43
46
  )
44
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
47
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
45
48
  if g_param[OptionsDefine.Language]:
46
49
  profile.language = g_param[OptionsDefine.Language]
47
50
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
48
51
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
49
52
  client._sdkVersion += ("_CLI_" + __version__)
50
53
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
51
- model = models.ResumeSubscribeRequest()
54
+ model = models.ModifyMigrationJobRequest()
52
55
  model.from_json_string(json.dumps(args))
53
56
  start_time = time.time()
54
57
  while True:
55
- rsp = client.ResumeSubscribe(model)
58
+ rsp = client.ModifyMigrationJob(model)
56
59
  result = rsp.to_json_string()
57
60
  try:
58
61
  json_obj = json.loads(result)
@@ -71,7 +74,7 @@ def doResumeSubscribe(args, parsed_globals):
71
74
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
72
75
 
73
76
 
74
- def doDestroyIsolatedSubscribe(args, parsed_globals):
77
+ def doDescribeSyncJobs(args, parsed_globals):
75
78
  g_param = parse_global_arg(parsed_globals)
76
79
 
77
80
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -81,7 +84,10 @@ def doDestroyIsolatedSubscribe(args, parsed_globals):
81
84
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
82
85
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
83
86
  )
84
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
87
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
89
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
90
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
91
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
86
92
  else:
87
93
  cred = credential.Credential(
@@ -93,18 +99,18 @@ def doDestroyIsolatedSubscribe(args, parsed_globals):
93
99
  endpoint=g_param[OptionsDefine.Endpoint],
94
100
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
95
101
  )
96
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
102
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
97
103
  if g_param[OptionsDefine.Language]:
98
104
  profile.language = g_param[OptionsDefine.Language]
99
105
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
100
106
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
101
107
  client._sdkVersion += ("_CLI_" + __version__)
102
108
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
103
- model = models.DestroyIsolatedSubscribeRequest()
109
+ model = models.DescribeSyncJobsRequest()
104
110
  model.from_json_string(json.dumps(args))
105
111
  start_time = time.time()
106
112
  while True:
107
- rsp = client.DestroyIsolatedSubscribe(model)
113
+ rsp = client.DescribeSyncJobs(model)
108
114
  result = rsp.to_json_string()
109
115
  try:
110
116
  json_obj = json.loads(result)
@@ -123,7 +129,7 @@ def doDestroyIsolatedSubscribe(args, parsed_globals):
123
129
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
124
130
 
125
131
 
126
- def doModifySubscribeConsumeTime(args, parsed_globals):
132
+ def doModifyMigrateRateLimit(args, parsed_globals):
127
133
  g_param = parse_global_arg(parsed_globals)
128
134
 
129
135
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -133,7 +139,10 @@ def doModifySubscribeConsumeTime(args, parsed_globals):
133
139
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
134
140
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
135
141
  )
136
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
142
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
144
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
145
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
137
146
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
138
147
  else:
139
148
  cred = credential.Credential(
@@ -145,18 +154,18 @@ def doModifySubscribeConsumeTime(args, parsed_globals):
145
154
  endpoint=g_param[OptionsDefine.Endpoint],
146
155
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
147
156
  )
148
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
157
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
149
158
  if g_param[OptionsDefine.Language]:
150
159
  profile.language = g_param[OptionsDefine.Language]
151
160
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
152
161
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
153
162
  client._sdkVersion += ("_CLI_" + __version__)
154
163
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
155
- model = models.ModifySubscribeConsumeTimeRequest()
164
+ model = models.ModifyMigrateRateLimitRequest()
156
165
  model.from_json_string(json.dumps(args))
157
166
  start_time = time.time()
158
167
  while True:
159
- rsp = client.ModifySubscribeConsumeTime(model)
168
+ rsp = client.ModifyMigrateRateLimit(model)
160
169
  result = rsp.to_json_string()
161
170
  try:
162
171
  json_obj = json.loads(result)
@@ -175,7 +184,7 @@ def doModifySubscribeConsumeTime(args, parsed_globals):
175
184
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
176
185
 
177
186
 
178
- def doCreateModifyCheckSyncJob(args, parsed_globals):
187
+ def doDescribeSubscribeReturnable(args, parsed_globals):
179
188
  g_param = parse_global_arg(parsed_globals)
180
189
 
181
190
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -185,7 +194,10 @@ def doCreateModifyCheckSyncJob(args, parsed_globals):
185
194
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
186
195
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
187
196
  )
188
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
197
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
199
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
200
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
189
201
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
190
202
  else:
191
203
  cred = credential.Credential(
@@ -197,18 +209,18 @@ def doCreateModifyCheckSyncJob(args, parsed_globals):
197
209
  endpoint=g_param[OptionsDefine.Endpoint],
198
210
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
199
211
  )
200
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
212
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
201
213
  if g_param[OptionsDefine.Language]:
202
214
  profile.language = g_param[OptionsDefine.Language]
203
215
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
204
216
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
205
217
  client._sdkVersion += ("_CLI_" + __version__)
206
218
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
207
- model = models.CreateModifyCheckSyncJobRequest()
219
+ model = models.DescribeSubscribeReturnableRequest()
208
220
  model.from_json_string(json.dumps(args))
209
221
  start_time = time.time()
210
222
  while True:
211
- rsp = client.CreateModifyCheckSyncJob(model)
223
+ rsp = client.DescribeSubscribeReturnable(model)
212
224
  result = rsp.to_json_string()
213
225
  try:
214
226
  json_obj = json.loads(result)
@@ -227,7 +239,7 @@ def doCreateModifyCheckSyncJob(args, parsed_globals):
227
239
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
228
240
 
229
241
 
230
- def doModifyMigrationJob(args, parsed_globals):
242
+ def doModifyCompareTask(args, parsed_globals):
231
243
  g_param = parse_global_arg(parsed_globals)
232
244
 
233
245
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -237,7 +249,10 @@ def doModifyMigrationJob(args, parsed_globals):
237
249
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
238
250
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
239
251
  )
240
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
252
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
254
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
255
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
241
256
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
242
257
  else:
243
258
  cred = credential.Credential(
@@ -249,18 +264,18 @@ def doModifyMigrationJob(args, parsed_globals):
249
264
  endpoint=g_param[OptionsDefine.Endpoint],
250
265
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
251
266
  )
252
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
267
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
253
268
  if g_param[OptionsDefine.Language]:
254
269
  profile.language = g_param[OptionsDefine.Language]
255
270
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
256
271
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
257
272
  client._sdkVersion += ("_CLI_" + __version__)
258
273
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
259
- model = models.ModifyMigrationJobRequest()
274
+ model = models.ModifyCompareTaskRequest()
260
275
  model.from_json_string(json.dumps(args))
261
276
  start_time = time.time()
262
277
  while True:
263
- rsp = client.ModifyMigrationJob(model)
278
+ rsp = client.ModifyCompareTask(model)
264
279
  result = rsp.to_json_string()
265
280
  try:
266
281
  json_obj = json.loads(result)
@@ -279,7 +294,7 @@ def doModifyMigrationJob(args, parsed_globals):
279
294
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
280
295
 
281
296
 
282
- def doDescribeSyncJobs(args, parsed_globals):
297
+ def doCreateConsumerGroup(args, parsed_globals):
283
298
  g_param = parse_global_arg(parsed_globals)
284
299
 
285
300
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -289,7 +304,10 @@ def doDescribeSyncJobs(args, parsed_globals):
289
304
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
290
305
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
291
306
  )
292
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
307
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
309
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
310
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
293
311
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
294
312
  else:
295
313
  cred = credential.Credential(
@@ -301,18 +319,18 @@ def doDescribeSyncJobs(args, parsed_globals):
301
319
  endpoint=g_param[OptionsDefine.Endpoint],
302
320
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
303
321
  )
304
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
322
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
305
323
  if g_param[OptionsDefine.Language]:
306
324
  profile.language = g_param[OptionsDefine.Language]
307
325
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
308
326
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
309
327
  client._sdkVersion += ("_CLI_" + __version__)
310
328
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
311
- model = models.DescribeSyncJobsRequest()
329
+ model = models.CreateConsumerGroupRequest()
312
330
  model.from_json_string(json.dumps(args))
313
331
  start_time = time.time()
314
332
  while True:
315
- rsp = client.DescribeSyncJobs(model)
333
+ rsp = client.CreateConsumerGroup(model)
316
334
  result = rsp.to_json_string()
317
335
  try:
318
336
  json_obj = json.loads(result)
@@ -331,7 +349,7 @@ def doDescribeSyncJobs(args, parsed_globals):
331
349
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
332
350
 
333
351
 
334
- def doModifyMigrateRuntimeAttribute(args, parsed_globals):
352
+ def doModifySubscribeObjects(args, parsed_globals):
335
353
  g_param = parse_global_arg(parsed_globals)
336
354
 
337
355
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -341,7 +359,10 @@ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
341
359
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
342
360
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
343
361
  )
344
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
362
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
364
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
365
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
345
366
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
346
367
  else:
347
368
  cred = credential.Credential(
@@ -353,18 +374,18 @@ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
353
374
  endpoint=g_param[OptionsDefine.Endpoint],
354
375
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
355
376
  )
356
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
377
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
357
378
  if g_param[OptionsDefine.Language]:
358
379
  profile.language = g_param[OptionsDefine.Language]
359
380
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
360
381
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
361
382
  client._sdkVersion += ("_CLI_" + __version__)
362
383
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
363
- model = models.ModifyMigrateRuntimeAttributeRequest()
384
+ model = models.ModifySubscribeObjectsRequest()
364
385
  model.from_json_string(json.dumps(args))
365
386
  start_time = time.time()
366
387
  while True:
367
- rsp = client.ModifyMigrateRuntimeAttribute(model)
388
+ rsp = client.ModifySubscribeObjects(model)
368
389
  result = rsp.to_json_string()
369
390
  try:
370
391
  json_obj = json.loads(result)
@@ -383,7 +404,7 @@ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
383
404
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
384
405
 
385
406
 
386
- def doCreateMigrationService(args, parsed_globals):
407
+ def doDeleteConsumerGroup(args, parsed_globals):
387
408
  g_param = parse_global_arg(parsed_globals)
388
409
 
389
410
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -393,7 +414,10 @@ def doCreateMigrationService(args, parsed_globals):
393
414
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
394
415
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
395
416
  )
396
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
417
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
419
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
420
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
397
421
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
398
422
  else:
399
423
  cred = credential.Credential(
@@ -405,18 +429,18 @@ def doCreateMigrationService(args, parsed_globals):
405
429
  endpoint=g_param[OptionsDefine.Endpoint],
406
430
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
407
431
  )
408
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
432
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
409
433
  if g_param[OptionsDefine.Language]:
410
434
  profile.language = g_param[OptionsDefine.Language]
411
435
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
412
436
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
413
437
  client._sdkVersion += ("_CLI_" + __version__)
414
438
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
415
- model = models.CreateMigrationServiceRequest()
439
+ model = models.DeleteConsumerGroupRequest()
416
440
  model.from_json_string(json.dumps(args))
417
441
  start_time = time.time()
418
442
  while True:
419
- rsp = client.CreateMigrationService(model)
443
+ rsp = client.DeleteConsumerGroup(model)
420
444
  result = rsp.to_json_string()
421
445
  try:
422
446
  json_obj = json.loads(result)
@@ -435,7 +459,7 @@ def doCreateMigrationService(args, parsed_globals):
435
459
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
436
460
 
437
461
 
438
- def doDescribeSubscribeJobs(args, parsed_globals):
462
+ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
439
463
  g_param = parse_global_arg(parsed_globals)
440
464
 
441
465
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -445,7 +469,10 @@ def doDescribeSubscribeJobs(args, parsed_globals):
445
469
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
446
470
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
447
471
  )
448
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
472
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
474
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
475
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
449
476
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
450
477
  else:
451
478
  cred = credential.Credential(
@@ -457,18 +484,18 @@ def doDescribeSubscribeJobs(args, parsed_globals):
457
484
  endpoint=g_param[OptionsDefine.Endpoint],
458
485
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
459
486
  )
460
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
487
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
461
488
  if g_param[OptionsDefine.Language]:
462
489
  profile.language = g_param[OptionsDefine.Language]
463
490
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
464
491
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
465
492
  client._sdkVersion += ("_CLI_" + __version__)
466
493
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
467
- model = models.DescribeSubscribeJobsRequest()
494
+ model = models.ModifySubscribeAutoRenewFlagRequest()
468
495
  model.from_json_string(json.dumps(args))
469
496
  start_time = time.time()
470
497
  while True:
471
- rsp = client.DescribeSubscribeJobs(model)
498
+ rsp = client.ModifySubscribeAutoRenewFlag(model)
472
499
  result = rsp.to_json_string()
473
500
  try:
474
501
  json_obj = json.loads(result)
@@ -487,7 +514,7 @@ def doDescribeSubscribeJobs(args, parsed_globals):
487
514
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
488
515
 
489
516
 
490
- def doModifyMigrateRateLimit(args, parsed_globals):
517
+ def doResumeMigrateJob(args, parsed_globals):
491
518
  g_param = parse_global_arg(parsed_globals)
492
519
 
493
520
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -497,7 +524,10 @@ def doModifyMigrateRateLimit(args, parsed_globals):
497
524
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
498
525
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
499
526
  )
500
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
527
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
529
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
530
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
501
531
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
502
532
  else:
503
533
  cred = credential.Credential(
@@ -509,18 +539,18 @@ def doModifyMigrateRateLimit(args, parsed_globals):
509
539
  endpoint=g_param[OptionsDefine.Endpoint],
510
540
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
511
541
  )
512
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
542
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
513
543
  if g_param[OptionsDefine.Language]:
514
544
  profile.language = g_param[OptionsDefine.Language]
515
545
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
516
546
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
517
547
  client._sdkVersion += ("_CLI_" + __version__)
518
548
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
519
- model = models.ModifyMigrateRateLimitRequest()
549
+ model = models.ResumeMigrateJobRequest()
520
550
  model.from_json_string(json.dumps(args))
521
551
  start_time = time.time()
522
552
  while True:
523
- rsp = client.ModifyMigrateRateLimit(model)
553
+ rsp = client.ResumeMigrateJob(model)
524
554
  result = rsp.to_json_string()
525
555
  try:
526
556
  json_obj = json.loads(result)
@@ -539,7 +569,7 @@ def doModifyMigrateRateLimit(args, parsed_globals):
539
569
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
540
570
 
541
571
 
542
- def doDeleteMigrateJob(args, parsed_globals):
572
+ def doDescribeMigrateJobs(args, parsed_globals):
543
573
  g_param = parse_global_arg(parsed_globals)
544
574
 
545
575
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -549,7 +579,10 @@ def doDeleteMigrateJob(args, parsed_globals):
549
579
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
550
580
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
551
581
  )
552
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
582
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
584
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
585
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
553
586
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
554
587
  else:
555
588
  cred = credential.Credential(
@@ -561,18 +594,18 @@ def doDeleteMigrateJob(args, parsed_globals):
561
594
  endpoint=g_param[OptionsDefine.Endpoint],
562
595
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
563
596
  )
564
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
597
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
565
598
  if g_param[OptionsDefine.Language]:
566
599
  profile.language = g_param[OptionsDefine.Language]
567
600
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
568
601
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
569
602
  client._sdkVersion += ("_CLI_" + __version__)
570
603
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
571
- model = models.DeleteMigrateJobRequest()
604
+ model = models.DescribeMigrateJobsRequest()
572
605
  model.from_json_string(json.dumps(args))
573
606
  start_time = time.time()
574
607
  while True:
575
- rsp = client.DeleteMigrateJob(model)
608
+ rsp = client.DescribeMigrateJobs(model)
576
609
  result = rsp.to_json_string()
577
610
  try:
578
611
  json_obj = json.loads(result)
@@ -591,7 +624,7 @@ def doDeleteMigrateJob(args, parsed_globals):
591
624
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
592
625
 
593
626
 
594
- def doDescribeSubscribeReturnable(args, parsed_globals):
627
+ def doModifySyncCompareTaskName(args, parsed_globals):
595
628
  g_param = parse_global_arg(parsed_globals)
596
629
 
597
630
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -601,7 +634,10 @@ def doDescribeSubscribeReturnable(args, parsed_globals):
601
634
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
602
635
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
603
636
  )
604
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
637
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
639
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
640
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
605
641
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
606
642
  else:
607
643
  cred = credential.Credential(
@@ -613,18 +649,18 @@ def doDescribeSubscribeReturnable(args, parsed_globals):
613
649
  endpoint=g_param[OptionsDefine.Endpoint],
614
650
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
615
651
  )
616
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
652
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
617
653
  if g_param[OptionsDefine.Language]:
618
654
  profile.language = g_param[OptionsDefine.Language]
619
655
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
620
656
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
621
657
  client._sdkVersion += ("_CLI_" + __version__)
622
658
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
623
- model = models.DescribeSubscribeReturnableRequest()
659
+ model = models.ModifySyncCompareTaskNameRequest()
624
660
  model.from_json_string(json.dumps(args))
625
661
  start_time = time.time()
626
662
  while True:
627
- rsp = client.DescribeSubscribeReturnable(model)
663
+ rsp = client.ModifySyncCompareTaskName(model)
628
664
  result = rsp.to_json_string()
629
665
  try:
630
666
  json_obj = json.loads(result)
@@ -643,7 +679,7 @@ def doDescribeSubscribeReturnable(args, parsed_globals):
643
679
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
644
680
 
645
681
 
646
- def doIsolateSyncJob(args, parsed_globals):
682
+ def doDescribeSubscribeCheckJob(args, parsed_globals):
647
683
  g_param = parse_global_arg(parsed_globals)
648
684
 
649
685
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -653,7 +689,10 @@ def doIsolateSyncJob(args, parsed_globals):
653
689
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
654
690
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
655
691
  )
656
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
692
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
694
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
695
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
657
696
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
658
697
  else:
659
698
  cred = credential.Credential(
@@ -665,18 +704,18 @@ def doIsolateSyncJob(args, parsed_globals):
665
704
  endpoint=g_param[OptionsDefine.Endpoint],
666
705
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
667
706
  )
668
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
707
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
669
708
  if g_param[OptionsDefine.Language]:
670
709
  profile.language = g_param[OptionsDefine.Language]
671
710
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
672
711
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
673
712
  client._sdkVersion += ("_CLI_" + __version__)
674
713
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
675
- model = models.IsolateSyncJobRequest()
714
+ model = models.DescribeSubscribeCheckJobRequest()
676
715
  model.from_json_string(json.dumps(args))
677
716
  start_time = time.time()
678
717
  while True:
679
- rsp = client.IsolateSyncJob(model)
718
+ rsp = client.DescribeSubscribeCheckJob(model)
680
719
  result = rsp.to_json_string()
681
720
  try:
682
721
  json_obj = json.loads(result)
@@ -695,7 +734,7 @@ def doIsolateSyncJob(args, parsed_globals):
695
734
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
696
735
 
697
736
 
698
- def doStopCompare(args, parsed_globals):
737
+ def doContinueSyncJob(args, parsed_globals):
699
738
  g_param = parse_global_arg(parsed_globals)
700
739
 
701
740
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -705,7 +744,10 @@ def doStopCompare(args, parsed_globals):
705
744
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
706
745
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
707
746
  )
708
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
747
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
749
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
750
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
709
751
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
710
752
  else:
711
753
  cred = credential.Credential(
@@ -717,18 +759,18 @@ def doStopCompare(args, parsed_globals):
717
759
  endpoint=g_param[OptionsDefine.Endpoint],
718
760
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
719
761
  )
720
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
762
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
721
763
  if g_param[OptionsDefine.Language]:
722
764
  profile.language = g_param[OptionsDefine.Language]
723
765
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
724
766
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
725
767
  client._sdkVersion += ("_CLI_" + __version__)
726
768
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
727
- model = models.StopCompareRequest()
769
+ model = models.ContinueSyncJobRequest()
728
770
  model.from_json_string(json.dumps(args))
729
771
  start_time = time.time()
730
772
  while True:
731
- rsp = client.StopCompare(model)
773
+ rsp = client.ContinueSyncJob(model)
732
774
  result = rsp.to_json_string()
733
775
  try:
734
776
  json_obj = json.loads(result)
@@ -747,7 +789,7 @@ def doStopCompare(args, parsed_globals):
747
789
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
748
790
 
749
791
 
750
- def doCreateSyncJob(args, parsed_globals):
792
+ def doStopSyncJob(args, parsed_globals):
751
793
  g_param = parse_global_arg(parsed_globals)
752
794
 
753
795
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -757,7 +799,10 @@ def doCreateSyncJob(args, parsed_globals):
757
799
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
758
800
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
759
801
  )
760
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
802
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
804
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
805
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
761
806
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
762
807
  else:
763
808
  cred = credential.Credential(
@@ -769,18 +814,18 @@ def doCreateSyncJob(args, parsed_globals):
769
814
  endpoint=g_param[OptionsDefine.Endpoint],
770
815
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
771
816
  )
772
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
817
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
773
818
  if g_param[OptionsDefine.Language]:
774
819
  profile.language = g_param[OptionsDefine.Language]
775
820
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
776
821
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
777
822
  client._sdkVersion += ("_CLI_" + __version__)
778
823
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
779
- model = models.CreateSyncJobRequest()
824
+ model = models.StopSyncJobRequest()
780
825
  model.from_json_string(json.dumps(args))
781
826
  start_time = time.time()
782
827
  while True:
783
- rsp = client.CreateSyncJob(model)
828
+ rsp = client.StopSyncJob(model)
784
829
  result = rsp.to_json_string()
785
830
  try:
786
831
  json_obj = json.loads(result)
@@ -799,7 +844,7 @@ def doCreateSyncJob(args, parsed_globals):
799
844
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
800
845
 
801
846
 
802
- def doConfigureSubscribeJob(args, parsed_globals):
847
+ def doDescribeMigrateDBInstances(args, parsed_globals):
803
848
  g_param = parse_global_arg(parsed_globals)
804
849
 
805
850
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -809,7 +854,10 @@ def doConfigureSubscribeJob(args, parsed_globals):
809
854
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
810
855
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
811
856
  )
812
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
857
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
859
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
860
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
813
861
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
814
862
  else:
815
863
  cred = credential.Credential(
@@ -821,18 +869,18 @@ def doConfigureSubscribeJob(args, parsed_globals):
821
869
  endpoint=g_param[OptionsDefine.Endpoint],
822
870
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
823
871
  )
824
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
872
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
825
873
  if g_param[OptionsDefine.Language]:
826
874
  profile.language = g_param[OptionsDefine.Language]
827
875
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
828
876
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
829
877
  client._sdkVersion += ("_CLI_" + __version__)
830
878
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
831
- model = models.ConfigureSubscribeJobRequest()
879
+ model = models.DescribeMigrateDBInstancesRequest()
832
880
  model.from_json_string(json.dumps(args))
833
881
  start_time = time.time()
834
882
  while True:
835
- rsp = client.ConfigureSubscribeJob(model)
883
+ rsp = client.DescribeMigrateDBInstances(model)
836
884
  result = rsp.to_json_string()
837
885
  try:
838
886
  json_obj = json.loads(result)
@@ -851,7 +899,7 @@ def doConfigureSubscribeJob(args, parsed_globals):
851
899
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
852
900
 
853
901
 
854
- def doDescribeConsumerGroups(args, parsed_globals):
902
+ def doCreateMigrateJob(args, parsed_globals):
855
903
  g_param = parse_global_arg(parsed_globals)
856
904
 
857
905
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -861,7 +909,10 @@ def doDescribeConsumerGroups(args, parsed_globals):
861
909
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
862
910
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
863
911
  )
864
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
912
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
914
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
915
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
865
916
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
866
917
  else:
867
918
  cred = credential.Credential(
@@ -873,18 +924,18 @@ def doDescribeConsumerGroups(args, parsed_globals):
873
924
  endpoint=g_param[OptionsDefine.Endpoint],
874
925
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
875
926
  )
876
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
927
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
877
928
  if g_param[OptionsDefine.Language]:
878
929
  profile.language = g_param[OptionsDefine.Language]
879
930
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
880
931
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
881
932
  client._sdkVersion += ("_CLI_" + __version__)
882
933
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
883
- model = models.DescribeConsumerGroupsRequest()
934
+ model = models.CreateMigrateJobRequest()
884
935
  model.from_json_string(json.dumps(args))
885
936
  start_time = time.time()
886
937
  while True:
887
- rsp = client.DescribeConsumerGroups(model)
938
+ rsp = client.CreateMigrateJob(model)
888
939
  result = rsp.to_json_string()
889
940
  try:
890
941
  json_obj = json.loads(result)
@@ -903,7 +954,7 @@ def doDescribeConsumerGroups(args, parsed_globals):
903
954
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
904
955
 
905
956
 
906
- def doCreateConsumerGroup(args, parsed_globals):
957
+ def doCreateMigrateCheckJob(args, parsed_globals):
907
958
  g_param = parse_global_arg(parsed_globals)
908
959
 
909
960
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -913,7 +964,10 @@ def doCreateConsumerGroup(args, parsed_globals):
913
964
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
914
965
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
915
966
  )
916
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
969
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
970
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
917
971
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
918
972
  else:
919
973
  cred = credential.Credential(
@@ -925,18 +979,18 @@ def doCreateConsumerGroup(args, parsed_globals):
925
979
  endpoint=g_param[OptionsDefine.Endpoint],
926
980
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
927
981
  )
928
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
982
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
929
983
  if g_param[OptionsDefine.Language]:
930
984
  profile.language = g_param[OptionsDefine.Language]
931
985
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
932
986
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
933
987
  client._sdkVersion += ("_CLI_" + __version__)
934
988
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
935
- model = models.CreateConsumerGroupRequest()
989
+ model = models.CreateMigrateCheckJobRequest()
936
990
  model.from_json_string(json.dumps(args))
937
991
  start_time = time.time()
938
992
  while True:
939
- rsp = client.CreateConsumerGroup(model)
993
+ rsp = client.CreateMigrateCheckJob(model)
940
994
  result = rsp.to_json_string()
941
995
  try:
942
996
  json_obj = json.loads(result)
@@ -955,7 +1009,7 @@ def doCreateConsumerGroup(args, parsed_globals):
955
1009
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
956
1010
 
957
1011
 
958
- def doResetConsumerGroupOffset(args, parsed_globals):
1012
+ def doDescribeCompareTasks(args, parsed_globals):
959
1013
  g_param = parse_global_arg(parsed_globals)
960
1014
 
961
1015
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -965,7 +1019,10 @@ def doResetConsumerGroupOffset(args, parsed_globals):
965
1019
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
966
1020
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
967
1021
  )
968
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1022
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1024
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1025
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
969
1026
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
970
1027
  else:
971
1028
  cred = credential.Credential(
@@ -977,18 +1034,18 @@ def doResetConsumerGroupOffset(args, parsed_globals):
977
1034
  endpoint=g_param[OptionsDefine.Endpoint],
978
1035
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
979
1036
  )
980
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1037
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
981
1038
  if g_param[OptionsDefine.Language]:
982
1039
  profile.language = g_param[OptionsDefine.Language]
983
1040
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
984
1041
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
985
1042
  client._sdkVersion += ("_CLI_" + __version__)
986
1043
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
987
- model = models.ResetConsumerGroupOffsetRequest()
1044
+ model = models.DescribeCompareTasksRequest()
988
1045
  model.from_json_string(json.dumps(args))
989
1046
  start_time = time.time()
990
1047
  while True:
991
- rsp = client.ResetConsumerGroupOffset(model)
1048
+ rsp = client.DescribeCompareTasks(model)
992
1049
  result = rsp.to_json_string()
993
1050
  try:
994
1051
  json_obj = json.loads(result)
@@ -1007,7 +1064,7 @@ def doResetConsumerGroupOffset(args, parsed_globals):
1007
1064
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1008
1065
 
1009
1066
 
1010
- def doDeleteCompareTask(args, parsed_globals):
1067
+ def doSkipSyncCheckItem(args, parsed_globals):
1011
1068
  g_param = parse_global_arg(parsed_globals)
1012
1069
 
1013
1070
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1017,7 +1074,10 @@ def doDeleteCompareTask(args, parsed_globals):
1017
1074
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
1075
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
1076
  )
1020
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1077
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1079
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1080
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1021
1081
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1022
1082
  else:
1023
1083
  cred = credential.Credential(
@@ -1029,18 +1089,18 @@ def doDeleteCompareTask(args, parsed_globals):
1029
1089
  endpoint=g_param[OptionsDefine.Endpoint],
1030
1090
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1031
1091
  )
1032
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1092
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1033
1093
  if g_param[OptionsDefine.Language]:
1034
1094
  profile.language = g_param[OptionsDefine.Language]
1035
1095
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1036
1096
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1037
1097
  client._sdkVersion += ("_CLI_" + __version__)
1038
1098
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1039
- model = models.DeleteCompareTaskRequest()
1099
+ model = models.SkipSyncCheckItemRequest()
1040
1100
  model.from_json_string(json.dumps(args))
1041
1101
  start_time = time.time()
1042
1102
  while True:
1043
- rsp = client.DeleteCompareTask(model)
1103
+ rsp = client.SkipSyncCheckItem(model)
1044
1104
  result = rsp.to_json_string()
1045
1105
  try:
1046
1106
  json_obj = json.loads(result)
@@ -1059,7 +1119,7 @@ def doDeleteCompareTask(args, parsed_globals):
1059
1119
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1060
1120
 
1061
1121
 
1062
- def doStartSubscribe(args, parsed_globals):
1122
+ def doDescribeMigrationJobs(args, parsed_globals):
1063
1123
  g_param = parse_global_arg(parsed_globals)
1064
1124
 
1065
1125
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1069,7 +1129,10 @@ def doStartSubscribe(args, parsed_globals):
1069
1129
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1070
1130
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1071
1131
  )
1072
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1132
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1134
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1135
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1073
1136
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1074
1137
  else:
1075
1138
  cred = credential.Credential(
@@ -1081,18 +1144,18 @@ def doStartSubscribe(args, parsed_globals):
1081
1144
  endpoint=g_param[OptionsDefine.Endpoint],
1082
1145
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1083
1146
  )
1084
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1147
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1085
1148
  if g_param[OptionsDefine.Language]:
1086
1149
  profile.language = g_param[OptionsDefine.Language]
1087
1150
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1088
1151
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1089
1152
  client._sdkVersion += ("_CLI_" + __version__)
1090
1153
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1091
- model = models.StartSubscribeRequest()
1154
+ model = models.DescribeMigrationJobsRequest()
1092
1155
  model.from_json_string(json.dumps(args))
1093
1156
  start_time = time.time()
1094
1157
  while True:
1095
- rsp = client.StartSubscribe(model)
1158
+ rsp = client.DescribeMigrationJobs(model)
1096
1159
  result = rsp.to_json_string()
1097
1160
  try:
1098
1161
  json_obj = json.loads(result)
@@ -1111,7 +1174,7 @@ def doStartSubscribe(args, parsed_globals):
1111
1174
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1112
1175
 
1113
1176
 
1114
- def doStartSyncJob(args, parsed_globals):
1177
+ def doRecoverSyncJob(args, parsed_globals):
1115
1178
  g_param = parse_global_arg(parsed_globals)
1116
1179
 
1117
1180
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1121,7 +1184,10 @@ def doStartSyncJob(args, parsed_globals):
1121
1184
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1122
1185
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1123
1186
  )
1124
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1187
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1189
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1190
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1125
1191
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1126
1192
  else:
1127
1193
  cred = credential.Credential(
@@ -1133,18 +1199,18 @@ def doStartSyncJob(args, parsed_globals):
1133
1199
  endpoint=g_param[OptionsDefine.Endpoint],
1134
1200
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1135
1201
  )
1136
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1202
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1137
1203
  if g_param[OptionsDefine.Language]:
1138
1204
  profile.language = g_param[OptionsDefine.Language]
1139
1205
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1140
1206
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1141
1207
  client._sdkVersion += ("_CLI_" + __version__)
1142
1208
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1143
- model = models.StartSyncJobRequest()
1209
+ model = models.RecoverSyncJobRequest()
1144
1210
  model.from_json_string(json.dumps(args))
1145
1211
  start_time = time.time()
1146
1212
  while True:
1147
- rsp = client.StartSyncJob(model)
1213
+ rsp = client.RecoverSyncJob(model)
1148
1214
  result = rsp.to_json_string()
1149
1215
  try:
1150
1216
  json_obj = json.loads(result)
@@ -1163,7 +1229,7 @@ def doStartSyncJob(args, parsed_globals):
1163
1229
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1164
1230
 
1165
1231
 
1166
- def doCreateCheckSyncJob(args, parsed_globals):
1232
+ def doResetSubscribe(args, parsed_globals):
1167
1233
  g_param = parse_global_arg(parsed_globals)
1168
1234
 
1169
1235
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1173,7 +1239,10 @@ def doCreateCheckSyncJob(args, parsed_globals):
1173
1239
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1174
1240
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1175
1241
  )
1176
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1242
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1244
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1245
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1177
1246
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1178
1247
  else:
1179
1248
  cred = credential.Credential(
@@ -1185,18 +1254,18 @@ def doCreateCheckSyncJob(args, parsed_globals):
1185
1254
  endpoint=g_param[OptionsDefine.Endpoint],
1186
1255
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1187
1256
  )
1188
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1257
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1189
1258
  if g_param[OptionsDefine.Language]:
1190
1259
  profile.language = g_param[OptionsDefine.Language]
1191
1260
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1192
1261
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1193
1262
  client._sdkVersion += ("_CLI_" + __version__)
1194
1263
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1195
- model = models.CreateCheckSyncJobRequest()
1264
+ model = models.ResetSubscribeRequest()
1196
1265
  model.from_json_string(json.dumps(args))
1197
1266
  start_time = time.time()
1198
1267
  while True:
1199
- rsp = client.CreateCheckSyncJob(model)
1268
+ rsp = client.ResetSubscribe(model)
1200
1269
  result = rsp.to_json_string()
1201
1270
  try:
1202
1271
  json_obj = json.loads(result)
@@ -1215,7 +1284,7 @@ def doCreateCheckSyncJob(args, parsed_globals):
1215
1284
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1216
1285
 
1217
1286
 
1218
- def doDescribeCompareReport(args, parsed_globals):
1287
+ def doModifyMigrateJob(args, parsed_globals):
1219
1288
  g_param = parse_global_arg(parsed_globals)
1220
1289
 
1221
1290
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1225,7 +1294,10 @@ def doDescribeCompareReport(args, parsed_globals):
1225
1294
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1226
1295
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1227
1296
  )
1228
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1297
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1299
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1300
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1229
1301
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1230
1302
  else:
1231
1303
  cred = credential.Credential(
@@ -1237,18 +1309,18 @@ def doDescribeCompareReport(args, parsed_globals):
1237
1309
  endpoint=g_param[OptionsDefine.Endpoint],
1238
1310
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1239
1311
  )
1240
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1312
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1241
1313
  if g_param[OptionsDefine.Language]:
1242
1314
  profile.language = g_param[OptionsDefine.Language]
1243
1315
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1244
1316
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1245
1317
  client._sdkVersion += ("_CLI_" + __version__)
1246
1318
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1247
- model = models.DescribeCompareReportRequest()
1319
+ model = models.ModifyMigrateJobRequest()
1248
1320
  model.from_json_string(json.dumps(args))
1249
1321
  start_time = time.time()
1250
1322
  while True:
1251
- rsp = client.DescribeCompareReport(model)
1323
+ rsp = client.ModifyMigrateJob(model)
1252
1324
  result = rsp.to_json_string()
1253
1325
  try:
1254
1326
  json_obj = json.loads(result)
@@ -1267,7 +1339,7 @@ def doDescribeCompareReport(args, parsed_globals):
1267
1339
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1268
1340
 
1269
1341
 
1270
- def doContinueMigrateJob(args, parsed_globals):
1342
+ def doModifyMigrateJobSpec(args, parsed_globals):
1271
1343
  g_param = parse_global_arg(parsed_globals)
1272
1344
 
1273
1345
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1277,7 +1349,10 @@ def doContinueMigrateJob(args, parsed_globals):
1277
1349
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1278
1350
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1279
1351
  )
1280
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1352
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1354
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1355
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1281
1356
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1282
1357
  else:
1283
1358
  cred = credential.Credential(
@@ -1289,18 +1364,18 @@ def doContinueMigrateJob(args, parsed_globals):
1289
1364
  endpoint=g_param[OptionsDefine.Endpoint],
1290
1365
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1291
1366
  )
1292
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1367
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1293
1368
  if g_param[OptionsDefine.Language]:
1294
1369
  profile.language = g_param[OptionsDefine.Language]
1295
1370
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1296
1371
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1297
1372
  client._sdkVersion += ("_CLI_" + __version__)
1298
1373
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1299
- model = models.ContinueMigrateJobRequest()
1374
+ model = models.ModifyMigrateJobSpecRequest()
1300
1375
  model.from_json_string(json.dumps(args))
1301
1376
  start_time = time.time()
1302
1377
  while True:
1303
- rsp = client.ContinueMigrateJob(model)
1378
+ rsp = client.ModifyMigrateJobSpec(model)
1304
1379
  result = rsp.to_json_string()
1305
1380
  try:
1306
1381
  json_obj = json.loads(result)
@@ -1319,7 +1394,7 @@ def doContinueMigrateJob(args, parsed_globals):
1319
1394
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1320
1395
 
1321
1396
 
1322
- def doPauseMigrateJob(args, parsed_globals):
1397
+ def doOfflineIsolatedSubscribe(args, parsed_globals):
1323
1398
  g_param = parse_global_arg(parsed_globals)
1324
1399
 
1325
1400
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1329,7 +1404,10 @@ def doPauseMigrateJob(args, parsed_globals):
1329
1404
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1330
1405
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1331
1406
  )
1332
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1407
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1409
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1410
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1333
1411
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1334
1412
  else:
1335
1413
  cred = credential.Credential(
@@ -1341,18 +1419,18 @@ def doPauseMigrateJob(args, parsed_globals):
1341
1419
  endpoint=g_param[OptionsDefine.Endpoint],
1342
1420
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1343
1421
  )
1344
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1422
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1345
1423
  if g_param[OptionsDefine.Language]:
1346
1424
  profile.language = g_param[OptionsDefine.Language]
1347
1425
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1348
1426
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1349
1427
  client._sdkVersion += ("_CLI_" + __version__)
1350
1428
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1351
- model = models.PauseMigrateJobRequest()
1429
+ model = models.OfflineIsolatedSubscribeRequest()
1352
1430
  model.from_json_string(json.dumps(args))
1353
1431
  start_time = time.time()
1354
1432
  while True:
1355
- rsp = client.PauseMigrateJob(model)
1433
+ rsp = client.OfflineIsolatedSubscribe(model)
1356
1434
  result = rsp.to_json_string()
1357
1435
  try:
1358
1436
  json_obj = json.loads(result)
@@ -1371,7 +1449,7 @@ def doPauseMigrateJob(args, parsed_globals):
1371
1449
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1372
1450
 
1373
1451
 
1374
- def doDescribeMigrateCheckJob(args, parsed_globals):
1452
+ def doDescribeMigrationDetail(args, parsed_globals):
1375
1453
  g_param = parse_global_arg(parsed_globals)
1376
1454
 
1377
1455
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1381,7 +1459,10 @@ def doDescribeMigrateCheckJob(args, parsed_globals):
1381
1459
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1382
1460
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1383
1461
  )
1384
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1462
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1464
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1465
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1385
1466
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1386
1467
  else:
1387
1468
  cred = credential.Credential(
@@ -1393,18 +1474,18 @@ def doDescribeMigrateCheckJob(args, parsed_globals):
1393
1474
  endpoint=g_param[OptionsDefine.Endpoint],
1394
1475
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1395
1476
  )
1396
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1477
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1397
1478
  if g_param[OptionsDefine.Language]:
1398
1479
  profile.language = g_param[OptionsDefine.Language]
1399
1480
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1400
1481
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1401
1482
  client._sdkVersion += ("_CLI_" + __version__)
1402
1483
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1403
- model = models.DescribeMigrateCheckJobRequest()
1484
+ model = models.DescribeMigrationDetailRequest()
1404
1485
  model.from_json_string(json.dumps(args))
1405
1486
  start_time = time.time()
1406
1487
  while True:
1407
- rsp = client.DescribeMigrateCheckJob(model)
1488
+ rsp = client.DescribeMigrationDetail(model)
1408
1489
  result = rsp.to_json_string()
1409
1490
  try:
1410
1491
  json_obj = json.loads(result)
@@ -1423,7 +1504,7 @@ def doDescribeMigrateCheckJob(args, parsed_globals):
1423
1504
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1424
1505
 
1425
1506
 
1426
- def doModifySubscribeObjects(args, parsed_globals):
1507
+ def doResumeSyncJob(args, parsed_globals):
1427
1508
  g_param = parse_global_arg(parsed_globals)
1428
1509
 
1429
1510
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1433,7 +1514,10 @@ def doModifySubscribeObjects(args, parsed_globals):
1433
1514
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1434
1515
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1435
1516
  )
1436
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1517
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1519
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1520
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1437
1521
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1438
1522
  else:
1439
1523
  cred = credential.Credential(
@@ -1445,18 +1529,18 @@ def doModifySubscribeObjects(args, parsed_globals):
1445
1529
  endpoint=g_param[OptionsDefine.Endpoint],
1446
1530
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1447
1531
  )
1448
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1532
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1449
1533
  if g_param[OptionsDefine.Language]:
1450
1534
  profile.language = g_param[OptionsDefine.Language]
1451
1535
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1452
1536
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1453
1537
  client._sdkVersion += ("_CLI_" + __version__)
1454
1538
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1455
- model = models.ModifySubscribeObjectsRequest()
1539
+ model = models.ResumeSyncJobRequest()
1456
1540
  model.from_json_string(json.dumps(args))
1457
1541
  start_time = time.time()
1458
1542
  while True:
1459
- rsp = client.ModifySubscribeObjects(model)
1543
+ rsp = client.ResumeSyncJob(model)
1460
1544
  result = rsp.to_json_string()
1461
1545
  try:
1462
1546
  json_obj = json.loads(result)
@@ -1475,7 +1559,7 @@ def doModifySubscribeObjects(args, parsed_globals):
1475
1559
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1476
1560
 
1477
1561
 
1478
- def doConfigureSyncJob(args, parsed_globals):
1562
+ def doPauseMigrateJob(args, parsed_globals):
1479
1563
  g_param = parse_global_arg(parsed_globals)
1480
1564
 
1481
1565
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1485,7 +1569,10 @@ def doConfigureSyncJob(args, parsed_globals):
1485
1569
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1486
1570
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1487
1571
  )
1488
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1572
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1574
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1575
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1489
1576
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1490
1577
  else:
1491
1578
  cred = credential.Credential(
@@ -1497,18 +1584,18 @@ def doConfigureSyncJob(args, parsed_globals):
1497
1584
  endpoint=g_param[OptionsDefine.Endpoint],
1498
1585
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1499
1586
  )
1500
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1587
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1501
1588
  if g_param[OptionsDefine.Language]:
1502
1589
  profile.language = g_param[OptionsDefine.Language]
1503
1590
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1504
1591
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1505
1592
  client._sdkVersion += ("_CLI_" + __version__)
1506
1593
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1507
- model = models.ConfigureSyncJobRequest()
1594
+ model = models.PauseMigrateJobRequest()
1508
1595
  model.from_json_string(json.dumps(args))
1509
1596
  start_time = time.time()
1510
1597
  while True:
1511
- rsp = client.ConfigureSyncJob(model)
1598
+ rsp = client.PauseMigrateJob(model)
1512
1599
  result = rsp.to_json_string()
1513
1600
  try:
1514
1601
  json_obj = json.loads(result)
@@ -1527,7 +1614,7 @@ def doConfigureSyncJob(args, parsed_globals):
1527
1614
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1528
1615
 
1529
1616
 
1530
- def doIsolateSubscribe(args, parsed_globals):
1617
+ def doStartMigrateJob(args, parsed_globals):
1531
1618
  g_param = parse_global_arg(parsed_globals)
1532
1619
 
1533
1620
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1537,7 +1624,10 @@ def doIsolateSubscribe(args, parsed_globals):
1537
1624
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1538
1625
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1539
1626
  )
1540
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1627
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1629
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1630
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1541
1631
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1542
1632
  else:
1543
1633
  cred = credential.Credential(
@@ -1549,18 +1639,18 @@ def doIsolateSubscribe(args, parsed_globals):
1549
1639
  endpoint=g_param[OptionsDefine.Endpoint],
1550
1640
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1551
1641
  )
1552
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1642
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1553
1643
  if g_param[OptionsDefine.Language]:
1554
1644
  profile.language = g_param[OptionsDefine.Language]
1555
1645
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1556
1646
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1557
1647
  client._sdkVersion += ("_CLI_" + __version__)
1558
1648
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1559
- model = models.IsolateSubscribeRequest()
1649
+ model = models.StartMigrateJobRequest()
1560
1650
  model.from_json_string(json.dumps(args))
1561
1651
  start_time = time.time()
1562
1652
  while True:
1563
- rsp = client.IsolateSubscribe(model)
1653
+ rsp = client.StartMigrateJob(model)
1564
1654
  result = rsp.to_json_string()
1565
1655
  try:
1566
1656
  json_obj = json.loads(result)
@@ -1579,7 +1669,7 @@ def doIsolateSubscribe(args, parsed_globals):
1579
1669
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1580
1670
 
1581
1671
 
1582
- def doDestroyMigrateJob(args, parsed_globals):
1672
+ def doDestroySyncJob(args, parsed_globals):
1583
1673
  g_param = parse_global_arg(parsed_globals)
1584
1674
 
1585
1675
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1589,7 +1679,10 @@ def doDestroyMigrateJob(args, parsed_globals):
1589
1679
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1590
1680
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1591
1681
  )
1592
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1682
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1684
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1685
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1593
1686
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1594
1687
  else:
1595
1688
  cred = credential.Credential(
@@ -1601,18 +1694,18 @@ def doDestroyMigrateJob(args, parsed_globals):
1601
1694
  endpoint=g_param[OptionsDefine.Endpoint],
1602
1695
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1603
1696
  )
1604
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1697
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1605
1698
  if g_param[OptionsDefine.Language]:
1606
1699
  profile.language = g_param[OptionsDefine.Language]
1607
1700
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1608
1701
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1609
1702
  client._sdkVersion += ("_CLI_" + __version__)
1610
1703
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1611
- model = models.DestroyMigrateJobRequest()
1704
+ model = models.DestroySyncJobRequest()
1612
1705
  model.from_json_string(json.dumps(args))
1613
1706
  start_time = time.time()
1614
1707
  while True:
1615
- rsp = client.DestroyMigrateJob(model)
1708
+ rsp = client.DestroySyncJob(model)
1616
1709
  result = rsp.to_json_string()
1617
1710
  try:
1618
1711
  json_obj = json.loads(result)
@@ -1631,7 +1724,7 @@ def doDestroyMigrateJob(args, parsed_globals):
1631
1724
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1632
1725
 
1633
1726
 
1634
- def doResetSyncJob(args, parsed_globals):
1727
+ def doStopSyncCompare(args, parsed_globals):
1635
1728
  g_param = parse_global_arg(parsed_globals)
1636
1729
 
1637
1730
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1641,7 +1734,10 @@ def doResetSyncJob(args, parsed_globals):
1641
1734
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1642
1735
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1643
1736
  )
1644
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1737
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1739
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1740
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1645
1741
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1646
1742
  else:
1647
1743
  cred = credential.Credential(
@@ -1653,18 +1749,18 @@ def doResetSyncJob(args, parsed_globals):
1653
1749
  endpoint=g_param[OptionsDefine.Endpoint],
1654
1750
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1655
1751
  )
1656
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1752
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1657
1753
  if g_param[OptionsDefine.Language]:
1658
1754
  profile.language = g_param[OptionsDefine.Language]
1659
1755
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1660
1756
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1661
1757
  client._sdkVersion += ("_CLI_" + __version__)
1662
1758
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1663
- model = models.ResetSyncJobRequest()
1759
+ model = models.StopSyncCompareRequest()
1664
1760
  model.from_json_string(json.dumps(args))
1665
1761
  start_time = time.time()
1666
1762
  while True:
1667
- rsp = client.ResetSyncJob(model)
1763
+ rsp = client.StopSyncCompare(model)
1668
1764
  result = rsp.to_json_string()
1669
1765
  try:
1670
1766
  json_obj = json.loads(result)
@@ -1683,7 +1779,7 @@ def doResetSyncJob(args, parsed_globals):
1683
1779
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1684
1780
 
1685
1781
 
1686
- def doResizeSyncJob(args, parsed_globals):
1782
+ def doResetSyncJob(args, parsed_globals):
1687
1783
  g_param = parse_global_arg(parsed_globals)
1688
1784
 
1689
1785
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1693,7 +1789,10 @@ def doResizeSyncJob(args, parsed_globals):
1693
1789
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1694
1790
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1695
1791
  )
1696
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1792
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1794
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1795
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1697
1796
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1698
1797
  else:
1699
1798
  cred = credential.Credential(
@@ -1705,18 +1804,18 @@ def doResizeSyncJob(args, parsed_globals):
1705
1804
  endpoint=g_param[OptionsDefine.Endpoint],
1706
1805
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1707
1806
  )
1708
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1807
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1709
1808
  if g_param[OptionsDefine.Language]:
1710
1809
  profile.language = g_param[OptionsDefine.Language]
1711
1810
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1712
1811
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1713
1812
  client._sdkVersion += ("_CLI_" + __version__)
1714
1813
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1715
- model = models.ResizeSyncJobRequest()
1814
+ model = models.ResetSyncJobRequest()
1716
1815
  model.from_json_string(json.dumps(args))
1717
1816
  start_time = time.time()
1718
1817
  while True:
1719
- rsp = client.ResizeSyncJob(model)
1818
+ rsp = client.ResetSyncJob(model)
1720
1819
  result = rsp.to_json_string()
1721
1820
  try:
1722
1821
  json_obj = json.loads(result)
@@ -1735,7 +1834,7 @@ def doResizeSyncJob(args, parsed_globals):
1735
1834
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1736
1835
 
1737
1836
 
1738
- def doModifySubscribeAutoRenewFlag(args, parsed_globals):
1837
+ def doDestroyIsolatedSubscribe(args, parsed_globals):
1739
1838
  g_param = parse_global_arg(parsed_globals)
1740
1839
 
1741
1840
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1745,7 +1844,10 @@ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
1745
1844
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1746
1845
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1747
1846
  )
1748
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1847
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1849
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1850
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1749
1851
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1750
1852
  else:
1751
1853
  cred = credential.Credential(
@@ -1757,18 +1859,18 @@ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
1757
1859
  endpoint=g_param[OptionsDefine.Endpoint],
1758
1860
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1759
1861
  )
1760
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1862
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1761
1863
  if g_param[OptionsDefine.Language]:
1762
1864
  profile.language = g_param[OptionsDefine.Language]
1763
1865
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1764
1866
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1765
1867
  client._sdkVersion += ("_CLI_" + __version__)
1766
1868
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1767
- model = models.ModifySubscribeAutoRenewFlagRequest()
1869
+ model = models.DestroyIsolatedSubscribeRequest()
1768
1870
  model.from_json_string(json.dumps(args))
1769
1871
  start_time = time.time()
1770
1872
  while True:
1771
- rsp = client.ModifySubscribeAutoRenewFlag(model)
1873
+ rsp = client.DestroyIsolatedSubscribe(model)
1772
1874
  result = rsp.to_json_string()
1773
1875
  try:
1774
1876
  json_obj = json.loads(result)
@@ -1787,7 +1889,7 @@ def doModifySubscribeAutoRenewFlag(args, parsed_globals):
1787
1889
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1788
1890
 
1789
1891
 
1790
- def doModifySyncJobConfig(args, parsed_globals):
1892
+ def doCreateModifyCheckSyncJob(args, parsed_globals):
1791
1893
  g_param = parse_global_arg(parsed_globals)
1792
1894
 
1793
1895
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1797,7 +1899,10 @@ def doModifySyncJobConfig(args, parsed_globals):
1797
1899
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1798
1900
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1799
1901
  )
1800
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1902
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1904
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1905
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1801
1906
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1802
1907
  else:
1803
1908
  cred = credential.Credential(
@@ -1809,18 +1914,18 @@ def doModifySyncJobConfig(args, parsed_globals):
1809
1914
  endpoint=g_param[OptionsDefine.Endpoint],
1810
1915
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1811
1916
  )
1812
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1917
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1813
1918
  if g_param[OptionsDefine.Language]:
1814
1919
  profile.language = g_param[OptionsDefine.Language]
1815
1920
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1816
1921
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1817
1922
  client._sdkVersion += ("_CLI_" + __version__)
1818
1923
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1819
- model = models.ModifySyncJobConfigRequest()
1924
+ model = models.CreateModifyCheckSyncJobRequest()
1820
1925
  model.from_json_string(json.dumps(args))
1821
1926
  start_time = time.time()
1822
1927
  while True:
1823
- rsp = client.ModifySyncJobConfig(model)
1928
+ rsp = client.CreateModifyCheckSyncJob(model)
1824
1929
  result = rsp.to_json_string()
1825
1930
  try:
1826
1931
  json_obj = json.loads(result)
@@ -1839,7 +1944,7 @@ def doModifySyncJobConfig(args, parsed_globals):
1839
1944
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1840
1945
 
1841
1946
 
1842
- def doResumeMigrateJob(args, parsed_globals):
1947
+ def doModifyMigrateRuntimeAttribute(args, parsed_globals):
1843
1948
  g_param = parse_global_arg(parsed_globals)
1844
1949
 
1845
1950
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1849,7 +1954,10 @@ def doResumeMigrateJob(args, parsed_globals):
1849
1954
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1850
1955
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1851
1956
  )
1852
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1957
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1959
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1960
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1853
1961
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1854
1962
  else:
1855
1963
  cred = credential.Credential(
@@ -1861,18 +1969,18 @@ def doResumeMigrateJob(args, parsed_globals):
1861
1969
  endpoint=g_param[OptionsDefine.Endpoint],
1862
1970
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1863
1971
  )
1864
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1972
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1865
1973
  if g_param[OptionsDefine.Language]:
1866
1974
  profile.language = g_param[OptionsDefine.Language]
1867
1975
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1868
1976
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1869
1977
  client._sdkVersion += ("_CLI_" + __version__)
1870
1978
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1871
- model = models.ResumeMigrateJobRequest()
1979
+ model = models.ModifyMigrateRuntimeAttributeRequest()
1872
1980
  model.from_json_string(json.dumps(args))
1873
1981
  start_time = time.time()
1874
1982
  while True:
1875
- rsp = client.ResumeMigrateJob(model)
1983
+ rsp = client.ModifyMigrateRuntimeAttribute(model)
1876
1984
  result = rsp.to_json_string()
1877
1985
  try:
1878
1986
  json_obj = json.loads(result)
@@ -1891,7 +1999,7 @@ def doResumeMigrateJob(args, parsed_globals):
1891
1999
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1892
2000
 
1893
2001
 
1894
- def doStopMigrateJob(args, parsed_globals):
2002
+ def doCreateMigrationService(args, parsed_globals):
1895
2003
  g_param = parse_global_arg(parsed_globals)
1896
2004
 
1897
2005
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1901,7 +2009,10 @@ def doStopMigrateJob(args, parsed_globals):
1901
2009
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1902
2010
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1903
2011
  )
1904
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2012
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2014
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2015
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1905
2016
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1906
2017
  else:
1907
2018
  cred = credential.Credential(
@@ -1913,18 +2024,18 @@ def doStopMigrateJob(args, parsed_globals):
1913
2024
  endpoint=g_param[OptionsDefine.Endpoint],
1914
2025
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1915
2026
  )
1916
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2027
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1917
2028
  if g_param[OptionsDefine.Language]:
1918
2029
  profile.language = g_param[OptionsDefine.Language]
1919
2030
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1920
2031
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1921
2032
  client._sdkVersion += ("_CLI_" + __version__)
1922
2033
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1923
- model = models.StopMigrateJobRequest()
2034
+ model = models.CreateMigrationServiceRequest()
1924
2035
  model.from_json_string(json.dumps(args))
1925
2036
  start_time = time.time()
1926
2037
  while True:
1927
- rsp = client.StopMigrateJob(model)
2038
+ rsp = client.CreateMigrationService(model)
1928
2039
  result = rsp.to_json_string()
1929
2040
  try:
1930
2041
  json_obj = json.loads(result)
@@ -1943,7 +2054,7 @@ def doStopMigrateJob(args, parsed_globals):
1943
2054
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1944
2055
 
1945
2056
 
1946
- def doPauseSyncJob(args, parsed_globals):
2057
+ def doDescribeSubscribeJobs(args, parsed_globals):
1947
2058
  g_param = parse_global_arg(parsed_globals)
1948
2059
 
1949
2060
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1953,7 +2064,10 @@ def doPauseSyncJob(args, parsed_globals):
1953
2064
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1954
2065
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1955
2066
  )
1956
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2067
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2069
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2070
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1957
2071
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1958
2072
  else:
1959
2073
  cred = credential.Credential(
@@ -1965,18 +2079,18 @@ def doPauseSyncJob(args, parsed_globals):
1965
2079
  endpoint=g_param[OptionsDefine.Endpoint],
1966
2080
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1967
2081
  )
1968
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1969
2083
  if g_param[OptionsDefine.Language]:
1970
2084
  profile.language = g_param[OptionsDefine.Language]
1971
2085
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1972
2086
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
1973
2087
  client._sdkVersion += ("_CLI_" + __version__)
1974
2088
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1975
- model = models.PauseSyncJobRequest()
2089
+ model = models.DescribeSubscribeJobsRequest()
1976
2090
  model.from_json_string(json.dumps(args))
1977
2091
  start_time = time.time()
1978
2092
  while True:
1979
- rsp = client.PauseSyncJob(model)
2093
+ rsp = client.DescribeSubscribeJobs(model)
1980
2094
  result = rsp.to_json_string()
1981
2095
  try:
1982
2096
  json_obj = json.loads(result)
@@ -1995,7 +2109,7 @@ def doPauseSyncJob(args, parsed_globals):
1995
2109
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1996
2110
 
1997
2111
 
1998
- def doStartModifySyncJob(args, parsed_globals):
2112
+ def doStopCompare(args, parsed_globals):
1999
2113
  g_param = parse_global_arg(parsed_globals)
2000
2114
 
2001
2115
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2005,7 +2119,10 @@ def doStartModifySyncJob(args, parsed_globals):
2005
2119
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2006
2120
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2007
2121
  )
2008
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2122
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2124
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2125
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2009
2126
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2010
2127
  else:
2011
2128
  cred = credential.Credential(
@@ -2017,18 +2134,18 @@ def doStartModifySyncJob(args, parsed_globals):
2017
2134
  endpoint=g_param[OptionsDefine.Endpoint],
2018
2135
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2019
2136
  )
2020
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2137
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2021
2138
  if g_param[OptionsDefine.Language]:
2022
2139
  profile.language = g_param[OptionsDefine.Language]
2023
2140
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2024
2141
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2025
2142
  client._sdkVersion += ("_CLI_" + __version__)
2026
2143
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2027
- model = models.StartModifySyncJobRequest()
2144
+ model = models.StopCompareRequest()
2028
2145
  model.from_json_string(json.dumps(args))
2029
2146
  start_time = time.time()
2030
2147
  while True:
2031
- rsp = client.StartModifySyncJob(model)
2148
+ rsp = client.StopCompare(model)
2032
2149
  result = rsp.to_json_string()
2033
2150
  try:
2034
2151
  json_obj = json.loads(result)
@@ -2047,7 +2164,7 @@ def doStartModifySyncJob(args, parsed_globals):
2047
2164
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2048
2165
 
2049
2166
 
2050
- def doDescribeSubscribes(args, parsed_globals):
2167
+ def doResetConsumerGroupOffset(args, parsed_globals):
2051
2168
  g_param = parse_global_arg(parsed_globals)
2052
2169
 
2053
2170
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2057,7 +2174,10 @@ def doDescribeSubscribes(args, parsed_globals):
2057
2174
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2058
2175
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2059
2176
  )
2060
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2177
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2179
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2180
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2061
2181
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2062
2182
  else:
2063
2183
  cred = credential.Credential(
@@ -2069,18 +2189,18 @@ def doDescribeSubscribes(args, parsed_globals):
2069
2189
  endpoint=g_param[OptionsDefine.Endpoint],
2070
2190
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2071
2191
  )
2072
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2192
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2073
2193
  if g_param[OptionsDefine.Language]:
2074
2194
  profile.language = g_param[OptionsDefine.Language]
2075
2195
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2076
2196
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2077
2197
  client._sdkVersion += ("_CLI_" + __version__)
2078
2198
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2079
- model = models.DescribeSubscribesRequest()
2199
+ model = models.ResetConsumerGroupOffsetRequest()
2080
2200
  model.from_json_string(json.dumps(args))
2081
2201
  start_time = time.time()
2082
2202
  while True:
2083
- rsp = client.DescribeSubscribes(model)
2203
+ rsp = client.ResetConsumerGroupOffset(model)
2084
2204
  result = rsp.to_json_string()
2085
2205
  try:
2086
2206
  json_obj = json.loads(result)
@@ -2099,7 +2219,7 @@ def doDescribeSubscribes(args, parsed_globals):
2099
2219
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2100
2220
 
2101
2221
 
2102
- def doStartCompare(args, parsed_globals):
2222
+ def doContinueMigrateJob(args, parsed_globals):
2103
2223
  g_param = parse_global_arg(parsed_globals)
2104
2224
 
2105
2225
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2109,7 +2229,10 @@ def doStartCompare(args, parsed_globals):
2109
2229
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2110
2230
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2111
2231
  )
2112
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2232
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2234
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2235
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2113
2236
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2114
2237
  else:
2115
2238
  cred = credential.Credential(
@@ -2121,18 +2244,18 @@ def doStartCompare(args, parsed_globals):
2121
2244
  endpoint=g_param[OptionsDefine.Endpoint],
2122
2245
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2123
2246
  )
2124
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2247
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2125
2248
  if g_param[OptionsDefine.Language]:
2126
2249
  profile.language = g_param[OptionsDefine.Language]
2127
2250
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2128
2251
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2129
2252
  client._sdkVersion += ("_CLI_" + __version__)
2130
2253
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2131
- model = models.StartCompareRequest()
2254
+ model = models.ContinueMigrateJobRequest()
2132
2255
  model.from_json_string(json.dumps(args))
2133
2256
  start_time = time.time()
2134
2257
  while True:
2135
- rsp = client.StartCompare(model)
2258
+ rsp = client.ContinueMigrateJob(model)
2136
2259
  result = rsp.to_json_string()
2137
2260
  try:
2138
2261
  json_obj = json.loads(result)
@@ -2151,7 +2274,7 @@ def doStartCompare(args, parsed_globals):
2151
2274
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2152
2275
 
2153
2276
 
2154
- def doDescribeSubscribeCheckJob(args, parsed_globals):
2277
+ def doStartSyncCompare(args, parsed_globals):
2155
2278
  g_param = parse_global_arg(parsed_globals)
2156
2279
 
2157
2280
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2161,7 +2284,10 @@ def doDescribeSubscribeCheckJob(args, parsed_globals):
2161
2284
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2162
2285
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2163
2286
  )
2164
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2287
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2289
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2290
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2165
2291
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2166
2292
  else:
2167
2293
  cred = credential.Credential(
@@ -2173,18 +2299,18 @@ def doDescribeSubscribeCheckJob(args, parsed_globals):
2173
2299
  endpoint=g_param[OptionsDefine.Endpoint],
2174
2300
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2175
2301
  )
2176
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2302
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2177
2303
  if g_param[OptionsDefine.Language]:
2178
2304
  profile.language = g_param[OptionsDefine.Language]
2179
2305
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2180
2306
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2181
2307
  client._sdkVersion += ("_CLI_" + __version__)
2182
2308
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2183
- model = models.DescribeSubscribeCheckJobRequest()
2309
+ model = models.StartSyncCompareRequest()
2184
2310
  model.from_json_string(json.dumps(args))
2185
2311
  start_time = time.time()
2186
2312
  while True:
2187
- rsp = client.DescribeSubscribeCheckJob(model)
2313
+ rsp = client.StartSyncCompare(model)
2188
2314
  result = rsp.to_json_string()
2189
2315
  try:
2190
2316
  json_obj = json.loads(result)
@@ -2203,7 +2329,7 @@ def doDescribeSubscribeCheckJob(args, parsed_globals):
2203
2329
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2204
2330
 
2205
2331
 
2206
- def doContinueSyncJob(args, parsed_globals):
2332
+ def doDeleteSyncCompareTask(args, parsed_globals):
2207
2333
  g_param = parse_global_arg(parsed_globals)
2208
2334
 
2209
2335
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2213,7 +2339,10 @@ def doContinueSyncJob(args, parsed_globals):
2213
2339
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2214
2340
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2215
2341
  )
2216
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2342
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2344
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2345
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2217
2346
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2218
2347
  else:
2219
2348
  cred = credential.Credential(
@@ -2225,18 +2354,18 @@ def doContinueSyncJob(args, parsed_globals):
2225
2354
  endpoint=g_param[OptionsDefine.Endpoint],
2226
2355
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2227
2356
  )
2228
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2357
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2229
2358
  if g_param[OptionsDefine.Language]:
2230
2359
  profile.language = g_param[OptionsDefine.Language]
2231
2360
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2232
2361
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2233
2362
  client._sdkVersion += ("_CLI_" + __version__)
2234
2363
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2235
- model = models.ContinueSyncJobRequest()
2364
+ model = models.DeleteSyncCompareTaskRequest()
2236
2365
  model.from_json_string(json.dumps(args))
2237
2366
  start_time = time.time()
2238
2367
  while True:
2239
- rsp = client.ContinueSyncJob(model)
2368
+ rsp = client.DeleteSyncCompareTask(model)
2240
2369
  result = rsp.to_json_string()
2241
2370
  try:
2242
2371
  json_obj = json.loads(result)
@@ -2255,7 +2384,7 @@ def doContinueSyncJob(args, parsed_globals):
2255
2384
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2256
2385
 
2257
2386
 
2258
- def doStopSyncJob(args, parsed_globals):
2387
+ def doModifySubscribeVipVport(args, parsed_globals):
2259
2388
  g_param = parse_global_arg(parsed_globals)
2260
2389
 
2261
2390
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2265,7 +2394,10 @@ def doStopSyncJob(args, parsed_globals):
2265
2394
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2266
2395
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2267
2396
  )
2268
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2397
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2399
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2400
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2269
2401
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2270
2402
  else:
2271
2403
  cred = credential.Credential(
@@ -2277,18 +2409,18 @@ def doStopSyncJob(args, parsed_globals):
2277
2409
  endpoint=g_param[OptionsDefine.Endpoint],
2278
2410
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2279
2411
  )
2280
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2412
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2281
2413
  if g_param[OptionsDefine.Language]:
2282
2414
  profile.language = g_param[OptionsDefine.Language]
2283
2415
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2284
2416
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2285
2417
  client._sdkVersion += ("_CLI_" + __version__)
2286
2418
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2287
- model = models.StopSyncJobRequest()
2419
+ model = models.ModifySubscribeVipVportRequest()
2288
2420
  model.from_json_string(json.dumps(args))
2289
2421
  start_time = time.time()
2290
2422
  while True:
2291
- rsp = client.StopSyncJob(model)
2423
+ rsp = client.ModifySubscribeVipVport(model)
2292
2424
  result = rsp.to_json_string()
2293
2425
  try:
2294
2426
  json_obj = json.loads(result)
@@ -2307,7 +2439,7 @@ def doStopSyncJob(args, parsed_globals):
2307
2439
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2308
2440
 
2309
2441
 
2310
- def doModifyConsumerGroupDescription(args, parsed_globals):
2442
+ def doStartSubscribe(args, parsed_globals):
2311
2443
  g_param = parse_global_arg(parsed_globals)
2312
2444
 
2313
2445
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2317,7 +2449,10 @@ def doModifyConsumerGroupDescription(args, parsed_globals):
2317
2449
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2318
2450
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2319
2451
  )
2320
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2452
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2454
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2455
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2321
2456
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2322
2457
  else:
2323
2458
  cred = credential.Credential(
@@ -2329,18 +2464,18 @@ def doModifyConsumerGroupDescription(args, parsed_globals):
2329
2464
  endpoint=g_param[OptionsDefine.Endpoint],
2330
2465
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2331
2466
  )
2332
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2467
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2333
2468
  if g_param[OptionsDefine.Language]:
2334
2469
  profile.language = g_param[OptionsDefine.Language]
2335
2470
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2336
2471
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2337
2472
  client._sdkVersion += ("_CLI_" + __version__)
2338
2473
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2339
- model = models.ModifyConsumerGroupDescriptionRequest()
2474
+ model = models.StartSubscribeRequest()
2340
2475
  model.from_json_string(json.dumps(args))
2341
2476
  start_time = time.time()
2342
2477
  while True:
2343
- rsp = client.ModifyConsumerGroupDescription(model)
2478
+ rsp = client.StartSubscribe(model)
2344
2479
  result = rsp.to_json_string()
2345
2480
  try:
2346
2481
  json_obj = json.loads(result)
@@ -2359,7 +2494,7 @@ def doModifyConsumerGroupDescription(args, parsed_globals):
2359
2494
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2360
2495
 
2361
2496
 
2362
- def doDescribeMigrateDBInstances(args, parsed_globals):
2497
+ def doDescribeSubscribeDetail(args, parsed_globals):
2363
2498
  g_param = parse_global_arg(parsed_globals)
2364
2499
 
2365
2500
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2369,7 +2504,10 @@ def doDescribeMigrateDBInstances(args, parsed_globals):
2369
2504
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2370
2505
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2371
2506
  )
2372
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2507
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2509
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2510
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2373
2511
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2374
2512
  else:
2375
2513
  cred = credential.Credential(
@@ -2381,18 +2519,18 @@ def doDescribeMigrateDBInstances(args, parsed_globals):
2381
2519
  endpoint=g_param[OptionsDefine.Endpoint],
2382
2520
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2383
2521
  )
2384
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2522
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2385
2523
  if g_param[OptionsDefine.Language]:
2386
2524
  profile.language = g_param[OptionsDefine.Language]
2387
2525
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2388
2526
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2389
2527
  client._sdkVersion += ("_CLI_" + __version__)
2390
2528
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2391
- model = models.DescribeMigrateDBInstancesRequest()
2529
+ model = models.DescribeSubscribeDetailRequest()
2392
2530
  model.from_json_string(json.dumps(args))
2393
2531
  start_time = time.time()
2394
2532
  while True:
2395
- rsp = client.DescribeMigrateDBInstances(model)
2533
+ rsp = client.DescribeSubscribeDetail(model)
2396
2534
  result = rsp.to_json_string()
2397
2535
  try:
2398
2536
  json_obj = json.loads(result)
@@ -2411,7 +2549,7 @@ def doDescribeMigrateDBInstances(args, parsed_globals):
2411
2549
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2412
2550
 
2413
2551
 
2414
- def doSkipCheckItem(args, parsed_globals):
2552
+ def doModifySyncCompareTask(args, parsed_globals):
2415
2553
  g_param = parse_global_arg(parsed_globals)
2416
2554
 
2417
2555
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2421,7 +2559,10 @@ def doSkipCheckItem(args, parsed_globals):
2421
2559
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2422
2560
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2423
2561
  )
2424
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2562
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2564
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2565
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2425
2566
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2426
2567
  else:
2427
2568
  cred = credential.Credential(
@@ -2433,18 +2574,18 @@ def doSkipCheckItem(args, parsed_globals):
2433
2574
  endpoint=g_param[OptionsDefine.Endpoint],
2434
2575
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2435
2576
  )
2436
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2577
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2437
2578
  if g_param[OptionsDefine.Language]:
2438
2579
  profile.language = g_param[OptionsDefine.Language]
2439
2580
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2440
2581
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2441
2582
  client._sdkVersion += ("_CLI_" + __version__)
2442
2583
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2443
- model = models.SkipCheckItemRequest()
2584
+ model = models.ModifySyncCompareTaskRequest()
2444
2585
  model.from_json_string(json.dumps(args))
2445
2586
  start_time = time.time()
2446
2587
  while True:
2447
- rsp = client.SkipCheckItem(model)
2588
+ rsp = client.ModifySyncCompareTask(model)
2448
2589
  result = rsp.to_json_string()
2449
2590
  try:
2450
2591
  json_obj = json.loads(result)
@@ -2473,7 +2614,10 @@ def doDescribeSubscribeConf(args, parsed_globals):
2473
2614
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2474
2615
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2475
2616
  )
2476
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2617
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2619
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2620
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2477
2621
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2478
2622
  else:
2479
2623
  cred = credential.Credential(
@@ -2485,7 +2629,7 @@ def doDescribeSubscribeConf(args, parsed_globals):
2485
2629
  endpoint=g_param[OptionsDefine.Endpoint],
2486
2630
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2487
2631
  )
2488
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2632
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2489
2633
  if g_param[OptionsDefine.Language]:
2490
2634
  profile.language = g_param[OptionsDefine.Language]
2491
2635
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2515,7 +2659,7 @@ def doDescribeSubscribeConf(args, parsed_globals):
2515
2659
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2516
2660
 
2517
2661
 
2518
- def doModifyConsumerGroupPassword(args, parsed_globals):
2662
+ def doDescribeAsyncRequestInfo(args, parsed_globals):
2519
2663
  g_param = parse_global_arg(parsed_globals)
2520
2664
 
2521
2665
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2525,7 +2669,10 @@ def doModifyConsumerGroupPassword(args, parsed_globals):
2525
2669
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2526
2670
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2527
2671
  )
2528
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2672
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2674
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2675
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2529
2676
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2530
2677
  else:
2531
2678
  cred = credential.Credential(
@@ -2537,18 +2684,18 @@ def doModifyConsumerGroupPassword(args, parsed_globals):
2537
2684
  endpoint=g_param[OptionsDefine.Endpoint],
2538
2685
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2539
2686
  )
2540
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2687
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2541
2688
  if g_param[OptionsDefine.Language]:
2542
2689
  profile.language = g_param[OptionsDefine.Language]
2543
2690
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2544
2691
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2545
2692
  client._sdkVersion += ("_CLI_" + __version__)
2546
2693
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2547
- model = models.ModifyConsumerGroupPasswordRequest()
2694
+ model = models.DescribeAsyncRequestInfoRequest()
2548
2695
  model.from_json_string(json.dumps(args))
2549
2696
  start_time = time.time()
2550
2697
  while True:
2551
- rsp = client.ModifyConsumerGroupPassword(model)
2698
+ rsp = client.DescribeAsyncRequestInfo(model)
2552
2699
  result = rsp.to_json_string()
2553
2700
  try:
2554
2701
  json_obj = json.loads(result)
@@ -2567,7 +2714,7 @@ def doModifyConsumerGroupPassword(args, parsed_globals):
2567
2714
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2568
2715
 
2569
2716
 
2570
- def doCreateMigrateJob(args, parsed_globals):
2717
+ def doCreateSyncCompareTask(args, parsed_globals):
2571
2718
  g_param = parse_global_arg(parsed_globals)
2572
2719
 
2573
2720
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2577,7 +2724,10 @@ def doCreateMigrateJob(args, parsed_globals):
2577
2724
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2578
2725
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2579
2726
  )
2580
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2727
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2729
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2730
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2581
2731
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2582
2732
  else:
2583
2733
  cred = credential.Credential(
@@ -2589,18 +2739,18 @@ def doCreateMigrateJob(args, parsed_globals):
2589
2739
  endpoint=g_param[OptionsDefine.Endpoint],
2590
2740
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2591
2741
  )
2592
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2742
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2593
2743
  if g_param[OptionsDefine.Language]:
2594
2744
  profile.language = g_param[OptionsDefine.Language]
2595
2745
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2596
2746
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2597
2747
  client._sdkVersion += ("_CLI_" + __version__)
2598
2748
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2599
- model = models.CreateMigrateJobRequest()
2749
+ model = models.CreateSyncCompareTaskRequest()
2600
2750
  model.from_json_string(json.dumps(args))
2601
2751
  start_time = time.time()
2602
2752
  while True:
2603
- rsp = client.CreateMigrateJob(model)
2753
+ rsp = client.CreateSyncCompareTask(model)
2604
2754
  result = rsp.to_json_string()
2605
2755
  try:
2606
2756
  json_obj = json.loads(result)
@@ -2619,7 +2769,7 @@ def doCreateMigrateJob(args, parsed_globals):
2619
2769
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2620
2770
 
2621
2771
 
2622
- def doModifySubscribeVipVport(args, parsed_globals):
2772
+ def doCompleteMigrateJob(args, parsed_globals):
2623
2773
  g_param = parse_global_arg(parsed_globals)
2624
2774
 
2625
2775
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2629,7 +2779,10 @@ def doModifySubscribeVipVport(args, parsed_globals):
2629
2779
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2630
2780
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2631
2781
  )
2632
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2782
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2784
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2785
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2633
2786
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2634
2787
  else:
2635
2788
  cred = credential.Credential(
@@ -2641,18 +2794,18 @@ def doModifySubscribeVipVport(args, parsed_globals):
2641
2794
  endpoint=g_param[OptionsDefine.Endpoint],
2642
2795
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2643
2796
  )
2644
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2797
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2645
2798
  if g_param[OptionsDefine.Language]:
2646
2799
  profile.language = g_param[OptionsDefine.Language]
2647
2800
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2648
2801
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2649
2802
  client._sdkVersion += ("_CLI_" + __version__)
2650
2803
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2651
- model = models.ModifySubscribeVipVportRequest()
2804
+ model = models.CompleteMigrateJobRequest()
2652
2805
  model.from_json_string(json.dumps(args))
2653
2806
  start_time = time.time()
2654
2807
  while True:
2655
- rsp = client.ModifySubscribeVipVport(model)
2808
+ rsp = client.CompleteMigrateJob(model)
2656
2809
  result = rsp.to_json_string()
2657
2810
  try:
2658
2811
  json_obj = json.loads(result)
@@ -2671,7 +2824,7 @@ def doModifySubscribeVipVport(args, parsed_globals):
2671
2824
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2672
2825
 
2673
2826
 
2674
- def doCreateSubscribeCheckJob(args, parsed_globals):
2827
+ def doIsolateSyncJob(args, parsed_globals):
2675
2828
  g_param = parse_global_arg(parsed_globals)
2676
2829
 
2677
2830
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2681,7 +2834,10 @@ def doCreateSubscribeCheckJob(args, parsed_globals):
2681
2834
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2682
2835
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2683
2836
  )
2684
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2837
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2839
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2840
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2685
2841
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2686
2842
  else:
2687
2843
  cred = credential.Credential(
@@ -2693,18 +2849,18 @@ def doCreateSubscribeCheckJob(args, parsed_globals):
2693
2849
  endpoint=g_param[OptionsDefine.Endpoint],
2694
2850
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2695
2851
  )
2696
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2852
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2697
2853
  if g_param[OptionsDefine.Language]:
2698
2854
  profile.language = g_param[OptionsDefine.Language]
2699
2855
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2700
2856
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2701
2857
  client._sdkVersion += ("_CLI_" + __version__)
2702
2858
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2703
- model = models.CreateSubscribeCheckJobRequest()
2859
+ model = models.IsolateSyncJobRequest()
2704
2860
  model.from_json_string(json.dumps(args))
2705
2861
  start_time = time.time()
2706
2862
  while True:
2707
- rsp = client.CreateSubscribeCheckJob(model)
2863
+ rsp = client.IsolateSyncJob(model)
2708
2864
  result = rsp.to_json_string()
2709
2865
  try:
2710
2866
  json_obj = json.loads(result)
@@ -2723,7 +2879,7 @@ def doCreateSubscribeCheckJob(args, parsed_globals):
2723
2879
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2724
2880
 
2725
2881
 
2726
- def doCreateMigrateCheckJob(args, parsed_globals):
2882
+ def doConfigureSubscribeJob(args, parsed_globals):
2727
2883
  g_param = parse_global_arg(parsed_globals)
2728
2884
 
2729
2885
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2733,7 +2889,10 @@ def doCreateMigrateCheckJob(args, parsed_globals):
2733
2889
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2734
2890
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2735
2891
  )
2736
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2892
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2894
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2895
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2737
2896
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2738
2897
  else:
2739
2898
  cred = credential.Credential(
@@ -2745,18 +2904,18 @@ def doCreateMigrateCheckJob(args, parsed_globals):
2745
2904
  endpoint=g_param[OptionsDefine.Endpoint],
2746
2905
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2747
2906
  )
2748
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2907
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2749
2908
  if g_param[OptionsDefine.Language]:
2750
2909
  profile.language = g_param[OptionsDefine.Language]
2751
2910
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2752
2911
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2753
2912
  client._sdkVersion += ("_CLI_" + __version__)
2754
2913
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2755
- model = models.CreateMigrateCheckJobRequest()
2914
+ model = models.ConfigureSubscribeJobRequest()
2756
2915
  model.from_json_string(json.dumps(args))
2757
2916
  start_time = time.time()
2758
2917
  while True:
2759
- rsp = client.CreateMigrateCheckJob(model)
2918
+ rsp = client.ConfigureSubscribeJob(model)
2760
2919
  result = rsp.to_json_string()
2761
2920
  try:
2762
2921
  json_obj = json.loads(result)
@@ -2775,7 +2934,7 @@ def doCreateMigrateCheckJob(args, parsed_globals):
2775
2934
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2776
2935
 
2777
2936
 
2778
- def doIsolateMigrateJob(args, parsed_globals):
2937
+ def doDeleteCompareTask(args, parsed_globals):
2779
2938
  g_param = parse_global_arg(parsed_globals)
2780
2939
 
2781
2940
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2785,7 +2944,10 @@ def doIsolateMigrateJob(args, parsed_globals):
2785
2944
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2786
2945
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2787
2946
  )
2788
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2947
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2949
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2950
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2789
2951
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2790
2952
  else:
2791
2953
  cred = credential.Credential(
@@ -2797,18 +2959,18 @@ def doIsolateMigrateJob(args, parsed_globals):
2797
2959
  endpoint=g_param[OptionsDefine.Endpoint],
2798
2960
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2799
2961
  )
2800
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2962
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2801
2963
  if g_param[OptionsDefine.Language]:
2802
2964
  profile.language = g_param[OptionsDefine.Language]
2803
2965
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2804
2966
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2805
2967
  client._sdkVersion += ("_CLI_" + __version__)
2806
2968
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2807
- model = models.IsolateMigrateJobRequest()
2969
+ model = models.DeleteCompareTaskRequest()
2808
2970
  model.from_json_string(json.dumps(args))
2809
2971
  start_time = time.time()
2810
2972
  while True:
2811
- rsp = client.IsolateMigrateJob(model)
2973
+ rsp = client.DeleteCompareTask(model)
2812
2974
  result = rsp.to_json_string()
2813
2975
  try:
2814
2976
  json_obj = json.loads(result)
@@ -2827,7 +2989,7 @@ def doIsolateMigrateJob(args, parsed_globals):
2827
2989
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2828
2990
 
2829
2991
 
2830
- def doDescribeCheckSyncJobResult(args, parsed_globals):
2992
+ def doStartSyncJob(args, parsed_globals):
2831
2993
  g_param = parse_global_arg(parsed_globals)
2832
2994
 
2833
2995
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2837,7 +2999,10 @@ def doDescribeCheckSyncJobResult(args, parsed_globals):
2837
2999
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2838
3000
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2839
3001
  )
2840
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3002
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3004
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3005
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2841
3006
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2842
3007
  else:
2843
3008
  cred = credential.Credential(
@@ -2849,18 +3014,18 @@ def doDescribeCheckSyncJobResult(args, parsed_globals):
2849
3014
  endpoint=g_param[OptionsDefine.Endpoint],
2850
3015
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2851
3016
  )
2852
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3017
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2853
3018
  if g_param[OptionsDefine.Language]:
2854
3019
  profile.language = g_param[OptionsDefine.Language]
2855
3020
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2856
3021
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2857
3022
  client._sdkVersion += ("_CLI_" + __version__)
2858
3023
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2859
- model = models.DescribeCheckSyncJobResultRequest()
3024
+ model = models.StartSyncJobRequest()
2860
3025
  model.from_json_string(json.dumps(args))
2861
3026
  start_time = time.time()
2862
3027
  while True:
2863
- rsp = client.DescribeCheckSyncJobResult(model)
3028
+ rsp = client.StartSyncJob(model)
2864
3029
  result = rsp.to_json_string()
2865
3030
  try:
2866
3031
  json_obj = json.loads(result)
@@ -2879,7 +3044,7 @@ def doDescribeCheckSyncJobResult(args, parsed_globals):
2879
3044
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2880
3045
 
2881
3046
 
2882
- def doDescribeCompareTasks(args, parsed_globals):
3047
+ def doDescribeSyncCompareTasks(args, parsed_globals):
2883
3048
  g_param = parse_global_arg(parsed_globals)
2884
3049
 
2885
3050
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2889,7 +3054,10 @@ def doDescribeCompareTasks(args, parsed_globals):
2889
3054
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2890
3055
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2891
3056
  )
2892
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3057
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3059
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3060
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2893
3061
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2894
3062
  else:
2895
3063
  cred = credential.Credential(
@@ -2901,18 +3069,18 @@ def doDescribeCompareTasks(args, parsed_globals):
2901
3069
  endpoint=g_param[OptionsDefine.Endpoint],
2902
3070
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2903
3071
  )
2904
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3072
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2905
3073
  if g_param[OptionsDefine.Language]:
2906
3074
  profile.language = g_param[OptionsDefine.Language]
2907
3075
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2908
3076
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2909
3077
  client._sdkVersion += ("_CLI_" + __version__)
2910
3078
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2911
- model = models.DescribeCompareTasksRequest()
3079
+ model = models.DescribeSyncCompareTasksRequest()
2912
3080
  model.from_json_string(json.dumps(args))
2913
3081
  start_time = time.time()
2914
3082
  while True:
2915
- rsp = client.DescribeCompareTasks(model)
3083
+ rsp = client.DescribeSyncCompareTasks(model)
2916
3084
  result = rsp.to_json_string()
2917
3085
  try:
2918
3086
  json_obj = json.loads(result)
@@ -2931,7 +3099,7 @@ def doDescribeCompareTasks(args, parsed_globals):
2931
3099
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2932
3100
 
2933
3101
 
2934
- def doSkipSyncCheckItem(args, parsed_globals):
3102
+ def doCreateCheckSyncJob(args, parsed_globals):
2935
3103
  g_param = parse_global_arg(parsed_globals)
2936
3104
 
2937
3105
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2941,7 +3109,10 @@ def doSkipSyncCheckItem(args, parsed_globals):
2941
3109
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2942
3110
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2943
3111
  )
2944
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3112
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3114
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3115
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
3116
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2946
3117
  else:
2947
3118
  cred = credential.Credential(
@@ -2953,18 +3124,18 @@ def doSkipSyncCheckItem(args, parsed_globals):
2953
3124
  endpoint=g_param[OptionsDefine.Endpoint],
2954
3125
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2955
3126
  )
2956
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3127
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2957
3128
  if g_param[OptionsDefine.Language]:
2958
3129
  profile.language = g_param[OptionsDefine.Language]
2959
3130
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2960
3131
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
2961
3132
  client._sdkVersion += ("_CLI_" + __version__)
2962
3133
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2963
- model = models.SkipSyncCheckItemRequest()
3134
+ model = models.CreateCheckSyncJobRequest()
2964
3135
  model.from_json_string(json.dumps(args))
2965
3136
  start_time = time.time()
2966
3137
  while True:
2967
- rsp = client.SkipSyncCheckItem(model)
3138
+ rsp = client.CreateCheckSyncJob(model)
2968
3139
  result = rsp.to_json_string()
2969
3140
  try:
2970
3141
  json_obj = json.loads(result)
@@ -2983,7 +3154,7 @@ def doSkipSyncCheckItem(args, parsed_globals):
2983
3154
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2984
3155
 
2985
3156
 
2986
- def doDescribeSubscribeDetail(args, parsed_globals):
3157
+ def doDescribeCompareReport(args, parsed_globals):
2987
3158
  g_param = parse_global_arg(parsed_globals)
2988
3159
 
2989
3160
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2993,7 +3164,10 @@ def doDescribeSubscribeDetail(args, parsed_globals):
2993
3164
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2994
3165
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2995
3166
  )
2996
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3167
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3169
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3170
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2997
3171
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2998
3172
  else:
2999
3173
  cred = credential.Credential(
@@ -3005,18 +3179,18 @@ def doDescribeSubscribeDetail(args, parsed_globals):
3005
3179
  endpoint=g_param[OptionsDefine.Endpoint],
3006
3180
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3007
3181
  )
3008
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3182
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3009
3183
  if g_param[OptionsDefine.Language]:
3010
3184
  profile.language = g_param[OptionsDefine.Language]
3011
3185
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3012
3186
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3013
3187
  client._sdkVersion += ("_CLI_" + __version__)
3014
3188
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3015
- model = models.DescribeSubscribeDetailRequest()
3189
+ model = models.DescribeCompareReportRequest()
3016
3190
  model.from_json_string(json.dumps(args))
3017
3191
  start_time = time.time()
3018
3192
  while True:
3019
- rsp = client.DescribeSubscribeDetail(model)
3193
+ rsp = client.DescribeCompareReport(model)
3020
3194
  result = rsp.to_json_string()
3021
3195
  try:
3022
3196
  json_obj = json.loads(result)
@@ -3035,7 +3209,7 @@ def doDescribeSubscribeDetail(args, parsed_globals):
3035
3209
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3036
3210
 
3037
3211
 
3038
- def doDeleteConsumerGroup(args, parsed_globals):
3212
+ def doDescribeMigrateCheckJob(args, parsed_globals):
3039
3213
  g_param = parse_global_arg(parsed_globals)
3040
3214
 
3041
3215
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3045,7 +3219,10 @@ def doDeleteConsumerGroup(args, parsed_globals):
3045
3219
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3046
3220
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3047
3221
  )
3048
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3222
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3224
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3225
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3049
3226
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3050
3227
  else:
3051
3228
  cred = credential.Credential(
@@ -3057,18 +3234,18 @@ def doDeleteConsumerGroup(args, parsed_globals):
3057
3234
  endpoint=g_param[OptionsDefine.Endpoint],
3058
3235
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3059
3236
  )
3060
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3237
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3061
3238
  if g_param[OptionsDefine.Language]:
3062
3239
  profile.language = g_param[OptionsDefine.Language]
3063
3240
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3064
3241
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3065
3242
  client._sdkVersion += ("_CLI_" + __version__)
3066
3243
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3067
- model = models.DeleteConsumerGroupRequest()
3244
+ model = models.DescribeMigrateCheckJobRequest()
3068
3245
  model.from_json_string(json.dumps(args))
3069
3246
  start_time = time.time()
3070
3247
  while True:
3071
- rsp = client.DeleteConsumerGroup(model)
3248
+ rsp = client.DescribeMigrateCheckJob(model)
3072
3249
  result = rsp.to_json_string()
3073
3250
  try:
3074
3251
  json_obj = json.loads(result)
@@ -3087,7 +3264,7 @@ def doDeleteConsumerGroup(args, parsed_globals):
3087
3264
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3088
3265
 
3089
3266
 
3090
- def doDescribeMigrationJobs(args, parsed_globals):
3267
+ def doConfigureSyncJob(args, parsed_globals):
3091
3268
  g_param = parse_global_arg(parsed_globals)
3092
3269
 
3093
3270
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3097,7 +3274,10 @@ def doDescribeMigrationJobs(args, parsed_globals):
3097
3274
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3098
3275
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3099
3276
  )
3100
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3277
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3279
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3280
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3101
3281
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3102
3282
  else:
3103
3283
  cred = credential.Credential(
@@ -3109,18 +3289,18 @@ def doDescribeMigrationJobs(args, parsed_globals):
3109
3289
  endpoint=g_param[OptionsDefine.Endpoint],
3110
3290
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3111
3291
  )
3112
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3292
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3113
3293
  if g_param[OptionsDefine.Language]:
3114
3294
  profile.language = g_param[OptionsDefine.Language]
3115
3295
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3116
3296
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3117
3297
  client._sdkVersion += ("_CLI_" + __version__)
3118
3298
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3119
- model = models.DescribeMigrationJobsRequest()
3299
+ model = models.ConfigureSyncJobRequest()
3120
3300
  model.from_json_string(json.dumps(args))
3121
3301
  start_time = time.time()
3122
3302
  while True:
3123
- rsp = client.DescribeMigrationJobs(model)
3303
+ rsp = client.ConfigureSyncJob(model)
3124
3304
  result = rsp.to_json_string()
3125
3305
  try:
3126
3306
  json_obj = json.loads(result)
@@ -3139,7 +3319,7 @@ def doDescribeMigrationJobs(args, parsed_globals):
3139
3319
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3140
3320
 
3141
3321
 
3142
- def doRecoverMigrateJob(args, parsed_globals):
3322
+ def doModifySyncJobConfig(args, parsed_globals):
3143
3323
  g_param = parse_global_arg(parsed_globals)
3144
3324
 
3145
3325
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3149,7 +3329,10 @@ def doRecoverMigrateJob(args, parsed_globals):
3149
3329
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3150
3330
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3151
3331
  )
3152
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3332
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3334
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3335
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3153
3336
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3154
3337
  else:
3155
3338
  cred = credential.Credential(
@@ -3161,18 +3344,18 @@ def doRecoverMigrateJob(args, parsed_globals):
3161
3344
  endpoint=g_param[OptionsDefine.Endpoint],
3162
3345
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3163
3346
  )
3164
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3347
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3165
3348
  if g_param[OptionsDefine.Language]:
3166
3349
  profile.language = g_param[OptionsDefine.Language]
3167
3350
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3168
3351
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3169
3352
  client._sdkVersion += ("_CLI_" + __version__)
3170
3353
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3171
- model = models.RecoverMigrateJobRequest()
3354
+ model = models.ModifySyncJobConfigRequest()
3172
3355
  model.from_json_string(json.dumps(args))
3173
3356
  start_time = time.time()
3174
3357
  while True:
3175
- rsp = client.RecoverMigrateJob(model)
3358
+ rsp = client.ModifySyncJobConfig(model)
3176
3359
  result = rsp.to_json_string()
3177
3360
  try:
3178
3361
  json_obj = json.loads(result)
@@ -3191,7 +3374,7 @@ def doRecoverMigrateJob(args, parsed_globals):
3191
3374
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3192
3375
 
3193
3376
 
3194
- def doDescribeMigrateJobs(args, parsed_globals):
3377
+ def doDescribeSyncCompareReport(args, parsed_globals):
3195
3378
  g_param = parse_global_arg(parsed_globals)
3196
3379
 
3197
3380
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3201,7 +3384,10 @@ def doDescribeMigrateJobs(args, parsed_globals):
3201
3384
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3202
3385
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3203
3386
  )
3204
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3387
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3389
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3390
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3205
3391
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3206
3392
  else:
3207
3393
  cred = credential.Credential(
@@ -3213,18 +3399,18 @@ def doDescribeMigrateJobs(args, parsed_globals):
3213
3399
  endpoint=g_param[OptionsDefine.Endpoint],
3214
3400
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3215
3401
  )
3216
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3402
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3217
3403
  if g_param[OptionsDefine.Language]:
3218
3404
  profile.language = g_param[OptionsDefine.Language]
3219
3405
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3220
3406
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3221
3407
  client._sdkVersion += ("_CLI_" + __version__)
3222
3408
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3223
- model = models.DescribeMigrateJobsRequest()
3409
+ model = models.DescribeSyncCompareReportRequest()
3224
3410
  model.from_json_string(json.dumps(args))
3225
3411
  start_time = time.time()
3226
3412
  while True:
3227
- rsp = client.DescribeMigrateJobs(model)
3413
+ rsp = client.DescribeSyncCompareReport(model)
3228
3414
  result = rsp.to_json_string()
3229
3415
  try:
3230
3416
  json_obj = json.loads(result)
@@ -3243,7 +3429,7 @@ def doDescribeMigrateJobs(args, parsed_globals):
3243
3429
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3244
3430
 
3245
3431
 
3246
- def doCreateSubscribe(args, parsed_globals):
3432
+ def doModifyConsumerGroupDescription(args, parsed_globals):
3247
3433
  g_param = parse_global_arg(parsed_globals)
3248
3434
 
3249
3435
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3253,7 +3439,10 @@ def doCreateSubscribe(args, parsed_globals):
3253
3439
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3254
3440
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3255
3441
  )
3256
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3442
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3444
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3445
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3257
3446
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3258
3447
  else:
3259
3448
  cred = credential.Credential(
@@ -3265,18 +3454,18 @@ def doCreateSubscribe(args, parsed_globals):
3265
3454
  endpoint=g_param[OptionsDefine.Endpoint],
3266
3455
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3267
3456
  )
3268
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3457
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3269
3458
  if g_param[OptionsDefine.Language]:
3270
3459
  profile.language = g_param[OptionsDefine.Language]
3271
3460
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3272
3461
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3273
3462
  client._sdkVersion += ("_CLI_" + __version__)
3274
3463
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3275
- model = models.CreateSubscribeRequest()
3464
+ model = models.ModifyConsumerGroupDescriptionRequest()
3276
3465
  model.from_json_string(json.dumps(args))
3277
3466
  start_time = time.time()
3278
3467
  while True:
3279
- rsp = client.CreateSubscribe(model)
3468
+ rsp = client.ModifyConsumerGroupDescription(model)
3280
3469
  result = rsp.to_json_string()
3281
3470
  try:
3282
3471
  json_obj = json.loads(result)
@@ -3295,7 +3484,7 @@ def doCreateSubscribe(args, parsed_globals):
3295
3484
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3296
3485
 
3297
3486
 
3298
- def doRecoverSyncJob(args, parsed_globals):
3487
+ def doModifyConsumerGroupPassword(args, parsed_globals):
3299
3488
  g_param = parse_global_arg(parsed_globals)
3300
3489
 
3301
3490
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3305,7 +3494,10 @@ def doRecoverSyncJob(args, parsed_globals):
3305
3494
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3306
3495
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3307
3496
  )
3308
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3497
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3499
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3500
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3309
3501
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3310
3502
  else:
3311
3503
  cred = credential.Credential(
@@ -3317,18 +3509,18 @@ def doRecoverSyncJob(args, parsed_globals):
3317
3509
  endpoint=g_param[OptionsDefine.Endpoint],
3318
3510
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3319
3511
  )
3320
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3512
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3321
3513
  if g_param[OptionsDefine.Language]:
3322
3514
  profile.language = g_param[OptionsDefine.Language]
3323
3515
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3324
3516
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3325
3517
  client._sdkVersion += ("_CLI_" + __version__)
3326
3518
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3327
- model = models.RecoverSyncJobRequest()
3519
+ model = models.ModifyConsumerGroupPasswordRequest()
3328
3520
  model.from_json_string(json.dumps(args))
3329
3521
  start_time = time.time()
3330
3522
  while True:
3331
- rsp = client.RecoverSyncJob(model)
3523
+ rsp = client.ModifyConsumerGroupPassword(model)
3332
3524
  result = rsp.to_json_string()
3333
3525
  try:
3334
3526
  json_obj = json.loads(result)
@@ -3347,7 +3539,7 @@ def doRecoverSyncJob(args, parsed_globals):
3347
3539
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3348
3540
 
3349
3541
 
3350
- def doResetSubscribe(args, parsed_globals):
3542
+ def doModifySubscribeConsumeTime(args, parsed_globals):
3351
3543
  g_param = parse_global_arg(parsed_globals)
3352
3544
 
3353
3545
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3357,7 +3549,10 @@ def doResetSubscribe(args, parsed_globals):
3357
3549
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3358
3550
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3359
3551
  )
3360
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3552
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3554
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3555
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3361
3556
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3362
3557
  else:
3363
3558
  cred = credential.Credential(
@@ -3369,18 +3564,18 @@ def doResetSubscribe(args, parsed_globals):
3369
3564
  endpoint=g_param[OptionsDefine.Endpoint],
3370
3565
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3371
3566
  )
3372
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3567
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3373
3568
  if g_param[OptionsDefine.Language]:
3374
3569
  profile.language = g_param[OptionsDefine.Language]
3375
3570
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3376
3571
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3377
3572
  client._sdkVersion += ("_CLI_" + __version__)
3378
3573
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3379
- model = models.ResetSubscribeRequest()
3574
+ model = models.ModifySubscribeConsumeTimeRequest()
3380
3575
  model.from_json_string(json.dumps(args))
3381
3576
  start_time = time.time()
3382
3577
  while True:
3383
- rsp = client.ResetSubscribe(model)
3578
+ rsp = client.ModifySubscribeConsumeTime(model)
3384
3579
  result = rsp.to_json_string()
3385
3580
  try:
3386
3581
  json_obj = json.loads(result)
@@ -3399,7 +3594,7 @@ def doResetSubscribe(args, parsed_globals):
3399
3594
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3400
3595
 
3401
3596
 
3402
- def doActivateSubscribe(args, parsed_globals):
3597
+ def doDescribeCheckSyncJobResult(args, parsed_globals):
3403
3598
  g_param = parse_global_arg(parsed_globals)
3404
3599
 
3405
3600
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3409,7 +3604,10 @@ def doActivateSubscribe(args, parsed_globals):
3409
3604
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3410
3605
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3411
3606
  )
3412
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3607
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3609
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3610
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3413
3611
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3414
3612
  else:
3415
3613
  cred = credential.Credential(
@@ -3421,18 +3619,18 @@ def doActivateSubscribe(args, parsed_globals):
3421
3619
  endpoint=g_param[OptionsDefine.Endpoint],
3422
3620
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3423
3621
  )
3424
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3622
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3425
3623
  if g_param[OptionsDefine.Language]:
3426
3624
  profile.language = g_param[OptionsDefine.Language]
3427
3625
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3428
3626
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3429
3627
  client._sdkVersion += ("_CLI_" + __version__)
3430
3628
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3431
- model = models.ActivateSubscribeRequest()
3629
+ model = models.DescribeCheckSyncJobResultRequest()
3432
3630
  model.from_json_string(json.dumps(args))
3433
3631
  start_time = time.time()
3434
3632
  while True:
3435
- rsp = client.ActivateSubscribe(model)
3633
+ rsp = client.DescribeCheckSyncJobResult(model)
3436
3634
  result = rsp.to_json_string()
3437
3635
  try:
3438
3636
  json_obj = json.loads(result)
@@ -3451,7 +3649,7 @@ def doActivateSubscribe(args, parsed_globals):
3451
3649
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3452
3650
 
3453
3651
 
3454
- def doModifyMigrateJobSpec(args, parsed_globals):
3652
+ def doDestroyMigrateJob(args, parsed_globals):
3455
3653
  g_param = parse_global_arg(parsed_globals)
3456
3654
 
3457
3655
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3461,7 +3659,10 @@ def doModifyMigrateJobSpec(args, parsed_globals):
3461
3659
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3462
3660
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3463
3661
  )
3464
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3662
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3664
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3665
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3465
3666
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3466
3667
  else:
3467
3668
  cred = credential.Credential(
@@ -3473,18 +3674,18 @@ def doModifyMigrateJobSpec(args, parsed_globals):
3473
3674
  endpoint=g_param[OptionsDefine.Endpoint],
3474
3675
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3475
3676
  )
3476
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3677
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3477
3678
  if g_param[OptionsDefine.Language]:
3478
3679
  profile.language = g_param[OptionsDefine.Language]
3479
3680
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3480
3681
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3481
3682
  client._sdkVersion += ("_CLI_" + __version__)
3482
3683
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3483
- model = models.ModifyMigrateJobSpecRequest()
3684
+ model = models.DestroyMigrateJobRequest()
3484
3685
  model.from_json_string(json.dumps(args))
3485
3686
  start_time = time.time()
3486
3687
  while True:
3487
- rsp = client.ModifyMigrateJobSpec(model)
3688
+ rsp = client.DestroyMigrateJob(model)
3488
3689
  result = rsp.to_json_string()
3489
3690
  try:
3490
3691
  json_obj = json.loads(result)
@@ -3513,7 +3714,10 @@ def doDescribeModifyCheckSyncJobResult(args, parsed_globals):
3513
3714
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3514
3715
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3515
3716
  )
3516
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3717
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3719
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3720
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3517
3721
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3518
3722
  else:
3519
3723
  cred = credential.Credential(
@@ -3525,7 +3729,7 @@ def doDescribeModifyCheckSyncJobResult(args, parsed_globals):
3525
3729
  endpoint=g_param[OptionsDefine.Endpoint],
3526
3730
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3527
3731
  )
3528
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3732
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3529
3733
  if g_param[OptionsDefine.Language]:
3530
3734
  profile.language = g_param[OptionsDefine.Language]
3531
3735
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3565,7 +3769,10 @@ def doModifySubscribeName(args, parsed_globals):
3565
3769
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3566
3770
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3567
3771
  )
3568
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3772
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3774
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3775
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3569
3776
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3570
3777
  else:
3571
3778
  cred = credential.Credential(
@@ -3577,7 +3784,7 @@ def doModifySubscribeName(args, parsed_globals):
3577
3784
  endpoint=g_param[OptionsDefine.Endpoint],
3578
3785
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3579
3786
  )
3580
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3787
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3581
3788
  if g_param[OptionsDefine.Language]:
3582
3789
  profile.language = g_param[OptionsDefine.Language]
3583
3790
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3607,7 +3814,7 @@ def doModifySubscribeName(args, parsed_globals):
3607
3814
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3608
3815
 
3609
3816
 
3610
- def doModifyMigrateJob(args, parsed_globals):
3817
+ def doDescribeOffsetByTime(args, parsed_globals):
3611
3818
  g_param = parse_global_arg(parsed_globals)
3612
3819
 
3613
3820
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3617,7 +3824,10 @@ def doModifyMigrateJob(args, parsed_globals):
3617
3824
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3618
3825
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3619
3826
  )
3620
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3829
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3830
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3621
3831
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3622
3832
  else:
3623
3833
  cred = credential.Credential(
@@ -3629,18 +3839,18 @@ def doModifyMigrateJob(args, parsed_globals):
3629
3839
  endpoint=g_param[OptionsDefine.Endpoint],
3630
3840
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3631
3841
  )
3632
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3842
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3633
3843
  if g_param[OptionsDefine.Language]:
3634
3844
  profile.language = g_param[OptionsDefine.Language]
3635
3845
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3636
3846
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3637
3847
  client._sdkVersion += ("_CLI_" + __version__)
3638
3848
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3639
- model = models.ModifyMigrateJobRequest()
3849
+ model = models.DescribeOffsetByTimeRequest()
3640
3850
  model.from_json_string(json.dumps(args))
3641
3851
  start_time = time.time()
3642
3852
  while True:
3643
- rsp = client.ModifyMigrateJob(model)
3853
+ rsp = client.DescribeOffsetByTime(model)
3644
3854
  result = rsp.to_json_string()
3645
3855
  try:
3646
3856
  json_obj = json.loads(result)
@@ -3659,7 +3869,7 @@ def doModifyMigrateJob(args, parsed_globals):
3659
3869
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3660
3870
 
3661
3871
 
3662
- def doCreateCompareTask(args, parsed_globals):
3872
+ def doIsolateMigrateJob(args, parsed_globals):
3663
3873
  g_param = parse_global_arg(parsed_globals)
3664
3874
 
3665
3875
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3669,7 +3879,10 @@ def doCreateCompareTask(args, parsed_globals):
3669
3879
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3670
3880
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3671
3881
  )
3672
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3882
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3884
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3885
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3673
3886
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3674
3887
  else:
3675
3888
  cred = credential.Credential(
@@ -3681,18 +3894,18 @@ def doCreateCompareTask(args, parsed_globals):
3681
3894
  endpoint=g_param[OptionsDefine.Endpoint],
3682
3895
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3683
3896
  )
3684
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3897
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3685
3898
  if g_param[OptionsDefine.Language]:
3686
3899
  profile.language = g_param[OptionsDefine.Language]
3687
3900
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3688
3901
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3689
3902
  client._sdkVersion += ("_CLI_" + __version__)
3690
3903
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3691
- model = models.CreateCompareTaskRequest()
3904
+ model = models.IsolateMigrateJobRequest()
3692
3905
  model.from_json_string(json.dumps(args))
3693
3906
  start_time = time.time()
3694
3907
  while True:
3695
- rsp = client.CreateCompareTask(model)
3908
+ rsp = client.IsolateMigrateJob(model)
3696
3909
  result = rsp.to_json_string()
3697
3910
  try:
3698
3911
  json_obj = json.loads(result)
@@ -3711,7 +3924,7 @@ def doCreateCompareTask(args, parsed_globals):
3711
3924
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3712
3925
 
3713
3926
 
3714
- def doOfflineIsolatedSubscribe(args, parsed_globals):
3927
+ def doModifyCompareTaskName(args, parsed_globals):
3715
3928
  g_param = parse_global_arg(parsed_globals)
3716
3929
 
3717
3930
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3721,7 +3934,10 @@ def doOfflineIsolatedSubscribe(args, parsed_globals):
3721
3934
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3722
3935
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3723
3936
  )
3724
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3937
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3939
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3940
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3725
3941
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3726
3942
  else:
3727
3943
  cred = credential.Credential(
@@ -3733,18 +3949,18 @@ def doOfflineIsolatedSubscribe(args, parsed_globals):
3733
3949
  endpoint=g_param[OptionsDefine.Endpoint],
3734
3950
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3735
3951
  )
3736
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3952
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3737
3953
  if g_param[OptionsDefine.Language]:
3738
3954
  profile.language = g_param[OptionsDefine.Language]
3739
3955
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3740
3956
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3741
3957
  client._sdkVersion += ("_CLI_" + __version__)
3742
3958
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3743
- model = models.OfflineIsolatedSubscribeRequest()
3959
+ model = models.ModifyCompareTaskNameRequest()
3744
3960
  model.from_json_string(json.dumps(args))
3745
3961
  start_time = time.time()
3746
3962
  while True:
3747
- rsp = client.OfflineIsolatedSubscribe(model)
3963
+ rsp = client.ModifyCompareTaskName(model)
3748
3964
  result = rsp.to_json_string()
3749
3965
  try:
3750
3966
  json_obj = json.loads(result)
@@ -3763,7 +3979,7 @@ def doOfflineIsolatedSubscribe(args, parsed_globals):
3763
3979
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3764
3980
 
3765
3981
 
3766
- def doDescribeMigrationDetail(args, parsed_globals):
3982
+ def doResumeSubscribe(args, parsed_globals):
3767
3983
  g_param = parse_global_arg(parsed_globals)
3768
3984
 
3769
3985
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3773,7 +3989,10 @@ def doDescribeMigrationDetail(args, parsed_globals):
3773
3989
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3774
3990
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3775
3991
  )
3776
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3992
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3994
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3995
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3777
3996
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3778
3997
  else:
3779
3998
  cred = credential.Credential(
@@ -3785,18 +4004,18 @@ def doDescribeMigrationDetail(args, parsed_globals):
3785
4004
  endpoint=g_param[OptionsDefine.Endpoint],
3786
4005
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3787
4006
  )
3788
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4007
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3789
4008
  if g_param[OptionsDefine.Language]:
3790
4009
  profile.language = g_param[OptionsDefine.Language]
3791
4010
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3792
4011
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3793
4012
  client._sdkVersion += ("_CLI_" + __version__)
3794
4013
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3795
- model = models.DescribeMigrationDetailRequest()
4014
+ model = models.ResumeSubscribeRequest()
3796
4015
  model.from_json_string(json.dumps(args))
3797
4016
  start_time = time.time()
3798
4017
  while True:
3799
- rsp = client.DescribeMigrationDetail(model)
4018
+ rsp = client.ResumeSubscribe(model)
3800
4019
  result = rsp.to_json_string()
3801
4020
  try:
3802
4021
  json_obj = json.loads(result)
@@ -3815,7 +4034,7 @@ def doDescribeMigrationDetail(args, parsed_globals):
3815
4034
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3816
4035
 
3817
4036
 
3818
- def doDescribeOffsetByTime(args, parsed_globals):
4037
+ def doStartModifySyncJob(args, parsed_globals):
3819
4038
  g_param = parse_global_arg(parsed_globals)
3820
4039
 
3821
4040
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3825,7 +4044,10 @@ def doDescribeOffsetByTime(args, parsed_globals):
3825
4044
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3826
4045
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3827
4046
  )
3828
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4047
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4049
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4050
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3829
4051
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3830
4052
  else:
3831
4053
  cred = credential.Credential(
@@ -3837,18 +4059,18 @@ def doDescribeOffsetByTime(args, parsed_globals):
3837
4059
  endpoint=g_param[OptionsDefine.Endpoint],
3838
4060
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3839
4061
  )
3840
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4062
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3841
4063
  if g_param[OptionsDefine.Language]:
3842
4064
  profile.language = g_param[OptionsDefine.Language]
3843
4065
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3844
4066
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3845
4067
  client._sdkVersion += ("_CLI_" + __version__)
3846
4068
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3847
- model = models.DescribeOffsetByTimeRequest()
4069
+ model = models.StartModifySyncJobRequest()
3848
4070
  model.from_json_string(json.dumps(args))
3849
4071
  start_time = time.time()
3850
4072
  while True:
3851
- rsp = client.DescribeOffsetByTime(model)
4073
+ rsp = client.StartModifySyncJob(model)
3852
4074
  result = rsp.to_json_string()
3853
4075
  try:
3854
4076
  json_obj = json.loads(result)
@@ -3867,7 +4089,7 @@ def doDescribeOffsetByTime(args, parsed_globals):
3867
4089
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3868
4090
 
3869
4091
 
3870
- def doModifySyncRateLimit(args, parsed_globals):
4092
+ def doActivateSubscribe(args, parsed_globals):
3871
4093
  g_param = parse_global_arg(parsed_globals)
3872
4094
 
3873
4095
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3877,7 +4099,10 @@ def doModifySyncRateLimit(args, parsed_globals):
3877
4099
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3878
4100
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3879
4101
  )
3880
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4102
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4104
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4105
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3881
4106
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3882
4107
  else:
3883
4108
  cred = credential.Credential(
@@ -3889,18 +4114,18 @@ def doModifySyncRateLimit(args, parsed_globals):
3889
4114
  endpoint=g_param[OptionsDefine.Endpoint],
3890
4115
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3891
4116
  )
3892
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4117
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3893
4118
  if g_param[OptionsDefine.Language]:
3894
4119
  profile.language = g_param[OptionsDefine.Language]
3895
4120
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3896
4121
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3897
4122
  client._sdkVersion += ("_CLI_" + __version__)
3898
4123
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3899
- model = models.ModifySyncRateLimitRequest()
4124
+ model = models.ActivateSubscribeRequest()
3900
4125
  model.from_json_string(json.dumps(args))
3901
4126
  start_time = time.time()
3902
4127
  while True:
3903
- rsp = client.ModifySyncRateLimit(model)
4128
+ rsp = client.ActivateSubscribe(model)
3904
4129
  result = rsp.to_json_string()
3905
4130
  try:
3906
4131
  json_obj = json.loads(result)
@@ -3919,7 +4144,7 @@ def doModifySyncRateLimit(args, parsed_globals):
3919
4144
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3920
4145
 
3921
4146
 
3922
- def doResumeSyncJob(args, parsed_globals):
4147
+ def doCreateSyncJob(args, parsed_globals):
3923
4148
  g_param = parse_global_arg(parsed_globals)
3924
4149
 
3925
4150
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3929,7 +4154,10 @@ def doResumeSyncJob(args, parsed_globals):
3929
4154
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3930
4155
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3931
4156
  )
3932
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4157
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4159
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4160
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3933
4161
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3934
4162
  else:
3935
4163
  cred = credential.Credential(
@@ -3941,18 +4169,18 @@ def doResumeSyncJob(args, parsed_globals):
3941
4169
  endpoint=g_param[OptionsDefine.Endpoint],
3942
4170
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3943
4171
  )
3944
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4172
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3945
4173
  if g_param[OptionsDefine.Language]:
3946
4174
  profile.language = g_param[OptionsDefine.Language]
3947
4175
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3948
4176
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
3949
4177
  client._sdkVersion += ("_CLI_" + __version__)
3950
4178
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3951
- model = models.ResumeSyncJobRequest()
4179
+ model = models.CreateSyncJobRequest()
3952
4180
  model.from_json_string(json.dumps(args))
3953
4181
  start_time = time.time()
3954
4182
  while True:
3955
- rsp = client.ResumeSyncJob(model)
4183
+ rsp = client.CreateSyncJob(model)
3956
4184
  result = rsp.to_json_string()
3957
4185
  try:
3958
4186
  json_obj = json.loads(result)
@@ -3971,7 +4199,7 @@ def doResumeSyncJob(args, parsed_globals):
3971
4199
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3972
4200
 
3973
4201
 
3974
- def doDescribeMigrationCheckJob(args, parsed_globals):
4202
+ def doDescribeConsumerGroups(args, parsed_globals):
3975
4203
  g_param = parse_global_arg(parsed_globals)
3976
4204
 
3977
4205
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3981,7 +4209,10 @@ def doDescribeMigrationCheckJob(args, parsed_globals):
3981
4209
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3982
4210
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3983
4211
  )
3984
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4212
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4214
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4215
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3985
4216
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3986
4217
  else:
3987
4218
  cred = credential.Credential(
@@ -3993,18 +4224,18 @@ def doDescribeMigrationCheckJob(args, parsed_globals):
3993
4224
  endpoint=g_param[OptionsDefine.Endpoint],
3994
4225
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3995
4226
  )
3996
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4227
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3997
4228
  if g_param[OptionsDefine.Language]:
3998
4229
  profile.language = g_param[OptionsDefine.Language]
3999
4230
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4000
4231
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4001
4232
  client._sdkVersion += ("_CLI_" + __version__)
4002
4233
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4003
- model = models.DescribeMigrationCheckJobRequest()
4234
+ model = models.DescribeConsumerGroupsRequest()
4004
4235
  model.from_json_string(json.dumps(args))
4005
4236
  start_time = time.time()
4006
4237
  while True:
4007
- rsp = client.DescribeMigrationCheckJob(model)
4238
+ rsp = client.DescribeConsumerGroups(model)
4008
4239
  result = rsp.to_json_string()
4009
4240
  try:
4010
4241
  json_obj = json.loads(result)
@@ -4023,7 +4254,7 @@ def doDescribeMigrationCheckJob(args, parsed_globals):
4023
4254
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4024
4255
 
4025
4256
 
4026
- def doStartMigrateJob(args, parsed_globals):
4257
+ def doDeleteMigrateJob(args, parsed_globals):
4027
4258
  g_param = parse_global_arg(parsed_globals)
4028
4259
 
4029
4260
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4033,7 +4264,10 @@ def doStartMigrateJob(args, parsed_globals):
4033
4264
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4034
4265
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4035
4266
  )
4036
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4267
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4269
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4270
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4037
4271
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4038
4272
  else:
4039
4273
  cred = credential.Credential(
@@ -4045,18 +4279,18 @@ def doStartMigrateJob(args, parsed_globals):
4045
4279
  endpoint=g_param[OptionsDefine.Endpoint],
4046
4280
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4047
4281
  )
4048
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4282
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4049
4283
  if g_param[OptionsDefine.Language]:
4050
4284
  profile.language = g_param[OptionsDefine.Language]
4051
4285
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4052
4286
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4053
4287
  client._sdkVersion += ("_CLI_" + __version__)
4054
4288
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4055
- model = models.StartMigrateJobRequest()
4289
+ model = models.DeleteMigrateJobRequest()
4056
4290
  model.from_json_string(json.dumps(args))
4057
4291
  start_time = time.time()
4058
4292
  while True:
4059
- rsp = client.StartMigrateJob(model)
4293
+ rsp = client.DeleteMigrateJob(model)
4060
4294
  result = rsp.to_json_string()
4061
4295
  try:
4062
4296
  json_obj = json.loads(result)
@@ -4075,7 +4309,7 @@ def doStartMigrateJob(args, parsed_globals):
4075
4309
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4076
4310
 
4077
4311
 
4078
- def doDescribeAsyncRequestInfo(args, parsed_globals):
4312
+ def doResizeSyncJob(args, parsed_globals):
4079
4313
  g_param = parse_global_arg(parsed_globals)
4080
4314
 
4081
4315
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4085,7 +4319,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
4085
4319
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4086
4320
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4087
4321
  )
4088
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4322
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4324
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4325
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4089
4326
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4090
4327
  else:
4091
4328
  cred = credential.Credential(
@@ -4097,18 +4334,18 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
4097
4334
  endpoint=g_param[OptionsDefine.Endpoint],
4098
4335
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4099
4336
  )
4100
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4337
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4101
4338
  if g_param[OptionsDefine.Language]:
4102
4339
  profile.language = g_param[OptionsDefine.Language]
4103
4340
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4104
4341
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4105
4342
  client._sdkVersion += ("_CLI_" + __version__)
4106
4343
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4107
- model = models.DescribeAsyncRequestInfoRequest()
4344
+ model = models.ResizeSyncJobRequest()
4108
4345
  model.from_json_string(json.dumps(args))
4109
4346
  start_time = time.time()
4110
4347
  while True:
4111
- rsp = client.DescribeAsyncRequestInfo(model)
4348
+ rsp = client.ResizeSyncJob(model)
4112
4349
  result = rsp.to_json_string()
4113
4350
  try:
4114
4351
  json_obj = json.loads(result)
@@ -4127,7 +4364,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
4127
4364
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4128
4365
 
4129
4366
 
4130
- def doDestroySyncJob(args, parsed_globals):
4367
+ def doStartCompare(args, parsed_globals):
4131
4368
  g_param = parse_global_arg(parsed_globals)
4132
4369
 
4133
4370
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4137,7 +4374,10 @@ def doDestroySyncJob(args, parsed_globals):
4137
4374
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4138
4375
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4139
4376
  )
4140
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4377
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4379
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4380
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4141
4381
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4142
4382
  else:
4143
4383
  cred = credential.Credential(
@@ -4149,18 +4389,18 @@ def doDestroySyncJob(args, parsed_globals):
4149
4389
  endpoint=g_param[OptionsDefine.Endpoint],
4150
4390
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4151
4391
  )
4152
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4392
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4153
4393
  if g_param[OptionsDefine.Language]:
4154
4394
  profile.language = g_param[OptionsDefine.Language]
4155
4395
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4156
4396
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4157
4397
  client._sdkVersion += ("_CLI_" + __version__)
4158
4398
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4159
- model = models.DestroySyncJobRequest()
4399
+ model = models.StartCompareRequest()
4160
4400
  model.from_json_string(json.dumps(args))
4161
4401
  start_time = time.time()
4162
4402
  while True:
4163
- rsp = client.DestroySyncJob(model)
4403
+ rsp = client.StartCompare(model)
4164
4404
  result = rsp.to_json_string()
4165
4405
  try:
4166
4406
  json_obj = json.loads(result)
@@ -4179,7 +4419,7 @@ def doDestroySyncJob(args, parsed_globals):
4179
4419
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4180
4420
 
4181
4421
 
4182
- def doModifyCompareTaskName(args, parsed_globals):
4422
+ def doStopMigrateJob(args, parsed_globals):
4183
4423
  g_param = parse_global_arg(parsed_globals)
4184
4424
 
4185
4425
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4189,7 +4429,10 @@ def doModifyCompareTaskName(args, parsed_globals):
4189
4429
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4190
4430
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4191
4431
  )
4192
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4432
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4434
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4435
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4193
4436
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4194
4437
  else:
4195
4438
  cred = credential.Credential(
@@ -4201,18 +4444,18 @@ def doModifyCompareTaskName(args, parsed_globals):
4201
4444
  endpoint=g_param[OptionsDefine.Endpoint],
4202
4445
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4203
4446
  )
4204
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4447
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4205
4448
  if g_param[OptionsDefine.Language]:
4206
4449
  profile.language = g_param[OptionsDefine.Language]
4207
4450
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4208
4451
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4209
4452
  client._sdkVersion += ("_CLI_" + __version__)
4210
4453
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4211
- model = models.ModifyCompareTaskNameRequest()
4454
+ model = models.StopMigrateJobRequest()
4212
4455
  model.from_json_string(json.dumps(args))
4213
4456
  start_time = time.time()
4214
4457
  while True:
4215
- rsp = client.ModifyCompareTaskName(model)
4458
+ rsp = client.StopMigrateJob(model)
4216
4459
  result = rsp.to_json_string()
4217
4460
  try:
4218
4461
  json_obj = json.loads(result)
@@ -4231,7 +4474,7 @@ def doModifyCompareTaskName(args, parsed_globals):
4231
4474
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4232
4475
 
4233
4476
 
4234
- def doCompleteMigrateJob(args, parsed_globals):
4477
+ def doPauseSyncJob(args, parsed_globals):
4235
4478
  g_param = parse_global_arg(parsed_globals)
4236
4479
 
4237
4480
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4241,7 +4484,10 @@ def doCompleteMigrateJob(args, parsed_globals):
4241
4484
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4242
4485
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4243
4486
  )
4244
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4487
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4489
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4490
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4245
4491
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4246
4492
  else:
4247
4493
  cred = credential.Credential(
@@ -4253,18 +4499,18 @@ def doCompleteMigrateJob(args, parsed_globals):
4253
4499
  endpoint=g_param[OptionsDefine.Endpoint],
4254
4500
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4255
4501
  )
4256
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4502
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4257
4503
  if g_param[OptionsDefine.Language]:
4258
4504
  profile.language = g_param[OptionsDefine.Language]
4259
4505
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4260
4506
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4261
4507
  client._sdkVersion += ("_CLI_" + __version__)
4262
4508
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4263
- model = models.CompleteMigrateJobRequest()
4509
+ model = models.PauseSyncJobRequest()
4264
4510
  model.from_json_string(json.dumps(args))
4265
4511
  start_time = time.time()
4266
4512
  while True:
4267
- rsp = client.CompleteMigrateJob(model)
4513
+ rsp = client.PauseSyncJob(model)
4268
4514
  result = rsp.to_json_string()
4269
4515
  try:
4270
4516
  json_obj = json.loads(result)
@@ -4283,7 +4529,7 @@ def doCompleteMigrateJob(args, parsed_globals):
4283
4529
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4284
4530
 
4285
4531
 
4286
- def doModifyMigrateName(args, parsed_globals):
4532
+ def doModifySyncRateLimit(args, parsed_globals):
4287
4533
  g_param = parse_global_arg(parsed_globals)
4288
4534
 
4289
4535
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4293,7 +4539,10 @@ def doModifyMigrateName(args, parsed_globals):
4293
4539
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4294
4540
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4295
4541
  )
4296
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4542
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4544
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4545
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4297
4546
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4298
4547
  else:
4299
4548
  cred = credential.Credential(
@@ -4305,18 +4554,18 @@ def doModifyMigrateName(args, parsed_globals):
4305
4554
  endpoint=g_param[OptionsDefine.Endpoint],
4306
4555
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4307
4556
  )
4308
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4557
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4309
4558
  if g_param[OptionsDefine.Language]:
4310
4559
  profile.language = g_param[OptionsDefine.Language]
4311
4560
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4312
4561
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4313
4562
  client._sdkVersion += ("_CLI_" + __version__)
4314
4563
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4315
- model = models.ModifyMigrateNameRequest()
4564
+ model = models.ModifySyncRateLimitRequest()
4316
4565
  model.from_json_string(json.dumps(args))
4317
4566
  start_time = time.time()
4318
4567
  while True:
4319
- rsp = client.ModifyMigrateName(model)
4568
+ rsp = client.ModifySyncRateLimit(model)
4320
4569
  result = rsp.to_json_string()
4321
4570
  try:
4322
4571
  json_obj = json.loads(result)
@@ -4335,7 +4584,7 @@ def doModifyMigrateName(args, parsed_globals):
4335
4584
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4336
4585
 
4337
4586
 
4338
- def doModifyCompareTask(args, parsed_globals):
4587
+ def doDescribeSubscribes(args, parsed_globals):
4339
4588
  g_param = parse_global_arg(parsed_globals)
4340
4589
 
4341
4590
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4345,7 +4594,10 @@ def doModifyCompareTask(args, parsed_globals):
4345
4594
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4346
4595
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4347
4596
  )
4348
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4597
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4599
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4600
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4349
4601
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4350
4602
  else:
4351
4603
  cred = credential.Credential(
@@ -4357,18 +4609,18 @@ def doModifyCompareTask(args, parsed_globals):
4357
4609
  endpoint=g_param[OptionsDefine.Endpoint],
4358
4610
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4359
4611
  )
4360
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4612
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4361
4613
  if g_param[OptionsDefine.Language]:
4362
4614
  profile.language = g_param[OptionsDefine.Language]
4363
4615
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4364
4616
  client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4365
4617
  client._sdkVersion += ("_CLI_" + __version__)
4366
4618
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4367
- model = models.ModifyCompareTaskRequest()
4619
+ model = models.DescribeSubscribesRequest()
4368
4620
  model.from_json_string(json.dumps(args))
4369
4621
  start_time = time.time()
4370
4622
  while True:
4371
- rsp = client.ModifyCompareTask(model)
4623
+ rsp = client.DescribeSubscribes(model)
4372
4624
  result = rsp.to_json_string()
4373
4625
  try:
4374
4626
  json_obj = json.loads(result)
@@ -4387,103 +4639,551 @@ def doModifyCompareTask(args, parsed_globals):
4387
4639
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4388
4640
 
4389
4641
 
4390
- CLIENT_MAP = {
4391
- "v20211206": dts_client_v20211206,
4392
- "v20180330": dts_client_v20180330,
4393
-
4394
- }
4395
-
4396
- MODELS_MAP = {
4397
- "v20211206": models_v20211206,
4398
- "v20180330": models_v20180330,
4399
-
4400
- }
4642
+ def doSkipCheckItem(args, parsed_globals):
4643
+ g_param = parse_global_arg(parsed_globals)
4401
4644
 
4402
- ACTION_MAP = {
4403
- "ResumeSubscribe": doResumeSubscribe,
4404
- "DestroyIsolatedSubscribe": doDestroyIsolatedSubscribe,
4405
- "ModifySubscribeConsumeTime": doModifySubscribeConsumeTime,
4406
- "CreateModifyCheckSyncJob": doCreateModifyCheckSyncJob,
4407
- "ModifyMigrationJob": doModifyMigrationJob,
4408
- "DescribeSyncJobs": doDescribeSyncJobs,
4409
- "ModifyMigrateRuntimeAttribute": doModifyMigrateRuntimeAttribute,
4410
- "CreateMigrationService": doCreateMigrationService,
4411
- "DescribeSubscribeJobs": doDescribeSubscribeJobs,
4412
- "ModifyMigrateRateLimit": doModifyMigrateRateLimit,
4413
- "DeleteMigrateJob": doDeleteMigrateJob,
4414
- "DescribeSubscribeReturnable": doDescribeSubscribeReturnable,
4415
- "IsolateSyncJob": doIsolateSyncJob,
4416
- "StopCompare": doStopCompare,
4417
- "CreateSyncJob": doCreateSyncJob,
4418
- "ConfigureSubscribeJob": doConfigureSubscribeJob,
4419
- "DescribeConsumerGroups": doDescribeConsumerGroups,
4420
- "CreateConsumerGroup": doCreateConsumerGroup,
4421
- "ResetConsumerGroupOffset": doResetConsumerGroupOffset,
4422
- "DeleteCompareTask": doDeleteCompareTask,
4423
- "StartSubscribe": doStartSubscribe,
4424
- "StartSyncJob": doStartSyncJob,
4425
- "CreateCheckSyncJob": doCreateCheckSyncJob,
4426
- "DescribeCompareReport": doDescribeCompareReport,
4427
- "ContinueMigrateJob": doContinueMigrateJob,
4428
- "PauseMigrateJob": doPauseMigrateJob,
4429
- "DescribeMigrateCheckJob": doDescribeMigrateCheckJob,
4430
- "ModifySubscribeObjects": doModifySubscribeObjects,
4431
- "ConfigureSyncJob": doConfigureSyncJob,
4432
- "IsolateSubscribe": doIsolateSubscribe,
4433
- "DestroyMigrateJob": doDestroyMigrateJob,
4434
- "ResetSyncJob": doResetSyncJob,
4435
- "ResizeSyncJob": doResizeSyncJob,
4436
- "ModifySubscribeAutoRenewFlag": doModifySubscribeAutoRenewFlag,
4437
- "ModifySyncJobConfig": doModifySyncJobConfig,
4438
- "ResumeMigrateJob": doResumeMigrateJob,
4439
- "StopMigrateJob": doStopMigrateJob,
4440
- "PauseSyncJob": doPauseSyncJob,
4441
- "StartModifySyncJob": doStartModifySyncJob,
4442
- "DescribeSubscribes": doDescribeSubscribes,
4443
- "StartCompare": doStartCompare,
4645
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4646
+ cred = credential.CVMRoleCredential()
4647
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4648
+ cred = credential.STSAssumeRoleCredential(
4649
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4650
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4651
+ )
4652
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4654
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4655
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4656
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4657
+ else:
4658
+ cred = credential.Credential(
4659
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4660
+ )
4661
+ http_profile = HttpProfile(
4662
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4663
+ reqMethod="POST",
4664
+ endpoint=g_param[OptionsDefine.Endpoint],
4665
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4666
+ )
4667
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4668
+ if g_param[OptionsDefine.Language]:
4669
+ profile.language = g_param[OptionsDefine.Language]
4670
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4671
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4672
+ client._sdkVersion += ("_CLI_" + __version__)
4673
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4674
+ model = models.SkipCheckItemRequest()
4675
+ model.from_json_string(json.dumps(args))
4676
+ start_time = time.time()
4677
+ while True:
4678
+ rsp = client.SkipCheckItem(model)
4679
+ result = rsp.to_json_string()
4680
+ try:
4681
+ json_obj = json.loads(result)
4682
+ except TypeError as e:
4683
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4684
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4685
+ break
4686
+ cur_time = time.time()
4687
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4688
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4689
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4690
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4691
+ else:
4692
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4693
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4694
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4695
+
4696
+
4697
+ def doCreateSubscribeCheckJob(args, parsed_globals):
4698
+ g_param = parse_global_arg(parsed_globals)
4699
+
4700
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4701
+ cred = credential.CVMRoleCredential()
4702
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4703
+ cred = credential.STSAssumeRoleCredential(
4704
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4705
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4706
+ )
4707
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4709
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4710
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4711
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4712
+ else:
4713
+ cred = credential.Credential(
4714
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4715
+ )
4716
+ http_profile = HttpProfile(
4717
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4718
+ reqMethod="POST",
4719
+ endpoint=g_param[OptionsDefine.Endpoint],
4720
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4721
+ )
4722
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4723
+ if g_param[OptionsDefine.Language]:
4724
+ profile.language = g_param[OptionsDefine.Language]
4725
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4726
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4727
+ client._sdkVersion += ("_CLI_" + __version__)
4728
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4729
+ model = models.CreateSubscribeCheckJobRequest()
4730
+ model.from_json_string(json.dumps(args))
4731
+ start_time = time.time()
4732
+ while True:
4733
+ rsp = client.CreateSubscribeCheckJob(model)
4734
+ result = rsp.to_json_string()
4735
+ try:
4736
+ json_obj = json.loads(result)
4737
+ except TypeError as e:
4738
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4739
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4740
+ break
4741
+ cur_time = time.time()
4742
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4743
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4744
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4745
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4746
+ else:
4747
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4748
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4749
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4750
+
4751
+
4752
+ def doRecoverMigrateJob(args, parsed_globals):
4753
+ g_param = parse_global_arg(parsed_globals)
4754
+
4755
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4756
+ cred = credential.CVMRoleCredential()
4757
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4758
+ cred = credential.STSAssumeRoleCredential(
4759
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4760
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4761
+ )
4762
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4763
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4764
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4765
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4766
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4767
+ else:
4768
+ cred = credential.Credential(
4769
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4770
+ )
4771
+ http_profile = HttpProfile(
4772
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4773
+ reqMethod="POST",
4774
+ endpoint=g_param[OptionsDefine.Endpoint],
4775
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4776
+ )
4777
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4778
+ if g_param[OptionsDefine.Language]:
4779
+ profile.language = g_param[OptionsDefine.Language]
4780
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4781
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4782
+ client._sdkVersion += ("_CLI_" + __version__)
4783
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4784
+ model = models.RecoverMigrateJobRequest()
4785
+ model.from_json_string(json.dumps(args))
4786
+ start_time = time.time()
4787
+ while True:
4788
+ rsp = client.RecoverMigrateJob(model)
4789
+ result = rsp.to_json_string()
4790
+ try:
4791
+ json_obj = json.loads(result)
4792
+ except TypeError as e:
4793
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4794
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4795
+ break
4796
+ cur_time = time.time()
4797
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4798
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4799
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4800
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4801
+ else:
4802
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4803
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4804
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4805
+
4806
+
4807
+ def doCreateSubscribe(args, parsed_globals):
4808
+ g_param = parse_global_arg(parsed_globals)
4809
+
4810
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4811
+ cred = credential.CVMRoleCredential()
4812
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4813
+ cred = credential.STSAssumeRoleCredential(
4814
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4815
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4816
+ )
4817
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4818
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4819
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4820
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4821
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4822
+ else:
4823
+ cred = credential.Credential(
4824
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4825
+ )
4826
+ http_profile = HttpProfile(
4827
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4828
+ reqMethod="POST",
4829
+ endpoint=g_param[OptionsDefine.Endpoint],
4830
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4831
+ )
4832
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4833
+ if g_param[OptionsDefine.Language]:
4834
+ profile.language = g_param[OptionsDefine.Language]
4835
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4836
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4837
+ client._sdkVersion += ("_CLI_" + __version__)
4838
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4839
+ model = models.CreateSubscribeRequest()
4840
+ model.from_json_string(json.dumps(args))
4841
+ start_time = time.time()
4842
+ while True:
4843
+ rsp = client.CreateSubscribe(model)
4844
+ result = rsp.to_json_string()
4845
+ try:
4846
+ json_obj = json.loads(result)
4847
+ except TypeError as e:
4848
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4849
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4850
+ break
4851
+ cur_time = time.time()
4852
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4853
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4854
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4855
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4856
+ else:
4857
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4858
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4859
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4860
+
4861
+
4862
+ def doCreateCompareTask(args, parsed_globals):
4863
+ g_param = parse_global_arg(parsed_globals)
4864
+
4865
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4866
+ cred = credential.CVMRoleCredential()
4867
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4868
+ cred = credential.STSAssumeRoleCredential(
4869
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4870
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4871
+ )
4872
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4873
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4874
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4875
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4876
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4877
+ else:
4878
+ cred = credential.Credential(
4879
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4880
+ )
4881
+ http_profile = HttpProfile(
4882
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4883
+ reqMethod="POST",
4884
+ endpoint=g_param[OptionsDefine.Endpoint],
4885
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4886
+ )
4887
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4888
+ if g_param[OptionsDefine.Language]:
4889
+ profile.language = g_param[OptionsDefine.Language]
4890
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4891
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4892
+ client._sdkVersion += ("_CLI_" + __version__)
4893
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4894
+ model = models.CreateCompareTaskRequest()
4895
+ model.from_json_string(json.dumps(args))
4896
+ start_time = time.time()
4897
+ while True:
4898
+ rsp = client.CreateCompareTask(model)
4899
+ result = rsp.to_json_string()
4900
+ try:
4901
+ json_obj = json.loads(result)
4902
+ except TypeError as e:
4903
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4904
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4905
+ break
4906
+ cur_time = time.time()
4907
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4908
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4909
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4910
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4911
+ else:
4912
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4913
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4914
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4915
+
4916
+
4917
+ def doIsolateSubscribe(args, parsed_globals):
4918
+ g_param = parse_global_arg(parsed_globals)
4919
+
4920
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4921
+ cred = credential.CVMRoleCredential()
4922
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4923
+ cred = credential.STSAssumeRoleCredential(
4924
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4925
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4926
+ )
4927
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4928
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4929
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4930
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4931
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4932
+ else:
4933
+ cred = credential.Credential(
4934
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4935
+ )
4936
+ http_profile = HttpProfile(
4937
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4938
+ reqMethod="POST",
4939
+ endpoint=g_param[OptionsDefine.Endpoint],
4940
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4941
+ )
4942
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4943
+ if g_param[OptionsDefine.Language]:
4944
+ profile.language = g_param[OptionsDefine.Language]
4945
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4946
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
4947
+ client._sdkVersion += ("_CLI_" + __version__)
4948
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4949
+ model = models.IsolateSubscribeRequest()
4950
+ model.from_json_string(json.dumps(args))
4951
+ start_time = time.time()
4952
+ while True:
4953
+ rsp = client.IsolateSubscribe(model)
4954
+ result = rsp.to_json_string()
4955
+ try:
4956
+ json_obj = json.loads(result)
4957
+ except TypeError as e:
4958
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4959
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4960
+ break
4961
+ cur_time = time.time()
4962
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4963
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4964
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4965
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4966
+ else:
4967
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4968
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4969
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4970
+
4971
+
4972
+ def doDescribeMigrationCheckJob(args, parsed_globals):
4973
+ g_param = parse_global_arg(parsed_globals)
4974
+
4975
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4976
+ cred = credential.CVMRoleCredential()
4977
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4978
+ cred = credential.STSAssumeRoleCredential(
4979
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4980
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4981
+ )
4982
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4983
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4984
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4985
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4986
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4987
+ else:
4988
+ cred = credential.Credential(
4989
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4990
+ )
4991
+ http_profile = HttpProfile(
4992
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4993
+ reqMethod="POST",
4994
+ endpoint=g_param[OptionsDefine.Endpoint],
4995
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4996
+ )
4997
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4998
+ if g_param[OptionsDefine.Language]:
4999
+ profile.language = g_param[OptionsDefine.Language]
5000
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5001
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
5002
+ client._sdkVersion += ("_CLI_" + __version__)
5003
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5004
+ model = models.DescribeMigrationCheckJobRequest()
5005
+ model.from_json_string(json.dumps(args))
5006
+ start_time = time.time()
5007
+ while True:
5008
+ rsp = client.DescribeMigrationCheckJob(model)
5009
+ result = rsp.to_json_string()
5010
+ try:
5011
+ json_obj = json.loads(result)
5012
+ except TypeError as e:
5013
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5014
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5015
+ break
5016
+ cur_time = time.time()
5017
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5018
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5019
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5020
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5021
+ else:
5022
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5023
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5024
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5025
+
5026
+
5027
+ def doModifyMigrateName(args, parsed_globals):
5028
+ g_param = parse_global_arg(parsed_globals)
5029
+
5030
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5031
+ cred = credential.CVMRoleCredential()
5032
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5033
+ cred = credential.STSAssumeRoleCredential(
5034
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5035
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5036
+ )
5037
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5038
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5039
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5040
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5041
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5042
+ else:
5043
+ cred = credential.Credential(
5044
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5045
+ )
5046
+ http_profile = HttpProfile(
5047
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5048
+ reqMethod="POST",
5049
+ endpoint=g_param[OptionsDefine.Endpoint],
5050
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5051
+ )
5052
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5053
+ if g_param[OptionsDefine.Language]:
5054
+ profile.language = g_param[OptionsDefine.Language]
5055
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5056
+ client = mod.DtsClient(cred, g_param[OptionsDefine.Region], profile)
5057
+ client._sdkVersion += ("_CLI_" + __version__)
5058
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5059
+ model = models.ModifyMigrateNameRequest()
5060
+ model.from_json_string(json.dumps(args))
5061
+ start_time = time.time()
5062
+ while True:
5063
+ rsp = client.ModifyMigrateName(model)
5064
+ result = rsp.to_json_string()
5065
+ try:
5066
+ json_obj = json.loads(result)
5067
+ except TypeError as e:
5068
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5069
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5070
+ break
5071
+ cur_time = time.time()
5072
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5073
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5074
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5075
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5076
+ else:
5077
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5078
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5079
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5080
+
5081
+
5082
+ CLIENT_MAP = {
5083
+ "v20211206": dts_client_v20211206,
5084
+ "v20180330": dts_client_v20180330,
5085
+
5086
+ }
5087
+
5088
+ MODELS_MAP = {
5089
+ "v20211206": models_v20211206,
5090
+ "v20180330": models_v20180330,
5091
+
5092
+ }
5093
+
5094
+ ACTION_MAP = {
5095
+ "ModifyMigrationJob": doModifyMigrationJob,
5096
+ "DescribeSyncJobs": doDescribeSyncJobs,
5097
+ "ModifyMigrateRateLimit": doModifyMigrateRateLimit,
5098
+ "DescribeSubscribeReturnable": doDescribeSubscribeReturnable,
5099
+ "ModifyCompareTask": doModifyCompareTask,
5100
+ "CreateConsumerGroup": doCreateConsumerGroup,
5101
+ "ModifySubscribeObjects": doModifySubscribeObjects,
5102
+ "DeleteConsumerGroup": doDeleteConsumerGroup,
5103
+ "ModifySubscribeAutoRenewFlag": doModifySubscribeAutoRenewFlag,
5104
+ "ResumeMigrateJob": doResumeMigrateJob,
5105
+ "DescribeMigrateJobs": doDescribeMigrateJobs,
5106
+ "ModifySyncCompareTaskName": doModifySyncCompareTaskName,
4444
5107
  "DescribeSubscribeCheckJob": doDescribeSubscribeCheckJob,
4445
5108
  "ContinueSyncJob": doContinueSyncJob,
4446
5109
  "StopSyncJob": doStopSyncJob,
4447
- "ModifyConsumerGroupDescription": doModifyConsumerGroupDescription,
4448
5110
  "DescribeMigrateDBInstances": doDescribeMigrateDBInstances,
4449
- "SkipCheckItem": doSkipCheckItem,
4450
- "DescribeSubscribeConf": doDescribeSubscribeConf,
4451
- "ModifyConsumerGroupPassword": doModifyConsumerGroupPassword,
4452
5111
  "CreateMigrateJob": doCreateMigrateJob,
4453
- "ModifySubscribeVipVport": doModifySubscribeVipVport,
4454
- "CreateSubscribeCheckJob": doCreateSubscribeCheckJob,
4455
5112
  "CreateMigrateCheckJob": doCreateMigrateCheckJob,
4456
- "IsolateMigrateJob": doIsolateMigrateJob,
4457
- "DescribeCheckSyncJobResult": doDescribeCheckSyncJobResult,
4458
5113
  "DescribeCompareTasks": doDescribeCompareTasks,
4459
5114
  "SkipSyncCheckItem": doSkipSyncCheckItem,
4460
- "DescribeSubscribeDetail": doDescribeSubscribeDetail,
4461
- "DeleteConsumerGroup": doDeleteConsumerGroup,
4462
5115
  "DescribeMigrationJobs": doDescribeMigrationJobs,
4463
- "RecoverMigrateJob": doRecoverMigrateJob,
4464
- "DescribeMigrateJobs": doDescribeMigrateJobs,
4465
- "CreateSubscribe": doCreateSubscribe,
4466
5116
  "RecoverSyncJob": doRecoverSyncJob,
4467
5117
  "ResetSubscribe": doResetSubscribe,
4468
- "ActivateSubscribe": doActivateSubscribe,
4469
- "ModifyMigrateJobSpec": doModifyMigrateJobSpec,
4470
- "DescribeModifyCheckSyncJobResult": doDescribeModifyCheckSyncJobResult,
4471
- "ModifySubscribeName": doModifySubscribeName,
4472
5118
  "ModifyMigrateJob": doModifyMigrateJob,
4473
- "CreateCompareTask": doCreateCompareTask,
5119
+ "ModifyMigrateJobSpec": doModifyMigrateJobSpec,
4474
5120
  "OfflineIsolatedSubscribe": doOfflineIsolatedSubscribe,
4475
5121
  "DescribeMigrationDetail": doDescribeMigrationDetail,
4476
- "DescribeOffsetByTime": doDescribeOffsetByTime,
4477
- "ModifySyncRateLimit": doModifySyncRateLimit,
4478
5122
  "ResumeSyncJob": doResumeSyncJob,
4479
- "DescribeMigrationCheckJob": doDescribeMigrationCheckJob,
5123
+ "PauseMigrateJob": doPauseMigrateJob,
4480
5124
  "StartMigrateJob": doStartMigrateJob,
4481
- "DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
4482
5125
  "DestroySyncJob": doDestroySyncJob,
4483
- "ModifyCompareTaskName": doModifyCompareTaskName,
5126
+ "StopSyncCompare": doStopSyncCompare,
5127
+ "ResetSyncJob": doResetSyncJob,
5128
+ "DestroyIsolatedSubscribe": doDestroyIsolatedSubscribe,
5129
+ "CreateModifyCheckSyncJob": doCreateModifyCheckSyncJob,
5130
+ "ModifyMigrateRuntimeAttribute": doModifyMigrateRuntimeAttribute,
5131
+ "CreateMigrationService": doCreateMigrationService,
5132
+ "DescribeSubscribeJobs": doDescribeSubscribeJobs,
5133
+ "StopCompare": doStopCompare,
5134
+ "ResetConsumerGroupOffset": doResetConsumerGroupOffset,
5135
+ "ContinueMigrateJob": doContinueMigrateJob,
5136
+ "StartSyncCompare": doStartSyncCompare,
5137
+ "DeleteSyncCompareTask": doDeleteSyncCompareTask,
5138
+ "ModifySubscribeVipVport": doModifySubscribeVipVport,
5139
+ "StartSubscribe": doStartSubscribe,
5140
+ "DescribeSubscribeDetail": doDescribeSubscribeDetail,
5141
+ "ModifySyncCompareTask": doModifySyncCompareTask,
5142
+ "DescribeSubscribeConf": doDescribeSubscribeConf,
5143
+ "DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
5144
+ "CreateSyncCompareTask": doCreateSyncCompareTask,
4484
5145
  "CompleteMigrateJob": doCompleteMigrateJob,
5146
+ "IsolateSyncJob": doIsolateSyncJob,
5147
+ "ConfigureSubscribeJob": doConfigureSubscribeJob,
5148
+ "DeleteCompareTask": doDeleteCompareTask,
5149
+ "StartSyncJob": doStartSyncJob,
5150
+ "DescribeSyncCompareTasks": doDescribeSyncCompareTasks,
5151
+ "CreateCheckSyncJob": doCreateCheckSyncJob,
5152
+ "DescribeCompareReport": doDescribeCompareReport,
5153
+ "DescribeMigrateCheckJob": doDescribeMigrateCheckJob,
5154
+ "ConfigureSyncJob": doConfigureSyncJob,
5155
+ "ModifySyncJobConfig": doModifySyncJobConfig,
5156
+ "DescribeSyncCompareReport": doDescribeSyncCompareReport,
5157
+ "ModifyConsumerGroupDescription": doModifyConsumerGroupDescription,
5158
+ "ModifyConsumerGroupPassword": doModifyConsumerGroupPassword,
5159
+ "ModifySubscribeConsumeTime": doModifySubscribeConsumeTime,
5160
+ "DescribeCheckSyncJobResult": doDescribeCheckSyncJobResult,
5161
+ "DestroyMigrateJob": doDestroyMigrateJob,
5162
+ "DescribeModifyCheckSyncJobResult": doDescribeModifyCheckSyncJobResult,
5163
+ "ModifySubscribeName": doModifySubscribeName,
5164
+ "DescribeOffsetByTime": doDescribeOffsetByTime,
5165
+ "IsolateMigrateJob": doIsolateMigrateJob,
5166
+ "ModifyCompareTaskName": doModifyCompareTaskName,
5167
+ "ResumeSubscribe": doResumeSubscribe,
5168
+ "StartModifySyncJob": doStartModifySyncJob,
5169
+ "ActivateSubscribe": doActivateSubscribe,
5170
+ "CreateSyncJob": doCreateSyncJob,
5171
+ "DescribeConsumerGroups": doDescribeConsumerGroups,
5172
+ "DeleteMigrateJob": doDeleteMigrateJob,
5173
+ "ResizeSyncJob": doResizeSyncJob,
5174
+ "StartCompare": doStartCompare,
5175
+ "StopMigrateJob": doStopMigrateJob,
5176
+ "PauseSyncJob": doPauseSyncJob,
5177
+ "ModifySyncRateLimit": doModifySyncRateLimit,
5178
+ "DescribeSubscribes": doDescribeSubscribes,
5179
+ "SkipCheckItem": doSkipCheckItem,
5180
+ "CreateSubscribeCheckJob": doCreateSubscribeCheckJob,
5181
+ "RecoverMigrateJob": doRecoverMigrateJob,
5182
+ "CreateSubscribe": doCreateSubscribe,
5183
+ "CreateCompareTask": doCreateCompareTask,
5184
+ "IsolateSubscribe": doIsolateSubscribe,
5185
+ "DescribeMigrationCheckJob": doDescribeMigrationCheckJob,
4485
5186
  "ModifyMigrateName": doModifyMigrateName,
4486
- "ModifyCompareTask": doModifyCompareTask,
4487
5187
 
4488
5188
  }
4489
5189