tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -29,7 +29,10 @@ def doTerminateDBInstances(args, parsed_globals):
29
29
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
30
30
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
31
31
  )
32
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
32
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
34
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
35
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
33
36
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
34
37
  else:
35
38
  cred = credential.Credential(
@@ -41,7 +44,7 @@ def doTerminateDBInstances(args, parsed_globals):
41
44
  endpoint=g_param[OptionsDefine.Endpoint],
42
45
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
43
46
  )
44
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
47
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
45
48
  if g_param[OptionsDefine.Language]:
46
49
  profile.language = g_param[OptionsDefine.Language]
47
50
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -81,7 +84,10 @@ def doDescribeDBInstanceURL(args, parsed_globals):
81
84
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
82
85
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
83
86
  )
84
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
87
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
89
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
90
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
91
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
86
92
  else:
87
93
  cred = credential.Credential(
@@ -93,7 +99,7 @@ def doDescribeDBInstanceURL(args, parsed_globals):
93
99
  endpoint=g_param[OptionsDefine.Endpoint],
94
100
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
95
101
  )
96
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
102
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
97
103
  if g_param[OptionsDefine.Language]:
98
104
  profile.language = g_param[OptionsDefine.Language]
99
105
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -123,7 +129,7 @@ def doDescribeDBInstanceURL(args, parsed_globals):
123
129
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
124
130
 
125
131
 
126
- def doDescribeDBInstanceNodeProperty(args, parsed_globals):
132
+ def doCreateLogDownloadTask(args, parsed_globals):
127
133
  g_param = parse_global_arg(parsed_globals)
128
134
 
129
135
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -133,7 +139,10 @@ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
133
139
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
134
140
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
135
141
  )
136
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
142
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
144
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
145
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
137
146
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
138
147
  else:
139
148
  cred = credential.Credential(
@@ -145,18 +154,18 @@ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
145
154
  endpoint=g_param[OptionsDefine.Endpoint],
146
155
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
147
156
  )
148
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
157
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
149
158
  if g_param[OptionsDefine.Language]:
150
159
  profile.language = g_param[OptionsDefine.Language]
151
160
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
152
161
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
153
162
  client._sdkVersion += ("_CLI_" + __version__)
154
163
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
155
- model = models.DescribeDBInstanceNodePropertyRequest()
164
+ model = models.CreateLogDownloadTaskRequest()
156
165
  model.from_json_string(json.dumps(args))
157
166
  start_time = time.time()
158
167
  while True:
159
- rsp = client.DescribeDBInstanceNodeProperty(model)
168
+ rsp = client.CreateLogDownloadTask(model)
160
169
  result = rsp.to_json_string()
161
170
  try:
162
171
  json_obj = json.loads(result)
@@ -175,7 +184,7 @@ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
175
184
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
176
185
 
177
186
 
178
- def doDescribeDBInstanceParamTpl(args, parsed_globals):
187
+ def doDescribeDBInstanceNodeProperty(args, parsed_globals):
179
188
  g_param = parse_global_arg(parsed_globals)
180
189
 
181
190
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -185,7 +194,10 @@ def doDescribeDBInstanceParamTpl(args, parsed_globals):
185
194
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
186
195
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
187
196
  )
188
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
197
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
199
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
200
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
189
201
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
190
202
  else:
191
203
  cred = credential.Credential(
@@ -197,18 +209,18 @@ def doDescribeDBInstanceParamTpl(args, parsed_globals):
197
209
  endpoint=g_param[OptionsDefine.Endpoint],
198
210
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
199
211
  )
200
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
212
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
201
213
  if g_param[OptionsDefine.Language]:
202
214
  profile.language = g_param[OptionsDefine.Language]
203
215
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
204
216
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
205
217
  client._sdkVersion += ("_CLI_" + __version__)
206
218
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
207
- model = models.DescribeDBInstanceParamTplRequest()
219
+ model = models.DescribeDBInstanceNodePropertyRequest()
208
220
  model.from_json_string(json.dumps(args))
209
221
  start_time = time.time()
210
222
  while True:
211
- rsp = client.DescribeDBInstanceParamTpl(model)
223
+ rsp = client.DescribeDBInstanceNodeProperty(model)
212
224
  result = rsp.to_json_string()
213
225
  try:
214
226
  json_obj = json.loads(result)
@@ -227,7 +239,7 @@ def doDescribeDBInstanceParamTpl(args, parsed_globals):
227
239
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
228
240
 
229
241
 
230
- def doDescribeDBInstanceDeal(args, parsed_globals):
242
+ def doDescribeDBInstanceParamTpl(args, parsed_globals):
231
243
  g_param = parse_global_arg(parsed_globals)
232
244
 
233
245
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -237,7 +249,10 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
237
249
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
238
250
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
239
251
  )
240
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
252
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
254
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
255
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
241
256
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
242
257
  else:
243
258
  cred = credential.Credential(
@@ -249,18 +264,18 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
249
264
  endpoint=g_param[OptionsDefine.Endpoint],
250
265
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
251
266
  )
252
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
267
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
253
268
  if g_param[OptionsDefine.Language]:
254
269
  profile.language = g_param[OptionsDefine.Language]
255
270
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
256
271
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
257
272
  client._sdkVersion += ("_CLI_" + __version__)
258
273
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
259
- model = models.DescribeDBInstanceDealRequest()
274
+ model = models.DescribeDBInstanceParamTplRequest()
260
275
  model.from_json_string(json.dumps(args))
261
276
  start_time = time.time()
262
277
  while True:
263
- rsp = client.DescribeDBInstanceDeal(model)
278
+ rsp = client.DescribeDBInstanceParamTpl(model)
264
279
  result = rsp.to_json_string()
265
280
  try:
266
281
  json_obj = json.loads(result)
@@ -279,7 +294,7 @@ def doDescribeDBInstanceDeal(args, parsed_globals):
279
294
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
280
295
 
281
296
 
282
- def doDescribeCurrentOp(args, parsed_globals):
297
+ def doDescribeDBInstanceDeal(args, parsed_globals):
283
298
  g_param = parse_global_arg(parsed_globals)
284
299
 
285
300
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -289,7 +304,10 @@ def doDescribeCurrentOp(args, parsed_globals):
289
304
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
290
305
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
291
306
  )
292
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
307
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
309
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
310
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
293
311
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
294
312
  else:
295
313
  cred = credential.Credential(
@@ -301,18 +319,18 @@ def doDescribeCurrentOp(args, parsed_globals):
301
319
  endpoint=g_param[OptionsDefine.Endpoint],
302
320
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
303
321
  )
304
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
322
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
305
323
  if g_param[OptionsDefine.Language]:
306
324
  profile.language = g_param[OptionsDefine.Language]
307
325
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
308
326
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
309
327
  client._sdkVersion += ("_CLI_" + __version__)
310
328
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
311
- model = models.DescribeCurrentOpRequest()
329
+ model = models.DescribeDBInstanceDealRequest()
312
330
  model.from_json_string(json.dumps(args))
313
331
  start_time = time.time()
314
332
  while True:
315
- rsp = client.DescribeCurrentOp(model)
333
+ rsp = client.DescribeDBInstanceDeal(model)
316
334
  result = rsp.to_json_string()
317
335
  try:
318
336
  json_obj = json.loads(result)
@@ -331,7 +349,7 @@ def doDescribeCurrentOp(args, parsed_globals):
331
349
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
332
350
 
333
351
 
334
- def doDescribeClientConnections(args, parsed_globals):
352
+ def doDescribeCurrentOp(args, parsed_globals):
335
353
  g_param = parse_global_arg(parsed_globals)
336
354
 
337
355
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -341,7 +359,10 @@ def doDescribeClientConnections(args, parsed_globals):
341
359
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
342
360
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
343
361
  )
344
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
362
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
364
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
365
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
345
366
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
346
367
  else:
347
368
  cred = credential.Credential(
@@ -353,18 +374,18 @@ def doDescribeClientConnections(args, parsed_globals):
353
374
  endpoint=g_param[OptionsDefine.Endpoint],
354
375
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
355
376
  )
356
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
377
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
357
378
  if g_param[OptionsDefine.Language]:
358
379
  profile.language = g_param[OptionsDefine.Language]
359
380
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
360
381
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
361
382
  client._sdkVersion += ("_CLI_" + __version__)
362
383
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
363
- model = models.DescribeClientConnectionsRequest()
384
+ model = models.DescribeCurrentOpRequest()
364
385
  model.from_json_string(json.dumps(args))
365
386
  start_time = time.time()
366
387
  while True:
367
- rsp = client.DescribeClientConnections(model)
388
+ rsp = client.DescribeCurrentOp(model)
368
389
  result = rsp.to_json_string()
369
390
  try:
370
391
  json_obj = json.loads(result)
@@ -383,7 +404,7 @@ def doDescribeClientConnections(args, parsed_globals):
383
404
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
384
405
 
385
406
 
386
- def doResetDBInstancePassword(args, parsed_globals):
407
+ def doDescribeDBBackups(args, parsed_globals):
387
408
  g_param = parse_global_arg(parsed_globals)
388
409
 
389
410
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -393,7 +414,10 @@ def doResetDBInstancePassword(args, parsed_globals):
393
414
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
394
415
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
395
416
  )
396
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
417
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
419
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
420
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
397
421
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
398
422
  else:
399
423
  cred = credential.Credential(
@@ -405,18 +429,18 @@ def doResetDBInstancePassword(args, parsed_globals):
405
429
  endpoint=g_param[OptionsDefine.Endpoint],
406
430
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
407
431
  )
408
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
432
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
409
433
  if g_param[OptionsDefine.Language]:
410
434
  profile.language = g_param[OptionsDefine.Language]
411
435
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
412
436
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
413
437
  client._sdkVersion += ("_CLI_" + __version__)
414
438
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
415
- model = models.ResetDBInstancePasswordRequest()
439
+ model = models.DescribeDBBackupsRequest()
416
440
  model.from_json_string(json.dumps(args))
417
441
  start_time = time.time()
418
442
  while True:
419
- rsp = client.ResetDBInstancePassword(model)
443
+ rsp = client.DescribeDBBackups(model)
420
444
  result = rsp.to_json_string()
421
445
  try:
422
446
  json_obj = json.loads(result)
@@ -435,7 +459,7 @@ def doResetDBInstancePassword(args, parsed_globals):
435
459
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
436
460
 
437
461
 
438
- def doDescribeSecurityGroup(args, parsed_globals):
462
+ def doDescribeClientConnections(args, parsed_globals):
439
463
  g_param = parse_global_arg(parsed_globals)
440
464
 
441
465
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -445,7 +469,10 @@ def doDescribeSecurityGroup(args, parsed_globals):
445
469
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
446
470
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
447
471
  )
448
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
472
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
474
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
475
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
449
476
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
450
477
  else:
451
478
  cred = credential.Credential(
@@ -457,18 +484,18 @@ def doDescribeSecurityGroup(args, parsed_globals):
457
484
  endpoint=g_param[OptionsDefine.Endpoint],
458
485
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
459
486
  )
460
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
487
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
461
488
  if g_param[OptionsDefine.Language]:
462
489
  profile.language = g_param[OptionsDefine.Language]
463
490
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
464
491
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
465
492
  client._sdkVersion += ("_CLI_" + __version__)
466
493
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
467
- model = models.DescribeSecurityGroupRequest()
494
+ model = models.DescribeClientConnectionsRequest()
468
495
  model.from_json_string(json.dumps(args))
469
496
  start_time = time.time()
470
497
  while True:
471
- rsp = client.DescribeSecurityGroup(model)
498
+ rsp = client.DescribeClientConnections(model)
472
499
  result = rsp.to_json_string()
473
500
  try:
474
501
  json_obj = json.loads(result)
@@ -487,7 +514,7 @@ def doDescribeSecurityGroup(args, parsed_globals):
487
514
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
488
515
 
489
516
 
490
- def doSetPassword(args, parsed_globals):
517
+ def doResetDBInstancePassword(args, parsed_globals):
491
518
  g_param = parse_global_arg(parsed_globals)
492
519
 
493
520
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -497,7 +524,10 @@ def doSetPassword(args, parsed_globals):
497
524
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
498
525
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
499
526
  )
500
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
527
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
529
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
530
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
501
531
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
502
532
  else:
503
533
  cred = credential.Credential(
@@ -509,18 +539,18 @@ def doSetPassword(args, parsed_globals):
509
539
  endpoint=g_param[OptionsDefine.Endpoint],
510
540
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
511
541
  )
512
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
542
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
513
543
  if g_param[OptionsDefine.Language]:
514
544
  profile.language = g_param[OptionsDefine.Language]
515
545
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
516
546
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
517
547
  client._sdkVersion += ("_CLI_" + __version__)
518
548
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
519
- model = models.SetPasswordRequest()
549
+ model = models.ResetDBInstancePasswordRequest()
520
550
  model.from_json_string(json.dumps(args))
521
551
  start_time = time.time()
522
552
  while True:
523
- rsp = client.SetPassword(model)
553
+ rsp = client.ResetDBInstancePassword(model)
524
554
  result = rsp.to_json_string()
525
555
  try:
526
556
  json_obj = json.loads(result)
@@ -539,7 +569,7 @@ def doSetPassword(args, parsed_globals):
539
569
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
540
570
 
541
571
 
542
- def doSetAccountUserPrivilege(args, parsed_globals):
572
+ def doDescribeSecurityGroup(args, parsed_globals):
543
573
  g_param = parse_global_arg(parsed_globals)
544
574
 
545
575
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -549,7 +579,10 @@ def doSetAccountUserPrivilege(args, parsed_globals):
549
579
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
550
580
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
551
581
  )
552
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
582
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
584
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
585
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
553
586
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
554
587
  else:
555
588
  cred = credential.Credential(
@@ -561,18 +594,18 @@ def doSetAccountUserPrivilege(args, parsed_globals):
561
594
  endpoint=g_param[OptionsDefine.Endpoint],
562
595
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
563
596
  )
564
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
597
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
565
598
  if g_param[OptionsDefine.Language]:
566
599
  profile.language = g_param[OptionsDefine.Language]
567
600
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
568
601
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
569
602
  client._sdkVersion += ("_CLI_" + __version__)
570
603
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
571
- model = models.SetAccountUserPrivilegeRequest()
604
+ model = models.DescribeSecurityGroupRequest()
572
605
  model.from_json_string(json.dumps(args))
573
606
  start_time = time.time()
574
607
  while True:
575
- rsp = client.SetAccountUserPrivilege(model)
608
+ rsp = client.DescribeSecurityGroup(model)
576
609
  result = rsp.to_json_string()
577
610
  try:
578
611
  json_obj = json.loads(result)
@@ -591,7 +624,7 @@ def doSetAccountUserPrivilege(args, parsed_globals):
591
624
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
592
625
 
593
626
 
594
- def doFlushInstanceRouterConfig(args, parsed_globals):
627
+ def doSetPassword(args, parsed_globals):
595
628
  g_param = parse_global_arg(parsed_globals)
596
629
 
597
630
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -601,7 +634,10 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
601
634
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
602
635
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
603
636
  )
604
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
637
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
639
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
640
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
605
641
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
606
642
  else:
607
643
  cred = credential.Credential(
@@ -613,18 +649,18 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
613
649
  endpoint=g_param[OptionsDefine.Endpoint],
614
650
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
615
651
  )
616
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
652
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
617
653
  if g_param[OptionsDefine.Language]:
618
654
  profile.language = g_param[OptionsDefine.Language]
619
655
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
620
656
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
621
657
  client._sdkVersion += ("_CLI_" + __version__)
622
658
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
623
- model = models.FlushInstanceRouterConfigRequest()
659
+ model = models.SetPasswordRequest()
624
660
  model.from_json_string(json.dumps(args))
625
661
  start_time = time.time()
626
662
  while True:
627
- rsp = client.FlushInstanceRouterConfig(model)
663
+ rsp = client.SetPassword(model)
628
664
  result = rsp.to_json_string()
629
665
  try:
630
666
  json_obj = json.loads(result)
@@ -643,7 +679,7 @@ def doFlushInstanceRouterConfig(args, parsed_globals):
643
679
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
644
680
 
645
681
 
646
- def doUpgradeDBInstance(args, parsed_globals):
682
+ def doSetAccountUserPrivilege(args, parsed_globals):
647
683
  g_param = parse_global_arg(parsed_globals)
648
684
 
649
685
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -653,7 +689,10 @@ def doUpgradeDBInstance(args, parsed_globals):
653
689
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
654
690
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
655
691
  )
656
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
692
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
694
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
695
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
657
696
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
658
697
  else:
659
698
  cred = credential.Credential(
@@ -665,18 +704,18 @@ def doUpgradeDBInstance(args, parsed_globals):
665
704
  endpoint=g_param[OptionsDefine.Endpoint],
666
705
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
667
706
  )
668
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
707
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
669
708
  if g_param[OptionsDefine.Language]:
670
709
  profile.language = g_param[OptionsDefine.Language]
671
710
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
672
711
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
673
712
  client._sdkVersion += ("_CLI_" + __version__)
674
713
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
675
- model = models.UpgradeDBInstanceRequest()
714
+ model = models.SetAccountUserPrivilegeRequest()
676
715
  model.from_json_string(json.dumps(args))
677
716
  start_time = time.time()
678
717
  while True:
679
- rsp = client.UpgradeDBInstance(model)
718
+ rsp = client.SetAccountUserPrivilege(model)
680
719
  result = rsp.to_json_string()
681
720
  try:
682
721
  json_obj = json.loads(result)
@@ -695,7 +734,7 @@ def doUpgradeDBInstance(args, parsed_globals):
695
734
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
696
735
 
697
736
 
698
- def doDescribeDBBackups(args, parsed_globals):
737
+ def doFlushInstanceRouterConfig(args, parsed_globals):
699
738
  g_param = parse_global_arg(parsed_globals)
700
739
 
701
740
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -705,7 +744,10 @@ def doDescribeDBBackups(args, parsed_globals):
705
744
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
706
745
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
707
746
  )
708
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
747
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
749
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
750
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
709
751
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
710
752
  else:
711
753
  cred = credential.Credential(
@@ -717,18 +759,18 @@ def doDescribeDBBackups(args, parsed_globals):
717
759
  endpoint=g_param[OptionsDefine.Endpoint],
718
760
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
719
761
  )
720
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
762
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
721
763
  if g_param[OptionsDefine.Language]:
722
764
  profile.language = g_param[OptionsDefine.Language]
723
765
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
724
766
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
725
767
  client._sdkVersion += ("_CLI_" + __version__)
726
768
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
727
- model = models.DescribeDBBackupsRequest()
769
+ model = models.FlushInstanceRouterConfigRequest()
728
770
  model.from_json_string(json.dumps(args))
729
771
  start_time = time.time()
730
772
  while True:
731
- rsp = client.DescribeDBBackups(model)
773
+ rsp = client.FlushInstanceRouterConfig(model)
732
774
  result = rsp.to_json_string()
733
775
  try:
734
776
  json_obj = json.loads(result)
@@ -747,7 +789,7 @@ def doDescribeDBBackups(args, parsed_globals):
747
789
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
748
790
 
749
791
 
750
- def doSetAutoRenew(args, parsed_globals):
792
+ def doUpgradeDBInstance(args, parsed_globals):
751
793
  g_param = parse_global_arg(parsed_globals)
752
794
 
753
795
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -757,7 +799,10 @@ def doSetAutoRenew(args, parsed_globals):
757
799
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
758
800
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
759
801
  )
760
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
802
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
804
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
805
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
761
806
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
762
807
  else:
763
808
  cred = credential.Credential(
@@ -769,18 +814,18 @@ def doSetAutoRenew(args, parsed_globals):
769
814
  endpoint=g_param[OptionsDefine.Endpoint],
770
815
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
771
816
  )
772
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
817
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
773
818
  if g_param[OptionsDefine.Language]:
774
819
  profile.language = g_param[OptionsDefine.Language]
775
820
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
776
821
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
777
822
  client._sdkVersion += ("_CLI_" + __version__)
778
823
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
779
- model = models.SetAutoRenewRequest()
824
+ model = models.UpgradeDBInstanceRequest()
780
825
  model.from_json_string(json.dumps(args))
781
826
  start_time = time.time()
782
827
  while True:
783
- rsp = client.SetAutoRenew(model)
828
+ rsp = client.UpgradeDBInstance(model)
784
829
  result = rsp.to_json_string()
785
830
  try:
786
831
  json_obj = json.loads(result)
@@ -799,7 +844,7 @@ def doSetAutoRenew(args, parsed_globals):
799
844
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
800
845
 
801
846
 
802
- def doDescribeDetailedSlowLogs(args, parsed_globals):
847
+ def doDeleteLogDownloadTask(args, parsed_globals):
803
848
  g_param = parse_global_arg(parsed_globals)
804
849
 
805
850
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -809,7 +854,10 @@ def doDescribeDetailedSlowLogs(args, parsed_globals):
809
854
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
810
855
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
811
856
  )
812
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
857
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
859
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
860
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
813
861
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
814
862
  else:
815
863
  cred = credential.Credential(
@@ -821,18 +869,18 @@ def doDescribeDetailedSlowLogs(args, parsed_globals):
821
869
  endpoint=g_param[OptionsDefine.Endpoint],
822
870
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
823
871
  )
824
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
872
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
825
873
  if g_param[OptionsDefine.Language]:
826
874
  profile.language = g_param[OptionsDefine.Language]
827
875
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
828
876
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
829
877
  client._sdkVersion += ("_CLI_" + __version__)
830
878
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
831
- model = models.DescribeDetailedSlowLogsRequest()
879
+ model = models.DeleteLogDownloadTaskRequest()
832
880
  model.from_json_string(json.dumps(args))
833
881
  start_time = time.time()
834
882
  while True:
835
- rsp = client.DescribeDetailedSlowLogs(model)
883
+ rsp = client.DeleteLogDownloadTask(model)
836
884
  result = rsp.to_json_string()
837
885
  try:
838
886
  json_obj = json.loads(result)
@@ -851,7 +899,7 @@ def doDescribeDetailedSlowLogs(args, parsed_globals):
851
899
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
852
900
 
853
901
 
854
- def doSetBackupRules(args, parsed_globals):
902
+ def doDeleteAuditLogFile(args, parsed_globals):
855
903
  g_param = parse_global_arg(parsed_globals)
856
904
 
857
905
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -861,7 +909,10 @@ def doSetBackupRules(args, parsed_globals):
861
909
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
862
910
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
863
911
  )
864
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
912
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
914
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
915
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
865
916
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
866
917
  else:
867
918
  cred = credential.Credential(
@@ -873,18 +924,18 @@ def doSetBackupRules(args, parsed_globals):
873
924
  endpoint=g_param[OptionsDefine.Endpoint],
874
925
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
875
926
  )
876
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
927
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
877
928
  if g_param[OptionsDefine.Language]:
878
929
  profile.language = g_param[OptionsDefine.Language]
879
930
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
880
931
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
881
932
  client._sdkVersion += ("_CLI_" + __version__)
882
933
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
883
- model = models.SetBackupRulesRequest()
934
+ model = models.DeleteAuditLogFileRequest()
884
935
  model.from_json_string(json.dumps(args))
885
936
  start_time = time.time()
886
937
  while True:
887
- rsp = client.SetBackupRules(model)
938
+ rsp = client.DeleteAuditLogFile(model)
888
939
  result = rsp.to_json_string()
889
940
  try:
890
941
  json_obj = json.loads(result)
@@ -903,7 +954,7 @@ def doSetBackupRules(args, parsed_globals):
903
954
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
904
955
 
905
956
 
906
- def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
957
+ def doDescribeAuditInstanceList(args, parsed_globals):
907
958
  g_param = parse_global_arg(parsed_globals)
908
959
 
909
960
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -913,7 +964,10 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
913
964
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
914
965
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
915
966
  )
916
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
969
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
970
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
917
971
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
918
972
  else:
919
973
  cred = credential.Credential(
@@ -925,18 +979,18 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
925
979
  endpoint=g_param[OptionsDefine.Endpoint],
926
980
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
927
981
  )
928
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
982
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
929
983
  if g_param[OptionsDefine.Language]:
930
984
  profile.language = g_param[OptionsDefine.Language]
931
985
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
932
986
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
933
987
  client._sdkVersion += ("_CLI_" + __version__)
934
988
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
935
- model = models.InquirePriceModifyDBInstanceSpecRequest()
989
+ model = models.DescribeAuditInstanceListRequest()
936
990
  model.from_json_string(json.dumps(args))
937
991
  start_time = time.time()
938
992
  while True:
939
- rsp = client.InquirePriceModifyDBInstanceSpec(model)
993
+ rsp = client.DescribeAuditInstanceList(model)
940
994
  result = rsp.to_json_string()
941
995
  try:
942
996
  json_obj = json.loads(result)
@@ -955,7 +1009,7 @@ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
955
1009
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
956
1010
 
957
1011
 
958
- def doRestartNodes(args, parsed_globals):
1012
+ def doDescribeDetailedSlowLogs(args, parsed_globals):
959
1013
  g_param = parse_global_arg(parsed_globals)
960
1014
 
961
1015
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -965,7 +1019,10 @@ def doRestartNodes(args, parsed_globals):
965
1019
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
966
1020
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
967
1021
  )
968
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1022
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1024
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1025
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
969
1026
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
970
1027
  else:
971
1028
  cred = credential.Credential(
@@ -977,18 +1034,18 @@ def doRestartNodes(args, parsed_globals):
977
1034
  endpoint=g_param[OptionsDefine.Endpoint],
978
1035
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
979
1036
  )
980
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1037
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
981
1038
  if g_param[OptionsDefine.Language]:
982
1039
  profile.language = g_param[OptionsDefine.Language]
983
1040
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
984
1041
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
985
1042
  client._sdkVersion += ("_CLI_" + __version__)
986
1043
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
987
- model = models.RestartNodesRequest()
1044
+ model = models.DescribeDetailedSlowLogsRequest()
988
1045
  model.from_json_string(json.dumps(args))
989
1046
  start_time = time.time()
990
1047
  while True:
991
- rsp = client.RestartNodes(model)
1048
+ rsp = client.DescribeDetailedSlowLogs(model)
992
1049
  result = rsp.to_json_string()
993
1050
  try:
994
1051
  json_obj = json.loads(result)
@@ -1007,7 +1064,7 @@ def doRestartNodes(args, parsed_globals):
1007
1064
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1008
1065
 
1009
1066
 
1010
- def doDescribeBackupRules(args, parsed_globals):
1067
+ def doInstanceEnableSSL(args, parsed_globals):
1011
1068
  g_param = parse_global_arg(parsed_globals)
1012
1069
 
1013
1070
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1017,7 +1074,10 @@ def doDescribeBackupRules(args, parsed_globals):
1017
1074
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
1075
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
1076
  )
1020
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1077
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1079
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1080
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1021
1081
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1022
1082
  else:
1023
1083
  cred = credential.Credential(
@@ -1029,18 +1089,18 @@ def doDescribeBackupRules(args, parsed_globals):
1029
1089
  endpoint=g_param[OptionsDefine.Endpoint],
1030
1090
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1031
1091
  )
1032
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1092
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1033
1093
  if g_param[OptionsDefine.Language]:
1034
1094
  profile.language = g_param[OptionsDefine.Language]
1035
1095
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1036
1096
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1037
1097
  client._sdkVersion += ("_CLI_" + __version__)
1038
1098
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1039
- model = models.DescribeBackupRulesRequest()
1099
+ model = models.InstanceEnableSSLRequest()
1040
1100
  model.from_json_string(json.dumps(args))
1041
1101
  start_time = time.time()
1042
1102
  while True:
1043
- rsp = client.DescribeBackupRules(model)
1103
+ rsp = client.InstanceEnableSSL(model)
1044
1104
  result = rsp.to_json_string()
1045
1105
  try:
1046
1106
  json_obj = json.loads(result)
@@ -1059,7 +1119,7 @@ def doDescribeBackupRules(args, parsed_globals):
1059
1119
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1060
1120
 
1061
1121
 
1062
- def doRenameInstance(args, parsed_globals):
1122
+ def doInquirePriceModifyDBInstanceSpec(args, parsed_globals):
1063
1123
  g_param = parse_global_arg(parsed_globals)
1064
1124
 
1065
1125
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1069,7 +1129,10 @@ def doRenameInstance(args, parsed_globals):
1069
1129
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1070
1130
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1071
1131
  )
1072
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1132
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1134
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1135
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1073
1136
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1074
1137
  else:
1075
1138
  cred = credential.Credential(
@@ -1081,18 +1144,18 @@ def doRenameInstance(args, parsed_globals):
1081
1144
  endpoint=g_param[OptionsDefine.Endpoint],
1082
1145
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1083
1146
  )
1084
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1147
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1085
1148
  if g_param[OptionsDefine.Language]:
1086
1149
  profile.language = g_param[OptionsDefine.Language]
1087
1150
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1088
1151
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1089
1152
  client._sdkVersion += ("_CLI_" + __version__)
1090
1153
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1091
- model = models.RenameInstanceRequest()
1154
+ model = models.InquirePriceModifyDBInstanceSpecRequest()
1092
1155
  model.from_json_string(json.dumps(args))
1093
1156
  start_time = time.time()
1094
1157
  while True:
1095
- rsp = client.RenameInstance(model)
1158
+ rsp = client.InquirePriceModifyDBInstanceSpec(model)
1096
1159
  result = rsp.to_json_string()
1097
1160
  try:
1098
1161
  json_obj = json.loads(result)
@@ -1111,7 +1174,7 @@ def doRenameInstance(args, parsed_globals):
1111
1174
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1112
1175
 
1113
1176
 
1114
- def doDescribeAsyncRequestInfo(args, parsed_globals):
1177
+ def doDescribeLogDownloadTasks(args, parsed_globals):
1115
1178
  g_param = parse_global_arg(parsed_globals)
1116
1179
 
1117
1180
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1121,7 +1184,10 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
1121
1184
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1122
1185
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1123
1186
  )
1124
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1187
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1189
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1190
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1125
1191
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1126
1192
  else:
1127
1193
  cred = credential.Credential(
@@ -1133,18 +1199,18 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
1133
1199
  endpoint=g_param[OptionsDefine.Endpoint],
1134
1200
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1135
1201
  )
1136
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1202
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1137
1203
  if g_param[OptionsDefine.Language]:
1138
1204
  profile.language = g_param[OptionsDefine.Language]
1139
1205
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1140
1206
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1141
1207
  client._sdkVersion += ("_CLI_" + __version__)
1142
1208
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1143
- model = models.DescribeAsyncRequestInfoRequest()
1209
+ model = models.DescribeLogDownloadTasksRequest()
1144
1210
  model.from_json_string(json.dumps(args))
1145
1211
  start_time = time.time()
1146
1212
  while True:
1147
- rsp = client.DescribeAsyncRequestInfo(model)
1213
+ rsp = client.DescribeLogDownloadTasks(model)
1148
1214
  result = rsp.to_json_string()
1149
1215
  try:
1150
1216
  json_obj = json.loads(result)
@@ -1163,7 +1229,7 @@ def doDescribeAsyncRequestInfo(args, parsed_globals):
1163
1229
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1164
1230
 
1165
1231
 
1166
- def doCreateAccountUser(args, parsed_globals):
1232
+ def doRestartNodes(args, parsed_globals):
1167
1233
  g_param = parse_global_arg(parsed_globals)
1168
1234
 
1169
1235
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1173,7 +1239,10 @@ def doCreateAccountUser(args, parsed_globals):
1173
1239
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1174
1240
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1175
1241
  )
1176
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1242
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1244
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1245
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1177
1246
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1178
1247
  else:
1179
1248
  cred = credential.Credential(
@@ -1185,18 +1254,18 @@ def doCreateAccountUser(args, parsed_globals):
1185
1254
  endpoint=g_param[OptionsDefine.Endpoint],
1186
1255
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1187
1256
  )
1188
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1257
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1189
1258
  if g_param[OptionsDefine.Language]:
1190
1259
  profile.language = g_param[OptionsDefine.Language]
1191
1260
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1192
1261
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1193
1262
  client._sdkVersion += ("_CLI_" + __version__)
1194
1263
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1195
- model = models.CreateAccountUserRequest()
1264
+ model = models.RestartNodesRequest()
1196
1265
  model.from_json_string(json.dumps(args))
1197
1266
  start_time = time.time()
1198
1267
  while True:
1199
- rsp = client.CreateAccountUser(model)
1268
+ rsp = client.RestartNodes(model)
1200
1269
  result = rsp.to_json_string()
1201
1270
  try:
1202
1271
  json_obj = json.loads(result)
@@ -1215,7 +1284,7 @@ def doCreateAccountUser(args, parsed_globals):
1215
1284
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1216
1285
 
1217
1286
 
1218
- def doOfflineIsolatedDBInstance(args, parsed_globals):
1287
+ def doDescribeBackupRules(args, parsed_globals):
1219
1288
  g_param = parse_global_arg(parsed_globals)
1220
1289
 
1221
1290
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1225,7 +1294,10 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
1225
1294
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1226
1295
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1227
1296
  )
1228
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1297
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1299
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1300
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1229
1301
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1230
1302
  else:
1231
1303
  cred = credential.Credential(
@@ -1237,18 +1309,18 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
1237
1309
  endpoint=g_param[OptionsDefine.Endpoint],
1238
1310
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1239
1311
  )
1240
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1312
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1241
1313
  if g_param[OptionsDefine.Language]:
1242
1314
  profile.language = g_param[OptionsDefine.Language]
1243
1315
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1244
1316
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1245
1317
  client._sdkVersion += ("_CLI_" + __version__)
1246
1318
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1247
- model = models.OfflineIsolatedDBInstanceRequest()
1319
+ model = models.DescribeBackupRulesRequest()
1248
1320
  model.from_json_string(json.dumps(args))
1249
1321
  start_time = time.time()
1250
1322
  while True:
1251
- rsp = client.OfflineIsolatedDBInstance(model)
1323
+ rsp = client.DescribeBackupRules(model)
1252
1324
  result = rsp.to_json_string()
1253
1325
  try:
1254
1326
  json_obj = json.loads(result)
@@ -1267,7 +1339,7 @@ def doOfflineIsolatedDBInstance(args, parsed_globals):
1267
1339
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1268
1340
 
1269
1341
 
1270
- def doModifyDBInstanceParamTpl(args, parsed_globals):
1342
+ def doModifyInstanceParams(args, parsed_globals):
1271
1343
  g_param = parse_global_arg(parsed_globals)
1272
1344
 
1273
1345
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1277,7 +1349,10 @@ def doModifyDBInstanceParamTpl(args, parsed_globals):
1277
1349
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1278
1350
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1279
1351
  )
1280
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1352
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1354
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1355
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1281
1356
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1282
1357
  else:
1283
1358
  cred = credential.Credential(
@@ -1289,18 +1364,18 @@ def doModifyDBInstanceParamTpl(args, parsed_globals):
1289
1364
  endpoint=g_param[OptionsDefine.Endpoint],
1290
1365
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1291
1366
  )
1292
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1367
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1293
1368
  if g_param[OptionsDefine.Language]:
1294
1369
  profile.language = g_param[OptionsDefine.Language]
1295
1370
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1296
1371
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1297
1372
  client._sdkVersion += ("_CLI_" + __version__)
1298
1373
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1299
- model = models.ModifyDBInstanceParamTplRequest()
1374
+ model = models.ModifyInstanceParamsRequest()
1300
1375
  model.from_json_string(json.dumps(args))
1301
1376
  start_time = time.time()
1302
1377
  while True:
1303
- rsp = client.ModifyDBInstanceParamTpl(model)
1378
+ rsp = client.ModifyInstanceParams(model)
1304
1379
  result = rsp.to_json_string()
1305
1380
  try:
1306
1381
  json_obj = json.loads(result)
@@ -1319,7 +1394,7 @@ def doModifyDBInstanceParamTpl(args, parsed_globals):
1319
1394
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1320
1395
 
1321
1396
 
1322
- def doCreateDBInstanceHour(args, parsed_globals):
1397
+ def doDescribeAsyncRequestInfo(args, parsed_globals):
1323
1398
  g_param = parse_global_arg(parsed_globals)
1324
1399
 
1325
1400
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1329,7 +1404,10 @@ def doCreateDBInstanceHour(args, parsed_globals):
1329
1404
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1330
1405
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1331
1406
  )
1332
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1407
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1409
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1410
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1333
1411
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1334
1412
  else:
1335
1413
  cred = credential.Credential(
@@ -1341,18 +1419,18 @@ def doCreateDBInstanceHour(args, parsed_globals):
1341
1419
  endpoint=g_param[OptionsDefine.Endpoint],
1342
1420
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1343
1421
  )
1344
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1422
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1345
1423
  if g_param[OptionsDefine.Language]:
1346
1424
  profile.language = g_param[OptionsDefine.Language]
1347
1425
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1348
1426
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1349
1427
  client._sdkVersion += ("_CLI_" + __version__)
1350
1428
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1351
- model = models.CreateDBInstanceHourRequest()
1429
+ model = models.DescribeAsyncRequestInfoRequest()
1352
1430
  model.from_json_string(json.dumps(args))
1353
1431
  start_time = time.time()
1354
1432
  while True:
1355
- rsp = client.CreateDBInstanceHour(model)
1433
+ rsp = client.DescribeAsyncRequestInfo(model)
1356
1434
  result = rsp.to_json_string()
1357
1435
  try:
1358
1436
  json_obj = json.loads(result)
@@ -1371,7 +1449,7 @@ def doCreateDBInstanceHour(args, parsed_globals):
1371
1449
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1372
1450
 
1373
1451
 
1374
- def doCreateDBInstanceParamTpl(args, parsed_globals):
1452
+ def doCreateAccountUser(args, parsed_globals):
1375
1453
  g_param = parse_global_arg(parsed_globals)
1376
1454
 
1377
1455
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1381,7 +1459,10 @@ def doCreateDBInstanceParamTpl(args, parsed_globals):
1381
1459
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1382
1460
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1383
1461
  )
1384
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1462
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1464
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1465
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1385
1466
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1386
1467
  else:
1387
1468
  cred = credential.Credential(
@@ -1393,18 +1474,18 @@ def doCreateDBInstanceParamTpl(args, parsed_globals):
1393
1474
  endpoint=g_param[OptionsDefine.Endpoint],
1394
1475
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1395
1476
  )
1396
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1477
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1397
1478
  if g_param[OptionsDefine.Language]:
1398
1479
  profile.language = g_param[OptionsDefine.Language]
1399
1480
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1400
1481
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1401
1482
  client._sdkVersion += ("_CLI_" + __version__)
1402
1483
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1403
- model = models.CreateDBInstanceParamTplRequest()
1484
+ model = models.CreateAccountUserRequest()
1404
1485
  model.from_json_string(json.dumps(args))
1405
1486
  start_time = time.time()
1406
1487
  while True:
1407
- rsp = client.CreateDBInstanceParamTpl(model)
1488
+ rsp = client.CreateAccountUser(model)
1408
1489
  result = rsp.to_json_string()
1409
1490
  try:
1410
1491
  json_obj = json.loads(result)
@@ -1423,7 +1504,7 @@ def doCreateDBInstanceParamTpl(args, parsed_globals):
1423
1504
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1424
1505
 
1425
1506
 
1426
- def doDropDBInstanceParamTpl(args, parsed_globals):
1507
+ def doOfflineIsolatedDBInstance(args, parsed_globals):
1427
1508
  g_param = parse_global_arg(parsed_globals)
1428
1509
 
1429
1510
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1433,7 +1514,10 @@ def doDropDBInstanceParamTpl(args, parsed_globals):
1433
1514
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1434
1515
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1435
1516
  )
1436
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1517
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1519
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1520
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1437
1521
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1438
1522
  else:
1439
1523
  cred = credential.Credential(
@@ -1445,18 +1529,18 @@ def doDropDBInstanceParamTpl(args, parsed_globals):
1445
1529
  endpoint=g_param[OptionsDefine.Endpoint],
1446
1530
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1447
1531
  )
1448
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1532
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1449
1533
  if g_param[OptionsDefine.Language]:
1450
1534
  profile.language = g_param[OptionsDefine.Language]
1451
1535
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1452
1536
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1453
1537
  client._sdkVersion += ("_CLI_" + __version__)
1454
1538
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1455
- model = models.DropDBInstanceParamTplRequest()
1539
+ model = models.OfflineIsolatedDBInstanceRequest()
1456
1540
  model.from_json_string(json.dumps(args))
1457
1541
  start_time = time.time()
1458
1542
  while True:
1459
- rsp = client.DropDBInstanceParamTpl(model)
1543
+ rsp = client.OfflineIsolatedDBInstance(model)
1460
1544
  result = rsp.to_json_string()
1461
1545
  try:
1462
1546
  json_obj = json.loads(result)
@@ -1475,7 +1559,7 @@ def doDropDBInstanceParamTpl(args, parsed_globals):
1475
1559
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1476
1560
 
1477
1561
 
1478
- def doTerminateDBInstance(args, parsed_globals):
1562
+ def doModifyDBInstanceParamTpl(args, parsed_globals):
1479
1563
  g_param = parse_global_arg(parsed_globals)
1480
1564
 
1481
1565
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1485,7 +1569,10 @@ def doTerminateDBInstance(args, parsed_globals):
1485
1569
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1486
1570
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1487
1571
  )
1488
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1572
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1574
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1575
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1489
1576
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1490
1577
  else:
1491
1578
  cred = credential.Credential(
@@ -1497,18 +1584,18 @@ def doTerminateDBInstance(args, parsed_globals):
1497
1584
  endpoint=g_param[OptionsDefine.Endpoint],
1498
1585
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1499
1586
  )
1500
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1587
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1501
1588
  if g_param[OptionsDefine.Language]:
1502
1589
  profile.language = g_param[OptionsDefine.Language]
1503
1590
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1504
1591
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1505
1592
  client._sdkVersion += ("_CLI_" + __version__)
1506
1593
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1507
- model = models.TerminateDBInstanceRequest()
1594
+ model = models.ModifyDBInstanceParamTplRequest()
1508
1595
  model.from_json_string(json.dumps(args))
1509
1596
  start_time = time.time()
1510
1597
  while True:
1511
- rsp = client.TerminateDBInstance(model)
1598
+ rsp = client.ModifyDBInstanceParamTpl(model)
1512
1599
  result = rsp.to_json_string()
1513
1600
  try:
1514
1601
  json_obj = json.loads(result)
@@ -1527,7 +1614,7 @@ def doTerminateDBInstance(args, parsed_globals):
1527
1614
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1528
1615
 
1529
1616
 
1530
- def doRenewDBInstances(args, parsed_globals):
1617
+ def doCreateDBInstanceHour(args, parsed_globals):
1531
1618
  g_param = parse_global_arg(parsed_globals)
1532
1619
 
1533
1620
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1537,7 +1624,10 @@ def doRenewDBInstances(args, parsed_globals):
1537
1624
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1538
1625
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1539
1626
  )
1540
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1627
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1629
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1630
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1541
1631
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1542
1632
  else:
1543
1633
  cred = credential.Credential(
@@ -1549,18 +1639,18 @@ def doRenewDBInstances(args, parsed_globals):
1549
1639
  endpoint=g_param[OptionsDefine.Endpoint],
1550
1640
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1551
1641
  )
1552
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1642
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1553
1643
  if g_param[OptionsDefine.Language]:
1554
1644
  profile.language = g_param[OptionsDefine.Language]
1555
1645
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1556
1646
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1557
1647
  client._sdkVersion += ("_CLI_" + __version__)
1558
1648
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1559
- model = models.RenewDBInstancesRequest()
1649
+ model = models.CreateDBInstanceHourRequest()
1560
1650
  model.from_json_string(json.dumps(args))
1561
1651
  start_time = time.time()
1562
1652
  while True:
1563
- rsp = client.RenewDBInstances(model)
1653
+ rsp = client.CreateDBInstanceHour(model)
1564
1654
  result = rsp.to_json_string()
1565
1655
  try:
1566
1656
  json_obj = json.loads(result)
@@ -1579,7 +1669,7 @@ def doRenewDBInstances(args, parsed_globals):
1579
1669
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1580
1670
 
1581
1671
 
1582
- def doCreateBackupDownloadTask(args, parsed_globals):
1672
+ def doCreateDBInstanceParamTpl(args, parsed_globals):
1583
1673
  g_param = parse_global_arg(parsed_globals)
1584
1674
 
1585
1675
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1589,7 +1679,10 @@ def doCreateBackupDownloadTask(args, parsed_globals):
1589
1679
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1590
1680
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1591
1681
  )
1592
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1682
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1684
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1685
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1593
1686
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1594
1687
  else:
1595
1688
  cred = credential.Credential(
@@ -1601,18 +1694,18 @@ def doCreateBackupDownloadTask(args, parsed_globals):
1601
1694
  endpoint=g_param[OptionsDefine.Endpoint],
1602
1695
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1603
1696
  )
1604
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1697
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1605
1698
  if g_param[OptionsDefine.Language]:
1606
1699
  profile.language = g_param[OptionsDefine.Language]
1607
1700
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1608
1701
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1609
1702
  client._sdkVersion += ("_CLI_" + __version__)
1610
1703
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1611
- model = models.CreateBackupDownloadTaskRequest()
1704
+ model = models.CreateDBInstanceParamTplRequest()
1612
1705
  model.from_json_string(json.dumps(args))
1613
1706
  start_time = time.time()
1614
1707
  while True:
1615
- rsp = client.CreateBackupDownloadTask(model)
1708
+ rsp = client.CreateDBInstanceParamTpl(model)
1616
1709
  result = rsp.to_json_string()
1617
1710
  try:
1618
1711
  json_obj = json.loads(result)
@@ -1631,7 +1724,7 @@ def doCreateBackupDownloadTask(args, parsed_globals):
1631
1724
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1632
1725
 
1633
1726
 
1634
- def doUpgradeDBInstanceHour(args, parsed_globals):
1727
+ def doDropDBInstanceParamTpl(args, parsed_globals):
1635
1728
  g_param = parse_global_arg(parsed_globals)
1636
1729
 
1637
1730
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1641,7 +1734,10 @@ def doUpgradeDBInstanceHour(args, parsed_globals):
1641
1734
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1642
1735
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1643
1736
  )
1644
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1737
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1739
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1740
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1645
1741
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1646
1742
  else:
1647
1743
  cred = credential.Credential(
@@ -1653,18 +1749,18 @@ def doUpgradeDBInstanceHour(args, parsed_globals):
1653
1749
  endpoint=g_param[OptionsDefine.Endpoint],
1654
1750
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1655
1751
  )
1656
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1752
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1657
1753
  if g_param[OptionsDefine.Language]:
1658
1754
  profile.language = g_param[OptionsDefine.Language]
1659
1755
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1660
1756
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1661
1757
  client._sdkVersion += ("_CLI_" + __version__)
1662
1758
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1663
- model = models.UpgradeDBInstanceHourRequest()
1759
+ model = models.DropDBInstanceParamTplRequest()
1664
1760
  model.from_json_string(json.dumps(args))
1665
1761
  start_time = time.time()
1666
1762
  while True:
1667
- rsp = client.UpgradeDBInstanceHour(model)
1763
+ rsp = client.DropDBInstanceParamTpl(model)
1668
1764
  result = rsp.to_json_string()
1669
1765
  try:
1670
1766
  json_obj = json.loads(result)
@@ -1683,7 +1779,7 @@ def doUpgradeDBInstanceHour(args, parsed_globals):
1683
1779
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1684
1780
 
1685
1781
 
1686
- def doFlashBackDBInstance(args, parsed_globals):
1782
+ def doTerminateDBInstance(args, parsed_globals):
1687
1783
  g_param = parse_global_arg(parsed_globals)
1688
1784
 
1689
1785
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1693,7 +1789,10 @@ def doFlashBackDBInstance(args, parsed_globals):
1693
1789
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1694
1790
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1695
1791
  )
1696
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1792
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1794
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1795
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1697
1796
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1698
1797
  else:
1699
1798
  cred = credential.Credential(
@@ -1705,18 +1804,18 @@ def doFlashBackDBInstance(args, parsed_globals):
1705
1804
  endpoint=g_param[OptionsDefine.Endpoint],
1706
1805
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1707
1806
  )
1708
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1807
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1709
1808
  if g_param[OptionsDefine.Language]:
1710
1809
  profile.language = g_param[OptionsDefine.Language]
1711
1810
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1712
1811
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1713
1812
  client._sdkVersion += ("_CLI_" + __version__)
1714
1813
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1715
- model = models.FlashBackDBInstanceRequest()
1814
+ model = models.TerminateDBInstanceRequest()
1716
1815
  model.from_json_string(json.dumps(args))
1717
1816
  start_time = time.time()
1718
1817
  while True:
1719
- rsp = client.FlashBackDBInstance(model)
1818
+ rsp = client.TerminateDBInstance(model)
1720
1819
  result = rsp.to_json_string()
1721
1820
  try:
1722
1821
  json_obj = json.loads(result)
@@ -1735,7 +1834,7 @@ def doFlashBackDBInstance(args, parsed_globals):
1735
1834
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1736
1835
 
1737
1836
 
1738
- def doDescribeDBInstances(args, parsed_globals):
1837
+ def doRenewDBInstances(args, parsed_globals):
1739
1838
  g_param = parse_global_arg(parsed_globals)
1740
1839
 
1741
1840
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1745,7 +1844,10 @@ def doDescribeDBInstances(args, parsed_globals):
1745
1844
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1746
1845
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1747
1846
  )
1748
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1847
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1849
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1850
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1749
1851
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1750
1852
  else:
1751
1853
  cred = credential.Credential(
@@ -1757,18 +1859,18 @@ def doDescribeDBInstances(args, parsed_globals):
1757
1859
  endpoint=g_param[OptionsDefine.Endpoint],
1758
1860
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1759
1861
  )
1760
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1862
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1761
1863
  if g_param[OptionsDefine.Language]:
1762
1864
  profile.language = g_param[OptionsDefine.Language]
1763
1865
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1764
1866
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1765
1867
  client._sdkVersion += ("_CLI_" + __version__)
1766
1868
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1767
- model = models.DescribeDBInstancesRequest()
1869
+ model = models.RenewDBInstancesRequest()
1768
1870
  model.from_json_string(json.dumps(args))
1769
1871
  start_time = time.time()
1770
1872
  while True:
1771
- rsp = client.DescribeDBInstances(model)
1873
+ rsp = client.RenewDBInstances(model)
1772
1874
  result = rsp.to_json_string()
1773
1875
  try:
1774
1876
  json_obj = json.loads(result)
@@ -1787,7 +1889,7 @@ def doDescribeDBInstances(args, parsed_globals):
1787
1889
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1788
1890
 
1789
1891
 
1790
- def doDescribeDBInstanceNamespace(args, parsed_globals):
1892
+ def doCreateBackupDownloadTask(args, parsed_globals):
1791
1893
  g_param = parse_global_arg(parsed_globals)
1792
1894
 
1793
1895
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1797,7 +1899,10 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
1797
1899
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1798
1900
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1799
1901
  )
1800
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1902
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1904
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1905
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1801
1906
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1802
1907
  else:
1803
1908
  cred = credential.Credential(
@@ -1809,18 +1914,18 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
1809
1914
  endpoint=g_param[OptionsDefine.Endpoint],
1810
1915
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1811
1916
  )
1812
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1917
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1813
1918
  if g_param[OptionsDefine.Language]:
1814
1919
  profile.language = g_param[OptionsDefine.Language]
1815
1920
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1816
1921
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1817
1922
  client._sdkVersion += ("_CLI_" + __version__)
1818
1923
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1819
- model = models.DescribeDBInstanceNamespaceRequest()
1924
+ model = models.CreateBackupDownloadTaskRequest()
1820
1925
  model.from_json_string(json.dumps(args))
1821
1926
  start_time = time.time()
1822
1927
  while True:
1823
- rsp = client.DescribeDBInstanceNamespace(model)
1928
+ rsp = client.CreateBackupDownloadTask(model)
1824
1929
  result = rsp.to_json_string()
1825
1930
  try:
1826
1931
  json_obj = json.loads(result)
@@ -1839,7 +1944,7 @@ def doDescribeDBInstanceNamespace(args, parsed_globals):
1839
1944
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1840
1945
 
1841
1946
 
1842
- def doDescribeSlowLogPatterns(args, parsed_globals):
1947
+ def doUpgradeDBInstanceHour(args, parsed_globals):
1843
1948
  g_param = parse_global_arg(parsed_globals)
1844
1949
 
1845
1950
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1849,7 +1954,10 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
1849
1954
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1850
1955
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1851
1956
  )
1852
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1957
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1959
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1960
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1853
1961
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1854
1962
  else:
1855
1963
  cred = credential.Credential(
@@ -1861,18 +1969,18 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
1861
1969
  endpoint=g_param[OptionsDefine.Endpoint],
1862
1970
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1863
1971
  )
1864
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1972
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1865
1973
  if g_param[OptionsDefine.Language]:
1866
1974
  profile.language = g_param[OptionsDefine.Language]
1867
1975
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1868
1976
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1869
1977
  client._sdkVersion += ("_CLI_" + __version__)
1870
1978
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1871
- model = models.DescribeSlowLogPatternsRequest()
1979
+ model = models.UpgradeDBInstanceHourRequest()
1872
1980
  model.from_json_string(json.dumps(args))
1873
1981
  start_time = time.time()
1874
1982
  while True:
1875
- rsp = client.DescribeSlowLogPatterns(model)
1983
+ rsp = client.UpgradeDBInstanceHour(model)
1876
1984
  result = rsp.to_json_string()
1877
1985
  try:
1878
1986
  json_obj = json.loads(result)
@@ -1891,7 +1999,7 @@ def doDescribeSlowLogPatterns(args, parsed_globals):
1891
1999
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1892
2000
 
1893
2001
 
1894
- def doDescribeSlowLogs(args, parsed_globals):
2002
+ def doFlashBackDBInstance(args, parsed_globals):
1895
2003
  g_param = parse_global_arg(parsed_globals)
1896
2004
 
1897
2005
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1901,7 +2009,10 @@ def doDescribeSlowLogs(args, parsed_globals):
1901
2009
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1902
2010
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1903
2011
  )
1904
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2012
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2014
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2015
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1905
2016
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1906
2017
  else:
1907
2018
  cred = credential.Credential(
@@ -1913,18 +2024,18 @@ def doDescribeSlowLogs(args, parsed_globals):
1913
2024
  endpoint=g_param[OptionsDefine.Endpoint],
1914
2025
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1915
2026
  )
1916
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2027
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1917
2028
  if g_param[OptionsDefine.Language]:
1918
2029
  profile.language = g_param[OptionsDefine.Language]
1919
2030
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1920
2031
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1921
2032
  client._sdkVersion += ("_CLI_" + __version__)
1922
2033
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1923
- model = models.DescribeSlowLogsRequest()
2034
+ model = models.FlashBackDBInstanceRequest()
1924
2035
  model.from_json_string(json.dumps(args))
1925
2036
  start_time = time.time()
1926
2037
  while True:
1927
- rsp = client.DescribeSlowLogs(model)
2038
+ rsp = client.FlashBackDBInstance(model)
1928
2039
  result = rsp.to_json_string()
1929
2040
  try:
1930
2041
  json_obj = json.loads(result)
@@ -1943,7 +2054,7 @@ def doDescribeSlowLogs(args, parsed_globals):
1943
2054
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1944
2055
 
1945
2056
 
1946
- def doModifyDBInstanceNetworkAddress(args, parsed_globals):
2057
+ def doModifyAuditService(args, parsed_globals):
1947
2058
  g_param = parse_global_arg(parsed_globals)
1948
2059
 
1949
2060
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1953,7 +2064,10 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
1953
2064
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1954
2065
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1955
2066
  )
1956
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2067
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2069
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2070
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1957
2071
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1958
2072
  else:
1959
2073
  cred = credential.Credential(
@@ -1965,18 +2079,18 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
1965
2079
  endpoint=g_param[OptionsDefine.Endpoint],
1966
2080
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1967
2081
  )
1968
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1969
2083
  if g_param[OptionsDefine.Language]:
1970
2084
  profile.language = g_param[OptionsDefine.Language]
1971
2085
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1972
2086
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
1973
2087
  client._sdkVersion += ("_CLI_" + __version__)
1974
2088
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1975
- model = models.ModifyDBInstanceNetworkAddressRequest()
2089
+ model = models.ModifyAuditServiceRequest()
1976
2090
  model.from_json_string(json.dumps(args))
1977
2091
  start_time = time.time()
1978
2092
  while True:
1979
- rsp = client.ModifyDBInstanceNetworkAddress(model)
2093
+ rsp = client.ModifyAuditService(model)
1980
2094
  result = rsp.to_json_string()
1981
2095
  try:
1982
2096
  json_obj = json.loads(result)
@@ -1995,7 +2109,7 @@ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
1995
2109
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1996
2110
 
1997
2111
 
1998
- def doCreateDBInstance(args, parsed_globals):
2112
+ def doDescribeDBInstances(args, parsed_globals):
1999
2113
  g_param = parse_global_arg(parsed_globals)
2000
2114
 
2001
2115
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2005,7 +2119,10 @@ def doCreateDBInstance(args, parsed_globals):
2005
2119
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2006
2120
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2007
2121
  )
2008
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2122
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2124
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2125
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2009
2126
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2010
2127
  else:
2011
2128
  cred = credential.Credential(
@@ -2017,18 +2134,18 @@ def doCreateDBInstance(args, parsed_globals):
2017
2134
  endpoint=g_param[OptionsDefine.Endpoint],
2018
2135
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2019
2136
  )
2020
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2137
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2021
2138
  if g_param[OptionsDefine.Language]:
2022
2139
  profile.language = g_param[OptionsDefine.Language]
2023
2140
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2024
2141
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2025
2142
  client._sdkVersion += ("_CLI_" + __version__)
2026
2143
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2027
- model = models.CreateDBInstanceRequest()
2144
+ model = models.DescribeDBInstancesRequest()
2028
2145
  model.from_json_string(json.dumps(args))
2029
2146
  start_time = time.time()
2030
2147
  while True:
2031
- rsp = client.CreateDBInstance(model)
2148
+ rsp = client.DescribeDBInstances(model)
2032
2149
  result = rsp.to_json_string()
2033
2150
  try:
2034
2151
  json_obj = json.loads(result)
@@ -2047,7 +2164,7 @@ def doCreateDBInstance(args, parsed_globals):
2047
2164
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2048
2165
 
2049
2166
 
2050
- def doModifyDBInstanceSpec(args, parsed_globals):
2167
+ def doDescribeDBInstanceNamespace(args, parsed_globals):
2051
2168
  g_param = parse_global_arg(parsed_globals)
2052
2169
 
2053
2170
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2057,7 +2174,10 @@ def doModifyDBInstanceSpec(args, parsed_globals):
2057
2174
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2058
2175
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2059
2176
  )
2060
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2177
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2179
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2180
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2061
2181
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2062
2182
  else:
2063
2183
  cred = credential.Credential(
@@ -2069,18 +2189,18 @@ def doModifyDBInstanceSpec(args, parsed_globals):
2069
2189
  endpoint=g_param[OptionsDefine.Endpoint],
2070
2190
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2071
2191
  )
2072
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2192
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2073
2193
  if g_param[OptionsDefine.Language]:
2074
2194
  profile.language = g_param[OptionsDefine.Language]
2075
2195
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2076
2196
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2077
2197
  client._sdkVersion += ("_CLI_" + __version__)
2078
2198
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2079
- model = models.ModifyDBInstanceSpecRequest()
2199
+ model = models.DescribeDBInstanceNamespaceRequest()
2080
2200
  model.from_json_string(json.dumps(args))
2081
2201
  start_time = time.time()
2082
2202
  while True:
2083
- rsp = client.ModifyDBInstanceSpec(model)
2203
+ rsp = client.DescribeDBInstanceNamespace(model)
2084
2204
  result = rsp.to_json_string()
2085
2205
  try:
2086
2206
  json_obj = json.loads(result)
@@ -2099,7 +2219,7 @@ def doModifyDBInstanceSpec(args, parsed_globals):
2099
2219
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2100
2220
 
2101
2221
 
2102
- def doDescribeInstanceParams(args, parsed_globals):
2222
+ def doDescribeSlowLogPatterns(args, parsed_globals):
2103
2223
  g_param = parse_global_arg(parsed_globals)
2104
2224
 
2105
2225
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2109,7 +2229,10 @@ def doDescribeInstanceParams(args, parsed_globals):
2109
2229
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2110
2230
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2111
2231
  )
2112
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2232
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2234
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2235
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2113
2236
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2114
2237
  else:
2115
2238
  cred = credential.Credential(
@@ -2121,18 +2244,18 @@ def doDescribeInstanceParams(args, parsed_globals):
2121
2244
  endpoint=g_param[OptionsDefine.Endpoint],
2122
2245
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2123
2246
  )
2124
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2247
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2125
2248
  if g_param[OptionsDefine.Language]:
2126
2249
  profile.language = g_param[OptionsDefine.Language]
2127
2250
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2128
2251
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2129
2252
  client._sdkVersion += ("_CLI_" + __version__)
2130
2253
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2131
- model = models.DescribeInstanceParamsRequest()
2254
+ model = models.DescribeSlowLogPatternsRequest()
2132
2255
  model.from_json_string(json.dumps(args))
2133
2256
  start_time = time.time()
2134
2257
  while True:
2135
- rsp = client.DescribeInstanceParams(model)
2258
+ rsp = client.DescribeSlowLogPatterns(model)
2136
2259
  result = rsp.to_json_string()
2137
2260
  try:
2138
2261
  json_obj = json.loads(result)
@@ -2151,7 +2274,7 @@ def doDescribeInstanceParams(args, parsed_globals):
2151
2274
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2152
2275
 
2153
2276
 
2154
- def doDescribeSpecInfo(args, parsed_globals):
2277
+ def doDescribeSlowLogs(args, parsed_globals):
2155
2278
  g_param = parse_global_arg(parsed_globals)
2156
2279
 
2157
2280
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2161,7 +2284,10 @@ def doDescribeSpecInfo(args, parsed_globals):
2161
2284
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2162
2285
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2163
2286
  )
2164
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2287
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2289
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2290
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2165
2291
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2166
2292
  else:
2167
2293
  cred = credential.Credential(
@@ -2173,18 +2299,18 @@ def doDescribeSpecInfo(args, parsed_globals):
2173
2299
  endpoint=g_param[OptionsDefine.Endpoint],
2174
2300
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2175
2301
  )
2176
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2302
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2177
2303
  if g_param[OptionsDefine.Language]:
2178
2304
  profile.language = g_param[OptionsDefine.Language]
2179
2305
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2180
2306
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2181
2307
  client._sdkVersion += ("_CLI_" + __version__)
2182
2308
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2183
- model = models.DescribeSpecInfoRequest()
2309
+ model = models.DescribeSlowLogsRequest()
2184
2310
  model.from_json_string(json.dumps(args))
2185
2311
  start_time = time.time()
2186
2312
  while True:
2187
- rsp = client.DescribeSpecInfo(model)
2313
+ rsp = client.DescribeSlowLogs(model)
2188
2314
  result = rsp.to_json_string()
2189
2315
  try:
2190
2316
  json_obj = json.loads(result)
@@ -2203,7 +2329,7 @@ def doDescribeSpecInfo(args, parsed_globals):
2203
2329
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2204
2330
 
2205
2331
 
2206
- def doDescribeBackupDownloadTask(args, parsed_globals):
2332
+ def doDescribeMongodbLogs(args, parsed_globals):
2207
2333
  g_param = parse_global_arg(parsed_globals)
2208
2334
 
2209
2335
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2213,7 +2339,10 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
2213
2339
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2214
2340
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2215
2341
  )
2216
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2342
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2344
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2345
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2217
2346
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2218
2347
  else:
2219
2348
  cred = credential.Credential(
@@ -2225,18 +2354,18 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
2225
2354
  endpoint=g_param[OptionsDefine.Endpoint],
2226
2355
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2227
2356
  )
2228
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2357
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2229
2358
  if g_param[OptionsDefine.Language]:
2230
2359
  profile.language = g_param[OptionsDefine.Language]
2231
2360
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2232
2361
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2233
2362
  client._sdkVersion += ("_CLI_" + __version__)
2234
2363
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2235
- model = models.DescribeBackupDownloadTaskRequest()
2364
+ model = models.DescribeMongodbLogsRequest()
2236
2365
  model.from_json_string(json.dumps(args))
2237
2366
  start_time = time.time()
2238
2367
  while True:
2239
- rsp = client.DescribeBackupDownloadTask(model)
2368
+ rsp = client.DescribeMongodbLogs(model)
2240
2369
  result = rsp.to_json_string()
2241
2370
  try:
2242
2371
  json_obj = json.loads(result)
@@ -2255,7 +2384,7 @@ def doDescribeBackupDownloadTask(args, parsed_globals):
2255
2384
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2256
2385
 
2257
2386
 
2258
- def doInquirePriceCreateDBInstances(args, parsed_globals):
2387
+ def doCreateDBInstance(args, parsed_globals):
2259
2388
  g_param = parse_global_arg(parsed_globals)
2260
2389
 
2261
2390
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2265,7 +2394,10 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
2265
2394
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2266
2395
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2267
2396
  )
2268
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2397
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2399
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2400
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2269
2401
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2270
2402
  else:
2271
2403
  cred = credential.Credential(
@@ -2277,18 +2409,18 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
2277
2409
  endpoint=g_param[OptionsDefine.Endpoint],
2278
2410
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2279
2411
  )
2280
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2412
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2281
2413
  if g_param[OptionsDefine.Language]:
2282
2414
  profile.language = g_param[OptionsDefine.Language]
2283
2415
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2284
2416
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2285
2417
  client._sdkVersion += ("_CLI_" + __version__)
2286
2418
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2287
- model = models.InquirePriceCreateDBInstancesRequest()
2419
+ model = models.CreateDBInstanceRequest()
2288
2420
  model.from_json_string(json.dumps(args))
2289
2421
  start_time = time.time()
2290
2422
  while True:
2291
- rsp = client.InquirePriceCreateDBInstances(model)
2423
+ rsp = client.CreateDBInstance(model)
2292
2424
  result = rsp.to_json_string()
2293
2425
  try:
2294
2426
  json_obj = json.loads(result)
@@ -2307,7 +2439,7 @@ def doInquirePriceCreateDBInstances(args, parsed_globals):
2307
2439
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2308
2440
 
2309
2441
 
2310
- def doSetDBInstanceDeletionProtection(args, parsed_globals):
2442
+ def doModifyDBInstanceSpec(args, parsed_globals):
2311
2443
  g_param = parse_global_arg(parsed_globals)
2312
2444
 
2313
2445
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2317,7 +2449,10 @@ def doSetDBInstanceDeletionProtection(args, parsed_globals):
2317
2449
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2318
2450
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2319
2451
  )
2320
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2452
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2454
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2455
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2321
2456
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2322
2457
  else:
2323
2458
  cred = credential.Credential(
@@ -2329,18 +2464,18 @@ def doSetDBInstanceDeletionProtection(args, parsed_globals):
2329
2464
  endpoint=g_param[OptionsDefine.Endpoint],
2330
2465
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2331
2466
  )
2332
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2467
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2333
2468
  if g_param[OptionsDefine.Language]:
2334
2469
  profile.language = g_param[OptionsDefine.Language]
2335
2470
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2336
2471
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2337
2472
  client._sdkVersion += ("_CLI_" + __version__)
2338
2473
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2339
- model = models.SetDBInstanceDeletionProtectionRequest()
2474
+ model = models.ModifyDBInstanceSpecRequest()
2340
2475
  model.from_json_string(json.dumps(args))
2341
2476
  start_time = time.time()
2342
2477
  while True:
2343
- rsp = client.SetDBInstanceDeletionProtection(model)
2478
+ rsp = client.ModifyDBInstanceSpec(model)
2344
2479
  result = rsp.to_json_string()
2345
2480
  try:
2346
2481
  json_obj = json.loads(result)
@@ -2359,7 +2494,7 @@ def doSetDBInstanceDeletionProtection(args, parsed_globals):
2359
2494
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2360
2495
 
2361
2496
 
2362
- def doAssignProject(args, parsed_globals):
2497
+ def doDescribeInstanceParams(args, parsed_globals):
2363
2498
  g_param = parse_global_arg(parsed_globals)
2364
2499
 
2365
2500
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2369,7 +2504,10 @@ def doAssignProject(args, parsed_globals):
2369
2504
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2370
2505
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2371
2506
  )
2372
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2507
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2509
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2510
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2373
2511
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2374
2512
  else:
2375
2513
  cred = credential.Credential(
@@ -2381,18 +2519,18 @@ def doAssignProject(args, parsed_globals):
2381
2519
  endpoint=g_param[OptionsDefine.Endpoint],
2382
2520
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2383
2521
  )
2384
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2522
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2385
2523
  if g_param[OptionsDefine.Language]:
2386
2524
  profile.language = g_param[OptionsDefine.Language]
2387
2525
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2388
2526
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2389
2527
  client._sdkVersion += ("_CLI_" + __version__)
2390
2528
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2391
- model = models.AssignProjectRequest()
2529
+ model = models.DescribeInstanceParamsRequest()
2392
2530
  model.from_json_string(json.dumps(args))
2393
2531
  start_time = time.time()
2394
2532
  while True:
2395
- rsp = client.AssignProject(model)
2533
+ rsp = client.DescribeInstanceParams(model)
2396
2534
  result = rsp.to_json_string()
2397
2535
  try:
2398
2536
  json_obj = json.loads(result)
@@ -2411,7 +2549,7 @@ def doAssignProject(args, parsed_globals):
2411
2549
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2412
2550
 
2413
2551
 
2414
- def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
2552
+ def doUpgradeDBInstanceKernelVersion(args, parsed_globals):
2415
2553
  g_param = parse_global_arg(parsed_globals)
2416
2554
 
2417
2555
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2421,7 +2559,10 @@ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
2421
2559
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2422
2560
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2423
2561
  )
2424
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2562
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2564
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2565
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2425
2566
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2426
2567
  else:
2427
2568
  cred = credential.Credential(
@@ -2433,18 +2574,18 @@ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
2433
2574
  endpoint=g_param[OptionsDefine.Endpoint],
2434
2575
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2435
2576
  )
2436
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2577
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2437
2578
  if g_param[OptionsDefine.Language]:
2438
2579
  profile.language = g_param[OptionsDefine.Language]
2439
2580
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2440
2581
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2441
2582
  client._sdkVersion += ("_CLI_" + __version__)
2442
2583
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2443
- model = models.DescribeTransparentDataEncryptionStatusRequest()
2584
+ model = models.UpgradeDBInstanceKernelVersionRequest()
2444
2585
  model.from_json_string(json.dumps(args))
2445
2586
  start_time = time.time()
2446
2587
  while True:
2447
- rsp = client.DescribeTransparentDataEncryptionStatus(model)
2588
+ rsp = client.UpgradeDBInstanceKernelVersion(model)
2448
2589
  result = rsp.to_json_string()
2449
2590
  try:
2450
2591
  json_obj = json.loads(result)
@@ -2463,7 +2604,7 @@ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
2463
2604
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2464
2605
 
2465
2606
 
2466
- def doDescribeAccountUsers(args, parsed_globals):
2607
+ def doDescribeSpecInfo(args, parsed_globals):
2467
2608
  g_param = parse_global_arg(parsed_globals)
2468
2609
 
2469
2610
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2473,7 +2614,10 @@ def doDescribeAccountUsers(args, parsed_globals):
2473
2614
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2474
2615
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2475
2616
  )
2476
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2617
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2619
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2620
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2477
2621
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2478
2622
  else:
2479
2623
  cred = credential.Credential(
@@ -2485,18 +2629,18 @@ def doDescribeAccountUsers(args, parsed_globals):
2485
2629
  endpoint=g_param[OptionsDefine.Endpoint],
2486
2630
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2487
2631
  )
2488
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2632
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2489
2633
  if g_param[OptionsDefine.Language]:
2490
2634
  profile.language = g_param[OptionsDefine.Language]
2491
2635
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2492
2636
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2493
2637
  client._sdkVersion += ("_CLI_" + __version__)
2494
2638
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2495
- model = models.DescribeAccountUsersRequest()
2639
+ model = models.DescribeSpecInfoRequest()
2496
2640
  model.from_json_string(json.dumps(args))
2497
2641
  start_time = time.time()
2498
2642
  while True:
2499
- rsp = client.DescribeAccountUsers(model)
2643
+ rsp = client.DescribeSpecInfo(model)
2500
2644
  result = rsp.to_json_string()
2501
2645
  try:
2502
2646
  json_obj = json.loads(result)
@@ -2515,7 +2659,7 @@ def doDescribeAccountUsers(args, parsed_globals):
2515
2659
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2516
2660
 
2517
2661
 
2518
- def doDescribeSlowLog(args, parsed_globals):
2662
+ def doDescribeBackupDownloadTask(args, parsed_globals):
2519
2663
  g_param = parse_global_arg(parsed_globals)
2520
2664
 
2521
2665
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2525,7 +2669,10 @@ def doDescribeSlowLog(args, parsed_globals):
2525
2669
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2526
2670
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2527
2671
  )
2528
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2672
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2674
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2675
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2529
2676
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2530
2677
  else:
2531
2678
  cred = credential.Credential(
@@ -2537,18 +2684,18 @@ def doDescribeSlowLog(args, parsed_globals):
2537
2684
  endpoint=g_param[OptionsDefine.Endpoint],
2538
2685
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2539
2686
  )
2540
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2687
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2541
2688
  if g_param[OptionsDefine.Language]:
2542
2689
  profile.language = g_param[OptionsDefine.Language]
2543
2690
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2544
2691
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2545
2692
  client._sdkVersion += ("_CLI_" + __version__)
2546
2693
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2547
- model = models.DescribeSlowLogRequest()
2694
+ model = models.DescribeBackupDownloadTaskRequest()
2548
2695
  model.from_json_string(json.dumps(args))
2549
2696
  start_time = time.time()
2550
2697
  while True:
2551
- rsp = client.DescribeSlowLog(model)
2698
+ rsp = client.DescribeBackupDownloadTask(model)
2552
2699
  result = rsp.to_json_string()
2553
2700
  try:
2554
2701
  json_obj = json.loads(result)
@@ -2567,7 +2714,667 @@ def doDescribeSlowLog(args, parsed_globals):
2567
2714
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2568
2715
 
2569
2716
 
2570
- def doSetInstanceMaintenance(args, parsed_globals):
2717
+ def doInquirePriceCreateDBInstances(args, parsed_globals):
2718
+ g_param = parse_global_arg(parsed_globals)
2719
+
2720
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2721
+ cred = credential.CVMRoleCredential()
2722
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2723
+ cred = credential.STSAssumeRoleCredential(
2724
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2725
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2726
+ )
2727
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2729
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2730
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2731
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2732
+ else:
2733
+ cred = credential.Credential(
2734
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2735
+ )
2736
+ http_profile = HttpProfile(
2737
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2738
+ reqMethod="POST",
2739
+ endpoint=g_param[OptionsDefine.Endpoint],
2740
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2741
+ )
2742
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2743
+ if g_param[OptionsDefine.Language]:
2744
+ profile.language = g_param[OptionsDefine.Language]
2745
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2746
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2747
+ client._sdkVersion += ("_CLI_" + __version__)
2748
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2749
+ model = models.InquirePriceCreateDBInstancesRequest()
2750
+ model.from_json_string(json.dumps(args))
2751
+ start_time = time.time()
2752
+ while True:
2753
+ rsp = client.InquirePriceCreateDBInstances(model)
2754
+ result = rsp.to_json_string()
2755
+ try:
2756
+ json_obj = json.loads(result)
2757
+ except TypeError as e:
2758
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2759
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2760
+ break
2761
+ cur_time = time.time()
2762
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2763
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2764
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2765
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2766
+ else:
2767
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2768
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2769
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2770
+
2771
+
2772
+ def doSetBackupRules(args, parsed_globals):
2773
+ g_param = parse_global_arg(parsed_globals)
2774
+
2775
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2776
+ cred = credential.CVMRoleCredential()
2777
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2778
+ cred = credential.STSAssumeRoleCredential(
2779
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2780
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2781
+ )
2782
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2784
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2785
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2786
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2787
+ else:
2788
+ cred = credential.Credential(
2789
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2790
+ )
2791
+ http_profile = HttpProfile(
2792
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2793
+ reqMethod="POST",
2794
+ endpoint=g_param[OptionsDefine.Endpoint],
2795
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2796
+ )
2797
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2798
+ if g_param[OptionsDefine.Language]:
2799
+ profile.language = g_param[OptionsDefine.Language]
2800
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2801
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2802
+ client._sdkVersion += ("_CLI_" + __version__)
2803
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2804
+ model = models.SetBackupRulesRequest()
2805
+ model.from_json_string(json.dumps(args))
2806
+ start_time = time.time()
2807
+ while True:
2808
+ rsp = client.SetBackupRules(model)
2809
+ result = rsp.to_json_string()
2810
+ try:
2811
+ json_obj = json.loads(result)
2812
+ except TypeError as e:
2813
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2814
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2815
+ break
2816
+ cur_time = time.time()
2817
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2818
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2819
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2820
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2821
+ else:
2822
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2823
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2824
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2825
+
2826
+
2827
+ def doDescribeInstanceSSL(args, parsed_globals):
2828
+ g_param = parse_global_arg(parsed_globals)
2829
+
2830
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2831
+ cred = credential.CVMRoleCredential()
2832
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2833
+ cred = credential.STSAssumeRoleCredential(
2834
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2835
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2836
+ )
2837
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2839
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2840
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2841
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2842
+ else:
2843
+ cred = credential.Credential(
2844
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2845
+ )
2846
+ http_profile = HttpProfile(
2847
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2848
+ reqMethod="POST",
2849
+ endpoint=g_param[OptionsDefine.Endpoint],
2850
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2851
+ )
2852
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2853
+ if g_param[OptionsDefine.Language]:
2854
+ profile.language = g_param[OptionsDefine.Language]
2855
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2856
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2857
+ client._sdkVersion += ("_CLI_" + __version__)
2858
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2859
+ model = models.DescribeInstanceSSLRequest()
2860
+ model.from_json_string(json.dumps(args))
2861
+ start_time = time.time()
2862
+ while True:
2863
+ rsp = client.DescribeInstanceSSL(model)
2864
+ result = rsp.to_json_string()
2865
+ try:
2866
+ json_obj = json.loads(result)
2867
+ except TypeError as e:
2868
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2869
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2870
+ break
2871
+ cur_time = time.time()
2872
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2873
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2874
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2875
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2876
+ else:
2877
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2878
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2879
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2880
+
2881
+
2882
+ def doSetAutoRenew(args, parsed_globals):
2883
+ g_param = parse_global_arg(parsed_globals)
2884
+
2885
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2886
+ cred = credential.CVMRoleCredential()
2887
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2888
+ cred = credential.STSAssumeRoleCredential(
2889
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2890
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2891
+ )
2892
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2894
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2895
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2896
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2897
+ else:
2898
+ cred = credential.Credential(
2899
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2900
+ )
2901
+ http_profile = HttpProfile(
2902
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2903
+ reqMethod="POST",
2904
+ endpoint=g_param[OptionsDefine.Endpoint],
2905
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2906
+ )
2907
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2908
+ if g_param[OptionsDefine.Language]:
2909
+ profile.language = g_param[OptionsDefine.Language]
2910
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2911
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2912
+ client._sdkVersion += ("_CLI_" + __version__)
2913
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2914
+ model = models.SetAutoRenewRequest()
2915
+ model.from_json_string(json.dumps(args))
2916
+ start_time = time.time()
2917
+ while True:
2918
+ rsp = client.SetAutoRenew(model)
2919
+ result = rsp.to_json_string()
2920
+ try:
2921
+ json_obj = json.loads(result)
2922
+ except TypeError as e:
2923
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2924
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2925
+ break
2926
+ cur_time = time.time()
2927
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2928
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2929
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2930
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2931
+ else:
2932
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2933
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2934
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2935
+
2936
+
2937
+ def doSetDBInstanceDeletionProtection(args, parsed_globals):
2938
+ g_param = parse_global_arg(parsed_globals)
2939
+
2940
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2941
+ cred = credential.CVMRoleCredential()
2942
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2943
+ cred = credential.STSAssumeRoleCredential(
2944
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2945
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2946
+ )
2947
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2949
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2950
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2951
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2952
+ else:
2953
+ cred = credential.Credential(
2954
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2955
+ )
2956
+ http_profile = HttpProfile(
2957
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2958
+ reqMethod="POST",
2959
+ endpoint=g_param[OptionsDefine.Endpoint],
2960
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2961
+ )
2962
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2963
+ if g_param[OptionsDefine.Language]:
2964
+ profile.language = g_param[OptionsDefine.Language]
2965
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2966
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2967
+ client._sdkVersion += ("_CLI_" + __version__)
2968
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2969
+ model = models.SetDBInstanceDeletionProtectionRequest()
2970
+ model.from_json_string(json.dumps(args))
2971
+ start_time = time.time()
2972
+ while True:
2973
+ rsp = client.SetDBInstanceDeletionProtection(model)
2974
+ result = rsp.to_json_string()
2975
+ try:
2976
+ json_obj = json.loads(result)
2977
+ except TypeError as e:
2978
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2979
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2980
+ break
2981
+ cur_time = time.time()
2982
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2983
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2984
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2985
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2986
+ else:
2987
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2988
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2989
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2990
+
2991
+
2992
+ def doAssignProject(args, parsed_globals):
2993
+ g_param = parse_global_arg(parsed_globals)
2994
+
2995
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2996
+ cred = credential.CVMRoleCredential()
2997
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2998
+ cred = credential.STSAssumeRoleCredential(
2999
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3000
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3001
+ )
3002
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3004
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3005
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3006
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3007
+ else:
3008
+ cred = credential.Credential(
3009
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3010
+ )
3011
+ http_profile = HttpProfile(
3012
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3013
+ reqMethod="POST",
3014
+ endpoint=g_param[OptionsDefine.Endpoint],
3015
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3016
+ )
3017
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3018
+ if g_param[OptionsDefine.Language]:
3019
+ profile.language = g_param[OptionsDefine.Language]
3020
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3021
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3022
+ client._sdkVersion += ("_CLI_" + __version__)
3023
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3024
+ model = models.AssignProjectRequest()
3025
+ model.from_json_string(json.dumps(args))
3026
+ start_time = time.time()
3027
+ while True:
3028
+ rsp = client.AssignProject(model)
3029
+ result = rsp.to_json_string()
3030
+ try:
3031
+ json_obj = json.loads(result)
3032
+ except TypeError as e:
3033
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3034
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3035
+ break
3036
+ cur_time = time.time()
3037
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3038
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3039
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3040
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3041
+ else:
3042
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3043
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3044
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3045
+
3046
+
3047
+ def doDescribeTransparentDataEncryptionStatus(args, parsed_globals):
3048
+ g_param = parse_global_arg(parsed_globals)
3049
+
3050
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3051
+ cred = credential.CVMRoleCredential()
3052
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3053
+ cred = credential.STSAssumeRoleCredential(
3054
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3055
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3056
+ )
3057
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3059
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3060
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3061
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3062
+ else:
3063
+ cred = credential.Credential(
3064
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3065
+ )
3066
+ http_profile = HttpProfile(
3067
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3068
+ reqMethod="POST",
3069
+ endpoint=g_param[OptionsDefine.Endpoint],
3070
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3071
+ )
3072
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3073
+ if g_param[OptionsDefine.Language]:
3074
+ profile.language = g_param[OptionsDefine.Language]
3075
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3076
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3077
+ client._sdkVersion += ("_CLI_" + __version__)
3078
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3079
+ model = models.DescribeTransparentDataEncryptionStatusRequest()
3080
+ model.from_json_string(json.dumps(args))
3081
+ start_time = time.time()
3082
+ while True:
3083
+ rsp = client.DescribeTransparentDataEncryptionStatus(model)
3084
+ result = rsp.to_json_string()
3085
+ try:
3086
+ json_obj = json.loads(result)
3087
+ except TypeError as e:
3088
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3089
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3090
+ break
3091
+ cur_time = time.time()
3092
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3093
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3094
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3095
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3096
+ else:
3097
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3098
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3099
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3100
+
3101
+
3102
+ def doUpgradeDbInstanceVersion(args, parsed_globals):
3103
+ g_param = parse_global_arg(parsed_globals)
3104
+
3105
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3106
+ cred = credential.CVMRoleCredential()
3107
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3108
+ cred = credential.STSAssumeRoleCredential(
3109
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3110
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3111
+ )
3112
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3114
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3115
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3116
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3117
+ else:
3118
+ cred = credential.Credential(
3119
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3120
+ )
3121
+ http_profile = HttpProfile(
3122
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3123
+ reqMethod="POST",
3124
+ endpoint=g_param[OptionsDefine.Endpoint],
3125
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3126
+ )
3127
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3128
+ if g_param[OptionsDefine.Language]:
3129
+ profile.language = g_param[OptionsDefine.Language]
3130
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3131
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3132
+ client._sdkVersion += ("_CLI_" + __version__)
3133
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3134
+ model = models.UpgradeDbInstanceVersionRequest()
3135
+ model.from_json_string(json.dumps(args))
3136
+ start_time = time.time()
3137
+ while True:
3138
+ rsp = client.UpgradeDbInstanceVersion(model)
3139
+ result = rsp.to_json_string()
3140
+ try:
3141
+ json_obj = json.loads(result)
3142
+ except TypeError as e:
3143
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3144
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3145
+ break
3146
+ cur_time = time.time()
3147
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3148
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3149
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3150
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3151
+ else:
3152
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3153
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3154
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3155
+
3156
+
3157
+ def doDescribeAccountUsers(args, parsed_globals):
3158
+ g_param = parse_global_arg(parsed_globals)
3159
+
3160
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3161
+ cred = credential.CVMRoleCredential()
3162
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3163
+ cred = credential.STSAssumeRoleCredential(
3164
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3165
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3166
+ )
3167
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3169
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3170
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3171
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3172
+ else:
3173
+ cred = credential.Credential(
3174
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3175
+ )
3176
+ http_profile = HttpProfile(
3177
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3178
+ reqMethod="POST",
3179
+ endpoint=g_param[OptionsDefine.Endpoint],
3180
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3181
+ )
3182
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3183
+ if g_param[OptionsDefine.Language]:
3184
+ profile.language = g_param[OptionsDefine.Language]
3185
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3186
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3187
+ client._sdkVersion += ("_CLI_" + __version__)
3188
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3189
+ model = models.DescribeAccountUsersRequest()
3190
+ model.from_json_string(json.dumps(args))
3191
+ start_time = time.time()
3192
+ while True:
3193
+ rsp = client.DescribeAccountUsers(model)
3194
+ result = rsp.to_json_string()
3195
+ try:
3196
+ json_obj = json.loads(result)
3197
+ except TypeError as e:
3198
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3199
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3200
+ break
3201
+ cur_time = time.time()
3202
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3203
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3204
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3205
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3206
+ else:
3207
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3208
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3209
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3210
+
3211
+
3212
+ def doDescribeSlowLog(args, parsed_globals):
3213
+ g_param = parse_global_arg(parsed_globals)
3214
+
3215
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3216
+ cred = credential.CVMRoleCredential()
3217
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3218
+ cred = credential.STSAssumeRoleCredential(
3219
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3220
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3221
+ )
3222
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3224
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3225
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3226
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3227
+ else:
3228
+ cred = credential.Credential(
3229
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3230
+ )
3231
+ http_profile = HttpProfile(
3232
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3233
+ reqMethod="POST",
3234
+ endpoint=g_param[OptionsDefine.Endpoint],
3235
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3236
+ )
3237
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3238
+ if g_param[OptionsDefine.Language]:
3239
+ profile.language = g_param[OptionsDefine.Language]
3240
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3241
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3242
+ client._sdkVersion += ("_CLI_" + __version__)
3243
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3244
+ model = models.DescribeSlowLogRequest()
3245
+ model.from_json_string(json.dumps(args))
3246
+ start_time = time.time()
3247
+ while True:
3248
+ rsp = client.DescribeSlowLog(model)
3249
+ result = rsp.to_json_string()
3250
+ try:
3251
+ json_obj = json.loads(result)
3252
+ except TypeError as e:
3253
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3254
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3255
+ break
3256
+ cur_time = time.time()
3257
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3258
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3259
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3260
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3261
+ else:
3262
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3263
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3264
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3265
+
3266
+
3267
+ def doOpenAuditService(args, parsed_globals):
3268
+ g_param = parse_global_arg(parsed_globals)
3269
+
3270
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3271
+ cred = credential.CVMRoleCredential()
3272
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3273
+ cred = credential.STSAssumeRoleCredential(
3274
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3275
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3276
+ )
3277
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3279
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3280
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3281
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3282
+ else:
3283
+ cred = credential.Credential(
3284
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3285
+ )
3286
+ http_profile = HttpProfile(
3287
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3288
+ reqMethod="POST",
3289
+ endpoint=g_param[OptionsDefine.Endpoint],
3290
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3291
+ )
3292
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3293
+ if g_param[OptionsDefine.Language]:
3294
+ profile.language = g_param[OptionsDefine.Language]
3295
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3296
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3297
+ client._sdkVersion += ("_CLI_" + __version__)
3298
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3299
+ model = models.OpenAuditServiceRequest()
3300
+ model.from_json_string(json.dumps(args))
3301
+ start_time = time.time()
3302
+ while True:
3303
+ rsp = client.OpenAuditService(model)
3304
+ result = rsp.to_json_string()
3305
+ try:
3306
+ json_obj = json.loads(result)
3307
+ except TypeError as e:
3308
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3309
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3310
+ break
3311
+ cur_time = time.time()
3312
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3313
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3314
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3315
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3316
+ else:
3317
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3318
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3319
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3320
+
3321
+
3322
+ def doCreateAuditLogFile(args, parsed_globals):
3323
+ g_param = parse_global_arg(parsed_globals)
3324
+
3325
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3326
+ cred = credential.CVMRoleCredential()
3327
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3328
+ cred = credential.STSAssumeRoleCredential(
3329
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3330
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3331
+ )
3332
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3334
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3335
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3336
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3337
+ else:
3338
+ cred = credential.Credential(
3339
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3340
+ )
3341
+ http_profile = HttpProfile(
3342
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3343
+ reqMethod="POST",
3344
+ endpoint=g_param[OptionsDefine.Endpoint],
3345
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3346
+ )
3347
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3348
+ if g_param[OptionsDefine.Language]:
3349
+ profile.language = g_param[OptionsDefine.Language]
3350
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3351
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3352
+ client._sdkVersion += ("_CLI_" + __version__)
3353
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3354
+ model = models.CreateAuditLogFileRequest()
3355
+ model.from_json_string(json.dumps(args))
3356
+ start_time = time.time()
3357
+ while True:
3358
+ rsp = client.CreateAuditLogFile(model)
3359
+ result = rsp.to_json_string()
3360
+ try:
3361
+ json_obj = json.loads(result)
3362
+ except TypeError as e:
3363
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3364
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3365
+ break
3366
+ cur_time = time.time()
3367
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3368
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3369
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3370
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3371
+ else:
3372
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3373
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3374
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3375
+
3376
+
3377
+ def doSetInstanceMaintenance(args, parsed_globals):
2571
3378
  g_param = parse_global_arg(parsed_globals)
2572
3379
 
2573
3380
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2577,7 +3384,10 @@ def doSetInstanceMaintenance(args, parsed_globals):
2577
3384
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2578
3385
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2579
3386
  )
2580
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3387
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3389
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3390
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2581
3391
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2582
3392
  else:
2583
3393
  cred = credential.Credential(
@@ -2589,7 +3399,7 @@ def doSetInstanceMaintenance(args, parsed_globals):
2589
3399
  endpoint=g_param[OptionsDefine.Endpoint],
2590
3400
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2591
3401
  )
2592
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3402
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2593
3403
  if g_param[OptionsDefine.Language]:
2594
3404
  profile.language = g_param[OptionsDefine.Language]
2595
3405
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2619,7 +3429,7 @@ def doSetInstanceMaintenance(args, parsed_globals):
2619
3429
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2620
3430
 
2621
3431
 
2622
- def doModifyInstanceParams(args, parsed_globals):
3432
+ def doRenameInstance(args, parsed_globals):
2623
3433
  g_param = parse_global_arg(parsed_globals)
2624
3434
 
2625
3435
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2629,7 +3439,10 @@ def doModifyInstanceParams(args, parsed_globals):
2629
3439
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2630
3440
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2631
3441
  )
2632
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3442
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3444
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3445
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2633
3446
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2634
3447
  else:
2635
3448
  cred = credential.Credential(
@@ -2641,18 +3454,18 @@ def doModifyInstanceParams(args, parsed_globals):
2641
3454
  endpoint=g_param[OptionsDefine.Endpoint],
2642
3455
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2643
3456
  )
2644
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3457
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2645
3458
  if g_param[OptionsDefine.Language]:
2646
3459
  profile.language = g_param[OptionsDefine.Language]
2647
3460
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2648
3461
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2649
3462
  client._sdkVersion += ("_CLI_" + __version__)
2650
3463
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2651
- model = models.ModifyInstanceParamsRequest()
3464
+ model = models.RenameInstanceRequest()
2652
3465
  model.from_json_string(json.dumps(args))
2653
3466
  start_time = time.time()
2654
3467
  while True:
2655
- rsp = client.ModifyInstanceParams(model)
3468
+ rsp = client.RenameInstance(model)
2656
3469
  result = rsp.to_json_string()
2657
3470
  try:
2658
3471
  json_obj = json.loads(result)
@@ -2681,7 +3494,10 @@ def doDescribeDBInstanceParamTplDetail(args, parsed_globals):
2681
3494
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2682
3495
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2683
3496
  )
2684
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3497
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3499
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3500
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2685
3501
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2686
3502
  else:
2687
3503
  cred = credential.Credential(
@@ -2693,7 +3509,7 @@ def doDescribeDBInstanceParamTplDetail(args, parsed_globals):
2693
3509
  endpoint=g_param[OptionsDefine.Endpoint],
2694
3510
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2695
3511
  )
2696
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3512
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2697
3513
  if g_param[OptionsDefine.Language]:
2698
3514
  profile.language = g_param[OptionsDefine.Language]
2699
3515
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2733,7 +3549,10 @@ def doKillOps(args, parsed_globals):
2733
3549
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2734
3550
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2735
3551
  )
2736
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3552
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3554
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3555
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2737
3556
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2738
3557
  else:
2739
3558
  cred = credential.Credential(
@@ -2745,7 +3564,7 @@ def doKillOps(args, parsed_globals):
2745
3564
  endpoint=g_param[OptionsDefine.Endpoint],
2746
3565
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2747
3566
  )
2748
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3567
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2749
3568
  if g_param[OptionsDefine.Language]:
2750
3569
  profile.language = g_param[OptionsDefine.Language]
2751
3570
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2785,7 +3604,10 @@ def doIsolateDBInstance(args, parsed_globals):
2785
3604
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2786
3605
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2787
3606
  )
2788
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3607
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3609
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3610
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2789
3611
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2790
3612
  else:
2791
3613
  cred = credential.Credential(
@@ -2797,7 +3619,7 @@ def doIsolateDBInstance(args, parsed_globals):
2797
3619
  endpoint=g_param[OptionsDefine.Endpoint],
2798
3620
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2799
3621
  )
2800
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3622
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2801
3623
  if g_param[OptionsDefine.Language]:
2802
3624
  profile.language = g_param[OptionsDefine.Language]
2803
3625
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2837,7 +3659,10 @@ def doEnableTransparentDataEncryption(args, parsed_globals):
2837
3659
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2838
3660
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2839
3661
  )
2840
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3662
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3664
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3665
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2841
3666
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2842
3667
  else:
2843
3668
  cred = credential.Credential(
@@ -2849,7 +3674,7 @@ def doEnableTransparentDataEncryption(args, parsed_globals):
2849
3674
  endpoint=g_param[OptionsDefine.Endpoint],
2850
3675
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2851
3676
  )
2852
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3677
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2853
3678
  if g_param[OptionsDefine.Language]:
2854
3679
  profile.language = g_param[OptionsDefine.Language]
2855
3680
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2879,7 +3704,7 @@ def doEnableTransparentDataEncryption(args, parsed_globals):
2879
3704
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2880
3705
 
2881
3706
 
2882
- def doCreateBackupDBInstance(args, parsed_globals):
3707
+ def doModifyDBInstanceNetworkAddress(args, parsed_globals):
2883
3708
  g_param = parse_global_arg(parsed_globals)
2884
3709
 
2885
3710
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2889,7 +3714,10 @@ def doCreateBackupDBInstance(args, parsed_globals):
2889
3714
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2890
3715
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2891
3716
  )
2892
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3717
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3719
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3720
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2893
3721
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2894
3722
  else:
2895
3723
  cred = credential.Credential(
@@ -2901,18 +3729,18 @@ def doCreateBackupDBInstance(args, parsed_globals):
2901
3729
  endpoint=g_param[OptionsDefine.Endpoint],
2902
3730
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2903
3731
  )
2904
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3732
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2905
3733
  if g_param[OptionsDefine.Language]:
2906
3734
  profile.language = g_param[OptionsDefine.Language]
2907
3735
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2908
3736
  client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
2909
3737
  client._sdkVersion += ("_CLI_" + __version__)
2910
3738
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2911
- model = models.CreateBackupDBInstanceRequest()
3739
+ model = models.ModifyDBInstanceNetworkAddressRequest()
2912
3740
  model.from_json_string(json.dumps(args))
2913
3741
  start_time = time.time()
2914
3742
  while True:
2915
- rsp = client.CreateBackupDBInstance(model)
3743
+ rsp = client.ModifyDBInstanceNetworkAddress(model)
2916
3744
  result = rsp.to_json_string()
2917
3745
  try:
2918
3746
  json_obj = json.loads(result)
@@ -2941,7 +3769,10 @@ def doInquirePriceRenewDBInstances(args, parsed_globals):
2941
3769
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2942
3770
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2943
3771
  )
2944
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3772
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3774
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3775
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
3776
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2946
3777
  else:
2947
3778
  cred = credential.Credential(
@@ -2953,7 +3784,7 @@ def doInquirePriceRenewDBInstances(args, parsed_globals):
2953
3784
  endpoint=g_param[OptionsDefine.Endpoint],
2954
3785
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2955
3786
  )
2956
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3787
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2957
3788
  if g_param[OptionsDefine.Language]:
2958
3789
  profile.language = g_param[OptionsDefine.Language]
2959
3790
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2993,7 +3824,10 @@ def doDeleteAccountUser(args, parsed_globals):
2993
3824
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2994
3825
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2995
3826
  )
2996
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3829
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3830
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2997
3831
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2998
3832
  else:
2999
3833
  cred = credential.Credential(
@@ -3005,7 +3839,7 @@ def doDeleteAccountUser(args, parsed_globals):
3005
3839
  endpoint=g_param[OptionsDefine.Endpoint],
3006
3840
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3007
3841
  )
3008
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3842
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3009
3843
  if g_param[OptionsDefine.Language]:
3010
3844
  profile.language = g_param[OptionsDefine.Language]
3011
3845
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3035,6 +3869,61 @@ def doDeleteAccountUser(args, parsed_globals):
3035
3869
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3036
3870
 
3037
3871
 
3872
+ def doCreateBackupDBInstance(args, parsed_globals):
3873
+ g_param = parse_global_arg(parsed_globals)
3874
+
3875
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3876
+ cred = credential.CVMRoleCredential()
3877
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3878
+ cred = credential.STSAssumeRoleCredential(
3879
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3880
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3881
+ )
3882
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3884
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3885
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3886
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3887
+ else:
3888
+ cred = credential.Credential(
3889
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3890
+ )
3891
+ http_profile = HttpProfile(
3892
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3893
+ reqMethod="POST",
3894
+ endpoint=g_param[OptionsDefine.Endpoint],
3895
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3896
+ )
3897
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3898
+ if g_param[OptionsDefine.Language]:
3899
+ profile.language = g_param[OptionsDefine.Language]
3900
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3901
+ client = mod.MongodbClient(cred, g_param[OptionsDefine.Region], profile)
3902
+ client._sdkVersion += ("_CLI_" + __version__)
3903
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3904
+ model = models.CreateBackupDBInstanceRequest()
3905
+ model.from_json_string(json.dumps(args))
3906
+ start_time = time.time()
3907
+ while True:
3908
+ rsp = client.CreateBackupDBInstance(model)
3909
+ result = rsp.to_json_string()
3910
+ try:
3911
+ json_obj = json.loads(result)
3912
+ except TypeError as e:
3913
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3914
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3915
+ break
3916
+ cur_time = time.time()
3917
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3918
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3919
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3920
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3921
+ else:
3922
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3923
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3924
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3925
+
3926
+
3038
3927
  def doModifyDBInstanceSecurityGroup(args, parsed_globals):
3039
3928
  g_param = parse_global_arg(parsed_globals)
3040
3929
 
@@ -3045,7 +3934,10 @@ def doModifyDBInstanceSecurityGroup(args, parsed_globals):
3045
3934
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3046
3935
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3047
3936
  )
3048
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3937
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3939
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3940
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3049
3941
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3050
3942
  else:
3051
3943
  cred = credential.Credential(
@@ -3057,7 +3949,7 @@ def doModifyDBInstanceSecurityGroup(args, parsed_globals):
3057
3949
  endpoint=g_param[OptionsDefine.Endpoint],
3058
3950
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3059
3951
  )
3060
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3952
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3061
3953
  if g_param[OptionsDefine.Language]:
3062
3954
  profile.language = g_param[OptionsDefine.Language]
3063
3955
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3102,10 +3994,12 @@ MODELS_MAP = {
3102
3994
  ACTION_MAP = {
3103
3995
  "TerminateDBInstances": doTerminateDBInstances,
3104
3996
  "DescribeDBInstanceURL": doDescribeDBInstanceURL,
3997
+ "CreateLogDownloadTask": doCreateLogDownloadTask,
3105
3998
  "DescribeDBInstanceNodeProperty": doDescribeDBInstanceNodeProperty,
3106
3999
  "DescribeDBInstanceParamTpl": doDescribeDBInstanceParamTpl,
3107
4000
  "DescribeDBInstanceDeal": doDescribeDBInstanceDeal,
3108
4001
  "DescribeCurrentOp": doDescribeCurrentOp,
4002
+ "DescribeDBBackups": doDescribeDBBackups,
3109
4003
  "DescribeClientConnections": doDescribeClientConnections,
3110
4004
  "ResetDBInstancePassword": doResetDBInstancePassword,
3111
4005
  "DescribeSecurityGroup": doDescribeSecurityGroup,
@@ -3113,14 +4007,16 @@ ACTION_MAP = {
3113
4007
  "SetAccountUserPrivilege": doSetAccountUserPrivilege,
3114
4008
  "FlushInstanceRouterConfig": doFlushInstanceRouterConfig,
3115
4009
  "UpgradeDBInstance": doUpgradeDBInstance,
3116
- "DescribeDBBackups": doDescribeDBBackups,
3117
- "SetAutoRenew": doSetAutoRenew,
4010
+ "DeleteLogDownloadTask": doDeleteLogDownloadTask,
4011
+ "DeleteAuditLogFile": doDeleteAuditLogFile,
4012
+ "DescribeAuditInstanceList": doDescribeAuditInstanceList,
3118
4013
  "DescribeDetailedSlowLogs": doDescribeDetailedSlowLogs,
3119
- "SetBackupRules": doSetBackupRules,
4014
+ "InstanceEnableSSL": doInstanceEnableSSL,
3120
4015
  "InquirePriceModifyDBInstanceSpec": doInquirePriceModifyDBInstanceSpec,
4016
+ "DescribeLogDownloadTasks": doDescribeLogDownloadTasks,
3121
4017
  "RestartNodes": doRestartNodes,
3122
4018
  "DescribeBackupRules": doDescribeBackupRules,
3123
- "RenameInstance": doRenameInstance,
4019
+ "ModifyInstanceParams": doModifyInstanceParams,
3124
4020
  "DescribeAsyncRequestInfo": doDescribeAsyncRequestInfo,
3125
4021
  "CreateAccountUser": doCreateAccountUser,
3126
4022
  "OfflineIsolatedDBInstance": doOfflineIsolatedDBInstance,
@@ -3133,31 +4029,40 @@ ACTION_MAP = {
3133
4029
  "CreateBackupDownloadTask": doCreateBackupDownloadTask,
3134
4030
  "UpgradeDBInstanceHour": doUpgradeDBInstanceHour,
3135
4031
  "FlashBackDBInstance": doFlashBackDBInstance,
4032
+ "ModifyAuditService": doModifyAuditService,
3136
4033
  "DescribeDBInstances": doDescribeDBInstances,
3137
4034
  "DescribeDBInstanceNamespace": doDescribeDBInstanceNamespace,
3138
4035
  "DescribeSlowLogPatterns": doDescribeSlowLogPatterns,
3139
4036
  "DescribeSlowLogs": doDescribeSlowLogs,
3140
- "ModifyDBInstanceNetworkAddress": doModifyDBInstanceNetworkAddress,
4037
+ "DescribeMongodbLogs": doDescribeMongodbLogs,
3141
4038
  "CreateDBInstance": doCreateDBInstance,
3142
4039
  "ModifyDBInstanceSpec": doModifyDBInstanceSpec,
3143
4040
  "DescribeInstanceParams": doDescribeInstanceParams,
4041
+ "UpgradeDBInstanceKernelVersion": doUpgradeDBInstanceKernelVersion,
3144
4042
  "DescribeSpecInfo": doDescribeSpecInfo,
3145
4043
  "DescribeBackupDownloadTask": doDescribeBackupDownloadTask,
3146
4044
  "InquirePriceCreateDBInstances": doInquirePriceCreateDBInstances,
4045
+ "SetBackupRules": doSetBackupRules,
4046
+ "DescribeInstanceSSL": doDescribeInstanceSSL,
4047
+ "SetAutoRenew": doSetAutoRenew,
3147
4048
  "SetDBInstanceDeletionProtection": doSetDBInstanceDeletionProtection,
3148
4049
  "AssignProject": doAssignProject,
3149
4050
  "DescribeTransparentDataEncryptionStatus": doDescribeTransparentDataEncryptionStatus,
4051
+ "UpgradeDbInstanceVersion": doUpgradeDbInstanceVersion,
3150
4052
  "DescribeAccountUsers": doDescribeAccountUsers,
3151
4053
  "DescribeSlowLog": doDescribeSlowLog,
4054
+ "OpenAuditService": doOpenAuditService,
4055
+ "CreateAuditLogFile": doCreateAuditLogFile,
3152
4056
  "SetInstanceMaintenance": doSetInstanceMaintenance,
3153
- "ModifyInstanceParams": doModifyInstanceParams,
4057
+ "RenameInstance": doRenameInstance,
3154
4058
  "DescribeDBInstanceParamTplDetail": doDescribeDBInstanceParamTplDetail,
3155
4059
  "KillOps": doKillOps,
3156
4060
  "IsolateDBInstance": doIsolateDBInstance,
3157
4061
  "EnableTransparentDataEncryption": doEnableTransparentDataEncryption,
3158
- "CreateBackupDBInstance": doCreateBackupDBInstance,
4062
+ "ModifyDBInstanceNetworkAddress": doModifyDBInstanceNetworkAddress,
3159
4063
  "InquirePriceRenewDBInstances": doInquirePriceRenewDBInstances,
3160
4064
  "DeleteAccountUser": doDeleteAccountUser,
4065
+ "CreateBackupDBInstance": doCreateBackupDBInstance,
3161
4066
  "ModifyDBInstanceSecurityGroup": doModifyDBInstanceSecurityGroup,
3162
4067
 
3163
4068
  }