tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -29,7 +29,10 @@ def doTerminateDBInstances(args, parsed_globals):
|
|
|
29
29
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
30
30
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
31
31
|
)
|
|
32
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
34
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
35
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
33
36
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
34
37
|
else:
|
|
35
38
|
cred = credential.Credential(
|
|
@@ -41,7 +44,7 @@ def doTerminateDBInstances(args, parsed_globals):
|
|
|
41
44
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
42
45
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
43
46
|
)
|
|
44
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
47
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
45
48
|
if g_param[OptionsDefine.Language]:
|
|
46
49
|
profile.language = g_param[OptionsDefine.Language]
|
|
47
50
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -81,7 +84,10 @@ def doDescribeDBInstanceURL(args, parsed_globals):
|
|
|
81
84
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
82
85
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
83
86
|
)
|
|
84
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
87
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
89
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
90
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
85
91
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
86
92
|
else:
|
|
87
93
|
cred = credential.Credential(
|
|
@@ -93,7 +99,7 @@ def doDescribeDBInstanceURL(args, parsed_globals):
|
|
|
93
99
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
94
100
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
95
101
|
)
|
|
96
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
102
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
97
103
|
if g_param[OptionsDefine.Language]:
|
|
98
104
|
profile.language = g_param[OptionsDefine.Language]
|
|
99
105
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -123,7 +129,7 @@ def doDescribeDBInstanceURL(args, parsed_globals):
|
|
|
123
129
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
124
130
|
|
|
125
131
|
|
|
126
|
-
def
|
|
132
|
+
def doCreateLogDownloadTask(args, parsed_globals):
|
|
127
133
|
g_param = parse_global_arg(parsed_globals)
|
|
128
134
|
|
|
129
135
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -133,7 +139,10 @@ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
|
|
|
133
139
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
134
140
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
135
141
|
)
|
|
136
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
142
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
144
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
145
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
137
146
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
138
147
|
else:
|
|
139
148
|
cred = credential.Credential(
|
|
@@ -145,18 +154,18 @@ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
|
|
|
145
154
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
146
155
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
147
156
|
)
|
|
148
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
157
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
149
158
|
if g_param[OptionsDefine.Language]:
|
|
150
159
|
profile.language = g_param[OptionsDefine.Language]
|
|
151
160
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
152
161
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
153
162
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
154
163
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
155
|
-
model = models.
|
|
164
|
+
model = models.CreateLogDownloadTaskRequest()
|
|
156
165
|
model.from_json_string(json.dumps(args))
|
|
157
166
|
start_time = time.time()
|
|
158
167
|
while True:
|
|
159
|
-
rsp = client.
|
|
168
|
+
rsp = client.CreateLogDownloadTask(model)
|
|
160
169
|
result = rsp.to_json_string()
|
|
161
170
|
try:
|
|
162
171
|
json_obj = json.loads(result)
|
|
@@ -175,7 +184,7 @@ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
|
|
|
175
184
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
176
185
|
|
|
177
186
|
|
|
178
|
-
def
|
|
187
|
+
def doDescribeDBInstanceNodeProperty(args, parsed_globals):
|
|
179
188
|
g_param = parse_global_arg(parsed_globals)
|
|
180
189
|
|
|
181
190
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -185,7 +194,10 @@ def doDescribeDBInstanceParamTpl(args, parsed_globals):
|
|
|
185
194
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
186
195
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
187
196
|
)
|
|
188
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
197
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
199
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
200
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
189
201
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
190
202
|
else:
|
|
191
203
|
cred = credential.Credential(
|
|
@@ -197,18 +209,18 @@ def doDescribeDBInstanceParamTpl(args, parsed_globals):
|
|
|
197
209
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
198
210
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
199
211
|
)
|
|
200
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
212
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
201
213
|
if g_param[OptionsDefine.Language]:
|
|
202
214
|
profile.language = g_param[OptionsDefine.Language]
|
|
203
215
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
204
216
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
205
217
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
206
218
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
207
|
-
model = models.
|
|
219
|
+
model = models.DescribeDBInstanceNodePropertyRequest()
|
|
208
220
|
model.from_json_string(json.dumps(args))
|
|
209
221
|
start_time = time.time()
|
|
210
222
|
while True:
|
|
211
|
-
rsp = client.
|
|
223
|
+
rsp = client.DescribeDBInstanceNodeProperty(model)
|
|
212
224
|
result = rsp.to_json_string()
|
|
213
225
|
try:
|
|
214
226
|
json_obj = json.loads(result)
|
|
@@ -227,7 +239,7 @@ def doDescribeDBInstanceParamTpl(args, parsed_globals):
|
|
|
227
239
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
228
240
|
|
|
229
241
|
|
|
230
|
-
def
|
|
242
|
+
def doDescribeDBInstanceParamTpl(args, parsed_globals):
|
|
231
243
|
g_param = parse_global_arg(parsed_globals)
|
|
232
244
|
|
|
233
245
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -237,7 +249,10 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
|
|
|
237
249
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
238
250
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
239
251
|
)
|
|
240
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
252
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
254
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
255
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
241
256
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
242
257
|
else:
|
|
243
258
|
cred = credential.Credential(
|
|
@@ -249,18 +264,18 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
|
|
|
249
264
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
250
265
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
251
266
|
)
|
|
252
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
267
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
253
268
|
if g_param[OptionsDefine.Language]:
|
|
254
269
|
profile.language = g_param[OptionsDefine.Language]
|
|
255
270
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
256
271
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
257
272
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
258
273
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
259
|
-
model = models.
|
|
274
|
+
model = models.DescribeDBInstanceParamTplRequest()
|
|
260
275
|
model.from_json_string(json.dumps(args))
|
|
261
276
|
start_time = time.time()
|
|
262
277
|
while True:
|
|
263
|
-
rsp = client.
|
|
278
|
+
rsp = client.DescribeDBInstanceParamTpl(model)
|
|
264
279
|
result = rsp.to_json_string()
|
|
265
280
|
try:
|
|
266
281
|
json_obj = json.loads(result)
|
|
@@ -279,7 +294,7 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
|
|
|
279
294
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
280
295
|
|
|
281
296
|
|
|
282
|
-
def
|
|
297
|
+
def doDescribeDBInstanceDeal(args, parsed_globals):
|
|
283
298
|
g_param = parse_global_arg(parsed_globals)
|
|
284
299
|
|
|
285
300
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -289,7 +304,10 @@ def doDescribeCurrentOp(args, parsed_globals):
|
|
|
289
304
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
290
305
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
291
306
|
)
|
|
292
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
307
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
309
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
310
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
293
311
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
294
312
|
else:
|
|
295
313
|
cred = credential.Credential(
|
|
@@ -301,18 +319,18 @@ def doDescribeCurrentOp(args, parsed_globals):
|
|
|
301
319
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
302
320
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
303
321
|
)
|
|
304
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
322
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
305
323
|
if g_param[OptionsDefine.Language]:
|
|
306
324
|
profile.language = g_param[OptionsDefine.Language]
|
|
307
325
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
308
326
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
309
327
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
310
328
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
311
|
-
model = models.
|
|
329
|
+
model = models.DescribeDBInstanceDealRequest()
|
|
312
330
|
model.from_json_string(json.dumps(args))
|
|
313
331
|
start_time = time.time()
|
|
314
332
|
while True:
|
|
315
|
-
rsp = client.
|
|
333
|
+
rsp = client.DescribeDBInstanceDeal(model)
|
|
316
334
|
result = rsp.to_json_string()
|
|
317
335
|
try:
|
|
318
336
|
json_obj = json.loads(result)
|
|
@@ -331,7 +349,7 @@ def doDescribeCurrentOp(args, parsed_globals):
|
|
|
331
349
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
332
350
|
|
|
333
351
|
|
|
334
|
-
def
|
|
352
|
+
def doDescribeCurrentOp(args, parsed_globals):
|
|
335
353
|
g_param = parse_global_arg(parsed_globals)
|
|
336
354
|
|
|
337
355
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -341,7 +359,10 @@ def doDescribeClientConnections(args, parsed_globals):
|
|
|
341
359
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
342
360
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
343
361
|
)
|
|
344
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
362
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
364
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
365
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
345
366
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
346
367
|
else:
|
|
347
368
|
cred = credential.Credential(
|
|
@@ -353,18 +374,18 @@ def doDescribeClientConnections(args, parsed_globals):
|
|
|
353
374
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
354
375
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
355
376
|
)
|
|
356
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
377
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
357
378
|
if g_param[OptionsDefine.Language]:
|
|
358
379
|
profile.language = g_param[OptionsDefine.Language]
|
|
359
380
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
360
381
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
361
382
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
362
383
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
363
|
-
model = models.
|
|
384
|
+
model = models.DescribeCurrentOpRequest()
|
|
364
385
|
model.from_json_string(json.dumps(args))
|
|
365
386
|
start_time = time.time()
|
|
366
387
|
while True:
|
|
367
|
-
rsp = client.
|
|
388
|
+
rsp = client.DescribeCurrentOp(model)
|
|
368
389
|
result = rsp.to_json_string()
|
|
369
390
|
try:
|
|
370
391
|
json_obj = json.loads(result)
|
|
@@ -383,7 +404,7 @@ def doDescribeClientConnections(args, parsed_globals):
|
|
|
383
404
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
384
405
|
|
|
385
406
|
|
|
386
|
-
def
|
|
407
|
+
def doDescribeDBBackups(args, parsed_globals):
|
|
387
408
|
g_param = parse_global_arg(parsed_globals)
|
|
388
409
|
|
|
389
410
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -393,7 +414,10 @@ def doResetDBInstancePassword(args, parsed_globals):
|
|
|
393
414
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
394
415
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
395
416
|
)
|
|
396
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
417
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
419
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
420
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
397
421
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
398
422
|
else:
|
|
399
423
|
cred = credential.Credential(
|
|
@@ -405,18 +429,18 @@ def doResetDBInstancePassword(args, parsed_globals):
|
|
|
405
429
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
406
430
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
407
431
|
)
|
|
408
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
432
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
409
433
|
if g_param[OptionsDefine.Language]:
|
|
410
434
|
profile.language = g_param[OptionsDefine.Language]
|
|
411
435
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
412
436
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
413
437
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
414
438
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
415
|
-
model = models.
|
|
439
|
+
model = models.DescribeDBBackupsRequest()
|
|
416
440
|
model.from_json_string(json.dumps(args))
|
|
417
441
|
start_time = time.time()
|
|
418
442
|
while True:
|
|
419
|
-
rsp = client.
|
|
443
|
+
rsp = client.DescribeDBBackups(model)
|
|
420
444
|
result = rsp.to_json_string()
|
|
421
445
|
try:
|
|
422
446
|
json_obj = json.loads(result)
|
|
@@ -435,7 +459,7 @@ def doResetDBInstancePassword(args, parsed_globals):
|
|
|
435
459
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
436
460
|
|
|
437
461
|
|
|
438
|
-
def
|
|
462
|
+
def doDescribeClientConnections(args, parsed_globals):
|
|
439
463
|
g_param = parse_global_arg(parsed_globals)
|
|
440
464
|
|
|
441
465
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -445,7 +469,10 @@ def doDescribeSecurityGroup(args, parsed_globals):
|
|
|
445
469
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
446
470
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
447
471
|
)
|
|
448
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
472
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
474
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
475
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
449
476
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
450
477
|
else:
|
|
451
478
|
cred = credential.Credential(
|
|
@@ -457,18 +484,18 @@ def doDescribeSecurityGroup(args, parsed_globals):
|
|
|
457
484
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
458
485
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
459
486
|
)
|
|
460
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
487
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
461
488
|
if g_param[OptionsDefine.Language]:
|
|
462
489
|
profile.language = g_param[OptionsDefine.Language]
|
|
463
490
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
464
491
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
465
492
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
466
493
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
467
|
-
model = models.
|
|
494
|
+
model = models.DescribeClientConnectionsRequest()
|
|
468
495
|
model.from_json_string(json.dumps(args))
|
|
469
496
|
start_time = time.time()
|
|
470
497
|
while True:
|
|
471
|
-
rsp = client.
|
|
498
|
+
rsp = client.DescribeClientConnections(model)
|
|
472
499
|
result = rsp.to_json_string()
|
|
473
500
|
try:
|
|
474
501
|
json_obj = json.loads(result)
|
|
@@ -487,7 +514,7 @@ def doDescribeSecurityGroup(args, parsed_globals):
|
|
|
487
514
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
488
515
|
|
|
489
516
|
|
|
490
|
-
def
|
|
517
|
+
def doResetDBInstancePassword(args, parsed_globals):
|
|
491
518
|
g_param = parse_global_arg(parsed_globals)
|
|
492
519
|
|
|
493
520
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -497,7 +524,10 @@ def doSetPassword(args, parsed_globals):
|
|
|
497
524
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
498
525
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
499
526
|
)
|
|
500
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
527
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
529
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
530
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
501
531
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
502
532
|
else:
|
|
503
533
|
cred = credential.Credential(
|
|
@@ -509,18 +539,18 @@ def doSetPassword(args, parsed_globals):
|
|
|
509
539
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
510
540
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
511
541
|
)
|
|
512
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
542
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
513
543
|
if g_param[OptionsDefine.Language]:
|
|
514
544
|
profile.language = g_param[OptionsDefine.Language]
|
|
515
545
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
516
546
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
517
547
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
518
548
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
519
|
-
model = models.
|
|
549
|
+
model = models.ResetDBInstancePasswordRequest()
|
|
520
550
|
model.from_json_string(json.dumps(args))
|
|
521
551
|
start_time = time.time()
|
|
522
552
|
while True:
|
|
523
|
-
rsp = client.
|
|
553
|
+
rsp = client.ResetDBInstancePassword(model)
|
|
524
554
|
result = rsp.to_json_string()
|
|
525
555
|
try:
|
|
526
556
|
json_obj = json.loads(result)
|
|
@@ -539,7 +569,7 @@ def doSetPassword(args, parsed_globals):
|
|
|
539
569
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
540
570
|
|
|
541
571
|
|
|
542
|
-
def
|
|
572
|
+
def doDescribeSecurityGroup(args, parsed_globals):
|
|
543
573
|
g_param = parse_global_arg(parsed_globals)
|
|
544
574
|
|
|
545
575
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -549,7 +579,10 @@ def doSetAccountUserPrivilege(args, parsed_globals):
|
|
|
549
579
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
550
580
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
551
581
|
)
|
|
552
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
582
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
584
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
585
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
553
586
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
554
587
|
else:
|
|
555
588
|
cred = credential.Credential(
|
|
@@ -561,18 +594,18 @@ def doSetAccountUserPrivilege(args, parsed_globals):
|
|
|
561
594
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
562
595
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
563
596
|
)
|
|
564
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
597
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
565
598
|
if g_param[OptionsDefine.Language]:
|
|
566
599
|
profile.language = g_param[OptionsDefine.Language]
|
|
567
600
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
568
601
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
569
602
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
570
603
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
571
|
-
model = models.
|
|
604
|
+
model = models.DescribeSecurityGroupRequest()
|
|
572
605
|
model.from_json_string(json.dumps(args))
|
|
573
606
|
start_time = time.time()
|
|
574
607
|
while True:
|
|
575
|
-
rsp = client.
|
|
608
|
+
rsp = client.DescribeSecurityGroup(model)
|
|
576
609
|
result = rsp.to_json_string()
|
|
577
610
|
try:
|
|
578
611
|
json_obj = json.loads(result)
|
|
@@ -591,7 +624,7 @@ def doSetAccountUserPrivilege(args, parsed_globals):
|
|
|
591
624
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
592
625
|
|
|
593
626
|
|
|
594
|
-
def
|
|
627
|
+
def doSetPassword(args, parsed_globals):
|
|
595
628
|
g_param = parse_global_arg(parsed_globals)
|
|
596
629
|
|
|
597
630
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -601,7 +634,10 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
|
|
|
601
634
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
602
635
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
603
636
|
)
|
|
604
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
637
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
639
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
640
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
605
641
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
606
642
|
else:
|
|
607
643
|
cred = credential.Credential(
|
|
@@ -613,18 +649,18 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
|
|
|
613
649
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
614
650
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
615
651
|
)
|
|
616
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
652
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
617
653
|
if g_param[OptionsDefine.Language]:
|
|
618
654
|
profile.language = g_param[OptionsDefine.Language]
|
|
619
655
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
620
656
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
621
657
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
622
658
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
623
|
-
model = models.
|
|
659
|
+
model = models.SetPasswordRequest()
|
|
624
660
|
model.from_json_string(json.dumps(args))
|
|
625
661
|
start_time = time.time()
|
|
626
662
|
while True:
|
|
627
|
-
rsp = client.
|
|
663
|
+
rsp = client.SetPassword(model)
|
|
628
664
|
result = rsp.to_json_string()
|
|
629
665
|
try:
|
|
630
666
|
json_obj = json.loads(result)
|
|
@@ -643,7 +679,7 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
|
|
|
643
679
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
644
680
|
|
|
645
681
|
|
|
646
|
-
def
|
|
682
|
+
def doSetAccountUserPrivilege(args, parsed_globals):
|
|
647
683
|
g_param = parse_global_arg(parsed_globals)
|
|
648
684
|
|
|
649
685
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -653,7 +689,10 @@ def doUpgradeDBInstance(args, parsed_globals):
|
|
|
653
689
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
654
690
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
655
691
|
)
|
|
656
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
692
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
694
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
695
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
657
696
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
658
697
|
else:
|
|
659
698
|
cred = credential.Credential(
|
|
@@ -665,18 +704,18 @@ def doUpgradeDBInstance(args, parsed_globals):
|
|
|
665
704
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
666
705
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
667
706
|
)
|
|
668
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
707
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
669
708
|
if g_param[OptionsDefine.Language]:
|
|
670
709
|
profile.language = g_param[OptionsDefine.Language]
|
|
671
710
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
672
711
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
673
712
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
674
713
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
675
|
-
model = models.
|
|
714
|
+
model = models.SetAccountUserPrivilegeRequest()
|
|
676
715
|
model.from_json_string(json.dumps(args))
|
|
677
716
|
start_time = time.time()
|
|
678
717
|
while True:
|
|
679
|
-
rsp = client.
|
|
718
|
+
rsp = client.SetAccountUserPrivilege(model)
|
|
680
719
|
result = rsp.to_json_string()
|
|
681
720
|
try:
|
|
682
721
|
json_obj = json.loads(result)
|
|
@@ -695,7 +734,7 @@ def doUpgradeDBInstance(args, parsed_globals):
|
|
|
695
734
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
696
735
|
|
|
697
736
|
|
|
698
|
-
def
|
|
737
|
+
def doFlushInstanceRouterConfig(args, parsed_globals):
|
|
699
738
|
g_param = parse_global_arg(parsed_globals)
|
|
700
739
|
|
|
701
740
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -705,7 +744,10 @@ def doDescribeDBBackups(args, parsed_globals):
|
|
|
705
744
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
706
745
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
707
746
|
)
|
|
708
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
747
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
749
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
750
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
709
751
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
710
752
|
else:
|
|
711
753
|
cred = credential.Credential(
|
|
@@ -717,18 +759,18 @@ def doDescribeDBBackups(args, parsed_globals):
|
|
|
717
759
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
718
760
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
719
761
|
)
|
|
720
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
762
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
721
763
|
if g_param[OptionsDefine.Language]:
|
|
722
764
|
profile.language = g_param[OptionsDefine.Language]
|
|
723
765
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
724
766
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
725
767
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
726
768
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
727
|
-
model = models.
|
|
769
|
+
model = models.FlushInstanceRouterConfigRequest()
|
|
728
770
|
model.from_json_string(json.dumps(args))
|
|
729
771
|
start_time = time.time()
|
|
730
772
|
while True:
|
|
731
|
-
rsp = client.
|
|
773
|
+
rsp = client.FlushInstanceRouterConfig(model)
|
|
732
774
|
result = rsp.to_json_string()
|
|
733
775
|
try:
|
|
734
776
|
json_obj = json.loads(result)
|
|
@@ -747,7 +789,7 @@ def doDescribeDBBackups(args, parsed_globals):
|
|
|
747
789
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
748
790
|
|
|
749
791
|
|
|
750
|
-
def
|
|
792
|
+
def doUpgradeDBInstance(args, parsed_globals):
|
|
751
793
|
g_param = parse_global_arg(parsed_globals)
|
|
752
794
|
|
|
753
795
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -757,7 +799,10 @@ def doSetAutoRenew(args, parsed_globals):
|
|
|
757
799
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
758
800
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
759
801
|
)
|
|
760
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
802
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
804
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
805
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
761
806
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
762
807
|
else:
|
|
763
808
|
cred = credential.Credential(
|
|
@@ -769,18 +814,18 @@ def doSetAutoRenew(args, parsed_globals):
|
|
|
769
814
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
770
815
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
771
816
|
)
|
|
772
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
817
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
773
818
|
if g_param[OptionsDefine.Language]:
|
|
774
819
|
profile.language = g_param[OptionsDefine.Language]
|
|
775
820
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
776
821
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
777
822
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
778
823
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
779
|
-
model = models.
|
|
824
|
+
model = models.UpgradeDBInstanceRequest()
|
|
780
825
|
model.from_json_string(json.dumps(args))
|
|
781
826
|
start_time = time.time()
|
|
782
827
|
while True:
|
|
783
|
-
rsp = client.
|
|
828
|
+
rsp = client.UpgradeDBInstance(model)
|
|
784
829
|
result = rsp.to_json_string()
|
|
785
830
|
try:
|
|
786
831
|
json_obj = json.loads(result)
|
|
@@ -799,7 +844,7 @@ def doSetAutoRenew(args, parsed_globals):
|
|
|
799
844
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
800
845
|
|
|
801
846
|
|
|
802
|
-
def
|
|
847
|
+
def doDeleteLogDownloadTask(args, parsed_globals):
|
|
803
848
|
g_param = parse_global_arg(parsed_globals)
|
|
804
849
|
|
|
805
850
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -809,7 +854,10 @@ def doDescribeDetailedSlowLogs(args, parsed_globals):
|
|
|
809
854
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
810
855
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
811
856
|
)
|
|
812
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
857
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
859
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
860
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
813
861
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
814
862
|
else:
|
|
815
863
|
cred = credential.Credential(
|
|
@@ -821,18 +869,18 @@ def doDescribeDetailedSlowLogs(args, parsed_globals):
|
|
|
821
869
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
822
870
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
823
871
|
)
|
|
824
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
872
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
825
873
|
if g_param[OptionsDefine.Language]:
|
|
826
874
|
profile.language = g_param[OptionsDefine.Language]
|
|
827
875
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
828
876
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
829
877
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
830
878
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
831
|
-
model = models.
|
|
879
|
+
model = models.DeleteLogDownloadTaskRequest()
|
|
832
880
|
model.from_json_string(json.dumps(args))
|
|
833
881
|
start_time = time.time()
|
|
834
882
|
while True:
|
|
835
|
-
rsp = client.
|
|
883
|
+
rsp = client.DeleteLogDownloadTask(model)
|
|
836
884
|
result = rsp.to_json_string()
|
|
837
885
|
try:
|
|
838
886
|
json_obj = json.loads(result)
|
|
@@ -851,7 +899,7 @@ def doDescribeDetailedSlowLogs(args, parsed_globals):
|
|
|
851
899
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
852
900
|
|
|
853
901
|
|
|
854
|
-
def
|
|
902
|
+
def doDeleteAuditLogFile(args, parsed_globals):
|
|
855
903
|
g_param = parse_global_arg(parsed_globals)
|
|
856
904
|
|
|
857
905
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -861,7 +909,10 @@ def doSetBackupRules(args, parsed_globals):
|
|
|
861
909
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
862
910
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
863
911
|
)
|
|
864
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
865
916
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
866
917
|
else:
|
|
867
918
|
cred = credential.Credential(
|
|
@@ -873,18 +924,18 @@ def doSetBackupRules(args, parsed_globals):
|
|
|
873
924
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
874
925
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
875
926
|
)
|
|
876
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
877
928
|
if g_param[OptionsDefine.Language]:
|
|
878
929
|
profile.language = g_param[OptionsDefine.Language]
|
|
879
930
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
880
931
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
881
932
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
882
933
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
883
|
-
model = models.
|
|
934
|
+
model = models.DeleteAuditLogFileRequest()
|
|
884
935
|
model.from_json_string(json.dumps(args))
|
|
885
936
|
start_time = time.time()
|
|
886
937
|
while True:
|
|
887
|
-
rsp = client.
|
|
938
|
+
rsp = client.DeleteAuditLogFile(model)
|
|
888
939
|
result = rsp.to_json_string()
|
|
889
940
|
try:
|
|
890
941
|
json_obj = json.loads(result)
|
|
@@ -903,7 +954,7 @@ def doSetBackupRules(args, parsed_globals):
|
|
|
903
954
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
904
955
|
|
|
905
956
|
|
|
906
|
-
def
|
|
957
|
+
def doDescribeAuditInstanceList(args, parsed_globals):
|
|
907
958
|
g_param = parse_global_arg(parsed_globals)
|
|
908
959
|
|
|
909
960
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -913,7 +964,10 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
|
|
|
913
964
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
914
965
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
915
966
|
)
|
|
916
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
917
971
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
918
972
|
else:
|
|
919
973
|
cred = credential.Credential(
|
|
@@ -925,18 +979,18 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
|
|
|
925
979
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
926
980
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
927
981
|
)
|
|
928
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
929
983
|
if g_param[OptionsDefine.Language]:
|
|
930
984
|
profile.language = g_param[OptionsDefine.Language]
|
|
931
985
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
932
986
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
933
987
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
934
988
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
935
|
-
model = models.
|
|
989
|
+
model = models.DescribeAuditInstanceListRequest()
|
|
936
990
|
model.from_json_string(json.dumps(args))
|
|
937
991
|
start_time = time.time()
|
|
938
992
|
while True:
|
|
939
|
-
rsp = client.
|
|
993
|
+
rsp = client.DescribeAuditInstanceList(model)
|
|
940
994
|
result = rsp.to_json_string()
|
|
941
995
|
try:
|
|
942
996
|
json_obj = json.loads(result)
|
|
@@ -955,7 +1009,7 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
|
|
|
955
1009
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
956
1010
|
|
|
957
1011
|
|
|
958
|
-
def
|
|
1012
|
+
def doDescribeDetailedSlowLogs(args, parsed_globals):
|
|
959
1013
|
g_param = parse_global_arg(parsed_globals)
|
|
960
1014
|
|
|
961
1015
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -965,7 +1019,10 @@ def doRestartNodes(args, parsed_globals):
|
|
|
965
1019
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
966
1020
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
967
1021
|
)
|
|
968
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1024
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1025
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
969
1026
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
970
1027
|
else:
|
|
971
1028
|
cred = credential.Credential(
|
|
@@ -977,18 +1034,18 @@ def doRestartNodes(args, parsed_globals):
|
|
|
977
1034
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
978
1035
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
979
1036
|
)
|
|
980
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1037
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
981
1038
|
if g_param[OptionsDefine.Language]:
|
|
982
1039
|
profile.language = g_param[OptionsDefine.Language]
|
|
983
1040
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
984
1041
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
985
1042
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
986
1043
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
987
|
-
model = models.
|
|
1044
|
+
model = models.DescribeDetailedSlowLogsRequest()
|
|
988
1045
|
model.from_json_string(json.dumps(args))
|
|
989
1046
|
start_time = time.time()
|
|
990
1047
|
while True:
|
|
991
|
-
rsp = client.
|
|
1048
|
+
rsp = client.DescribeDetailedSlowLogs(model)
|
|
992
1049
|
result = rsp.to_json_string()
|
|
993
1050
|
try:
|
|
994
1051
|
json_obj = json.loads(result)
|
|
@@ -1007,7 +1064,7 @@ def doRestartNodes(args, parsed_globals):
|
|
|
1007
1064
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1008
1065
|
|
|
1009
1066
|
|
|
1010
|
-
def
|
|
1067
|
+
def doInstanceEnableSSL(args, parsed_globals):
|
|
1011
1068
|
g_param = parse_global_arg(parsed_globals)
|
|
1012
1069
|
|
|
1013
1070
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1017,7 +1074,10 @@ def doDescribeBackupRules(args, parsed_globals):
|
|
|
1017
1074
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1018
1075
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1019
1076
|
)
|
|
1020
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1077
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1079
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1080
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1021
1081
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1022
1082
|
else:
|
|
1023
1083
|
cred = credential.Credential(
|
|
@@ -1029,18 +1089,18 @@ def doDescribeBackupRules(args, parsed_globals):
|
|
|
1029
1089
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1030
1090
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1031
1091
|
)
|
|
1032
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1092
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1033
1093
|
if g_param[OptionsDefine.Language]:
|
|
1034
1094
|
profile.language = g_param[OptionsDefine.Language]
|
|
1035
1095
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1036
1096
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1037
1097
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1038
1098
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1039
|
-
model = models.
|
|
1099
|
+
model = models.InstanceEnableSSLRequest()
|
|
1040
1100
|
model.from_json_string(json.dumps(args))
|
|
1041
1101
|
start_time = time.time()
|
|
1042
1102
|
while True:
|
|
1043
|
-
rsp = client.
|
|
1103
|
+
rsp = client.InstanceEnableSSL(model)
|
|
1044
1104
|
result = rsp.to_json_string()
|
|
1045
1105
|
try:
|
|
1046
1106
|
json_obj = json.loads(result)
|
|
@@ -1059,7 +1119,7 @@ def doDescribeBackupRules(args, parsed_globals):
|
|
|
1059
1119
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1060
1120
|
|
|
1061
1121
|
|
|
1062
|
-
def
|
|
1122
|
+
def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
|
|
1063
1123
|
g_param = parse_global_arg(parsed_globals)
|
|
1064
1124
|
|
|
1065
1125
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1069,7 +1129,10 @@ def doRenameInstance(args, parsed_globals):
|
|
|
1069
1129
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1070
1130
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1071
1131
|
)
|
|
1072
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1132
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1134
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1135
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1073
1136
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1074
1137
|
else:
|
|
1075
1138
|
cred = credential.Credential(
|
|
@@ -1081,18 +1144,18 @@ def doRenameInstance(args, parsed_globals):
|
|
|
1081
1144
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1082
1145
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1083
1146
|
)
|
|
1084
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1147
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1085
1148
|
if g_param[OptionsDefine.Language]:
|
|
1086
1149
|
profile.language = g_param[OptionsDefine.Language]
|
|
1087
1150
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1088
1151
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1089
1152
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1090
1153
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1091
|
-
model = models.
|
|
1154
|
+
model = models.InquirePriceModifyDBInstanceSpecRequest()
|
|
1092
1155
|
model.from_json_string(json.dumps(args))
|
|
1093
1156
|
start_time = time.time()
|
|
1094
1157
|
while True:
|
|
1095
|
-
rsp = client.
|
|
1158
|
+
rsp = client.InquirePriceModifyDBInstanceSpec(model)
|
|
1096
1159
|
result = rsp.to_json_string()
|
|
1097
1160
|
try:
|
|
1098
1161
|
json_obj = json.loads(result)
|
|
@@ -1111,7 +1174,7 @@ def doRenameInstance(args, parsed_globals):
|
|
|
1111
1174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1112
1175
|
|
|
1113
1176
|
|
|
1114
|
-
def
|
|
1177
|
+
def doDescribeLogDownloadTasks(args, parsed_globals):
|
|
1115
1178
|
g_param = parse_global_arg(parsed_globals)
|
|
1116
1179
|
|
|
1117
1180
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1121,7 +1184,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
1121
1184
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
1185
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
1186
|
)
|
|
1124
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1187
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1189
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1190
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
1191
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
1192
|
else:
|
|
1127
1193
|
cred = credential.Credential(
|
|
@@ -1133,18 +1199,18 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
1133
1199
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
1200
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
1201
|
)
|
|
1136
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1202
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1137
1203
|
if g_param[OptionsDefine.Language]:
|
|
1138
1204
|
profile.language = g_param[OptionsDefine.Language]
|
|
1139
1205
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1140
1206
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1141
1207
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1142
1208
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1143
|
-
model = models.
|
|
1209
|
+
model = models.DescribeLogDownloadTasksRequest()
|
|
1144
1210
|
model.from_json_string(json.dumps(args))
|
|
1145
1211
|
start_time = time.time()
|
|
1146
1212
|
while True:
|
|
1147
|
-
rsp = client.
|
|
1213
|
+
rsp = client.DescribeLogDownloadTasks(model)
|
|
1148
1214
|
result = rsp.to_json_string()
|
|
1149
1215
|
try:
|
|
1150
1216
|
json_obj = json.loads(result)
|
|
@@ -1163,7 +1229,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
|
1163
1229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1164
1230
|
|
|
1165
1231
|
|
|
1166
|
-
def
|
|
1232
|
+
def doRestartNodes(args, parsed_globals):
|
|
1167
1233
|
g_param = parse_global_arg(parsed_globals)
|
|
1168
1234
|
|
|
1169
1235
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1173,7 +1239,10 @@ def doCreateAccountUser(args, parsed_globals):
|
|
|
1173
1239
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1174
1240
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1175
1241
|
)
|
|
1176
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1244
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1245
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1177
1246
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1178
1247
|
else:
|
|
1179
1248
|
cred = credential.Credential(
|
|
@@ -1185,18 +1254,18 @@ def doCreateAccountUser(args, parsed_globals):
|
|
|
1185
1254
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1186
1255
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1187
1256
|
)
|
|
1188
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1257
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1189
1258
|
if g_param[OptionsDefine.Language]:
|
|
1190
1259
|
profile.language = g_param[OptionsDefine.Language]
|
|
1191
1260
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1192
1261
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1193
1262
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1194
1263
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1195
|
-
model = models.
|
|
1264
|
+
model = models.RestartNodesRequest()
|
|
1196
1265
|
model.from_json_string(json.dumps(args))
|
|
1197
1266
|
start_time = time.time()
|
|
1198
1267
|
while True:
|
|
1199
|
-
rsp = client.
|
|
1268
|
+
rsp = client.RestartNodes(model)
|
|
1200
1269
|
result = rsp.to_json_string()
|
|
1201
1270
|
try:
|
|
1202
1271
|
json_obj = json.loads(result)
|
|
@@ -1215,7 +1284,7 @@ def doCreateAccountUser(args, parsed_globals):
|
|
|
1215
1284
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1216
1285
|
|
|
1217
1286
|
|
|
1218
|
-
def
|
|
1287
|
+
def doDescribeBackupRules(args, parsed_globals):
|
|
1219
1288
|
g_param = parse_global_arg(parsed_globals)
|
|
1220
1289
|
|
|
1221
1290
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1225,7 +1294,10 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
|
|
|
1225
1294
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1226
1295
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1227
1296
|
)
|
|
1228
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1297
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1299
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1300
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1229
1301
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1230
1302
|
else:
|
|
1231
1303
|
cred = credential.Credential(
|
|
@@ -1237,18 +1309,18 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
|
|
|
1237
1309
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1238
1310
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1239
1311
|
)
|
|
1240
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1312
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1241
1313
|
if g_param[OptionsDefine.Language]:
|
|
1242
1314
|
profile.language = g_param[OptionsDefine.Language]
|
|
1243
1315
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1244
1316
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1245
1317
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1246
1318
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1247
|
-
model = models.
|
|
1319
|
+
model = models.DescribeBackupRulesRequest()
|
|
1248
1320
|
model.from_json_string(json.dumps(args))
|
|
1249
1321
|
start_time = time.time()
|
|
1250
1322
|
while True:
|
|
1251
|
-
rsp = client.
|
|
1323
|
+
rsp = client.DescribeBackupRules(model)
|
|
1252
1324
|
result = rsp.to_json_string()
|
|
1253
1325
|
try:
|
|
1254
1326
|
json_obj = json.loads(result)
|
|
@@ -1267,7 +1339,7 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
|
|
|
1267
1339
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1268
1340
|
|
|
1269
1341
|
|
|
1270
|
-
def
|
|
1342
|
+
def doModifyInstanceParams(args, parsed_globals):
|
|
1271
1343
|
g_param = parse_global_arg(parsed_globals)
|
|
1272
1344
|
|
|
1273
1345
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1277,7 +1349,10 @@ def doModifyDBInstanceParamTpl(args, parsed_globals):
|
|
|
1277
1349
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1278
1350
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1279
1351
|
)
|
|
1280
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1352
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1354
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1355
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1281
1356
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1282
1357
|
else:
|
|
1283
1358
|
cred = credential.Credential(
|
|
@@ -1289,18 +1364,18 @@ def doModifyDBInstanceParamTpl(args, parsed_globals):
|
|
|
1289
1364
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1290
1365
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1291
1366
|
)
|
|
1292
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1367
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1293
1368
|
if g_param[OptionsDefine.Language]:
|
|
1294
1369
|
profile.language = g_param[OptionsDefine.Language]
|
|
1295
1370
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1296
1371
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1297
1372
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1298
1373
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1299
|
-
model = models.
|
|
1374
|
+
model = models.ModifyInstanceParamsRequest()
|
|
1300
1375
|
model.from_json_string(json.dumps(args))
|
|
1301
1376
|
start_time = time.time()
|
|
1302
1377
|
while True:
|
|
1303
|
-
rsp = client.
|
|
1378
|
+
rsp = client.ModifyInstanceParams(model)
|
|
1304
1379
|
result = rsp.to_json_string()
|
|
1305
1380
|
try:
|
|
1306
1381
|
json_obj = json.loads(result)
|
|
@@ -1319,7 +1394,7 @@ def doModifyDBInstanceParamTpl(args, parsed_globals):
|
|
|
1319
1394
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1320
1395
|
|
|
1321
1396
|
|
|
1322
|
-
def
|
|
1397
|
+
def doDescribeAsyncRequestInfo(args, parsed_globals):
|
|
1323
1398
|
g_param = parse_global_arg(parsed_globals)
|
|
1324
1399
|
|
|
1325
1400
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1329,7 +1404,10 @@ def doCreateDBInstanceHour(args, parsed_globals):
|
|
|
1329
1404
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1330
1405
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1331
1406
|
)
|
|
1332
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1407
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1409
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1410
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1333
1411
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1334
1412
|
else:
|
|
1335
1413
|
cred = credential.Credential(
|
|
@@ -1341,18 +1419,18 @@ def doCreateDBInstanceHour(args, parsed_globals):
|
|
|
1341
1419
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1342
1420
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1343
1421
|
)
|
|
1344
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1422
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1345
1423
|
if g_param[OptionsDefine.Language]:
|
|
1346
1424
|
profile.language = g_param[OptionsDefine.Language]
|
|
1347
1425
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1348
1426
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1349
1427
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1350
1428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1351
|
-
model = models.
|
|
1429
|
+
model = models.DescribeAsyncRequestInfoRequest()
|
|
1352
1430
|
model.from_json_string(json.dumps(args))
|
|
1353
1431
|
start_time = time.time()
|
|
1354
1432
|
while True:
|
|
1355
|
-
rsp = client.
|
|
1433
|
+
rsp = client.DescribeAsyncRequestInfo(model)
|
|
1356
1434
|
result = rsp.to_json_string()
|
|
1357
1435
|
try:
|
|
1358
1436
|
json_obj = json.loads(result)
|
|
@@ -1371,7 +1449,7 @@ def doCreateDBInstanceHour(args, parsed_globals):
|
|
|
1371
1449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1372
1450
|
|
|
1373
1451
|
|
|
1374
|
-
def
|
|
1452
|
+
def doCreateAccountUser(args, parsed_globals):
|
|
1375
1453
|
g_param = parse_global_arg(parsed_globals)
|
|
1376
1454
|
|
|
1377
1455
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1381,7 +1459,10 @@ def doCreateDBInstanceParamTpl(args, parsed_globals):
|
|
|
1381
1459
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1382
1460
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1383
1461
|
)
|
|
1384
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1462
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1464
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1465
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1385
1466
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1386
1467
|
else:
|
|
1387
1468
|
cred = credential.Credential(
|
|
@@ -1393,18 +1474,18 @@ def doCreateDBInstanceParamTpl(args, parsed_globals):
|
|
|
1393
1474
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1394
1475
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1395
1476
|
)
|
|
1396
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1477
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1397
1478
|
if g_param[OptionsDefine.Language]:
|
|
1398
1479
|
profile.language = g_param[OptionsDefine.Language]
|
|
1399
1480
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1400
1481
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1401
1482
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1402
1483
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1403
|
-
model = models.
|
|
1484
|
+
model = models.CreateAccountUserRequest()
|
|
1404
1485
|
model.from_json_string(json.dumps(args))
|
|
1405
1486
|
start_time = time.time()
|
|
1406
1487
|
while True:
|
|
1407
|
-
rsp = client.
|
|
1488
|
+
rsp = client.CreateAccountUser(model)
|
|
1408
1489
|
result = rsp.to_json_string()
|
|
1409
1490
|
try:
|
|
1410
1491
|
json_obj = json.loads(result)
|
|
@@ -1423,7 +1504,7 @@ def doCreateDBInstanceParamTpl(args, parsed_globals):
|
|
|
1423
1504
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1424
1505
|
|
|
1425
1506
|
|
|
1426
|
-
def
|
|
1507
|
+
def doOfflineIsolatedDBInstance(args, parsed_globals):
|
|
1427
1508
|
g_param = parse_global_arg(parsed_globals)
|
|
1428
1509
|
|
|
1429
1510
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1433,7 +1514,10 @@ def doDropDBInstanceParamTpl(args, parsed_globals):
|
|
|
1433
1514
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1434
1515
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1435
1516
|
)
|
|
1436
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1517
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1519
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1520
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1437
1521
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1438
1522
|
else:
|
|
1439
1523
|
cred = credential.Credential(
|
|
@@ -1445,18 +1529,18 @@ def doDropDBInstanceParamTpl(args, parsed_globals):
|
|
|
1445
1529
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1446
1530
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1447
1531
|
)
|
|
1448
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1449
1533
|
if g_param[OptionsDefine.Language]:
|
|
1450
1534
|
profile.language = g_param[OptionsDefine.Language]
|
|
1451
1535
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1452
1536
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1453
1537
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1454
1538
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1455
|
-
model = models.
|
|
1539
|
+
model = models.OfflineIsolatedDBInstanceRequest()
|
|
1456
1540
|
model.from_json_string(json.dumps(args))
|
|
1457
1541
|
start_time = time.time()
|
|
1458
1542
|
while True:
|
|
1459
|
-
rsp = client.
|
|
1543
|
+
rsp = client.OfflineIsolatedDBInstance(model)
|
|
1460
1544
|
result = rsp.to_json_string()
|
|
1461
1545
|
try:
|
|
1462
1546
|
json_obj = json.loads(result)
|
|
@@ -1475,7 +1559,7 @@ def doDropDBInstanceParamTpl(args, parsed_globals):
|
|
|
1475
1559
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1476
1560
|
|
|
1477
1561
|
|
|
1478
|
-
def
|
|
1562
|
+
def doModifyDBInstanceParamTpl(args, parsed_globals):
|
|
1479
1563
|
g_param = parse_global_arg(parsed_globals)
|
|
1480
1564
|
|
|
1481
1565
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1485,7 +1569,10 @@ def doTerminateDBInstance(args, parsed_globals):
|
|
|
1485
1569
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1486
1570
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1487
1571
|
)
|
|
1488
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1574
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1575
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1489
1576
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1490
1577
|
else:
|
|
1491
1578
|
cred = credential.Credential(
|
|
@@ -1497,18 +1584,18 @@ def doTerminateDBInstance(args, parsed_globals):
|
|
|
1497
1584
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1498
1585
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1499
1586
|
)
|
|
1500
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1587
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1501
1588
|
if g_param[OptionsDefine.Language]:
|
|
1502
1589
|
profile.language = g_param[OptionsDefine.Language]
|
|
1503
1590
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1504
1591
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1505
1592
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1506
1593
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1507
|
-
model = models.
|
|
1594
|
+
model = models.ModifyDBInstanceParamTplRequest()
|
|
1508
1595
|
model.from_json_string(json.dumps(args))
|
|
1509
1596
|
start_time = time.time()
|
|
1510
1597
|
while True:
|
|
1511
|
-
rsp = client.
|
|
1598
|
+
rsp = client.ModifyDBInstanceParamTpl(model)
|
|
1512
1599
|
result = rsp.to_json_string()
|
|
1513
1600
|
try:
|
|
1514
1601
|
json_obj = json.loads(result)
|
|
@@ -1527,7 +1614,7 @@ def doTerminateDBInstance(args, parsed_globals):
|
|
|
1527
1614
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1528
1615
|
|
|
1529
1616
|
|
|
1530
|
-
def
|
|
1617
|
+
def doCreateDBInstanceHour(args, parsed_globals):
|
|
1531
1618
|
g_param = parse_global_arg(parsed_globals)
|
|
1532
1619
|
|
|
1533
1620
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1537,7 +1624,10 @@ def doRenewDBInstances(args, parsed_globals):
|
|
|
1537
1624
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1538
1625
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1539
1626
|
)
|
|
1540
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1627
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1629
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1630
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1541
1631
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1542
1632
|
else:
|
|
1543
1633
|
cred = credential.Credential(
|
|
@@ -1549,18 +1639,18 @@ def doRenewDBInstances(args, parsed_globals):
|
|
|
1549
1639
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1550
1640
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1551
1641
|
)
|
|
1552
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1642
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1553
1643
|
if g_param[OptionsDefine.Language]:
|
|
1554
1644
|
profile.language = g_param[OptionsDefine.Language]
|
|
1555
1645
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1556
1646
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1557
1647
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1558
1648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1559
|
-
model = models.
|
|
1649
|
+
model = models.CreateDBInstanceHourRequest()
|
|
1560
1650
|
model.from_json_string(json.dumps(args))
|
|
1561
1651
|
start_time = time.time()
|
|
1562
1652
|
while True:
|
|
1563
|
-
rsp = client.
|
|
1653
|
+
rsp = client.CreateDBInstanceHour(model)
|
|
1564
1654
|
result = rsp.to_json_string()
|
|
1565
1655
|
try:
|
|
1566
1656
|
json_obj = json.loads(result)
|
|
@@ -1579,7 +1669,7 @@ def doRenewDBInstances(args, parsed_globals):
|
|
|
1579
1669
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1580
1670
|
|
|
1581
1671
|
|
|
1582
|
-
def
|
|
1672
|
+
def doCreateDBInstanceParamTpl(args, parsed_globals):
|
|
1583
1673
|
g_param = parse_global_arg(parsed_globals)
|
|
1584
1674
|
|
|
1585
1675
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1589,7 +1679,10 @@ def doCreateBackupDownloadTask(args, parsed_globals):
|
|
|
1589
1679
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1590
1680
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1591
1681
|
)
|
|
1592
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1682
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1684
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1685
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1593
1686
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1594
1687
|
else:
|
|
1595
1688
|
cred = credential.Credential(
|
|
@@ -1601,18 +1694,18 @@ def doCreateBackupDownloadTask(args, parsed_globals):
|
|
|
1601
1694
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1602
1695
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1603
1696
|
)
|
|
1604
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1697
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1605
1698
|
if g_param[OptionsDefine.Language]:
|
|
1606
1699
|
profile.language = g_param[OptionsDefine.Language]
|
|
1607
1700
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1608
1701
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1609
1702
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1610
1703
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1611
|
-
model = models.
|
|
1704
|
+
model = models.CreateDBInstanceParamTplRequest()
|
|
1612
1705
|
model.from_json_string(json.dumps(args))
|
|
1613
1706
|
start_time = time.time()
|
|
1614
1707
|
while True:
|
|
1615
|
-
rsp = client.
|
|
1708
|
+
rsp = client.CreateDBInstanceParamTpl(model)
|
|
1616
1709
|
result = rsp.to_json_string()
|
|
1617
1710
|
try:
|
|
1618
1711
|
json_obj = json.loads(result)
|
|
@@ -1631,7 +1724,7 @@ def doCreateBackupDownloadTask(args, parsed_globals):
|
|
|
1631
1724
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1632
1725
|
|
|
1633
1726
|
|
|
1634
|
-
def
|
|
1727
|
+
def doDropDBInstanceParamTpl(args, parsed_globals):
|
|
1635
1728
|
g_param = parse_global_arg(parsed_globals)
|
|
1636
1729
|
|
|
1637
1730
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1641,7 +1734,10 @@ def doUpgradeDBInstanceHour(args, parsed_globals):
|
|
|
1641
1734
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1642
1735
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1643
1736
|
)
|
|
1644
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1737
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1739
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1740
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1645
1741
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1646
1742
|
else:
|
|
1647
1743
|
cred = credential.Credential(
|
|
@@ -1653,18 +1749,18 @@ def doUpgradeDBInstanceHour(args, parsed_globals):
|
|
|
1653
1749
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1654
1750
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1655
1751
|
)
|
|
1656
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1752
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1657
1753
|
if g_param[OptionsDefine.Language]:
|
|
1658
1754
|
profile.language = g_param[OptionsDefine.Language]
|
|
1659
1755
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1660
1756
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1661
1757
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1662
1758
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1663
|
-
model = models.
|
|
1759
|
+
model = models.DropDBInstanceParamTplRequest()
|
|
1664
1760
|
model.from_json_string(json.dumps(args))
|
|
1665
1761
|
start_time = time.time()
|
|
1666
1762
|
while True:
|
|
1667
|
-
rsp = client.
|
|
1763
|
+
rsp = client.DropDBInstanceParamTpl(model)
|
|
1668
1764
|
result = rsp.to_json_string()
|
|
1669
1765
|
try:
|
|
1670
1766
|
json_obj = json.loads(result)
|
|
@@ -1683,7 +1779,7 @@ def doUpgradeDBInstanceHour(args, parsed_globals):
|
|
|
1683
1779
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1684
1780
|
|
|
1685
1781
|
|
|
1686
|
-
def
|
|
1782
|
+
def doTerminateDBInstance(args, parsed_globals):
|
|
1687
1783
|
g_param = parse_global_arg(parsed_globals)
|
|
1688
1784
|
|
|
1689
1785
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1693,7 +1789,10 @@ def doFlashBackDBInstance(args, parsed_globals):
|
|
|
1693
1789
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1694
1790
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1695
1791
|
)
|
|
1696
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1792
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1794
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1795
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1697
1796
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1698
1797
|
else:
|
|
1699
1798
|
cred = credential.Credential(
|
|
@@ -1705,18 +1804,18 @@ def doFlashBackDBInstance(args, parsed_globals):
|
|
|
1705
1804
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1706
1805
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1707
1806
|
)
|
|
1708
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1807
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1709
1808
|
if g_param[OptionsDefine.Language]:
|
|
1710
1809
|
profile.language = g_param[OptionsDefine.Language]
|
|
1711
1810
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1712
1811
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1713
1812
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1714
1813
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1715
|
-
model = models.
|
|
1814
|
+
model = models.TerminateDBInstanceRequest()
|
|
1716
1815
|
model.from_json_string(json.dumps(args))
|
|
1717
1816
|
start_time = time.time()
|
|
1718
1817
|
while True:
|
|
1719
|
-
rsp = client.
|
|
1818
|
+
rsp = client.TerminateDBInstance(model)
|
|
1720
1819
|
result = rsp.to_json_string()
|
|
1721
1820
|
try:
|
|
1722
1821
|
json_obj = json.loads(result)
|
|
@@ -1735,7 +1834,7 @@ def doFlashBackDBInstance(args, parsed_globals):
|
|
|
1735
1834
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1736
1835
|
|
|
1737
1836
|
|
|
1738
|
-
def
|
|
1837
|
+
def doRenewDBInstances(args, parsed_globals):
|
|
1739
1838
|
g_param = parse_global_arg(parsed_globals)
|
|
1740
1839
|
|
|
1741
1840
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1745,7 +1844,10 @@ def doDescribeDBInstances(args, parsed_globals):
|
|
|
1745
1844
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1746
1845
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1747
1846
|
)
|
|
1748
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1847
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1849
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1850
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1749
1851
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1750
1852
|
else:
|
|
1751
1853
|
cred = credential.Credential(
|
|
@@ -1757,18 +1859,18 @@ def doDescribeDBInstances(args, parsed_globals):
|
|
|
1757
1859
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1758
1860
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1759
1861
|
)
|
|
1760
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1862
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1761
1863
|
if g_param[OptionsDefine.Language]:
|
|
1762
1864
|
profile.language = g_param[OptionsDefine.Language]
|
|
1763
1865
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1764
1866
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1765
1867
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1766
1868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1767
|
-
model = models.
|
|
1869
|
+
model = models.RenewDBInstancesRequest()
|
|
1768
1870
|
model.from_json_string(json.dumps(args))
|
|
1769
1871
|
start_time = time.time()
|
|
1770
1872
|
while True:
|
|
1771
|
-
rsp = client.
|
|
1873
|
+
rsp = client.RenewDBInstances(model)
|
|
1772
1874
|
result = rsp.to_json_string()
|
|
1773
1875
|
try:
|
|
1774
1876
|
json_obj = json.loads(result)
|
|
@@ -1787,7 +1889,7 @@ def doDescribeDBInstances(args, parsed_globals):
|
|
|
1787
1889
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1788
1890
|
|
|
1789
1891
|
|
|
1790
|
-
def
|
|
1892
|
+
def doCreateBackupDownloadTask(args, parsed_globals):
|
|
1791
1893
|
g_param = parse_global_arg(parsed_globals)
|
|
1792
1894
|
|
|
1793
1895
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1797,7 +1899,10 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
|
|
|
1797
1899
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1798
1900
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1799
1901
|
)
|
|
1800
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1902
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1904
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1905
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1801
1906
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1802
1907
|
else:
|
|
1803
1908
|
cred = credential.Credential(
|
|
@@ -1809,18 +1914,18 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
|
|
|
1809
1914
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1810
1915
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1811
1916
|
)
|
|
1812
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1917
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1813
1918
|
if g_param[OptionsDefine.Language]:
|
|
1814
1919
|
profile.language = g_param[OptionsDefine.Language]
|
|
1815
1920
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1816
1921
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1817
1922
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1818
1923
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1819
|
-
model = models.
|
|
1924
|
+
model = models.CreateBackupDownloadTaskRequest()
|
|
1820
1925
|
model.from_json_string(json.dumps(args))
|
|
1821
1926
|
start_time = time.time()
|
|
1822
1927
|
while True:
|
|
1823
|
-
rsp = client.
|
|
1928
|
+
rsp = client.CreateBackupDownloadTask(model)
|
|
1824
1929
|
result = rsp.to_json_string()
|
|
1825
1930
|
try:
|
|
1826
1931
|
json_obj = json.loads(result)
|
|
@@ -1839,7 +1944,7 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
|
|
|
1839
1944
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1840
1945
|
|
|
1841
1946
|
|
|
1842
|
-
def
|
|
1947
|
+
def doUpgradeDBInstanceHour(args, parsed_globals):
|
|
1843
1948
|
g_param = parse_global_arg(parsed_globals)
|
|
1844
1949
|
|
|
1845
1950
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1849,7 +1954,10 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
|
|
|
1849
1954
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1850
1955
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1851
1956
|
)
|
|
1852
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1957
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1959
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1960
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1853
1961
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1854
1962
|
else:
|
|
1855
1963
|
cred = credential.Credential(
|
|
@@ -1861,18 +1969,18 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
|
|
|
1861
1969
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1862
1970
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1863
1971
|
)
|
|
1864
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1972
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1865
1973
|
if g_param[OptionsDefine.Language]:
|
|
1866
1974
|
profile.language = g_param[OptionsDefine.Language]
|
|
1867
1975
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1868
1976
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1869
1977
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1870
1978
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1871
|
-
model = models.
|
|
1979
|
+
model = models.UpgradeDBInstanceHourRequest()
|
|
1872
1980
|
model.from_json_string(json.dumps(args))
|
|
1873
1981
|
start_time = time.time()
|
|
1874
1982
|
while True:
|
|
1875
|
-
rsp = client.
|
|
1983
|
+
rsp = client.UpgradeDBInstanceHour(model)
|
|
1876
1984
|
result = rsp.to_json_string()
|
|
1877
1985
|
try:
|
|
1878
1986
|
json_obj = json.loads(result)
|
|
@@ -1891,7 +1999,7 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
|
|
|
1891
1999
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1892
2000
|
|
|
1893
2001
|
|
|
1894
|
-
def
|
|
2002
|
+
def doFlashBackDBInstance(args, parsed_globals):
|
|
1895
2003
|
g_param = parse_global_arg(parsed_globals)
|
|
1896
2004
|
|
|
1897
2005
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1901,7 +2009,10 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
1901
2009
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1902
2010
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1903
2011
|
)
|
|
1904
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2012
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2014
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2015
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1905
2016
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1906
2017
|
else:
|
|
1907
2018
|
cred = credential.Credential(
|
|
@@ -1913,18 +2024,18 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
1913
2024
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1914
2025
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1915
2026
|
)
|
|
1916
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2027
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1917
2028
|
if g_param[OptionsDefine.Language]:
|
|
1918
2029
|
profile.language = g_param[OptionsDefine.Language]
|
|
1919
2030
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1920
2031
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1921
2032
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1922
2033
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1923
|
-
model = models.
|
|
2034
|
+
model = models.FlashBackDBInstanceRequest()
|
|
1924
2035
|
model.from_json_string(json.dumps(args))
|
|
1925
2036
|
start_time = time.time()
|
|
1926
2037
|
while True:
|
|
1927
|
-
rsp = client.
|
|
2038
|
+
rsp = client.FlashBackDBInstance(model)
|
|
1928
2039
|
result = rsp.to_json_string()
|
|
1929
2040
|
try:
|
|
1930
2041
|
json_obj = json.loads(result)
|
|
@@ -1943,7 +2054,7 @@ def doDescribeSlowLogs(args, parsed_globals):
|
|
|
1943
2054
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1944
2055
|
|
|
1945
2056
|
|
|
1946
|
-
def
|
|
2057
|
+
def doModifyAuditService(args, parsed_globals):
|
|
1947
2058
|
g_param = parse_global_arg(parsed_globals)
|
|
1948
2059
|
|
|
1949
2060
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1953,7 +2064,10 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
|
|
|
1953
2064
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1954
2065
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1955
2066
|
)
|
|
1956
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2067
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2069
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2070
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1957
2071
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1958
2072
|
else:
|
|
1959
2073
|
cred = credential.Credential(
|
|
@@ -1965,18 +2079,18 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
|
|
|
1965
2079
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1966
2080
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1967
2081
|
)
|
|
1968
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1969
2083
|
if g_param[OptionsDefine.Language]:
|
|
1970
2084
|
profile.language = g_param[OptionsDefine.Language]
|
|
1971
2085
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1972
2086
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1973
2087
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1974
2088
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1975
|
-
model = models.
|
|
2089
|
+
model = models.ModifyAuditServiceRequest()
|
|
1976
2090
|
model.from_json_string(json.dumps(args))
|
|
1977
2091
|
start_time = time.time()
|
|
1978
2092
|
while True:
|
|
1979
|
-
rsp = client.
|
|
2093
|
+
rsp = client.ModifyAuditService(model)
|
|
1980
2094
|
result = rsp.to_json_string()
|
|
1981
2095
|
try:
|
|
1982
2096
|
json_obj = json.loads(result)
|
|
@@ -1995,7 +2109,7 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
|
|
|
1995
2109
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1996
2110
|
|
|
1997
2111
|
|
|
1998
|
-
def
|
|
2112
|
+
def doDescribeDBInstances(args, parsed_globals):
|
|
1999
2113
|
g_param = parse_global_arg(parsed_globals)
|
|
2000
2114
|
|
|
2001
2115
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2005,7 +2119,10 @@ def doCreateDBInstance(args, parsed_globals):
|
|
|
2005
2119
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2006
2120
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2007
2121
|
)
|
|
2008
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2124
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2125
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2009
2126
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2010
2127
|
else:
|
|
2011
2128
|
cred = credential.Credential(
|
|
@@ -2017,18 +2134,18 @@ def doCreateDBInstance(args, parsed_globals):
|
|
|
2017
2134
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2018
2135
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2019
2136
|
)
|
|
2020
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2137
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2021
2138
|
if g_param[OptionsDefine.Language]:
|
|
2022
2139
|
profile.language = g_param[OptionsDefine.Language]
|
|
2023
2140
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2024
2141
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2025
2142
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2026
2143
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2027
|
-
model = models.
|
|
2144
|
+
model = models.DescribeDBInstancesRequest()
|
|
2028
2145
|
model.from_json_string(json.dumps(args))
|
|
2029
2146
|
start_time = time.time()
|
|
2030
2147
|
while True:
|
|
2031
|
-
rsp = client.
|
|
2148
|
+
rsp = client.DescribeDBInstances(model)
|
|
2032
2149
|
result = rsp.to_json_string()
|
|
2033
2150
|
try:
|
|
2034
2151
|
json_obj = json.loads(result)
|
|
@@ -2047,7 +2164,7 @@ def doCreateDBInstance(args, parsed_globals):
|
|
|
2047
2164
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2048
2165
|
|
|
2049
2166
|
|
|
2050
|
-
def
|
|
2167
|
+
def doDescribeDBInstanceNamespace(args, parsed_globals):
|
|
2051
2168
|
g_param = parse_global_arg(parsed_globals)
|
|
2052
2169
|
|
|
2053
2170
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2057,7 +2174,10 @@ def doModifyDBInstanceSpec(args, parsed_globals):
|
|
|
2057
2174
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2058
2175
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2059
2176
|
)
|
|
2060
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2177
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2179
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2180
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2061
2181
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2062
2182
|
else:
|
|
2063
2183
|
cred = credential.Credential(
|
|
@@ -2069,18 +2189,18 @@ def doModifyDBInstanceSpec(args, parsed_globals):
|
|
|
2069
2189
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2070
2190
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2071
2191
|
)
|
|
2072
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2192
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2073
2193
|
if g_param[OptionsDefine.Language]:
|
|
2074
2194
|
profile.language = g_param[OptionsDefine.Language]
|
|
2075
2195
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2076
2196
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2077
2197
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2078
2198
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2079
|
-
model = models.
|
|
2199
|
+
model = models.DescribeDBInstanceNamespaceRequest()
|
|
2080
2200
|
model.from_json_string(json.dumps(args))
|
|
2081
2201
|
start_time = time.time()
|
|
2082
2202
|
while True:
|
|
2083
|
-
rsp = client.
|
|
2203
|
+
rsp = client.DescribeDBInstanceNamespace(model)
|
|
2084
2204
|
result = rsp.to_json_string()
|
|
2085
2205
|
try:
|
|
2086
2206
|
json_obj = json.loads(result)
|
|
@@ -2099,7 +2219,7 @@ def doModifyDBInstanceSpec(args, parsed_globals):
|
|
|
2099
2219
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2100
2220
|
|
|
2101
2221
|
|
|
2102
|
-
def
|
|
2222
|
+
def doDescribeSlowLogPatterns(args, parsed_globals):
|
|
2103
2223
|
g_param = parse_global_arg(parsed_globals)
|
|
2104
2224
|
|
|
2105
2225
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2109,7 +2229,10 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
2109
2229
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2110
2230
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2111
2231
|
)
|
|
2112
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2232
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2234
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2235
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2113
2236
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2114
2237
|
else:
|
|
2115
2238
|
cred = credential.Credential(
|
|
@@ -2121,18 +2244,18 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
2121
2244
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2122
2245
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2123
2246
|
)
|
|
2124
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2247
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2125
2248
|
if g_param[OptionsDefine.Language]:
|
|
2126
2249
|
profile.language = g_param[OptionsDefine.Language]
|
|
2127
2250
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2128
2251
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2129
2252
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2130
2253
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2131
|
-
model = models.
|
|
2254
|
+
model = models.DescribeSlowLogPatternsRequest()
|
|
2132
2255
|
model.from_json_string(json.dumps(args))
|
|
2133
2256
|
start_time = time.time()
|
|
2134
2257
|
while True:
|
|
2135
|
-
rsp = client.
|
|
2258
|
+
rsp = client.DescribeSlowLogPatterns(model)
|
|
2136
2259
|
result = rsp.to_json_string()
|
|
2137
2260
|
try:
|
|
2138
2261
|
json_obj = json.loads(result)
|
|
@@ -2151,7 +2274,7 @@ def doDescribeInstanceParams(args, parsed_globals):
|
|
|
2151
2274
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2152
2275
|
|
|
2153
2276
|
|
|
2154
|
-
def
|
|
2277
|
+
def doDescribeSlowLogs(args, parsed_globals):
|
|
2155
2278
|
g_param = parse_global_arg(parsed_globals)
|
|
2156
2279
|
|
|
2157
2280
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2161,7 +2284,10 @@ def doDescribeSpecInfo(args, parsed_globals):
|
|
|
2161
2284
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2162
2285
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2163
2286
|
)
|
|
2164
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2287
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2289
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2290
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2165
2291
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2166
2292
|
else:
|
|
2167
2293
|
cred = credential.Credential(
|
|
@@ -2173,18 +2299,18 @@ def doDescribeSpecInfo(args, parsed_globals):
|
|
|
2173
2299
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2174
2300
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2175
2301
|
)
|
|
2176
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2302
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2177
2303
|
if g_param[OptionsDefine.Language]:
|
|
2178
2304
|
profile.language = g_param[OptionsDefine.Language]
|
|
2179
2305
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2180
2306
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2181
2307
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2182
2308
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2183
|
-
model = models.
|
|
2309
|
+
model = models.DescribeSlowLogsRequest()
|
|
2184
2310
|
model.from_json_string(json.dumps(args))
|
|
2185
2311
|
start_time = time.time()
|
|
2186
2312
|
while True:
|
|
2187
|
-
rsp = client.
|
|
2313
|
+
rsp = client.DescribeSlowLogs(model)
|
|
2188
2314
|
result = rsp.to_json_string()
|
|
2189
2315
|
try:
|
|
2190
2316
|
json_obj = json.loads(result)
|
|
@@ -2203,7 +2329,7 @@ def doDescribeSpecInfo(args, parsed_globals):
|
|
|
2203
2329
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2204
2330
|
|
|
2205
2331
|
|
|
2206
|
-
def
|
|
2332
|
+
def doDescribeMongodbLogs(args, parsed_globals):
|
|
2207
2333
|
g_param = parse_global_arg(parsed_globals)
|
|
2208
2334
|
|
|
2209
2335
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2213,7 +2339,10 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
|
|
|
2213
2339
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2214
2340
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2215
2341
|
)
|
|
2216
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2344
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2345
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2217
2346
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2218
2347
|
else:
|
|
2219
2348
|
cred = credential.Credential(
|
|
@@ -2225,18 +2354,18 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
|
|
|
2225
2354
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2226
2355
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2227
2356
|
)
|
|
2228
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2357
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2229
2358
|
if g_param[OptionsDefine.Language]:
|
|
2230
2359
|
profile.language = g_param[OptionsDefine.Language]
|
|
2231
2360
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2232
2361
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2233
2362
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2234
2363
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2235
|
-
model = models.
|
|
2364
|
+
model = models.DescribeMongodbLogsRequest()
|
|
2236
2365
|
model.from_json_string(json.dumps(args))
|
|
2237
2366
|
start_time = time.time()
|
|
2238
2367
|
while True:
|
|
2239
|
-
rsp = client.
|
|
2368
|
+
rsp = client.DescribeMongodbLogs(model)
|
|
2240
2369
|
result = rsp.to_json_string()
|
|
2241
2370
|
try:
|
|
2242
2371
|
json_obj = json.loads(result)
|
|
@@ -2255,7 +2384,7 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
|
|
|
2255
2384
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2256
2385
|
|
|
2257
2386
|
|
|
2258
|
-
def
|
|
2387
|
+
def doCreateDBInstance(args, parsed_globals):
|
|
2259
2388
|
g_param = parse_global_arg(parsed_globals)
|
|
2260
2389
|
|
|
2261
2390
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2265,7 +2394,10 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
|
|
|
2265
2394
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2266
2395
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2267
2396
|
)
|
|
2268
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2397
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2399
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2400
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2269
2401
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2270
2402
|
else:
|
|
2271
2403
|
cred = credential.Credential(
|
|
@@ -2277,18 +2409,18 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
|
|
|
2277
2409
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2278
2410
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2279
2411
|
)
|
|
2280
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2412
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2281
2413
|
if g_param[OptionsDefine.Language]:
|
|
2282
2414
|
profile.language = g_param[OptionsDefine.Language]
|
|
2283
2415
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2284
2416
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2285
2417
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2286
2418
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2287
|
-
model = models.
|
|
2419
|
+
model = models.CreateDBInstanceRequest()
|
|
2288
2420
|
model.from_json_string(json.dumps(args))
|
|
2289
2421
|
start_time = time.time()
|
|
2290
2422
|
while True:
|
|
2291
|
-
rsp = client.
|
|
2423
|
+
rsp = client.CreateDBInstance(model)
|
|
2292
2424
|
result = rsp.to_json_string()
|
|
2293
2425
|
try:
|
|
2294
2426
|
json_obj = json.loads(result)
|
|
@@ -2307,7 +2439,7 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
|
|
|
2307
2439
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2308
2440
|
|
|
2309
2441
|
|
|
2310
|
-
def
|
|
2442
|
+
def doModifyDBInstanceSpec(args, parsed_globals):
|
|
2311
2443
|
g_param = parse_global_arg(parsed_globals)
|
|
2312
2444
|
|
|
2313
2445
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2317,7 +2449,10 @@ def doSetDBInstanceDeletionProtection(args, parsed_globals):
|
|
|
2317
2449
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2318
2450
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2319
2451
|
)
|
|
2320
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2452
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2454
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2455
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2321
2456
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2322
2457
|
else:
|
|
2323
2458
|
cred = credential.Credential(
|
|
@@ -2329,18 +2464,18 @@ def doSetDBInstanceDeletionProtection(args, parsed_globals):
|
|
|
2329
2464
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2330
2465
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2331
2466
|
)
|
|
2332
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2467
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2333
2468
|
if g_param[OptionsDefine.Language]:
|
|
2334
2469
|
profile.language = g_param[OptionsDefine.Language]
|
|
2335
2470
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2336
2471
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2337
2472
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2338
2473
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2339
|
-
model = models.
|
|
2474
|
+
model = models.ModifyDBInstanceSpecRequest()
|
|
2340
2475
|
model.from_json_string(json.dumps(args))
|
|
2341
2476
|
start_time = time.time()
|
|
2342
2477
|
while True:
|
|
2343
|
-
rsp = client.
|
|
2478
|
+
rsp = client.ModifyDBInstanceSpec(model)
|
|
2344
2479
|
result = rsp.to_json_string()
|
|
2345
2480
|
try:
|
|
2346
2481
|
json_obj = json.loads(result)
|
|
@@ -2359,7 +2494,7 @@ def doSetDBInstanceDeletionProtection(args, parsed_globals):
|
|
|
2359
2494
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2360
2495
|
|
|
2361
2496
|
|
|
2362
|
-
def
|
|
2497
|
+
def doDescribeInstanceParams(args, parsed_globals):
|
|
2363
2498
|
g_param = parse_global_arg(parsed_globals)
|
|
2364
2499
|
|
|
2365
2500
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2369,7 +2504,10 @@ def doAssignProject(args, parsed_globals):
|
|
|
2369
2504
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2370
2505
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2371
2506
|
)
|
|
2372
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2507
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2509
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2510
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2373
2511
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2374
2512
|
else:
|
|
2375
2513
|
cred = credential.Credential(
|
|
@@ -2381,18 +2519,18 @@ def doAssignProject(args, parsed_globals):
|
|
|
2381
2519
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2382
2520
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2383
2521
|
)
|
|
2384
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2522
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2385
2523
|
if g_param[OptionsDefine.Language]:
|
|
2386
2524
|
profile.language = g_param[OptionsDefine.Language]
|
|
2387
2525
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2388
2526
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2389
2527
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2390
2528
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2391
|
-
model = models.
|
|
2529
|
+
model = models.DescribeInstanceParamsRequest()
|
|
2392
2530
|
model.from_json_string(json.dumps(args))
|
|
2393
2531
|
start_time = time.time()
|
|
2394
2532
|
while True:
|
|
2395
|
-
rsp = client.
|
|
2533
|
+
rsp = client.DescribeInstanceParams(model)
|
|
2396
2534
|
result = rsp.to_json_string()
|
|
2397
2535
|
try:
|
|
2398
2536
|
json_obj = json.loads(result)
|
|
@@ -2411,7 +2549,7 @@ def doAssignProject(args, parsed_globals):
|
|
|
2411
2549
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2412
2550
|
|
|
2413
2551
|
|
|
2414
|
-
def
|
|
2552
|
+
def doUpgradeDBInstanceKernelVersion(args, parsed_globals):
|
|
2415
2553
|
g_param = parse_global_arg(parsed_globals)
|
|
2416
2554
|
|
|
2417
2555
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2421,7 +2559,10 @@ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
|
|
|
2421
2559
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2422
2560
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2423
2561
|
)
|
|
2424
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2562
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2564
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2565
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2425
2566
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2426
2567
|
else:
|
|
2427
2568
|
cred = credential.Credential(
|
|
@@ -2433,18 +2574,18 @@ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
|
|
|
2433
2574
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2434
2575
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2435
2576
|
)
|
|
2436
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2577
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2437
2578
|
if g_param[OptionsDefine.Language]:
|
|
2438
2579
|
profile.language = g_param[OptionsDefine.Language]
|
|
2439
2580
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2440
2581
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2441
2582
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2442
2583
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2443
|
-
model = models.
|
|
2584
|
+
model = models.UpgradeDBInstanceKernelVersionRequest()
|
|
2444
2585
|
model.from_json_string(json.dumps(args))
|
|
2445
2586
|
start_time = time.time()
|
|
2446
2587
|
while True:
|
|
2447
|
-
rsp = client.
|
|
2588
|
+
rsp = client.UpgradeDBInstanceKernelVersion(model)
|
|
2448
2589
|
result = rsp.to_json_string()
|
|
2449
2590
|
try:
|
|
2450
2591
|
json_obj = json.loads(result)
|
|
@@ -2463,7 +2604,7 @@ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
|
|
|
2463
2604
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2464
2605
|
|
|
2465
2606
|
|
|
2466
|
-
def
|
|
2607
|
+
def doDescribeSpecInfo(args, parsed_globals):
|
|
2467
2608
|
g_param = parse_global_arg(parsed_globals)
|
|
2468
2609
|
|
|
2469
2610
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2473,7 +2614,10 @@ def doDescribeAccountUsers(args, parsed_globals):
|
|
|
2473
2614
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2474
2615
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2475
2616
|
)
|
|
2476
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2617
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2619
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2620
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2477
2621
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2478
2622
|
else:
|
|
2479
2623
|
cred = credential.Credential(
|
|
@@ -2485,18 +2629,18 @@ def doDescribeAccountUsers(args, parsed_globals):
|
|
|
2485
2629
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2486
2630
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2487
2631
|
)
|
|
2488
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2632
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2489
2633
|
if g_param[OptionsDefine.Language]:
|
|
2490
2634
|
profile.language = g_param[OptionsDefine.Language]
|
|
2491
2635
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2492
2636
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2493
2637
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2494
2638
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2495
|
-
model = models.
|
|
2639
|
+
model = models.DescribeSpecInfoRequest()
|
|
2496
2640
|
model.from_json_string(json.dumps(args))
|
|
2497
2641
|
start_time = time.time()
|
|
2498
2642
|
while True:
|
|
2499
|
-
rsp = client.
|
|
2643
|
+
rsp = client.DescribeSpecInfo(model)
|
|
2500
2644
|
result = rsp.to_json_string()
|
|
2501
2645
|
try:
|
|
2502
2646
|
json_obj = json.loads(result)
|
|
@@ -2515,7 +2659,7 @@ def doDescribeAccountUsers(args, parsed_globals):
|
|
|
2515
2659
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2516
2660
|
|
|
2517
2661
|
|
|
2518
|
-
def
|
|
2662
|
+
def doDescribeBackupDownloadTask(args, parsed_globals):
|
|
2519
2663
|
g_param = parse_global_arg(parsed_globals)
|
|
2520
2664
|
|
|
2521
2665
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2525,7 +2669,10 @@ def doDescribeSlowLog(args, parsed_globals):
|
|
|
2525
2669
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2526
2670
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2527
2671
|
)
|
|
2528
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2672
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2674
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2675
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2529
2676
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2530
2677
|
else:
|
|
2531
2678
|
cred = credential.Credential(
|
|
@@ -2537,18 +2684,18 @@ def doDescribeSlowLog(args, parsed_globals):
|
|
|
2537
2684
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2538
2685
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2539
2686
|
)
|
|
2540
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2687
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2541
2688
|
if g_param[OptionsDefine.Language]:
|
|
2542
2689
|
profile.language = g_param[OptionsDefine.Language]
|
|
2543
2690
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2544
2691
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2545
2692
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2546
2693
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2547
|
-
model = models.
|
|
2694
|
+
model = models.DescribeBackupDownloadTaskRequest()
|
|
2548
2695
|
model.from_json_string(json.dumps(args))
|
|
2549
2696
|
start_time = time.time()
|
|
2550
2697
|
while True:
|
|
2551
|
-
rsp = client.
|
|
2698
|
+
rsp = client.DescribeBackupDownloadTask(model)
|
|
2552
2699
|
result = rsp.to_json_string()
|
|
2553
2700
|
try:
|
|
2554
2701
|
json_obj = json.loads(result)
|
|
@@ -2567,7 +2714,667 @@ def doDescribeSlowLog(args, parsed_globals):
|
|
|
2567
2714
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2568
2715
|
|
|
2569
2716
|
|
|
2570
|
-
def
|
|
2717
|
+
def doInquirePriceCreateDBInstances(args, parsed_globals):
|
|
2718
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2719
|
+
|
|
2720
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2721
|
+
cred = credential.CVMRoleCredential()
|
|
2722
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2723
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2724
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2725
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2726
|
+
)
|
|
2727
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2729
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2730
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2731
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2732
|
+
else:
|
|
2733
|
+
cred = credential.Credential(
|
|
2734
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2735
|
+
)
|
|
2736
|
+
http_profile = HttpProfile(
|
|
2737
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2738
|
+
reqMethod="POST",
|
|
2739
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2740
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2741
|
+
)
|
|
2742
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2743
|
+
if g_param[OptionsDefine.Language]:
|
|
2744
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2745
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2746
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2747
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2748
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2749
|
+
model = models.InquirePriceCreateDBInstancesRequest()
|
|
2750
|
+
model.from_json_string(json.dumps(args))
|
|
2751
|
+
start_time = time.time()
|
|
2752
|
+
while True:
|
|
2753
|
+
rsp = client.InquirePriceCreateDBInstances(model)
|
|
2754
|
+
result = rsp.to_json_string()
|
|
2755
|
+
try:
|
|
2756
|
+
json_obj = json.loads(result)
|
|
2757
|
+
except TypeError as e:
|
|
2758
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2759
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2760
|
+
break
|
|
2761
|
+
cur_time = time.time()
|
|
2762
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2763
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2764
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2765
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2766
|
+
else:
|
|
2767
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2768
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2769
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2770
|
+
|
|
2771
|
+
|
|
2772
|
+
def doSetBackupRules(args, parsed_globals):
|
|
2773
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2774
|
+
|
|
2775
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2776
|
+
cred = credential.CVMRoleCredential()
|
|
2777
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2778
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2779
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2780
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2781
|
+
)
|
|
2782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2784
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2785
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2786
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2787
|
+
else:
|
|
2788
|
+
cred = credential.Credential(
|
|
2789
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2790
|
+
)
|
|
2791
|
+
http_profile = HttpProfile(
|
|
2792
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2793
|
+
reqMethod="POST",
|
|
2794
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2795
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2796
|
+
)
|
|
2797
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2798
|
+
if g_param[OptionsDefine.Language]:
|
|
2799
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2800
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2801
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2802
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2803
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2804
|
+
model = models.SetBackupRulesRequest()
|
|
2805
|
+
model.from_json_string(json.dumps(args))
|
|
2806
|
+
start_time = time.time()
|
|
2807
|
+
while True:
|
|
2808
|
+
rsp = client.SetBackupRules(model)
|
|
2809
|
+
result = rsp.to_json_string()
|
|
2810
|
+
try:
|
|
2811
|
+
json_obj = json.loads(result)
|
|
2812
|
+
except TypeError as e:
|
|
2813
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2814
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2815
|
+
break
|
|
2816
|
+
cur_time = time.time()
|
|
2817
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2818
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2819
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2820
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2821
|
+
else:
|
|
2822
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2823
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2824
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2825
|
+
|
|
2826
|
+
|
|
2827
|
+
def doDescribeInstanceSSL(args, parsed_globals):
|
|
2828
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2829
|
+
|
|
2830
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2831
|
+
cred = credential.CVMRoleCredential()
|
|
2832
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2833
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2834
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2835
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2836
|
+
)
|
|
2837
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2839
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2840
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
|
+
else:
|
|
2843
|
+
cred = credential.Credential(
|
|
2844
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2845
|
+
)
|
|
2846
|
+
http_profile = HttpProfile(
|
|
2847
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2848
|
+
reqMethod="POST",
|
|
2849
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2850
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2851
|
+
)
|
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2853
|
+
if g_param[OptionsDefine.Language]:
|
|
2854
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2855
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2856
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2857
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2858
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2859
|
+
model = models.DescribeInstanceSSLRequest()
|
|
2860
|
+
model.from_json_string(json.dumps(args))
|
|
2861
|
+
start_time = time.time()
|
|
2862
|
+
while True:
|
|
2863
|
+
rsp = client.DescribeInstanceSSL(model)
|
|
2864
|
+
result = rsp.to_json_string()
|
|
2865
|
+
try:
|
|
2866
|
+
json_obj = json.loads(result)
|
|
2867
|
+
except TypeError as e:
|
|
2868
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2869
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2870
|
+
break
|
|
2871
|
+
cur_time = time.time()
|
|
2872
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2873
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2874
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2875
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2876
|
+
else:
|
|
2877
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2878
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2879
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2880
|
+
|
|
2881
|
+
|
|
2882
|
+
def doSetAutoRenew(args, parsed_globals):
|
|
2883
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2884
|
+
|
|
2885
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2886
|
+
cred = credential.CVMRoleCredential()
|
|
2887
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2888
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2889
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
|
+
)
|
|
2892
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2894
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2895
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2896
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2897
|
+
else:
|
|
2898
|
+
cred = credential.Credential(
|
|
2899
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2900
|
+
)
|
|
2901
|
+
http_profile = HttpProfile(
|
|
2902
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2903
|
+
reqMethod="POST",
|
|
2904
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2905
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2906
|
+
)
|
|
2907
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2908
|
+
if g_param[OptionsDefine.Language]:
|
|
2909
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2910
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2911
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2912
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2913
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2914
|
+
model = models.SetAutoRenewRequest()
|
|
2915
|
+
model.from_json_string(json.dumps(args))
|
|
2916
|
+
start_time = time.time()
|
|
2917
|
+
while True:
|
|
2918
|
+
rsp = client.SetAutoRenew(model)
|
|
2919
|
+
result = rsp.to_json_string()
|
|
2920
|
+
try:
|
|
2921
|
+
json_obj = json.loads(result)
|
|
2922
|
+
except TypeError as e:
|
|
2923
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2924
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2925
|
+
break
|
|
2926
|
+
cur_time = time.time()
|
|
2927
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2928
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2929
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2930
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2931
|
+
else:
|
|
2932
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2933
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2934
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2935
|
+
|
|
2936
|
+
|
|
2937
|
+
def doSetDBInstanceDeletionProtection(args, parsed_globals):
|
|
2938
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2939
|
+
|
|
2940
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2941
|
+
cred = credential.CVMRoleCredential()
|
|
2942
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2943
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2944
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2945
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2946
|
+
)
|
|
2947
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2949
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2950
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2951
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2952
|
+
else:
|
|
2953
|
+
cred = credential.Credential(
|
|
2954
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2955
|
+
)
|
|
2956
|
+
http_profile = HttpProfile(
|
|
2957
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2958
|
+
reqMethod="POST",
|
|
2959
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2960
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2961
|
+
)
|
|
2962
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2963
|
+
if g_param[OptionsDefine.Language]:
|
|
2964
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2965
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2966
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2967
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2968
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2969
|
+
model = models.SetDBInstanceDeletionProtectionRequest()
|
|
2970
|
+
model.from_json_string(json.dumps(args))
|
|
2971
|
+
start_time = time.time()
|
|
2972
|
+
while True:
|
|
2973
|
+
rsp = client.SetDBInstanceDeletionProtection(model)
|
|
2974
|
+
result = rsp.to_json_string()
|
|
2975
|
+
try:
|
|
2976
|
+
json_obj = json.loads(result)
|
|
2977
|
+
except TypeError as e:
|
|
2978
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2979
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2980
|
+
break
|
|
2981
|
+
cur_time = time.time()
|
|
2982
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2983
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2984
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2985
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2986
|
+
else:
|
|
2987
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2988
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2989
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2990
|
+
|
|
2991
|
+
|
|
2992
|
+
def doAssignProject(args, parsed_globals):
|
|
2993
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2994
|
+
|
|
2995
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2996
|
+
cred = credential.CVMRoleCredential()
|
|
2997
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2998
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2999
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3000
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3001
|
+
)
|
|
3002
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3004
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3005
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3006
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3007
|
+
else:
|
|
3008
|
+
cred = credential.Credential(
|
|
3009
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3010
|
+
)
|
|
3011
|
+
http_profile = HttpProfile(
|
|
3012
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3013
|
+
reqMethod="POST",
|
|
3014
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3015
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3016
|
+
)
|
|
3017
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3018
|
+
if g_param[OptionsDefine.Language]:
|
|
3019
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3020
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3021
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3022
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3023
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3024
|
+
model = models.AssignProjectRequest()
|
|
3025
|
+
model.from_json_string(json.dumps(args))
|
|
3026
|
+
start_time = time.time()
|
|
3027
|
+
while True:
|
|
3028
|
+
rsp = client.AssignProject(model)
|
|
3029
|
+
result = rsp.to_json_string()
|
|
3030
|
+
try:
|
|
3031
|
+
json_obj = json.loads(result)
|
|
3032
|
+
except TypeError as e:
|
|
3033
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3034
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3035
|
+
break
|
|
3036
|
+
cur_time = time.time()
|
|
3037
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3038
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3039
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3040
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3041
|
+
else:
|
|
3042
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3043
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3044
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3045
|
+
|
|
3046
|
+
|
|
3047
|
+
def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
|
|
3048
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3049
|
+
|
|
3050
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3051
|
+
cred = credential.CVMRoleCredential()
|
|
3052
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3053
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3054
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3055
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3056
|
+
)
|
|
3057
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3059
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3060
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3061
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3062
|
+
else:
|
|
3063
|
+
cred = credential.Credential(
|
|
3064
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3065
|
+
)
|
|
3066
|
+
http_profile = HttpProfile(
|
|
3067
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3068
|
+
reqMethod="POST",
|
|
3069
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3070
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3071
|
+
)
|
|
3072
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3073
|
+
if g_param[OptionsDefine.Language]:
|
|
3074
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3075
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3076
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3077
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3078
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3079
|
+
model = models.DescribeTransparentDataEncryptionStatusRequest()
|
|
3080
|
+
model.from_json_string(json.dumps(args))
|
|
3081
|
+
start_time = time.time()
|
|
3082
|
+
while True:
|
|
3083
|
+
rsp = client.DescribeTransparentDataEncryptionStatus(model)
|
|
3084
|
+
result = rsp.to_json_string()
|
|
3085
|
+
try:
|
|
3086
|
+
json_obj = json.loads(result)
|
|
3087
|
+
except TypeError as e:
|
|
3088
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3089
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3090
|
+
break
|
|
3091
|
+
cur_time = time.time()
|
|
3092
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3093
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3094
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3095
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3096
|
+
else:
|
|
3097
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3098
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3099
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3100
|
+
|
|
3101
|
+
|
|
3102
|
+
def doUpgradeDbInstanceVersion(args, parsed_globals):
|
|
3103
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3104
|
+
|
|
3105
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3106
|
+
cred = credential.CVMRoleCredential()
|
|
3107
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3108
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3109
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3110
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3111
|
+
)
|
|
3112
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3114
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3115
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3116
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3117
|
+
else:
|
|
3118
|
+
cred = credential.Credential(
|
|
3119
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3120
|
+
)
|
|
3121
|
+
http_profile = HttpProfile(
|
|
3122
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3123
|
+
reqMethod="POST",
|
|
3124
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3125
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3126
|
+
)
|
|
3127
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3128
|
+
if g_param[OptionsDefine.Language]:
|
|
3129
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3130
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3131
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3132
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3133
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3134
|
+
model = models.UpgradeDbInstanceVersionRequest()
|
|
3135
|
+
model.from_json_string(json.dumps(args))
|
|
3136
|
+
start_time = time.time()
|
|
3137
|
+
while True:
|
|
3138
|
+
rsp = client.UpgradeDbInstanceVersion(model)
|
|
3139
|
+
result = rsp.to_json_string()
|
|
3140
|
+
try:
|
|
3141
|
+
json_obj = json.loads(result)
|
|
3142
|
+
except TypeError as e:
|
|
3143
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3144
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3145
|
+
break
|
|
3146
|
+
cur_time = time.time()
|
|
3147
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3148
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3149
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3150
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3151
|
+
else:
|
|
3152
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3153
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3154
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3155
|
+
|
|
3156
|
+
|
|
3157
|
+
def doDescribeAccountUsers(args, parsed_globals):
|
|
3158
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3159
|
+
|
|
3160
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3161
|
+
cred = credential.CVMRoleCredential()
|
|
3162
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3163
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3164
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3165
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3166
|
+
)
|
|
3167
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3169
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3170
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3171
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3172
|
+
else:
|
|
3173
|
+
cred = credential.Credential(
|
|
3174
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3175
|
+
)
|
|
3176
|
+
http_profile = HttpProfile(
|
|
3177
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3178
|
+
reqMethod="POST",
|
|
3179
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3180
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3181
|
+
)
|
|
3182
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3183
|
+
if g_param[OptionsDefine.Language]:
|
|
3184
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3185
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3186
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3187
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3188
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3189
|
+
model = models.DescribeAccountUsersRequest()
|
|
3190
|
+
model.from_json_string(json.dumps(args))
|
|
3191
|
+
start_time = time.time()
|
|
3192
|
+
while True:
|
|
3193
|
+
rsp = client.DescribeAccountUsers(model)
|
|
3194
|
+
result = rsp.to_json_string()
|
|
3195
|
+
try:
|
|
3196
|
+
json_obj = json.loads(result)
|
|
3197
|
+
except TypeError as e:
|
|
3198
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3199
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3200
|
+
break
|
|
3201
|
+
cur_time = time.time()
|
|
3202
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3203
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3204
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3205
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3206
|
+
else:
|
|
3207
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3208
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3209
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3210
|
+
|
|
3211
|
+
|
|
3212
|
+
def doDescribeSlowLog(args, parsed_globals):
|
|
3213
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3214
|
+
|
|
3215
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3216
|
+
cred = credential.CVMRoleCredential()
|
|
3217
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3218
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3219
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3220
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3221
|
+
)
|
|
3222
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3224
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3225
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3226
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3227
|
+
else:
|
|
3228
|
+
cred = credential.Credential(
|
|
3229
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3230
|
+
)
|
|
3231
|
+
http_profile = HttpProfile(
|
|
3232
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3233
|
+
reqMethod="POST",
|
|
3234
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3235
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3236
|
+
)
|
|
3237
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3238
|
+
if g_param[OptionsDefine.Language]:
|
|
3239
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3240
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3241
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3242
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3243
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3244
|
+
model = models.DescribeSlowLogRequest()
|
|
3245
|
+
model.from_json_string(json.dumps(args))
|
|
3246
|
+
start_time = time.time()
|
|
3247
|
+
while True:
|
|
3248
|
+
rsp = client.DescribeSlowLog(model)
|
|
3249
|
+
result = rsp.to_json_string()
|
|
3250
|
+
try:
|
|
3251
|
+
json_obj = json.loads(result)
|
|
3252
|
+
except TypeError as e:
|
|
3253
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3254
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3255
|
+
break
|
|
3256
|
+
cur_time = time.time()
|
|
3257
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3258
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3259
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3260
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3261
|
+
else:
|
|
3262
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3263
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3264
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3265
|
+
|
|
3266
|
+
|
|
3267
|
+
def doOpenAuditService(args, parsed_globals):
|
|
3268
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3269
|
+
|
|
3270
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3271
|
+
cred = credential.CVMRoleCredential()
|
|
3272
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3273
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3274
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3275
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3276
|
+
)
|
|
3277
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3279
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3280
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3281
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3282
|
+
else:
|
|
3283
|
+
cred = credential.Credential(
|
|
3284
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3285
|
+
)
|
|
3286
|
+
http_profile = HttpProfile(
|
|
3287
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3288
|
+
reqMethod="POST",
|
|
3289
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3290
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3291
|
+
)
|
|
3292
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3293
|
+
if g_param[OptionsDefine.Language]:
|
|
3294
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3295
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3296
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3297
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3298
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3299
|
+
model = models.OpenAuditServiceRequest()
|
|
3300
|
+
model.from_json_string(json.dumps(args))
|
|
3301
|
+
start_time = time.time()
|
|
3302
|
+
while True:
|
|
3303
|
+
rsp = client.OpenAuditService(model)
|
|
3304
|
+
result = rsp.to_json_string()
|
|
3305
|
+
try:
|
|
3306
|
+
json_obj = json.loads(result)
|
|
3307
|
+
except TypeError as e:
|
|
3308
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3309
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3310
|
+
break
|
|
3311
|
+
cur_time = time.time()
|
|
3312
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3313
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3314
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3315
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3316
|
+
else:
|
|
3317
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3318
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3319
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3320
|
+
|
|
3321
|
+
|
|
3322
|
+
def doCreateAuditLogFile(args, parsed_globals):
|
|
3323
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3324
|
+
|
|
3325
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3326
|
+
cred = credential.CVMRoleCredential()
|
|
3327
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3328
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3329
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3330
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3331
|
+
)
|
|
3332
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3334
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3335
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3336
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3337
|
+
else:
|
|
3338
|
+
cred = credential.Credential(
|
|
3339
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3340
|
+
)
|
|
3341
|
+
http_profile = HttpProfile(
|
|
3342
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3343
|
+
reqMethod="POST",
|
|
3344
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3345
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3346
|
+
)
|
|
3347
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3348
|
+
if g_param[OptionsDefine.Language]:
|
|
3349
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3350
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3351
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3352
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3353
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3354
|
+
model = models.CreateAuditLogFileRequest()
|
|
3355
|
+
model.from_json_string(json.dumps(args))
|
|
3356
|
+
start_time = time.time()
|
|
3357
|
+
while True:
|
|
3358
|
+
rsp = client.CreateAuditLogFile(model)
|
|
3359
|
+
result = rsp.to_json_string()
|
|
3360
|
+
try:
|
|
3361
|
+
json_obj = json.loads(result)
|
|
3362
|
+
except TypeError as e:
|
|
3363
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3364
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3365
|
+
break
|
|
3366
|
+
cur_time = time.time()
|
|
3367
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3368
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3369
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3370
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3371
|
+
else:
|
|
3372
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3373
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3374
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3375
|
+
|
|
3376
|
+
|
|
3377
|
+
def doSetInstanceMaintenance(args, parsed_globals):
|
|
2571
3378
|
g_param = parse_global_arg(parsed_globals)
|
|
2572
3379
|
|
|
2573
3380
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2577,7 +3384,10 @@ def doSetInstanceMaintenance(args, parsed_globals):
|
|
|
2577
3384
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2578
3385
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2579
3386
|
)
|
|
2580
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3387
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3389
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3390
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2581
3391
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2582
3392
|
else:
|
|
2583
3393
|
cred = credential.Credential(
|
|
@@ -2589,7 +3399,7 @@ def doSetInstanceMaintenance(args, parsed_globals):
|
|
|
2589
3399
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2590
3400
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2591
3401
|
)
|
|
2592
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3402
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2593
3403
|
if g_param[OptionsDefine.Language]:
|
|
2594
3404
|
profile.language = g_param[OptionsDefine.Language]
|
|
2595
3405
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2619,7 +3429,7 @@ def doSetInstanceMaintenance(args, parsed_globals):
|
|
|
2619
3429
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2620
3430
|
|
|
2621
3431
|
|
|
2622
|
-
def
|
|
3432
|
+
def doRenameInstance(args, parsed_globals):
|
|
2623
3433
|
g_param = parse_global_arg(parsed_globals)
|
|
2624
3434
|
|
|
2625
3435
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2629,7 +3439,10 @@ def doModifyInstanceParams(args, parsed_globals):
|
|
|
2629
3439
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2630
3440
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2631
3441
|
)
|
|
2632
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3442
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3444
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3445
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2633
3446
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2634
3447
|
else:
|
|
2635
3448
|
cred = credential.Credential(
|
|
@@ -2641,18 +3454,18 @@ def doModifyInstanceParams(args, parsed_globals):
|
|
|
2641
3454
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2642
3455
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2643
3456
|
)
|
|
2644
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3457
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2645
3458
|
if g_param[OptionsDefine.Language]:
|
|
2646
3459
|
profile.language = g_param[OptionsDefine.Language]
|
|
2647
3460
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2648
3461
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2649
3462
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2650
3463
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2651
|
-
model = models.
|
|
3464
|
+
model = models.RenameInstanceRequest()
|
|
2652
3465
|
model.from_json_string(json.dumps(args))
|
|
2653
3466
|
start_time = time.time()
|
|
2654
3467
|
while True:
|
|
2655
|
-
rsp = client.
|
|
3468
|
+
rsp = client.RenameInstance(model)
|
|
2656
3469
|
result = rsp.to_json_string()
|
|
2657
3470
|
try:
|
|
2658
3471
|
json_obj = json.loads(result)
|
|
@@ -2681,7 +3494,10 @@ def doDescribeDBInstanceParamTplDetail(args, parsed_globals):
|
|
|
2681
3494
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2682
3495
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2683
3496
|
)
|
|
2684
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3497
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3499
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3500
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2685
3501
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2686
3502
|
else:
|
|
2687
3503
|
cred = credential.Credential(
|
|
@@ -2693,7 +3509,7 @@ def doDescribeDBInstanceParamTplDetail(args, parsed_globals):
|
|
|
2693
3509
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2694
3510
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2695
3511
|
)
|
|
2696
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3512
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2697
3513
|
if g_param[OptionsDefine.Language]:
|
|
2698
3514
|
profile.language = g_param[OptionsDefine.Language]
|
|
2699
3515
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2733,7 +3549,10 @@ def doKillOps(args, parsed_globals):
|
|
|
2733
3549
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2734
3550
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2735
3551
|
)
|
|
2736
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3552
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3554
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3555
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2737
3556
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2738
3557
|
else:
|
|
2739
3558
|
cred = credential.Credential(
|
|
@@ -2745,7 +3564,7 @@ def doKillOps(args, parsed_globals):
|
|
|
2745
3564
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2746
3565
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2747
3566
|
)
|
|
2748
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3567
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2749
3568
|
if g_param[OptionsDefine.Language]:
|
|
2750
3569
|
profile.language = g_param[OptionsDefine.Language]
|
|
2751
3570
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2785,7 +3604,10 @@ def doIsolateDBInstance(args, parsed_globals):
|
|
|
2785
3604
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2786
3605
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2787
3606
|
)
|
|
2788
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3607
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3609
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3610
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2789
3611
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2790
3612
|
else:
|
|
2791
3613
|
cred = credential.Credential(
|
|
@@ -2797,7 +3619,7 @@ def doIsolateDBInstance(args, parsed_globals):
|
|
|
2797
3619
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2798
3620
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2799
3621
|
)
|
|
2800
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3622
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2801
3623
|
if g_param[OptionsDefine.Language]:
|
|
2802
3624
|
profile.language = g_param[OptionsDefine.Language]
|
|
2803
3625
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2837,7 +3659,10 @@ def doEnableTransparentDataEncryption(args, parsed_globals):
|
|
|
2837
3659
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2838
3660
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2839
3661
|
)
|
|
2840
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3662
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3664
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3665
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2841
3666
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2842
3667
|
else:
|
|
2843
3668
|
cred = credential.Credential(
|
|
@@ -2849,7 +3674,7 @@ def doEnableTransparentDataEncryption(args, parsed_globals):
|
|
|
2849
3674
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2850
3675
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2851
3676
|
)
|
|
2852
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3677
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2853
3678
|
if g_param[OptionsDefine.Language]:
|
|
2854
3679
|
profile.language = g_param[OptionsDefine.Language]
|
|
2855
3680
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2879,7 +3704,7 @@ def doEnableTransparentDataEncryption(args, parsed_globals):
|
|
|
2879
3704
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2880
3705
|
|
|
2881
3706
|
|
|
2882
|
-
def
|
|
3707
|
+
def doModifyDBInstanceNetworkAddress(args, parsed_globals):
|
|
2883
3708
|
g_param = parse_global_arg(parsed_globals)
|
|
2884
3709
|
|
|
2885
3710
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2889,7 +3714,10 @@ def doCreateBackupDBInstance(args, parsed_globals):
|
|
|
2889
3714
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2890
3715
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2891
3716
|
)
|
|
2892
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3717
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3719
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3720
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2893
3721
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2894
3722
|
else:
|
|
2895
3723
|
cred = credential.Credential(
|
|
@@ -2901,18 +3729,18 @@ def doCreateBackupDBInstance(args, parsed_globals):
|
|
|
2901
3729
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2902
3730
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2903
3731
|
)
|
|
2904
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3732
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2905
3733
|
if g_param[OptionsDefine.Language]:
|
|
2906
3734
|
profile.language = g_param[OptionsDefine.Language]
|
|
2907
3735
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2908
3736
|
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2909
3737
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2910
3738
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2911
|
-
model = models.
|
|
3739
|
+
model = models.ModifyDBInstanceNetworkAddressRequest()
|
|
2912
3740
|
model.from_json_string(json.dumps(args))
|
|
2913
3741
|
start_time = time.time()
|
|
2914
3742
|
while True:
|
|
2915
|
-
rsp = client.
|
|
3743
|
+
rsp = client.ModifyDBInstanceNetworkAddress(model)
|
|
2916
3744
|
result = rsp.to_json_string()
|
|
2917
3745
|
try:
|
|
2918
3746
|
json_obj = json.loads(result)
|
|
@@ -2941,7 +3769,10 @@ def doInquirePriceRenewDBInstances(args, parsed_globals):
|
|
|
2941
3769
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2942
3770
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2943
3771
|
)
|
|
2944
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3772
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3774
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3775
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2945
3776
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2946
3777
|
else:
|
|
2947
3778
|
cred = credential.Credential(
|
|
@@ -2953,7 +3784,7 @@ def doInquirePriceRenewDBInstances(args, parsed_globals):
|
|
|
2953
3784
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2954
3785
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2955
3786
|
)
|
|
2956
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3787
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2957
3788
|
if g_param[OptionsDefine.Language]:
|
|
2958
3789
|
profile.language = g_param[OptionsDefine.Language]
|
|
2959
3790
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2993,7 +3824,10 @@ def doDeleteAccountUser(args, parsed_globals):
|
|
|
2993
3824
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2994
3825
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2995
3826
|
)
|
|
2996
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3827
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3829
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3830
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2997
3831
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2998
3832
|
else:
|
|
2999
3833
|
cred = credential.Credential(
|
|
@@ -3005,7 +3839,7 @@ def doDeleteAccountUser(args, parsed_globals):
|
|
|
3005
3839
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3006
3840
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3007
3841
|
)
|
|
3008
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3842
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3009
3843
|
if g_param[OptionsDefine.Language]:
|
|
3010
3844
|
profile.language = g_param[OptionsDefine.Language]
|
|
3011
3845
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3035,6 +3869,61 @@ def doDeleteAccountUser(args, parsed_globals):
|
|
|
3035
3869
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3036
3870
|
|
|
3037
3871
|
|
|
3872
|
+
def doCreateBackupDBInstance(args, parsed_globals):
|
|
3873
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3874
|
+
|
|
3875
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3876
|
+
cred = credential.CVMRoleCredential()
|
|
3877
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3878
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3879
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3880
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3881
|
+
)
|
|
3882
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3884
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3885
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3886
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3887
|
+
else:
|
|
3888
|
+
cred = credential.Credential(
|
|
3889
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3890
|
+
)
|
|
3891
|
+
http_profile = HttpProfile(
|
|
3892
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3893
|
+
reqMethod="POST",
|
|
3894
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3895
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3896
|
+
)
|
|
3897
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3898
|
+
if g_param[OptionsDefine.Language]:
|
|
3899
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3900
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3901
|
+
client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3902
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3903
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3904
|
+
model = models.CreateBackupDBInstanceRequest()
|
|
3905
|
+
model.from_json_string(json.dumps(args))
|
|
3906
|
+
start_time = time.time()
|
|
3907
|
+
while True:
|
|
3908
|
+
rsp = client.CreateBackupDBInstance(model)
|
|
3909
|
+
result = rsp.to_json_string()
|
|
3910
|
+
try:
|
|
3911
|
+
json_obj = json.loads(result)
|
|
3912
|
+
except TypeError as e:
|
|
3913
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3914
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3915
|
+
break
|
|
3916
|
+
cur_time = time.time()
|
|
3917
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3918
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3919
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3920
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3921
|
+
else:
|
|
3922
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3923
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3924
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3925
|
+
|
|
3926
|
+
|
|
3038
3927
|
def doModifyDBInstanceSecurityGroup(args, parsed_globals):
|
|
3039
3928
|
g_param = parse_global_arg(parsed_globals)
|
|
3040
3929
|
|
|
@@ -3045,7 +3934,10 @@ def doModifyDBInstanceSecurityGroup(args, parsed_globals):
|
|
|
3045
3934
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3046
3935
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3047
3936
|
)
|
|
3048
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3937
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3939
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3940
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3049
3941
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3050
3942
|
else:
|
|
3051
3943
|
cred = credential.Credential(
|
|
@@ -3057,7 +3949,7 @@ def doModifyDBInstanceSecurityGroup(args, parsed_globals):
|
|
|
3057
3949
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3058
3950
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3059
3951
|
)
|
|
3060
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3952
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3061
3953
|
if g_param[OptionsDefine.Language]:
|
|
3062
3954
|
profile.language = g_param[OptionsDefine.Language]
|
|
3063
3955
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3102,10 +3994,12 @@ MODELS_MAP = {
|
|
|
3102
3994
|
ACTION_MAP = {
|
|
3103
3995
|
"TerminateDBInstances": doTerminateDBInstances,
|
|
3104
3996
|
"DescribeDBInstanceURL": doDescribeDBInstanceURL,
|
|
3997
|
+
"CreateLogDownloadTask": doCreateLogDownloadTask,
|
|
3105
3998
|
"DescribeDBInstanceNodeProperty": doDescribeDBInstanceNodeProperty,
|
|
3106
3999
|
"DescribeDBInstanceParamTpl": doDescribeDBInstanceParamTpl,
|
|
3107
4000
|
"DescribeDBInstanceDeal": doDescribeDBInstanceDeal,
|
|
3108
4001
|
"DescribeCurrentOp": doDescribeCurrentOp,
|
|
4002
|
+
"DescribeDBBackups": doDescribeDBBackups,
|
|
3109
4003
|
"DescribeClientConnections": doDescribeClientConnections,
|
|
3110
4004
|
"ResetDBInstancePassword": doResetDBInstancePassword,
|
|
3111
4005
|
"DescribeSecurityGroup": doDescribeSecurityGroup,
|
|
@@ -3113,14 +4007,16 @@ ACTION_MAP = {
|
|
|
3113
4007
|
"SetAccountUserPrivilege": doSetAccountUserPrivilege,
|
|
3114
4008
|
"FlushInstanceRouterConfig": doFlushInstanceRouterConfig,
|
|
3115
4009
|
"UpgradeDBInstance": doUpgradeDBInstance,
|
|
3116
|
-
"
|
|
3117
|
-
"
|
|
4010
|
+
"DeleteLogDownloadTask": doDeleteLogDownloadTask,
|
|
4011
|
+
"DeleteAuditLogFile": doDeleteAuditLogFile,
|
|
4012
|
+
"DescribeAuditInstanceList": doDescribeAuditInstanceList,
|
|
3118
4013
|
"DescribeDetailedSlowLogs": doDescribeDetailedSlowLogs,
|
|
3119
|
-
"
|
|
4014
|
+
"InstanceEnableSSL": doInstanceEnableSSL,
|
|
3120
4015
|
"InquirePriceModifyDBInstanceSpec": doInquirePriceModifyDBInstanceSpec,
|
|
4016
|
+
"DescribeLogDownloadTasks": doDescribeLogDownloadTasks,
|
|
3121
4017
|
"RestartNodes": doRestartNodes,
|
|
3122
4018
|
"DescribeBackupRules": doDescribeBackupRules,
|
|
3123
|
-
"
|
|
4019
|
+
"ModifyInstanceParams": doModifyInstanceParams,
|
|
3124
4020
|
"DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
|
|
3125
4021
|
"CreateAccountUser": doCreateAccountUser,
|
|
3126
4022
|
"OfflineIsolatedDBInstance": doOfflineIsolatedDBInstance,
|
|
@@ -3133,31 +4029,40 @@ ACTION_MAP = {
|
|
|
3133
4029
|
"CreateBackupDownloadTask": doCreateBackupDownloadTask,
|
|
3134
4030
|
"UpgradeDBInstanceHour": doUpgradeDBInstanceHour,
|
|
3135
4031
|
"FlashBackDBInstance": doFlashBackDBInstance,
|
|
4032
|
+
"ModifyAuditService": doModifyAuditService,
|
|
3136
4033
|
"DescribeDBInstances": doDescribeDBInstances,
|
|
3137
4034
|
"DescribeDBInstanceNamespace": doDescribeDBInstanceNamespace,
|
|
3138
4035
|
"DescribeSlowLogPatterns": doDescribeSlowLogPatterns,
|
|
3139
4036
|
"DescribeSlowLogs": doDescribeSlowLogs,
|
|
3140
|
-
"
|
|
4037
|
+
"DescribeMongodbLogs": doDescribeMongodbLogs,
|
|
3141
4038
|
"CreateDBInstance": doCreateDBInstance,
|
|
3142
4039
|
"ModifyDBInstanceSpec": doModifyDBInstanceSpec,
|
|
3143
4040
|
"DescribeInstanceParams": doDescribeInstanceParams,
|
|
4041
|
+
"UpgradeDBInstanceKernelVersion": doUpgradeDBInstanceKernelVersion,
|
|
3144
4042
|
"DescribeSpecInfo": doDescribeSpecInfo,
|
|
3145
4043
|
"DescribeBackupDownloadTask": doDescribeBackupDownloadTask,
|
|
3146
4044
|
"InquirePriceCreateDBInstances": doInquirePriceCreateDBInstances,
|
|
4045
|
+
"SetBackupRules": doSetBackupRules,
|
|
4046
|
+
"DescribeInstanceSSL": doDescribeInstanceSSL,
|
|
4047
|
+
"SetAutoRenew": doSetAutoRenew,
|
|
3147
4048
|
"SetDBInstanceDeletionProtection": doSetDBInstanceDeletionProtection,
|
|
3148
4049
|
"AssignProject": doAssignProject,
|
|
3149
4050
|
"DescribeTransparentDataEncryptionStatus": doDescribeTransparentDataEncryptionStatus,
|
|
4051
|
+
"UpgradeDbInstanceVersion": doUpgradeDbInstanceVersion,
|
|
3150
4052
|
"DescribeAccountUsers": doDescribeAccountUsers,
|
|
3151
4053
|
"DescribeSlowLog": doDescribeSlowLog,
|
|
4054
|
+
"OpenAuditService": doOpenAuditService,
|
|
4055
|
+
"CreateAuditLogFile": doCreateAuditLogFile,
|
|
3152
4056
|
"SetInstanceMaintenance": doSetInstanceMaintenance,
|
|
3153
|
-
"
|
|
4057
|
+
"RenameInstance": doRenameInstance,
|
|
3154
4058
|
"DescribeDBInstanceParamTplDetail": doDescribeDBInstanceParamTplDetail,
|
|
3155
4059
|
"KillOps": doKillOps,
|
|
3156
4060
|
"IsolateDBInstance": doIsolateDBInstance,
|
|
3157
4061
|
"EnableTransparentDataEncryption": doEnableTransparentDataEncryption,
|
|
3158
|
-
"
|
|
4062
|
+
"ModifyDBInstanceNetworkAddress": doModifyDBInstanceNetworkAddress,
|
|
3159
4063
|
"InquirePriceRenewDBInstances": doInquirePriceRenewDBInstances,
|
|
3160
4064
|
"DeleteAccountUser": doDeleteAccountUser,
|
|
4065
|
+
"CreateBackupDBInstance": doCreateBackupDBInstance,
|
|
3161
4066
|
"ModifyDBInstanceSecurityGroup": doModifyDBInstanceSecurityGroup,
|
|
3162
4067
|
|
|
3163
4068
|
}
|