tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/bh/bh_client.py
CHANGED
|
@@ -17,7 +17,7 @@ from tencentcloud.bh.v20230418 import models as models_v20230418
|
|
|
17
17
|
from jmespath import search
|
|
18
18
|
import time
|
|
19
19
|
|
|
20
|
-
def
|
|
20
|
+
def doDeleteDeviceAccounts(args, parsed_globals):
|
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
|
22
22
|
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -27,7 +27,10 @@ def doModifyDeviceGroup(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,18 +42,18 @@ def doModifyDeviceGroup(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
46
49
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
47
50
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
48
51
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
49
|
-
model = models.
|
|
52
|
+
model = models.DeleteDeviceAccountsRequest()
|
|
50
53
|
model.from_json_string(json.dumps(args))
|
|
51
54
|
start_time = time.time()
|
|
52
55
|
while True:
|
|
53
|
-
rsp = client.
|
|
56
|
+
rsp = client.DeleteDeviceAccounts(model)
|
|
54
57
|
result = rsp.to_json_string()
|
|
55
58
|
try:
|
|
56
59
|
json_obj = json.loads(result)
|
|
@@ -69,7 +72,7 @@ def doModifyDeviceGroup(args, parsed_globals):
|
|
|
69
72
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
70
73
|
|
|
71
74
|
|
|
72
|
-
def
|
|
75
|
+
def doResetUser(args, parsed_globals):
|
|
73
76
|
g_param = parse_global_arg(parsed_globals)
|
|
74
77
|
|
|
75
78
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -79,7 +82,10 @@ def doDescribeDeviceGroupMembers(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,18 +97,18 @@ def doDescribeDeviceGroupMembers(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
98
104
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
99
105
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
100
106
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
101
|
-
model = models.
|
|
107
|
+
model = models.ResetUserRequest()
|
|
102
108
|
model.from_json_string(json.dumps(args))
|
|
103
109
|
start_time = time.time()
|
|
104
110
|
while True:
|
|
105
|
-
rsp = client.
|
|
111
|
+
rsp = client.ResetUser(model)
|
|
106
112
|
result = rsp.to_json_string()
|
|
107
113
|
try:
|
|
108
114
|
json_obj = json.loads(result)
|
|
@@ -121,7 +127,7 @@ def doDescribeDeviceGroupMembers(args, parsed_globals):
|
|
|
121
127
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
122
128
|
|
|
123
129
|
|
|
124
|
-
def
|
|
130
|
+
def doDescribeOperationTask(args, parsed_globals):
|
|
125
131
|
g_param = parse_global_arg(parsed_globals)
|
|
126
132
|
|
|
127
133
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -131,7 +137,10 @@ def doModifyOAuthSetting(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,18 +152,18 @@ def doModifyOAuthSetting(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
150
159
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
151
160
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
152
161
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
153
|
-
model = models.
|
|
162
|
+
model = models.DescribeOperationTaskRequest()
|
|
154
163
|
model.from_json_string(json.dumps(args))
|
|
155
164
|
start_time = time.time()
|
|
156
165
|
while True:
|
|
157
|
-
rsp = client.
|
|
166
|
+
rsp = client.DescribeOperationTask(model)
|
|
158
167
|
result = rsp.to_json_string()
|
|
159
168
|
try:
|
|
160
169
|
json_obj = json.loads(result)
|
|
@@ -173,7 +182,7 @@ def doModifyOAuthSetting(args, parsed_globals):
|
|
|
173
182
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
174
183
|
|
|
175
184
|
|
|
176
|
-
def
|
|
185
|
+
def doDescribeDomains(args, parsed_globals):
|
|
177
186
|
g_param = parse_global_arg(parsed_globals)
|
|
178
187
|
|
|
179
188
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -183,7 +192,10 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,18 +207,18 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
202
214
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
203
215
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
204
216
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
205
|
-
model = models.
|
|
217
|
+
model = models.DescribeDomainsRequest()
|
|
206
218
|
model.from_json_string(json.dumps(args))
|
|
207
219
|
start_time = time.time()
|
|
208
220
|
while True:
|
|
209
|
-
rsp = client.
|
|
221
|
+
rsp = client.DescribeDomains(model)
|
|
210
222
|
result = rsp.to_json_string()
|
|
211
223
|
try:
|
|
212
224
|
json_obj = json.loads(result)
|
|
@@ -225,7 +237,7 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
|
|
|
225
237
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
226
238
|
|
|
227
239
|
|
|
228
|
-
def
|
|
240
|
+
def doModifyUserDirectory(args, parsed_globals):
|
|
229
241
|
g_param = parse_global_arg(parsed_globals)
|
|
230
242
|
|
|
231
243
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -235,7 +247,10 @@ def doCreateAcl(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,18 +262,18 @@ def doCreateAcl(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
254
269
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
255
270
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
256
271
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
257
|
-
model = models.
|
|
272
|
+
model = models.ModifyUserDirectoryRequest()
|
|
258
273
|
model.from_json_string(json.dumps(args))
|
|
259
274
|
start_time = time.time()
|
|
260
275
|
while True:
|
|
261
|
-
rsp = client.
|
|
276
|
+
rsp = client.ModifyUserDirectory(model)
|
|
262
277
|
result = rsp.to_json_string()
|
|
263
278
|
try:
|
|
264
279
|
json_obj = json.loads(result)
|
|
@@ -277,7 +292,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
277
292
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
293
|
|
|
279
294
|
|
|
280
|
-
def
|
|
295
|
+
def doImportExternalDevice(args, parsed_globals):
|
|
281
296
|
g_param = parse_global_arg(parsed_globals)
|
|
282
297
|
|
|
283
298
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -287,7 +302,10 @@ def doDeleteUserGroupMembers(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,18 +317,18 @@ def doDeleteUserGroupMembers(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
306
324
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
307
325
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
308
326
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
309
|
-
model = models.
|
|
327
|
+
model = models.ImportExternalDeviceRequest()
|
|
310
328
|
model.from_json_string(json.dumps(args))
|
|
311
329
|
start_time = time.time()
|
|
312
330
|
while True:
|
|
313
|
-
rsp = client.
|
|
331
|
+
rsp = client.ImportExternalDevice(model)
|
|
314
332
|
result = rsp.to_json_string()
|
|
315
333
|
try:
|
|
316
334
|
json_obj = json.loads(result)
|
|
@@ -329,7 +347,7 @@ def doDeleteUserGroupMembers(args, parsed_globals):
|
|
|
329
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
348
|
|
|
331
349
|
|
|
332
|
-
def
|
|
350
|
+
def doDescribeUserDirectory(args, parsed_globals):
|
|
333
351
|
g_param = parse_global_arg(parsed_globals)
|
|
334
352
|
|
|
335
353
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -339,7 +357,10 @@ def doCreateDeviceGroup(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,18 +372,18 @@ def doCreateDeviceGroup(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
379
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
380
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
381
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
-
model = models.
|
|
382
|
+
model = models.DescribeUserDirectoryRequest()
|
|
362
383
|
model.from_json_string(json.dumps(args))
|
|
363
384
|
start_time = time.time()
|
|
364
385
|
while True:
|
|
365
|
-
rsp = client.
|
|
386
|
+
rsp = client.DescribeUserDirectory(model)
|
|
366
387
|
result = rsp.to_json_string()
|
|
367
388
|
try:
|
|
368
389
|
json_obj = json.loads(result)
|
|
@@ -381,7 +402,7 @@ def doCreateDeviceGroup(args, parsed_globals):
|
|
|
381
402
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
403
|
|
|
383
404
|
|
|
384
|
-
def
|
|
405
|
+
def doDeleteUserGroupMembers(args, parsed_globals):
|
|
385
406
|
g_param = parse_global_arg(parsed_globals)
|
|
386
407
|
|
|
387
408
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -391,7 +412,10 @@ def doDeleteDeviceAccounts(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,18 +427,18 @@ def doDeleteDeviceAccounts(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
410
434
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
411
435
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
412
436
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
413
|
-
model = models.
|
|
437
|
+
model = models.DeleteUserGroupMembersRequest()
|
|
414
438
|
model.from_json_string(json.dumps(args))
|
|
415
439
|
start_time = time.time()
|
|
416
440
|
while True:
|
|
417
|
-
rsp = client.
|
|
441
|
+
rsp = client.DeleteUserGroupMembers(model)
|
|
418
442
|
result = rsp.to_json_string()
|
|
419
443
|
try:
|
|
420
444
|
json_obj = json.loads(result)
|
|
@@ -433,7 +457,7 @@ def doDeleteDeviceAccounts(args, parsed_globals):
|
|
|
433
457
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
434
458
|
|
|
435
459
|
|
|
436
|
-
def
|
|
460
|
+
def doCreateAssetSyncJob(args, parsed_globals):
|
|
437
461
|
g_param = parse_global_arg(parsed_globals)
|
|
438
462
|
|
|
439
463
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -443,7 +467,10 @@ def doCheckLDAPConnection(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,18 +482,18 @@ def doCheckLDAPConnection(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
462
489
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
463
490
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
464
491
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
465
|
-
model = models.
|
|
492
|
+
model = models.CreateAssetSyncJobRequest()
|
|
466
493
|
model.from_json_string(json.dumps(args))
|
|
467
494
|
start_time = time.time()
|
|
468
495
|
while True:
|
|
469
|
-
rsp = client.
|
|
496
|
+
rsp = client.CreateAssetSyncJob(model)
|
|
470
497
|
result = rsp.to_json_string()
|
|
471
498
|
try:
|
|
472
499
|
json_obj = json.loads(result)
|
|
@@ -485,7 +512,7 @@ def doCheckLDAPConnection(args, parsed_globals):
|
|
|
485
512
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
513
|
|
|
487
514
|
|
|
488
|
-
def
|
|
515
|
+
def doCreateUserDirectory(args, parsed_globals):
|
|
489
516
|
g_param = parse_global_arg(parsed_globals)
|
|
490
517
|
|
|
491
518
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +522,10 @@ def doResetUser(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,18 +537,18 @@ def doResetUser(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
544
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
545
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
546
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
547
|
+
model = models.CreateUserDirectoryRequest()
|
|
518
548
|
model.from_json_string(json.dumps(args))
|
|
519
549
|
start_time = time.time()
|
|
520
550
|
while True:
|
|
521
|
-
rsp = client.
|
|
551
|
+
rsp = client.CreateUserDirectory(model)
|
|
522
552
|
result = rsp.to_json_string()
|
|
523
553
|
try:
|
|
524
554
|
json_obj = json.loads(result)
|
|
@@ -537,7 +567,7 @@ def doResetUser(args, parsed_globals):
|
|
|
537
567
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
538
568
|
|
|
539
569
|
|
|
540
|
-
def
|
|
570
|
+
def doSyncUserToIOA(args, parsed_globals):
|
|
541
571
|
g_param = parse_global_arg(parsed_globals)
|
|
542
572
|
|
|
543
573
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -547,7 +577,10 @@ def doCreateOperationTask(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,18 +592,18 @@ def doCreateOperationTask(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
566
599
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
567
600
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
568
601
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
569
|
-
model = models.
|
|
602
|
+
model = models.SyncUserToIOARequest()
|
|
570
603
|
model.from_json_string(json.dumps(args))
|
|
571
604
|
start_time = time.time()
|
|
572
605
|
while True:
|
|
573
|
-
rsp = client.
|
|
606
|
+
rsp = client.SyncUserToIOA(model)
|
|
574
607
|
result = rsp.to_json_string()
|
|
575
608
|
try:
|
|
576
609
|
json_obj = json.loads(result)
|
|
@@ -589,7 +622,7 @@ def doCreateOperationTask(args, parsed_globals):
|
|
|
589
622
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
590
623
|
|
|
591
624
|
|
|
592
|
-
def
|
|
625
|
+
def doSearchSubtaskResultById(args, parsed_globals):
|
|
593
626
|
g_param = parse_global_arg(parsed_globals)
|
|
594
627
|
|
|
595
628
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -599,7 +632,10 @@ def doCreateChangePwdTask(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,18 +647,18 @@ def doCreateChangePwdTask(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
618
654
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
619
655
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
620
656
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
621
|
-
model = models.
|
|
657
|
+
model = models.SearchSubtaskResultByIdRequest()
|
|
622
658
|
model.from_json_string(json.dumps(args))
|
|
623
659
|
start_time = time.time()
|
|
624
660
|
while True:
|
|
625
|
-
rsp = client.
|
|
661
|
+
rsp = client.SearchSubtaskResultById(model)
|
|
626
662
|
result = rsp.to_json_string()
|
|
627
663
|
try:
|
|
628
664
|
json_obj = json.loads(result)
|
|
@@ -641,7 +677,7 @@ def doCreateChangePwdTask(args, parsed_globals):
|
|
|
641
677
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
642
678
|
|
|
643
679
|
|
|
644
|
-
def
|
|
680
|
+
def doModifyAcl(args, parsed_globals):
|
|
645
681
|
g_param = parse_global_arg(parsed_globals)
|
|
646
682
|
|
|
647
683
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -651,7 +687,10 @@ def doSetLDAPSyncFlag(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,18 +702,18 @@ def doSetLDAPSyncFlag(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
670
709
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
671
710
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
672
711
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
673
|
-
model = models.
|
|
712
|
+
model = models.ModifyAclRequest()
|
|
674
713
|
model.from_json_string(json.dumps(args))
|
|
675
714
|
start_time = time.time()
|
|
676
715
|
while True:
|
|
677
|
-
rsp = client.
|
|
716
|
+
rsp = client.ModifyAcl(model)
|
|
678
717
|
result = rsp.to_json_string()
|
|
679
718
|
try:
|
|
680
719
|
json_obj = json.loads(result)
|
|
@@ -693,7 +732,7 @@ def doSetLDAPSyncFlag(args, parsed_globals):
|
|
|
693
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
733
|
|
|
695
734
|
|
|
696
|
-
def
|
|
735
|
+
def doDeleteUsers(args, parsed_globals):
|
|
697
736
|
g_param = parse_global_arg(parsed_globals)
|
|
698
737
|
|
|
699
738
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +742,10 @@ def doDescribeUserGroups(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,18 +757,18 @@ def doDescribeUserGroups(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
764
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
765
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
766
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
767
|
+
model = models.DeleteUsersRequest()
|
|
726
768
|
model.from_json_string(json.dumps(args))
|
|
727
769
|
start_time = time.time()
|
|
728
770
|
while True:
|
|
729
|
-
rsp = client.
|
|
771
|
+
rsp = client.DeleteUsers(model)
|
|
730
772
|
result = rsp.to_json_string()
|
|
731
773
|
try:
|
|
732
774
|
json_obj = json.loads(result)
|
|
@@ -745,7 +787,7 @@ def doDescribeUserGroups(args, parsed_globals):
|
|
|
745
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
788
|
|
|
747
789
|
|
|
748
|
-
def
|
|
790
|
+
def doDescribeAssetSyncFlag(args, parsed_globals):
|
|
749
791
|
g_param = parse_global_arg(parsed_globals)
|
|
750
792
|
|
|
751
793
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +797,10 @@ def doDescribeDomains(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,18 +812,18 @@ def doDescribeDomains(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
819
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
820
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
821
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
822
|
+
model = models.DescribeAssetSyncFlagRequest()
|
|
778
823
|
model.from_json_string(json.dumps(args))
|
|
779
824
|
start_time = time.time()
|
|
780
825
|
while True:
|
|
781
|
-
rsp = client.
|
|
826
|
+
rsp = client.DescribeAssetSyncFlag(model)
|
|
782
827
|
result = rsp.to_json_string()
|
|
783
828
|
try:
|
|
784
829
|
json_obj = json.loads(result)
|
|
@@ -797,7 +842,7 @@ def doDescribeDomains(args, parsed_globals):
|
|
|
797
842
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
843
|
|
|
799
844
|
|
|
800
|
-
def
|
|
845
|
+
def doDescribeAccessWhiteListRules(args, parsed_globals):
|
|
801
846
|
g_param = parse_global_arg(parsed_globals)
|
|
802
847
|
|
|
803
848
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +852,10 @@ def doDeployResource(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,18 +867,18 @@ def doDeployResource(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
874
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
875
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
876
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
877
|
+
model = models.DescribeAccessWhiteListRulesRequest()
|
|
830
878
|
model.from_json_string(json.dumps(args))
|
|
831
879
|
start_time = time.time()
|
|
832
880
|
while True:
|
|
833
|
-
rsp = client.
|
|
881
|
+
rsp = client.DescribeAccessWhiteListRules(model)
|
|
834
882
|
result = rsp.to_json_string()
|
|
835
883
|
try:
|
|
836
884
|
json_obj = json.loads(result)
|
|
@@ -849,7 +897,7 @@ def doDeployResource(args, parsed_globals):
|
|
|
849
897
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
898
|
|
|
851
899
|
|
|
852
|
-
def
|
|
900
|
+
def doDescribeAssetSyncStatus(args, parsed_globals):
|
|
853
901
|
g_param = parse_global_arg(parsed_globals)
|
|
854
902
|
|
|
855
903
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +907,10 @@ def doModifyDevice(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,18 +922,18 @@ def doModifyDevice(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
929
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
930
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
931
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
932
|
+
model = models.DescribeAssetSyncStatusRequest()
|
|
882
933
|
model.from_json_string(json.dumps(args))
|
|
883
934
|
start_time = time.time()
|
|
884
935
|
while True:
|
|
885
|
-
rsp = client.
|
|
936
|
+
rsp = client.DescribeAssetSyncStatus(model)
|
|
886
937
|
result = rsp.to_json_string()
|
|
887
938
|
try:
|
|
888
939
|
json_obj = json.loads(result)
|
|
@@ -901,7 +952,7 @@ def doModifyDevice(args, parsed_globals):
|
|
|
901
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
953
|
|
|
903
954
|
|
|
904
|
-
def
|
|
955
|
+
def doDescribeOperationEvent(args, parsed_globals):
|
|
905
956
|
g_param = parse_global_arg(parsed_globals)
|
|
906
957
|
|
|
907
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +962,10 @@ def doBindDeviceResource(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,18 +977,18 @@ def doBindDeviceResource(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
984
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
987
|
+
model = models.DescribeOperationEventRequest()
|
|
934
988
|
model.from_json_string(json.dumps(args))
|
|
935
989
|
start_time = time.time()
|
|
936
990
|
while True:
|
|
937
|
-
rsp = client.
|
|
991
|
+
rsp = client.DescribeOperationEvent(model)
|
|
938
992
|
result = rsp.to_json_string()
|
|
939
993
|
try:
|
|
940
994
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1007,7 @@ def doBindDeviceResource(args, parsed_globals):
|
|
|
953
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1008
|
|
|
955
1009
|
|
|
956
|
-
def
|
|
1010
|
+
def doDescribeAccountGroups(args, parsed_globals):
|
|
957
1011
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1012
|
|
|
959
1013
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1017,10 @@ def doBindDeviceAccountPassword(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,18 +1032,18 @@ def doBindDeviceAccountPassword(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1039
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1042
|
+
model = models.DescribeAccountGroupsRequest()
|
|
986
1043
|
model.from_json_string(json.dumps(args))
|
|
987
1044
|
start_time = time.time()
|
|
988
1045
|
while True:
|
|
989
|
-
rsp = client.
|
|
1046
|
+
rsp = client.DescribeAccountGroups(model)
|
|
990
1047
|
result = rsp.to_json_string()
|
|
991
1048
|
try:
|
|
992
1049
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1062,7 @@ def doBindDeviceAccountPassword(args, parsed_globals):
|
|
|
1005
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1063
|
|
|
1007
1064
|
|
|
1008
|
-
def
|
|
1065
|
+
def doDeleteCmdTemplates(args, parsed_globals):
|
|
1009
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1067
|
|
|
1011
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1072,10 @@ def doDescribeLDAPUnitSet(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,18 +1087,18 @@ def doDescribeLDAPUnitSet(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1094
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1097
|
+
model = models.DeleteCmdTemplatesRequest()
|
|
1038
1098
|
model.from_json_string(json.dumps(args))
|
|
1039
1099
|
start_time = time.time()
|
|
1040
1100
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1101
|
+
rsp = client.DeleteCmdTemplates(model)
|
|
1042
1102
|
result = rsp.to_json_string()
|
|
1043
1103
|
try:
|
|
1044
1104
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1117,7 @@ def doDescribeLDAPUnitSet(args, parsed_globals):
|
|
|
1057
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1118
|
|
|
1059
1119
|
|
|
1060
|
-
def
|
|
1120
|
+
def doModifyAccessWhiteListStatus(args, parsed_globals):
|
|
1061
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1122
|
|
|
1063
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1127,10 @@ def doCreateCmdTemplate(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,18 +1142,18 @@ def doCreateCmdTemplate(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1149
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1152
|
+
model = models.ModifyAccessWhiteListStatusRequest()
|
|
1090
1153
|
model.from_json_string(json.dumps(args))
|
|
1091
1154
|
start_time = time.time()
|
|
1092
1155
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1156
|
+
rsp = client.ModifyAccessWhiteListStatus(model)
|
|
1094
1157
|
result = rsp.to_json_string()
|
|
1095
1158
|
try:
|
|
1096
1159
|
json_obj = json.loads(result)
|
|
@@ -1109,7 +1172,7 @@ def doCreateCmdTemplate(args, parsed_globals):
|
|
|
1109
1172
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1110
1173
|
|
|
1111
1174
|
|
|
1112
|
-
def
|
|
1175
|
+
def doDescribeChangePwdTask(args, parsed_globals):
|
|
1113
1176
|
g_param = parse_global_arg(parsed_globals)
|
|
1114
1177
|
|
|
1115
1178
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1119,7 +1182,10 @@ def doSearchSession(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,18 +1197,18 @@ def doSearchSession(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1138
1204
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1139
1205
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1140
1206
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1141
|
-
model = models.
|
|
1207
|
+
model = models.DescribeChangePwdTaskRequest()
|
|
1142
1208
|
model.from_json_string(json.dumps(args))
|
|
1143
1209
|
start_time = time.time()
|
|
1144
1210
|
while True:
|
|
1145
|
-
rsp = client.
|
|
1211
|
+
rsp = client.DescribeChangePwdTask(model)
|
|
1146
1212
|
result = rsp.to_json_string()
|
|
1147
1213
|
try:
|
|
1148
1214
|
json_obj = json.loads(result)
|
|
@@ -1161,7 +1227,7 @@ def doSearchSession(args, parsed_globals):
|
|
|
1161
1227
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1162
1228
|
|
|
1163
1229
|
|
|
1164
|
-
def
|
|
1230
|
+
def doSearchFile(args, parsed_globals):
|
|
1165
1231
|
g_param = parse_global_arg(parsed_globals)
|
|
1166
1232
|
|
|
1167
1233
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1171,7 +1237,10 @@ def doDeleteAcls(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,18 +1252,18 @@ def doDeleteAcls(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1190
1259
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1191
1260
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1192
1261
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1193
|
-
model = models.
|
|
1262
|
+
model = models.SearchFileRequest()
|
|
1194
1263
|
model.from_json_string(json.dumps(args))
|
|
1195
1264
|
start_time = time.time()
|
|
1196
1265
|
while True:
|
|
1197
|
-
rsp = client.
|
|
1266
|
+
rsp = client.SearchFile(model)
|
|
1198
1267
|
result = rsp.to_json_string()
|
|
1199
1268
|
try:
|
|
1200
1269
|
json_obj = json.loads(result)
|
|
@@ -1213,7 +1282,7 @@ def doDeleteAcls(args, parsed_globals):
|
|
|
1213
1282
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1214
1283
|
|
|
1215
1284
|
|
|
1216
|
-
def
|
|
1285
|
+
def doCreateUserGroup(args, parsed_globals):
|
|
1217
1286
|
g_param = parse_global_arg(parsed_globals)
|
|
1218
1287
|
|
|
1219
1288
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1223,7 +1292,10 @@ def doAccessDevices(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,18 +1307,18 @@ def doAccessDevices(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1242
1314
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1243
1315
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1244
1316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1245
|
-
model = models.
|
|
1317
|
+
model = models.CreateUserGroupRequest()
|
|
1246
1318
|
model.from_json_string(json.dumps(args))
|
|
1247
1319
|
start_time = time.time()
|
|
1248
1320
|
while True:
|
|
1249
|
-
rsp = client.
|
|
1321
|
+
rsp = client.CreateUserGroup(model)
|
|
1250
1322
|
result = rsp.to_json_string()
|
|
1251
1323
|
try:
|
|
1252
1324
|
json_obj = json.loads(result)
|
|
@@ -1265,7 +1337,7 @@ def doAccessDevices(args, parsed_globals):
|
|
|
1265
1337
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1266
1338
|
|
|
1267
1339
|
|
|
1268
|
-
def
|
|
1340
|
+
def doCreateUser(args, parsed_globals):
|
|
1269
1341
|
g_param = parse_global_arg(parsed_globals)
|
|
1270
1342
|
|
|
1271
1343
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1275,7 +1347,10 @@ def doDescribeResources(args, parsed_globals):
|
|
|
1275
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1349
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1355
|
else:
|
|
1281
1356
|
cred = credential.Credential(
|
|
@@ -1287,18 +1362,18 @@ def doDescribeResources(args, parsed_globals):
|
|
|
1287
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1364
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1366
|
if g_param[OptionsDefine.Language]:
|
|
1292
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1294
1369
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1295
1370
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1296
1371
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1297
|
-
model = models.
|
|
1372
|
+
model = models.CreateUserRequest()
|
|
1298
1373
|
model.from_json_string(json.dumps(args))
|
|
1299
1374
|
start_time = time.time()
|
|
1300
1375
|
while True:
|
|
1301
|
-
rsp = client.
|
|
1376
|
+
rsp = client.CreateUser(model)
|
|
1302
1377
|
result = rsp.to_json_string()
|
|
1303
1378
|
try:
|
|
1304
1379
|
json_obj = json.loads(result)
|
|
@@ -1317,7 +1392,7 @@ def doDescribeResources(args, parsed_globals):
|
|
|
1317
1392
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
1393
|
|
|
1319
1394
|
|
|
1320
|
-
def
|
|
1395
|
+
def doSearchTaskResult(args, parsed_globals):
|
|
1321
1396
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
1397
|
|
|
1323
1398
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1327,7 +1402,10 @@ def doDescribeLoginEvent(args, parsed_globals):
|
|
|
1327
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1404
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1410
|
else:
|
|
1333
1411
|
cred = credential.Credential(
|
|
@@ -1339,18 +1417,18 @@ def doDescribeLoginEvent(args, parsed_globals):
|
|
|
1339
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1419
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1421
|
if g_param[OptionsDefine.Language]:
|
|
1344
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1346
1424
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1347
1425
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1348
1426
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1349
|
-
model = models.
|
|
1427
|
+
model = models.SearchTaskResultRequest()
|
|
1350
1428
|
model.from_json_string(json.dumps(args))
|
|
1351
1429
|
start_time = time.time()
|
|
1352
1430
|
while True:
|
|
1353
|
-
rsp = client.
|
|
1431
|
+
rsp = client.SearchTaskResult(model)
|
|
1354
1432
|
result = rsp.to_json_string()
|
|
1355
1433
|
try:
|
|
1356
1434
|
json_obj = json.loads(result)
|
|
@@ -1369,7 +1447,7 @@ def doDescribeLoginEvent(args, parsed_globals):
|
|
|
1369
1447
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1370
1448
|
|
|
1371
1449
|
|
|
1372
|
-
def
|
|
1450
|
+
def doDeleteAccessWhiteListRules(args, parsed_globals):
|
|
1373
1451
|
g_param = parse_global_arg(parsed_globals)
|
|
1374
1452
|
|
|
1375
1453
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1379,7 +1457,10 @@ def doModifyChangePwdTask(args, parsed_globals):
|
|
|
1379
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1459
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1465
|
else:
|
|
1385
1466
|
cred = credential.Credential(
|
|
@@ -1391,18 +1472,18 @@ def doModifyChangePwdTask(args, parsed_globals):
|
|
|
1391
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1474
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1476
|
if g_param[OptionsDefine.Language]:
|
|
1396
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1398
1479
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1399
1480
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1400
1481
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1401
|
-
model = models.
|
|
1482
|
+
model = models.DeleteAccessWhiteListRulesRequest()
|
|
1402
1483
|
model.from_json_string(json.dumps(args))
|
|
1403
1484
|
start_time = time.time()
|
|
1404
1485
|
while True:
|
|
1405
|
-
rsp = client.
|
|
1486
|
+
rsp = client.DeleteAccessWhiteListRules(model)
|
|
1406
1487
|
result = rsp.to_json_string()
|
|
1407
1488
|
try:
|
|
1408
1489
|
json_obj = json.loads(result)
|
|
@@ -1421,7 +1502,7 @@ def doModifyChangePwdTask(args, parsed_globals):
|
|
|
1421
1502
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1422
1503
|
|
|
1423
1504
|
|
|
1424
|
-
def
|
|
1505
|
+
def doCreateDeviceGroup(args, parsed_globals):
|
|
1425
1506
|
g_param = parse_global_arg(parsed_globals)
|
|
1426
1507
|
|
|
1427
1508
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1431,7 +1512,10 @@ def doCreateAssetSyncJob(args, parsed_globals):
|
|
|
1431
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1514
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1520
|
else:
|
|
1437
1521
|
cred = credential.Credential(
|
|
@@ -1443,18 +1527,18 @@ def doCreateAssetSyncJob(args, parsed_globals):
|
|
|
1443
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1529
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1531
|
if g_param[OptionsDefine.Language]:
|
|
1448
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1450
1534
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1451
1535
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1452
1536
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1453
|
-
model = models.
|
|
1537
|
+
model = models.CreateDeviceGroupRequest()
|
|
1454
1538
|
model.from_json_string(json.dumps(args))
|
|
1455
1539
|
start_time = time.time()
|
|
1456
1540
|
while True:
|
|
1457
|
-
rsp = client.
|
|
1541
|
+
rsp = client.CreateDeviceGroup(model)
|
|
1458
1542
|
result = rsp.to_json_string()
|
|
1459
1543
|
try:
|
|
1460
1544
|
json_obj = json.loads(result)
|
|
@@ -1473,7 +1557,7 @@ def doCreateAssetSyncJob(args, parsed_globals):
|
|
|
1473
1557
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1474
1558
|
|
|
1475
1559
|
|
|
1476
|
-
def
|
|
1560
|
+
def doCheckLDAPConnection(args, parsed_globals):
|
|
1477
1561
|
g_param = parse_global_arg(parsed_globals)
|
|
1478
1562
|
|
|
1479
1563
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1483,7 +1567,10 @@ def doCreateDeviceAccount(args, parsed_globals):
|
|
|
1483
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1569
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1575
|
else:
|
|
1489
1576
|
cred = credential.Credential(
|
|
@@ -1495,18 +1582,18 @@ def doCreateDeviceAccount(args, parsed_globals):
|
|
|
1495
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1584
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1586
|
if g_param[OptionsDefine.Language]:
|
|
1500
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1502
1589
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1503
1590
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1504
1591
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1505
|
-
model = models.
|
|
1592
|
+
model = models.CheckLDAPConnectionRequest()
|
|
1506
1593
|
model.from_json_string(json.dumps(args))
|
|
1507
1594
|
start_time = time.time()
|
|
1508
1595
|
while True:
|
|
1509
|
-
rsp = client.
|
|
1596
|
+
rsp = client.CheckLDAPConnection(model)
|
|
1510
1597
|
result = rsp.to_json_string()
|
|
1511
1598
|
try:
|
|
1512
1599
|
json_obj = json.loads(result)
|
|
@@ -1525,7 +1612,7 @@ def doCreateDeviceAccount(args, parsed_globals):
|
|
|
1525
1612
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1526
1613
|
|
|
1527
1614
|
|
|
1528
|
-
def
|
|
1615
|
+
def doDescribeUserGroups(args, parsed_globals):
|
|
1529
1616
|
g_param = parse_global_arg(parsed_globals)
|
|
1530
1617
|
|
|
1531
1618
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1535,7 +1622,10 @@ def doRunChangePwdTask(args, parsed_globals):
|
|
|
1535
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1624
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1630
|
else:
|
|
1541
1631
|
cred = credential.Credential(
|
|
@@ -1547,18 +1637,18 @@ def doRunChangePwdTask(args, parsed_globals):
|
|
|
1547
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1639
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1641
|
if g_param[OptionsDefine.Language]:
|
|
1552
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1554
1644
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1555
1645
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1556
1646
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1557
|
-
model = models.
|
|
1647
|
+
model = models.DescribeUserGroupsRequest()
|
|
1558
1648
|
model.from_json_string(json.dumps(args))
|
|
1559
1649
|
start_time = time.time()
|
|
1560
1650
|
while True:
|
|
1561
|
-
rsp = client.
|
|
1651
|
+
rsp = client.DescribeUserGroups(model)
|
|
1562
1652
|
result = rsp.to_json_string()
|
|
1563
1653
|
try:
|
|
1564
1654
|
json_obj = json.loads(result)
|
|
@@ -1577,7 +1667,7 @@ def doRunChangePwdTask(args, parsed_globals):
|
|
|
1577
1667
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1578
1668
|
|
|
1579
1669
|
|
|
1580
|
-
def
|
|
1670
|
+
def doDeployResource(args, parsed_globals):
|
|
1581
1671
|
g_param = parse_global_arg(parsed_globals)
|
|
1582
1672
|
|
|
1583
1673
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1587,7 +1677,10 @@ def doResetDeviceAccountPassword(args, parsed_globals):
|
|
|
1587
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1679
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1685
|
else:
|
|
1593
1686
|
cred = credential.Credential(
|
|
@@ -1599,18 +1692,18 @@ def doResetDeviceAccountPassword(args, parsed_globals):
|
|
|
1599
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1694
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1696
|
if g_param[OptionsDefine.Language]:
|
|
1604
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1606
1699
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1607
1700
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1608
1701
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1609
|
-
model = models.
|
|
1702
|
+
model = models.DeployResourceRequest()
|
|
1610
1703
|
model.from_json_string(json.dumps(args))
|
|
1611
1704
|
start_time = time.time()
|
|
1612
1705
|
while True:
|
|
1613
|
-
rsp = client.
|
|
1706
|
+
rsp = client.DeployResource(model)
|
|
1614
1707
|
result = rsp.to_json_string()
|
|
1615
1708
|
try:
|
|
1616
1709
|
json_obj = json.loads(result)
|
|
@@ -1629,7 +1722,7 @@ def doResetDeviceAccountPassword(args, parsed_globals):
|
|
|
1629
1722
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1630
1723
|
|
|
1631
1724
|
|
|
1632
|
-
def
|
|
1725
|
+
def doModifyDevice(args, parsed_globals):
|
|
1633
1726
|
g_param = parse_global_arg(parsed_globals)
|
|
1634
1727
|
|
|
1635
1728
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1639,7 +1732,10 @@ def doModifyUserGroup(args, parsed_globals):
|
|
|
1639
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1734
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1740
|
else:
|
|
1645
1741
|
cred = credential.Credential(
|
|
@@ -1651,18 +1747,18 @@ def doModifyUserGroup(args, parsed_globals):
|
|
|
1651
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1749
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1751
|
if g_param[OptionsDefine.Language]:
|
|
1656
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1658
1754
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1659
1755
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1660
1756
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1661
|
-
model = models.
|
|
1757
|
+
model = models.ModifyDeviceRequest()
|
|
1662
1758
|
model.from_json_string(json.dumps(args))
|
|
1663
1759
|
start_time = time.time()
|
|
1664
1760
|
while True:
|
|
1665
|
-
rsp = client.
|
|
1761
|
+
rsp = client.ModifyDevice(model)
|
|
1666
1762
|
result = rsp.to_json_string()
|
|
1667
1763
|
try:
|
|
1668
1764
|
json_obj = json.loads(result)
|
|
@@ -1681,7 +1777,7 @@ def doModifyUserGroup(args, parsed_globals):
|
|
|
1681
1777
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1682
1778
|
|
|
1683
1779
|
|
|
1684
|
-
def
|
|
1780
|
+
def doBindDeviceResource(args, parsed_globals):
|
|
1685
1781
|
g_param = parse_global_arg(parsed_globals)
|
|
1686
1782
|
|
|
1687
1783
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1691,7 +1787,10 @@ def doDeleteDeviceGroups(args, parsed_globals):
|
|
|
1691
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1789
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1795
|
else:
|
|
1697
1796
|
cred = credential.Credential(
|
|
@@ -1703,18 +1802,18 @@ def doDeleteDeviceGroups(args, parsed_globals):
|
|
|
1703
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1804
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1806
|
if g_param[OptionsDefine.Language]:
|
|
1708
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1710
1809
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1711
1810
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1712
1811
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1713
|
-
model = models.
|
|
1812
|
+
model = models.BindDeviceResourceRequest()
|
|
1714
1813
|
model.from_json_string(json.dumps(args))
|
|
1715
1814
|
start_time = time.time()
|
|
1716
1815
|
while True:
|
|
1717
|
-
rsp = client.
|
|
1816
|
+
rsp = client.BindDeviceResource(model)
|
|
1718
1817
|
result = rsp.to_json_string()
|
|
1719
1818
|
try:
|
|
1720
1819
|
json_obj = json.loads(result)
|
|
@@ -1733,7 +1832,7 @@ def doDeleteDeviceGroups(args, parsed_globals):
|
|
|
1733
1832
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1734
1833
|
|
|
1735
1834
|
|
|
1736
|
-
def
|
|
1835
|
+
def doSearchSession(args, parsed_globals):
|
|
1737
1836
|
g_param = parse_global_arg(parsed_globals)
|
|
1738
1837
|
|
|
1739
1838
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1743,7 +1842,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1743
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1844
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1850
|
else:
|
|
1749
1851
|
cred = credential.Credential(
|
|
@@ -1755,18 +1857,18 @@ def doCreateUser(args, parsed_globals):
|
|
|
1755
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1859
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1861
|
if g_param[OptionsDefine.Language]:
|
|
1760
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1762
1864
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1763
1865
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1764
1866
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1765
|
-
model = models.
|
|
1867
|
+
model = models.SearchSessionRequest()
|
|
1766
1868
|
model.from_json_string(json.dumps(args))
|
|
1767
1869
|
start_time = time.time()
|
|
1768
1870
|
while True:
|
|
1769
|
-
rsp = client.
|
|
1871
|
+
rsp = client.SearchSession(model)
|
|
1770
1872
|
result = rsp.to_json_string()
|
|
1771
1873
|
try:
|
|
1772
1874
|
json_obj = json.loads(result)
|
|
@@ -1785,7 +1887,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
1785
1887
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1786
1888
|
|
|
1787
1889
|
|
|
1788
|
-
def
|
|
1890
|
+
def doDescribeSecuritySetting(args, parsed_globals):
|
|
1789
1891
|
g_param = parse_global_arg(parsed_globals)
|
|
1790
1892
|
|
|
1791
1893
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1795,7 +1897,10 @@ def doAddUserGroupMembers(args, parsed_globals):
|
|
|
1795
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1899
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1905
|
else:
|
|
1801
1906
|
cred = credential.Credential(
|
|
@@ -1807,18 +1912,18 @@ def doAddUserGroupMembers(args, parsed_globals):
|
|
|
1807
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1914
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1916
|
if g_param[OptionsDefine.Language]:
|
|
1812
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1814
1919
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1815
1920
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1816
1921
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1817
|
-
model = models.
|
|
1922
|
+
model = models.DescribeSecuritySettingRequest()
|
|
1818
1923
|
model.from_json_string(json.dumps(args))
|
|
1819
1924
|
start_time = time.time()
|
|
1820
1925
|
while True:
|
|
1821
|
-
rsp = client.
|
|
1926
|
+
rsp = client.DescribeSecuritySetting(model)
|
|
1822
1927
|
result = rsp.to_json_string()
|
|
1823
1928
|
try:
|
|
1824
1929
|
json_obj = json.loads(result)
|
|
@@ -1837,7 +1942,7 @@ def doAddUserGroupMembers(args, parsed_globals):
|
|
|
1837
1942
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1838
1943
|
|
|
1839
1944
|
|
|
1840
|
-
def
|
|
1945
|
+
def doAccessDevices(args, parsed_globals):
|
|
1841
1946
|
g_param = parse_global_arg(parsed_globals)
|
|
1842
1947
|
|
|
1843
1948
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1847,7 +1952,10 @@ def doDeleteOperationTasks(args, parsed_globals):
|
|
|
1847
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1954
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1960
|
else:
|
|
1853
1961
|
cred = credential.Credential(
|
|
@@ -1859,18 +1967,18 @@ def doDeleteOperationTasks(args, parsed_globals):
|
|
|
1859
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1969
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1971
|
if g_param[OptionsDefine.Language]:
|
|
1864
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1866
1974
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1867
1975
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1868
1976
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1869
|
-
model = models.
|
|
1977
|
+
model = models.AccessDevicesRequest()
|
|
1870
1978
|
model.from_json_string(json.dumps(args))
|
|
1871
1979
|
start_time = time.time()
|
|
1872
1980
|
while True:
|
|
1873
|
-
rsp = client.
|
|
1981
|
+
rsp = client.AccessDevices(model)
|
|
1874
1982
|
result = rsp.to_json_string()
|
|
1875
1983
|
try:
|
|
1876
1984
|
json_obj = json.loads(result)
|
|
@@ -1889,7 +1997,7 @@ def doDeleteOperationTasks(args, parsed_globals):
|
|
|
1889
1997
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
1998
|
|
|
1891
1999
|
|
|
1892
|
-
def
|
|
2000
|
+
def doDescribeResources(args, parsed_globals):
|
|
1893
2001
|
g_param = parse_global_arg(parsed_globals)
|
|
1894
2002
|
|
|
1895
2003
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1899,7 +2007,10 @@ def doModifyAcl(args, parsed_globals):
|
|
|
1899
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2009
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2015
|
else:
|
|
1905
2016
|
cred = credential.Credential(
|
|
@@ -1911,18 +2022,18 @@ def doModifyAcl(args, parsed_globals):
|
|
|
1911
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2024
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2026
|
if g_param[OptionsDefine.Language]:
|
|
1916
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
2029
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
2030
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
2031
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.
|
|
2032
|
+
model = models.DescribeResourcesRequest()
|
|
1922
2033
|
model.from_json_string(json.dumps(args))
|
|
1923
2034
|
start_time = time.time()
|
|
1924
2035
|
while True:
|
|
1925
|
-
rsp = client.
|
|
2036
|
+
rsp = client.DescribeResources(model)
|
|
1926
2037
|
result = rsp.to_json_string()
|
|
1927
2038
|
try:
|
|
1928
2039
|
json_obj = json.loads(result)
|
|
@@ -1941,7 +2052,7 @@ def doModifyAcl(args, parsed_globals):
|
|
|
1941
2052
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
2053
|
|
|
1943
2054
|
|
|
1944
|
-
def
|
|
2055
|
+
def doEnableExternalAccess(args, parsed_globals):
|
|
1945
2056
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2057
|
|
|
1947
2058
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1951,7 +2062,10 @@ def doDeleteUsers(args, parsed_globals):
|
|
|
1951
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2064
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2070
|
else:
|
|
1957
2071
|
cred = credential.Credential(
|
|
@@ -1963,18 +2077,18 @@ def doDeleteUsers(args, parsed_globals):
|
|
|
1963
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2079
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2081
|
if g_param[OptionsDefine.Language]:
|
|
1968
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1970
2084
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1971
2085
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1972
2086
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1973
|
-
model = models.
|
|
2087
|
+
model = models.EnableExternalAccessRequest()
|
|
1974
2088
|
model.from_json_string(json.dumps(args))
|
|
1975
2089
|
start_time = time.time()
|
|
1976
2090
|
while True:
|
|
1977
|
-
rsp = client.
|
|
2091
|
+
rsp = client.EnableExternalAccess(model)
|
|
1978
2092
|
result = rsp.to_json_string()
|
|
1979
2093
|
try:
|
|
1980
2094
|
json_obj = json.loads(result)
|
|
@@ -1993,7 +2107,7 @@ def doDeleteUsers(args, parsed_globals):
|
|
|
1993
2107
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1994
2108
|
|
|
1995
2109
|
|
|
1996
|
-
def
|
|
2110
|
+
def doDisableExternalAccess(args, parsed_globals):
|
|
1997
2111
|
g_param = parse_global_arg(parsed_globals)
|
|
1998
2112
|
|
|
1999
2113
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2003,7 +2117,10 @@ def doDeleteAccessWhiteListRules(args, parsed_globals):
|
|
|
2003
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2119
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2125
|
else:
|
|
2009
2126
|
cred = credential.Credential(
|
|
@@ -2015,18 +2132,18 @@ def doDeleteAccessWhiteListRules(args, parsed_globals):
|
|
|
2015
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2134
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2136
|
if g_param[OptionsDefine.Language]:
|
|
2020
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2022
2139
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2023
2140
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2024
2141
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2025
|
-
model = models.
|
|
2142
|
+
model = models.DisableExternalAccessRequest()
|
|
2026
2143
|
model.from_json_string(json.dumps(args))
|
|
2027
2144
|
start_time = time.time()
|
|
2028
2145
|
while True:
|
|
2029
|
-
rsp = client.
|
|
2146
|
+
rsp = client.DisableExternalAccess(model)
|
|
2030
2147
|
result = rsp.to_json_string()
|
|
2031
2148
|
try:
|
|
2032
2149
|
json_obj = json.loads(result)
|
|
@@ -2055,7 +2172,10 @@ def doSearchCommandBySid(args, parsed_globals):
|
|
|
2055
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2174
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2180
|
else:
|
|
2061
2181
|
cred = credential.Credential(
|
|
@@ -2067,7 +2187,7 @@ def doSearchCommandBySid(args, parsed_globals):
|
|
|
2067
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2189
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2191
|
if g_param[OptionsDefine.Language]:
|
|
2072
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2097,7 +2217,7 @@ def doSearchCommandBySid(args, parsed_globals):
|
|
|
2097
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2098
2218
|
|
|
2099
2219
|
|
|
2100
|
-
def
|
|
2220
|
+
def doModifyCmdTemplate(args, parsed_globals):
|
|
2101
2221
|
g_param = parse_global_arg(parsed_globals)
|
|
2102
2222
|
|
|
2103
2223
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2107,7 +2227,10 @@ def doCreateResource(args, parsed_globals):
|
|
|
2107
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2229
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2235
|
else:
|
|
2113
2236
|
cred = credential.Credential(
|
|
@@ -2119,18 +2242,18 @@ def doCreateResource(args, parsed_globals):
|
|
|
2119
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2244
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2246
|
if g_param[OptionsDefine.Language]:
|
|
2124
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2126
2249
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2127
2250
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2128
2251
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2129
|
-
model = models.
|
|
2252
|
+
model = models.ModifyCmdTemplateRequest()
|
|
2130
2253
|
model.from_json_string(json.dumps(args))
|
|
2131
2254
|
start_time = time.time()
|
|
2132
2255
|
while True:
|
|
2133
|
-
rsp = client.
|
|
2256
|
+
rsp = client.ModifyCmdTemplate(model)
|
|
2134
2257
|
result = rsp.to_json_string()
|
|
2135
2258
|
try:
|
|
2136
2259
|
json_obj = json.loads(result)
|
|
@@ -2149,7 +2272,7 @@ def doCreateResource(args, parsed_globals):
|
|
|
2149
2272
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2150
2273
|
|
|
2151
2274
|
|
|
2152
|
-
def
|
|
2275
|
+
def doCreateCmdTemplate(args, parsed_globals):
|
|
2153
2276
|
g_param = parse_global_arg(parsed_globals)
|
|
2154
2277
|
|
|
2155
2278
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2159,7 +2282,10 @@ def doCreateAccessWhiteListRule(args, parsed_globals):
|
|
|
2159
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2284
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2290
|
else:
|
|
2165
2291
|
cred = credential.Credential(
|
|
@@ -2171,18 +2297,18 @@ def doCreateAccessWhiteListRule(args, parsed_globals):
|
|
|
2171
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2299
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2301
|
if g_param[OptionsDefine.Language]:
|
|
2176
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2178
2304
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2179
2305
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2180
2306
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2181
|
-
model = models.
|
|
2307
|
+
model = models.CreateCmdTemplateRequest()
|
|
2182
2308
|
model.from_json_string(json.dumps(args))
|
|
2183
2309
|
start_time = time.time()
|
|
2184
2310
|
while True:
|
|
2185
|
-
rsp = client.
|
|
2311
|
+
rsp = client.CreateCmdTemplate(model)
|
|
2186
2312
|
result = rsp.to_json_string()
|
|
2187
2313
|
try:
|
|
2188
2314
|
json_obj = json.loads(result)
|
|
@@ -2201,7 +2327,7 @@ def doCreateAccessWhiteListRule(args, parsed_globals):
|
|
|
2201
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2202
2328
|
|
|
2203
2329
|
|
|
2204
|
-
def
|
|
2330
|
+
def doReplaySession(args, parsed_globals):
|
|
2205
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
2206
2332
|
|
|
2207
2333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2211,7 +2337,10 @@ def doDescribeAcls(args, parsed_globals):
|
|
|
2211
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2339
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2345
|
else:
|
|
2217
2346
|
cred = credential.Credential(
|
|
@@ -2223,18 +2352,18 @@ def doDescribeAcls(args, parsed_globals):
|
|
|
2223
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2354
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2356
|
if g_param[OptionsDefine.Language]:
|
|
2228
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2230
2359
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2231
2360
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2232
2361
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2233
|
-
model = models.
|
|
2362
|
+
model = models.ReplaySessionRequest()
|
|
2234
2363
|
model.from_json_string(json.dumps(args))
|
|
2235
2364
|
start_time = time.time()
|
|
2236
2365
|
while True:
|
|
2237
|
-
rsp = client.
|
|
2366
|
+
rsp = client.ReplaySession(model)
|
|
2238
2367
|
result = rsp.to_json_string()
|
|
2239
2368
|
try:
|
|
2240
2369
|
json_obj = json.loads(result)
|
|
@@ -2253,7 +2382,7 @@ def doDescribeAcls(args, parsed_globals):
|
|
|
2253
2382
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2254
2383
|
|
|
2255
2384
|
|
|
2256
|
-
def
|
|
2385
|
+
def doResetDeviceAccountPrivateKey(args, parsed_globals):
|
|
2257
2386
|
g_param = parse_global_arg(parsed_globals)
|
|
2258
2387
|
|
|
2259
2388
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2263,7 +2392,10 @@ def doDescribeAccessWhiteListRules(args, parsed_globals):
|
|
|
2263
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2394
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2400
|
else:
|
|
2269
2401
|
cred = credential.Credential(
|
|
@@ -2275,18 +2407,18 @@ def doDescribeAccessWhiteListRules(args, parsed_globals):
|
|
|
2275
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2409
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2411
|
if g_param[OptionsDefine.Language]:
|
|
2280
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2282
2414
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2283
2415
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2284
2416
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2285
|
-
model = models.
|
|
2417
|
+
model = models.ResetDeviceAccountPrivateKeyRequest()
|
|
2286
2418
|
model.from_json_string(json.dumps(args))
|
|
2287
2419
|
start_time = time.time()
|
|
2288
2420
|
while True:
|
|
2289
|
-
rsp = client.
|
|
2421
|
+
rsp = client.ResetDeviceAccountPrivateKey(model)
|
|
2290
2422
|
result = rsp.to_json_string()
|
|
2291
2423
|
try:
|
|
2292
2424
|
json_obj = json.loads(result)
|
|
@@ -2315,7 +2447,10 @@ def doSearchAuditLog(args, parsed_globals):
|
|
|
2315
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2449
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2455
|
else:
|
|
2321
2456
|
cred = credential.Credential(
|
|
@@ -2327,7 +2462,7 @@ def doSearchAuditLog(args, parsed_globals):
|
|
|
2327
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2464
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2466
|
if g_param[OptionsDefine.Language]:
|
|
2332
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2357,7 +2492,7 @@ def doSearchAuditLog(args, parsed_globals):
|
|
|
2357
2492
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
2493
|
|
|
2359
2494
|
|
|
2360
|
-
def
|
|
2495
|
+
def doModifyAuthModeSetting(args, parsed_globals):
|
|
2361
2496
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
2497
|
|
|
2363
2498
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2367,7 +2502,10 @@ def doAddDeviceGroupMembers(args, parsed_globals):
|
|
|
2367
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2504
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2510
|
else:
|
|
2373
2511
|
cred = credential.Credential(
|
|
@@ -2379,18 +2517,18 @@ def doAddDeviceGroupMembers(args, parsed_globals):
|
|
|
2379
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2519
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2521
|
if g_param[OptionsDefine.Language]:
|
|
2384
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2386
2524
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2387
2525
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2388
2526
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2389
|
-
model = models.
|
|
2527
|
+
model = models.ModifyAuthModeSettingRequest()
|
|
2390
2528
|
model.from_json_string(json.dumps(args))
|
|
2391
2529
|
start_time = time.time()
|
|
2392
2530
|
while True:
|
|
2393
|
-
rsp = client.
|
|
2531
|
+
rsp = client.ModifyAuthModeSetting(model)
|
|
2394
2532
|
result = rsp.to_json_string()
|
|
2395
2533
|
try:
|
|
2396
2534
|
json_obj = json.loads(result)
|
|
@@ -2409,7 +2547,7 @@ def doAddDeviceGroupMembers(args, parsed_globals):
|
|
|
2409
2547
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
2548
|
|
|
2411
2549
|
|
|
2412
|
-
def
|
|
2550
|
+
def doSearchSessionCommand(args, parsed_globals):
|
|
2413
2551
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
2552
|
|
|
2415
2553
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2419,7 +2557,10 @@ def doModifyCmdTemplate(args, parsed_globals):
|
|
|
2419
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2559
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2565
|
else:
|
|
2425
2566
|
cred = credential.Credential(
|
|
@@ -2431,18 +2572,18 @@ def doModifyCmdTemplate(args, parsed_globals):
|
|
|
2431
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2574
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2576
|
if g_param[OptionsDefine.Language]:
|
|
2436
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2438
2579
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2439
2580
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2440
2581
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2441
|
-
model = models.
|
|
2582
|
+
model = models.SearchSessionCommandRequest()
|
|
2442
2583
|
model.from_json_string(json.dumps(args))
|
|
2443
2584
|
start_time = time.time()
|
|
2444
2585
|
while True:
|
|
2445
|
-
rsp = client.
|
|
2586
|
+
rsp = client.SearchSessionCommand(model)
|
|
2446
2587
|
result = rsp.to_json_string()
|
|
2447
2588
|
try:
|
|
2448
2589
|
json_obj = json.loads(result)
|
|
@@ -2461,7 +2602,7 @@ def doModifyCmdTemplate(args, parsed_globals):
|
|
|
2461
2602
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2462
2603
|
|
|
2463
2604
|
|
|
2464
|
-
def
|
|
2605
|
+
def doModifyDeviceGroup(args, parsed_globals):
|
|
2465
2606
|
g_param = parse_global_arg(parsed_globals)
|
|
2466
2607
|
|
|
2467
2608
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2471,7 +2612,10 @@ def doDeleteChangePwdTask(args, parsed_globals):
|
|
|
2471
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2614
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2620
|
else:
|
|
2477
2621
|
cred = credential.Credential(
|
|
@@ -2483,18 +2627,18 @@ def doDeleteChangePwdTask(args, parsed_globals):
|
|
|
2483
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2629
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2631
|
if g_param[OptionsDefine.Language]:
|
|
2488
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2490
2634
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2491
2635
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2492
2636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2493
|
-
model = models.
|
|
2637
|
+
model = models.ModifyDeviceGroupRequest()
|
|
2494
2638
|
model.from_json_string(json.dumps(args))
|
|
2495
2639
|
start_time = time.time()
|
|
2496
2640
|
while True:
|
|
2497
|
-
rsp = client.
|
|
2641
|
+
rsp = client.ModifyDeviceGroup(model)
|
|
2498
2642
|
result = rsp.to_json_string()
|
|
2499
2643
|
try:
|
|
2500
2644
|
json_obj = json.loads(result)
|
|
@@ -2513,7 +2657,7 @@ def doDeleteChangePwdTask(args, parsed_globals):
|
|
|
2513
2657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2514
2658
|
|
|
2515
2659
|
|
|
2516
|
-
def
|
|
2660
|
+
def doModifyOAuthSetting(args, parsed_globals):
|
|
2517
2661
|
g_param = parse_global_arg(parsed_globals)
|
|
2518
2662
|
|
|
2519
2663
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2523,7 +2667,10 @@ def doDescribeOperationEvent(args, parsed_globals):
|
|
|
2523
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2669
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2675
|
else:
|
|
2529
2676
|
cred = credential.Credential(
|
|
@@ -2535,18 +2682,18 @@ def doDescribeOperationEvent(args, parsed_globals):
|
|
|
2535
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2684
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2686
|
if g_param[OptionsDefine.Language]:
|
|
2540
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2542
2689
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2543
2690
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2544
2691
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2545
|
-
model = models.
|
|
2692
|
+
model = models.ModifyOAuthSettingRequest()
|
|
2546
2693
|
model.from_json_string(json.dumps(args))
|
|
2547
2694
|
start_time = time.time()
|
|
2548
2695
|
while True:
|
|
2549
|
-
rsp = client.
|
|
2696
|
+
rsp = client.ModifyOAuthSetting(model)
|
|
2550
2697
|
result = rsp.to_json_string()
|
|
2551
2698
|
try:
|
|
2552
2699
|
json_obj = json.loads(result)
|
|
@@ -2565,7 +2712,7 @@ def doDescribeOperationEvent(args, parsed_globals):
|
|
|
2565
2712
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
2713
|
|
|
2567
2714
|
|
|
2568
|
-
def
|
|
2715
|
+
def doDescribeLoginEvent(args, parsed_globals):
|
|
2569
2716
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
2717
|
|
|
2571
2718
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2575,7 +2722,10 @@ def doModifyOperationTask(args, parsed_globals):
|
|
|
2575
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2724
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2730
|
else:
|
|
2581
2731
|
cred = credential.Credential(
|
|
@@ -2587,18 +2737,18 @@ def doModifyOperationTask(args, parsed_globals):
|
|
|
2587
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2739
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2741
|
if g_param[OptionsDefine.Language]:
|
|
2592
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2594
2744
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2595
2745
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2596
2746
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2597
|
-
model = models.
|
|
2747
|
+
model = models.DescribeLoginEventRequest()
|
|
2598
2748
|
model.from_json_string(json.dumps(args))
|
|
2599
2749
|
start_time = time.time()
|
|
2600
2750
|
while True:
|
|
2601
|
-
rsp = client.
|
|
2751
|
+
rsp = client.DescribeLoginEvent(model)
|
|
2602
2752
|
result = rsp.to_json_string()
|
|
2603
2753
|
try:
|
|
2604
2754
|
json_obj = json.loads(result)
|
|
@@ -2617,7 +2767,7 @@ def doModifyOperationTask(args, parsed_globals):
|
|
|
2617
2767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2618
2768
|
|
|
2619
2769
|
|
|
2620
|
-
def
|
|
2770
|
+
def doCreateOperationTask(args, parsed_globals):
|
|
2621
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
2622
2772
|
|
|
2623
2773
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2627,7 +2777,10 @@ def doModifyLDAPSetting(args, parsed_globals):
|
|
|
2627
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2779
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2785
|
else:
|
|
2633
2786
|
cred = credential.Credential(
|
|
@@ -2639,18 +2792,18 @@ def doModifyLDAPSetting(args, parsed_globals):
|
|
|
2639
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2794
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2796
|
if g_param[OptionsDefine.Language]:
|
|
2644
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2646
2799
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2647
2800
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2648
2801
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2649
|
-
model = models.
|
|
2802
|
+
model = models.CreateOperationTaskRequest()
|
|
2650
2803
|
model.from_json_string(json.dumps(args))
|
|
2651
2804
|
start_time = time.time()
|
|
2652
2805
|
while True:
|
|
2653
|
-
rsp = client.
|
|
2806
|
+
rsp = client.CreateOperationTask(model)
|
|
2654
2807
|
result = rsp.to_json_string()
|
|
2655
2808
|
try:
|
|
2656
2809
|
json_obj = json.loads(result)
|
|
@@ -2669,7 +2822,7 @@ def doModifyLDAPSetting(args, parsed_globals):
|
|
|
2669
2822
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2670
2823
|
|
|
2671
2824
|
|
|
2672
|
-
def
|
|
2825
|
+
def doAddUserGroupMembers(args, parsed_globals):
|
|
2673
2826
|
g_param = parse_global_arg(parsed_globals)
|
|
2674
2827
|
|
|
2675
2828
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2679,7 +2832,10 @@ def doDescribeDeviceAccounts(args, parsed_globals):
|
|
|
2679
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2834
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2840
|
else:
|
|
2685
2841
|
cred = credential.Credential(
|
|
@@ -2691,18 +2847,18 @@ def doDescribeDeviceAccounts(args, parsed_globals):
|
|
|
2691
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2849
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2851
|
if g_param[OptionsDefine.Language]:
|
|
2696
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2698
2854
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2699
2855
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2700
2856
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2701
|
-
model = models.
|
|
2857
|
+
model = models.AddUserGroupMembersRequest()
|
|
2702
2858
|
model.from_json_string(json.dumps(args))
|
|
2703
2859
|
start_time = time.time()
|
|
2704
2860
|
while True:
|
|
2705
|
-
rsp = client.
|
|
2861
|
+
rsp = client.AddUserGroupMembers(model)
|
|
2706
2862
|
result = rsp.to_json_string()
|
|
2707
2863
|
try:
|
|
2708
2864
|
json_obj = json.loads(result)
|
|
@@ -2721,7 +2877,7 @@ def doDescribeDeviceAccounts(args, parsed_globals):
|
|
|
2721
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2722
2878
|
|
|
2723
2879
|
|
|
2724
|
-
def
|
|
2880
|
+
def doSetLDAPSyncFlag(args, parsed_globals):
|
|
2725
2881
|
g_param = parse_global_arg(parsed_globals)
|
|
2726
2882
|
|
|
2727
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2731,7 +2887,10 @@ def doDeleteUserGroups(args, parsed_globals):
|
|
|
2731
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2889
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2895
|
else:
|
|
2737
2896
|
cred = credential.Credential(
|
|
@@ -2743,18 +2902,18 @@ def doDeleteUserGroups(args, parsed_globals):
|
|
|
2743
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2904
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2906
|
if g_param[OptionsDefine.Language]:
|
|
2748
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2750
2909
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2751
2910
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2752
2911
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2753
|
-
model = models.
|
|
2912
|
+
model = models.SetLDAPSyncFlagRequest()
|
|
2754
2913
|
model.from_json_string(json.dumps(args))
|
|
2755
2914
|
start_time = time.time()
|
|
2756
2915
|
while True:
|
|
2757
|
-
rsp = client.
|
|
2916
|
+
rsp = client.SetLDAPSyncFlag(model)
|
|
2758
2917
|
result = rsp.to_json_string()
|
|
2759
2918
|
try:
|
|
2760
2919
|
json_obj = json.loads(result)
|
|
@@ -2773,7 +2932,7 @@ def doDeleteUserGroups(args, parsed_globals):
|
|
|
2773
2932
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2774
2933
|
|
|
2775
2934
|
|
|
2776
|
-
def
|
|
2935
|
+
def doBindDeviceAccountPassword(args, parsed_globals):
|
|
2777
2936
|
g_param = parse_global_arg(parsed_globals)
|
|
2778
2937
|
|
|
2779
2938
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2783,7 +2942,10 @@ def doRunOperationTask(args, parsed_globals):
|
|
|
2783
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2944
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
2950
|
else:
|
|
2789
2951
|
cred = credential.Credential(
|
|
@@ -2795,18 +2957,18 @@ def doRunOperationTask(args, parsed_globals):
|
|
|
2795
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
2959
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
2961
|
if g_param[OptionsDefine.Language]:
|
|
2800
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2802
2964
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2803
2965
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2804
2966
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2805
|
-
model = models.
|
|
2967
|
+
model = models.BindDeviceAccountPasswordRequest()
|
|
2806
2968
|
model.from_json_string(json.dumps(args))
|
|
2807
2969
|
start_time = time.time()
|
|
2808
2970
|
while True:
|
|
2809
|
-
rsp = client.
|
|
2971
|
+
rsp = client.BindDeviceAccountPassword(model)
|
|
2810
2972
|
result = rsp.to_json_string()
|
|
2811
2973
|
try:
|
|
2812
2974
|
json_obj = json.loads(result)
|
|
@@ -2825,7 +2987,7 @@ def doRunOperationTask(args, parsed_globals):
|
|
|
2825
2987
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2826
2988
|
|
|
2827
2989
|
|
|
2828
|
-
def
|
|
2990
|
+
def doDescribeLDAPUnitSet(args, parsed_globals):
|
|
2829
2991
|
g_param = parse_global_arg(parsed_globals)
|
|
2830
2992
|
|
|
2831
2993
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2835,7 +2997,10 @@ def doDeleteDevices(args, parsed_globals):
|
|
|
2835
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2999
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3005
|
else:
|
|
2841
3006
|
cred = credential.Credential(
|
|
@@ -2847,18 +3012,18 @@ def doDeleteDevices(args, parsed_globals):
|
|
|
2847
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3014
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3016
|
if g_param[OptionsDefine.Language]:
|
|
2852
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2854
3019
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2855
3020
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2856
3021
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2857
|
-
model = models.
|
|
3022
|
+
model = models.DescribeLDAPUnitSetRequest()
|
|
2858
3023
|
model.from_json_string(json.dumps(args))
|
|
2859
3024
|
start_time = time.time()
|
|
2860
3025
|
while True:
|
|
2861
|
-
rsp = client.
|
|
3026
|
+
rsp = client.DescribeLDAPUnitSet(model)
|
|
2862
3027
|
result = rsp.to_json_string()
|
|
2863
3028
|
try:
|
|
2864
3029
|
json_obj = json.loads(result)
|
|
@@ -2877,7 +3042,7 @@ def doDeleteDevices(args, parsed_globals):
|
|
|
2877
3042
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2878
3043
|
|
|
2879
3044
|
|
|
2880
|
-
def
|
|
3045
|
+
def doDeleteAcls(args, parsed_globals):
|
|
2881
3046
|
g_param = parse_global_arg(parsed_globals)
|
|
2882
3047
|
|
|
2883
3048
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2887,7 +3052,10 @@ def doModifyResource(args, parsed_globals):
|
|
|
2887
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3054
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3060
|
else:
|
|
2893
3061
|
cred = credential.Credential(
|
|
@@ -2899,18 +3067,18 @@ def doModifyResource(args, parsed_globals):
|
|
|
2899
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3069
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3071
|
if g_param[OptionsDefine.Language]:
|
|
2904
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2906
3074
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2907
3075
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2908
3076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2909
|
-
model = models.
|
|
3077
|
+
model = models.DeleteAclsRequest()
|
|
2910
3078
|
model.from_json_string(json.dumps(args))
|
|
2911
3079
|
start_time = time.time()
|
|
2912
3080
|
while True:
|
|
2913
|
-
rsp = client.
|
|
3081
|
+
rsp = client.DeleteAcls(model)
|
|
2914
3082
|
result = rsp.to_json_string()
|
|
2915
3083
|
try:
|
|
2916
3084
|
json_obj = json.loads(result)
|
|
@@ -2929,7 +3097,7 @@ def doModifyResource(args, parsed_globals):
|
|
|
2929
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2930
3098
|
|
|
2931
3099
|
|
|
2932
|
-
def
|
|
3100
|
+
def doDeleteUserDirectory(args, parsed_globals):
|
|
2933
3101
|
g_param = parse_global_arg(parsed_globals)
|
|
2934
3102
|
|
|
2935
3103
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2939,7 +3107,10 @@ def doDescribeOperationTask(args, parsed_globals):
|
|
|
2939
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3109
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3115
|
else:
|
|
2945
3116
|
cred = credential.Credential(
|
|
@@ -2951,18 +3122,18 @@ def doDescribeOperationTask(args, parsed_globals):
|
|
|
2951
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3124
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3126
|
if g_param[OptionsDefine.Language]:
|
|
2956
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2958
3129
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2959
3130
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2960
3131
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2961
|
-
model = models.
|
|
3132
|
+
model = models.DeleteUserDirectoryRequest()
|
|
2962
3133
|
model.from_json_string(json.dumps(args))
|
|
2963
3134
|
start_time = time.time()
|
|
2964
3135
|
while True:
|
|
2965
|
-
rsp = client.
|
|
3136
|
+
rsp = client.DeleteUserDirectory(model)
|
|
2966
3137
|
result = rsp.to_json_string()
|
|
2967
3138
|
try:
|
|
2968
3139
|
json_obj = json.loads(result)
|
|
@@ -2981,7 +3152,7 @@ def doDescribeOperationTask(args, parsed_globals):
|
|
|
2981
3152
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2982
3153
|
|
|
2983
3154
|
|
|
2984
|
-
def
|
|
3155
|
+
def doModifyUserGroup(args, parsed_globals):
|
|
2985
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2986
3157
|
|
|
2987
3158
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2991,7 +3162,10 @@ def doModifyUser(args, parsed_globals):
|
|
|
2991
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3164
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3170
|
else:
|
|
2997
3171
|
cred = credential.Credential(
|
|
@@ -3003,18 +3177,18 @@ def doModifyUser(args, parsed_globals):
|
|
|
3003
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3179
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3181
|
if g_param[OptionsDefine.Language]:
|
|
3008
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3010
3184
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3011
3185
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3012
3186
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3013
|
-
model = models.
|
|
3187
|
+
model = models.ModifyUserGroupRequest()
|
|
3014
3188
|
model.from_json_string(json.dumps(args))
|
|
3015
3189
|
start_time = time.time()
|
|
3016
3190
|
while True:
|
|
3017
|
-
rsp = client.
|
|
3191
|
+
rsp = client.ModifyUserGroup(model)
|
|
3018
3192
|
result = rsp.to_json_string()
|
|
3019
3193
|
try:
|
|
3020
3194
|
json_obj = json.loads(result)
|
|
@@ -3033,7 +3207,7 @@ def doModifyUser(args, parsed_globals):
|
|
|
3033
3207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3034
3208
|
|
|
3035
3209
|
|
|
3036
|
-
def
|
|
3210
|
+
def doDescribeSourceTypes(args, parsed_globals):
|
|
3037
3211
|
g_param = parse_global_arg(parsed_globals)
|
|
3038
3212
|
|
|
3039
3213
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3043,7 +3217,10 @@ def doDescribeCmdTemplates(args, parsed_globals):
|
|
|
3043
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3219
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3225
|
else:
|
|
3049
3226
|
cred = credential.Credential(
|
|
@@ -3055,18 +3232,18 @@ def doDescribeCmdTemplates(args, parsed_globals):
|
|
|
3055
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3234
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3236
|
if g_param[OptionsDefine.Language]:
|
|
3060
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3062
3239
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3063
3240
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3064
3241
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3065
|
-
model = models.
|
|
3242
|
+
model = models.DescribeSourceTypesRequest()
|
|
3066
3243
|
model.from_json_string(json.dumps(args))
|
|
3067
3244
|
start_time = time.time()
|
|
3068
3245
|
while True:
|
|
3069
|
-
rsp = client.
|
|
3246
|
+
rsp = client.DescribeSourceTypes(model)
|
|
3070
3247
|
result = rsp.to_json_string()
|
|
3071
3248
|
try:
|
|
3072
3249
|
json_obj = json.loads(result)
|
|
@@ -3085,7 +3262,7 @@ def doDescribeCmdTemplates(args, parsed_globals):
|
|
|
3085
3262
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3086
3263
|
|
|
3087
3264
|
|
|
3088
|
-
def
|
|
3265
|
+
def doCreateDeviceAccount(args, parsed_globals):
|
|
3089
3266
|
g_param = parse_global_arg(parsed_globals)
|
|
3090
3267
|
|
|
3091
3268
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3095,7 +3272,10 @@ def doDeleteCmdTemplates(args, parsed_globals):
|
|
|
3095
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3274
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3280
|
else:
|
|
3101
3281
|
cred = credential.Credential(
|
|
@@ -3107,18 +3287,18 @@ def doDeleteCmdTemplates(args, parsed_globals):
|
|
|
3107
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3289
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3291
|
if g_param[OptionsDefine.Language]:
|
|
3112
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3114
3294
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3115
3295
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3116
3296
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3117
|
-
model = models.
|
|
3297
|
+
model = models.CreateDeviceAccountRequest()
|
|
3118
3298
|
model.from_json_string(json.dumps(args))
|
|
3119
3299
|
start_time = time.time()
|
|
3120
3300
|
while True:
|
|
3121
|
-
rsp = client.
|
|
3301
|
+
rsp = client.CreateDeviceAccount(model)
|
|
3122
3302
|
result = rsp.to_json_string()
|
|
3123
3303
|
try:
|
|
3124
3304
|
json_obj = json.loads(result)
|
|
@@ -3137,7 +3317,7 @@ def doDeleteCmdTemplates(args, parsed_globals):
|
|
|
3137
3317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3138
3318
|
|
|
3139
3319
|
|
|
3140
|
-
def
|
|
3320
|
+
def doDeleteChangePwdTask(args, parsed_globals):
|
|
3141
3321
|
g_param = parse_global_arg(parsed_globals)
|
|
3142
3322
|
|
|
3143
3323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3147,7 +3327,10 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
|
|
|
3147
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3329
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3335
|
else:
|
|
3153
3336
|
cred = credential.Credential(
|
|
@@ -3159,18 +3342,18 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
|
|
|
3159
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3344
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3346
|
if g_param[OptionsDefine.Language]:
|
|
3164
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3166
3349
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3167
3350
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3168
3351
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3169
|
-
model = models.
|
|
3352
|
+
model = models.DeleteChangePwdTaskRequest()
|
|
3170
3353
|
model.from_json_string(json.dumps(args))
|
|
3171
3354
|
start_time = time.time()
|
|
3172
3355
|
while True:
|
|
3173
|
-
rsp = client.
|
|
3356
|
+
rsp = client.DeleteChangePwdTask(model)
|
|
3174
3357
|
result = rsp.to_json_string()
|
|
3175
3358
|
try:
|
|
3176
3359
|
json_obj = json.loads(result)
|
|
@@ -3189,7 +3372,7 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
|
|
|
3189
3372
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3190
3373
|
|
|
3191
3374
|
|
|
3192
|
-
def
|
|
3375
|
+
def doModifyOperationTask(args, parsed_globals):
|
|
3193
3376
|
g_param = parse_global_arg(parsed_globals)
|
|
3194
3377
|
|
|
3195
3378
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3199,7 +3382,10 @@ def doDescribeDeviceGroups(args, parsed_globals):
|
|
|
3199
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3384
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3390
|
else:
|
|
3205
3391
|
cred = credential.Credential(
|
|
@@ -3211,18 +3397,18 @@ def doDescribeDeviceGroups(args, parsed_globals):
|
|
|
3211
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3399
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3401
|
if g_param[OptionsDefine.Language]:
|
|
3216
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3218
3404
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3219
3405
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3220
3406
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3221
|
-
model = models.
|
|
3407
|
+
model = models.ModifyOperationTaskRequest()
|
|
3222
3408
|
model.from_json_string(json.dumps(args))
|
|
3223
3409
|
start_time = time.time()
|
|
3224
3410
|
while True:
|
|
3225
|
-
rsp = client.
|
|
3411
|
+
rsp = client.ModifyOperationTask(model)
|
|
3226
3412
|
result = rsp.to_json_string()
|
|
3227
3413
|
try:
|
|
3228
3414
|
json_obj = json.loads(result)
|
|
@@ -3241,7 +3427,7 @@ def doDescribeDeviceGroups(args, parsed_globals):
|
|
|
3241
3427
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3242
3428
|
|
|
3243
3429
|
|
|
3244
|
-
def
|
|
3430
|
+
def doDescribeDeviceAccounts(args, parsed_globals):
|
|
3245
3431
|
g_param = parse_global_arg(parsed_globals)
|
|
3246
3432
|
|
|
3247
3433
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3251,7 +3437,10 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
3251
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3439
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3445
|
else:
|
|
3257
3446
|
cred = credential.Credential(
|
|
@@ -3263,18 +3452,18 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
3263
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3454
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3456
|
if g_param[OptionsDefine.Language]:
|
|
3268
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3270
3459
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3271
3460
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3272
3461
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3273
|
-
model = models.
|
|
3462
|
+
model = models.DescribeDeviceAccountsRequest()
|
|
3274
3463
|
model.from_json_string(json.dumps(args))
|
|
3275
3464
|
start_time = time.time()
|
|
3276
3465
|
while True:
|
|
3277
|
-
rsp = client.
|
|
3466
|
+
rsp = client.DescribeDeviceAccounts(model)
|
|
3278
3467
|
result = rsp.to_json_string()
|
|
3279
3468
|
try:
|
|
3280
3469
|
json_obj = json.loads(result)
|
|
@@ -3293,7 +3482,7 @@ def doDescribeUsers(args, parsed_globals):
|
|
|
3293
3482
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3294
3483
|
|
|
3295
3484
|
|
|
3296
|
-
def
|
|
3485
|
+
def doDeleteUserGroups(args, parsed_globals):
|
|
3297
3486
|
g_param = parse_global_arg(parsed_globals)
|
|
3298
3487
|
|
|
3299
3488
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3303,7 +3492,10 @@ def doDescribeDevices(args, parsed_globals):
|
|
|
3303
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3494
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3500
|
else:
|
|
3309
3501
|
cred = credential.Credential(
|
|
@@ -3315,18 +3507,18 @@ def doDescribeDevices(args, parsed_globals):
|
|
|
3315
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3509
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3511
|
if g_param[OptionsDefine.Language]:
|
|
3320
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3322
3514
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3323
3515
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3324
3516
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3325
|
-
model = models.
|
|
3517
|
+
model = models.DeleteUserGroupsRequest()
|
|
3326
3518
|
model.from_json_string(json.dumps(args))
|
|
3327
3519
|
start_time = time.time()
|
|
3328
3520
|
while True:
|
|
3329
|
-
rsp = client.
|
|
3521
|
+
rsp = client.DeleteUserGroups(model)
|
|
3330
3522
|
result = rsp.to_json_string()
|
|
3331
3523
|
try:
|
|
3332
3524
|
json_obj = json.loads(result)
|
|
@@ -3345,7 +3537,7 @@ def doDescribeDevices(args, parsed_globals):
|
|
|
3345
3537
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3346
3538
|
|
|
3347
3539
|
|
|
3348
|
-
def
|
|
3540
|
+
def doRunOperationTask(args, parsed_globals):
|
|
3349
3541
|
g_param = parse_global_arg(parsed_globals)
|
|
3350
3542
|
|
|
3351
3543
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3355,7 +3547,10 @@ def doDescribeUserGroupMembers(args, parsed_globals):
|
|
|
3355
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3549
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3555
|
else:
|
|
3361
3556
|
cred = credential.Credential(
|
|
@@ -3367,18 +3562,18 @@ def doDescribeUserGroupMembers(args, parsed_globals):
|
|
|
3367
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3564
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3566
|
if g_param[OptionsDefine.Language]:
|
|
3372
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3374
3569
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3375
3570
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3376
3571
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3377
|
-
model = models.
|
|
3572
|
+
model = models.RunOperationTaskRequest()
|
|
3378
3573
|
model.from_json_string(json.dumps(args))
|
|
3379
3574
|
start_time = time.time()
|
|
3380
3575
|
while True:
|
|
3381
|
-
rsp = client.
|
|
3576
|
+
rsp = client.RunOperationTask(model)
|
|
3382
3577
|
result = rsp.to_json_string()
|
|
3383
3578
|
try:
|
|
3384
3579
|
json_obj = json.loads(result)
|
|
@@ -3397,7 +3592,7 @@ def doDescribeUserGroupMembers(args, parsed_globals):
|
|
|
3397
3592
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3398
3593
|
|
|
3399
3594
|
|
|
3400
|
-
def
|
|
3595
|
+
def doEnableIntranetAccess(args, parsed_globals):
|
|
3401
3596
|
g_param = parse_global_arg(parsed_globals)
|
|
3402
3597
|
|
|
3403
3598
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3407,7 +3602,10 @@ def doSearchCommand(args, parsed_globals):
|
|
|
3407
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3604
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3610
|
else:
|
|
3413
3611
|
cred = credential.Credential(
|
|
@@ -3419,18 +3617,18 @@ def doSearchCommand(args, parsed_globals):
|
|
|
3419
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3619
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3621
|
if g_param[OptionsDefine.Language]:
|
|
3424
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3426
3624
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3427
3625
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3428
3626
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3429
|
-
model = models.
|
|
3627
|
+
model = models.EnableIntranetAccessRequest()
|
|
3430
3628
|
model.from_json_string(json.dumps(args))
|
|
3431
3629
|
start_time = time.time()
|
|
3432
3630
|
while True:
|
|
3433
|
-
rsp = client.
|
|
3631
|
+
rsp = client.EnableIntranetAccess(model)
|
|
3434
3632
|
result = rsp.to_json_string()
|
|
3435
3633
|
try:
|
|
3436
3634
|
json_obj = json.loads(result)
|
|
@@ -3449,7 +3647,7 @@ def doSearchCommand(args, parsed_globals):
|
|
|
3449
3647
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3450
3648
|
|
|
3451
3649
|
|
|
3452
|
-
def
|
|
3650
|
+
def doCreateSyncUserTask(args, parsed_globals):
|
|
3453
3651
|
g_param = parse_global_arg(parsed_globals)
|
|
3454
3652
|
|
|
3455
3653
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3459,7 +3657,10 @@ def doReplaySession(args, parsed_globals):
|
|
|
3459
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3659
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3665
|
else:
|
|
3465
3666
|
cred = credential.Credential(
|
|
@@ -3471,18 +3672,18 @@ def doReplaySession(args, parsed_globals):
|
|
|
3471
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3674
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3676
|
if g_param[OptionsDefine.Language]:
|
|
3476
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3478
3679
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3479
3680
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3480
3681
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3481
|
-
model = models.
|
|
3682
|
+
model = models.CreateSyncUserTaskRequest()
|
|
3482
3683
|
model.from_json_string(json.dumps(args))
|
|
3483
3684
|
start_time = time.time()
|
|
3484
3685
|
while True:
|
|
3485
|
-
rsp = client.
|
|
3686
|
+
rsp = client.CreateSyncUserTask(model)
|
|
3486
3687
|
result = rsp.to_json_string()
|
|
3487
3688
|
try:
|
|
3488
3689
|
json_obj = json.loads(result)
|
|
@@ -3501,7 +3702,7 @@ def doReplaySession(args, parsed_globals):
|
|
|
3501
3702
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3502
3703
|
|
|
3503
3704
|
|
|
3504
|
-
def
|
|
3705
|
+
def doCreateChangePwdTask(args, parsed_globals):
|
|
3505
3706
|
g_param = parse_global_arg(parsed_globals)
|
|
3506
3707
|
|
|
3507
3708
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3511,7 +3712,10 @@ def doUnlockUser(args, parsed_globals):
|
|
|
3511
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3714
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3720
|
else:
|
|
3517
3721
|
cred = credential.Credential(
|
|
@@ -3523,18 +3727,18 @@ def doUnlockUser(args, parsed_globals):
|
|
|
3523
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3729
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3731
|
if g_param[OptionsDefine.Language]:
|
|
3528
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3530
3734
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3531
3735
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3532
3736
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3533
|
-
model = models.
|
|
3737
|
+
model = models.CreateChangePwdTaskRequest()
|
|
3534
3738
|
model.from_json_string(json.dumps(args))
|
|
3535
3739
|
start_time = time.time()
|
|
3536
3740
|
while True:
|
|
3537
|
-
rsp = client.
|
|
3741
|
+
rsp = client.CreateChangePwdTask(model)
|
|
3538
3742
|
result = rsp.to_json_string()
|
|
3539
3743
|
try:
|
|
3540
3744
|
json_obj = json.loads(result)
|
|
@@ -3553,7 +3757,7 @@ def doUnlockUser(args, parsed_globals):
|
|
|
3553
3757
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3554
3758
|
|
|
3555
3759
|
|
|
3556
|
-
def
|
|
3760
|
+
def doSearchCommand(args, parsed_globals):
|
|
3557
3761
|
g_param = parse_global_arg(parsed_globals)
|
|
3558
3762
|
|
|
3559
3763
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3563,7 +3767,10 @@ def doSearchFileBySid(args, parsed_globals):
|
|
|
3563
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3769
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3775
|
else:
|
|
3569
3776
|
cred = credential.Credential(
|
|
@@ -3575,18 +3782,18 @@ def doSearchFileBySid(args, parsed_globals):
|
|
|
3575
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3784
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3786
|
if g_param[OptionsDefine.Language]:
|
|
3580
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3582
3789
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3583
3790
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3584
3791
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3585
|
-
model = models.
|
|
3792
|
+
model = models.SearchCommandRequest()
|
|
3586
3793
|
model.from_json_string(json.dumps(args))
|
|
3587
3794
|
start_time = time.time()
|
|
3588
3795
|
while True:
|
|
3589
|
-
rsp = client.
|
|
3796
|
+
rsp = client.SearchCommand(model)
|
|
3590
3797
|
result = rsp.to_json_string()
|
|
3591
3798
|
try:
|
|
3592
3799
|
json_obj = json.loads(result)
|
|
@@ -3605,7 +3812,7 @@ def doSearchFileBySid(args, parsed_globals):
|
|
|
3605
3812
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3606
3813
|
|
|
3607
3814
|
|
|
3608
|
-
def
|
|
3815
|
+
def doDescribeUserGroupMembers(args, parsed_globals):
|
|
3609
3816
|
g_param = parse_global_arg(parsed_globals)
|
|
3610
3817
|
|
|
3611
3818
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3615,7 +3822,10 @@ def doImportExternalDevice(args, parsed_globals):
|
|
|
3615
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3824
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3830
|
else:
|
|
3621
3831
|
cred = credential.Credential(
|
|
@@ -3627,18 +3837,18 @@ def doImportExternalDevice(args, parsed_globals):
|
|
|
3627
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3839
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3841
|
if g_param[OptionsDefine.Language]:
|
|
3632
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3634
3844
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3635
3845
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3636
3846
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3637
|
-
model = models.
|
|
3847
|
+
model = models.DescribeUserGroupMembersRequest()
|
|
3638
3848
|
model.from_json_string(json.dumps(args))
|
|
3639
3849
|
start_time = time.time()
|
|
3640
3850
|
while True:
|
|
3641
|
-
rsp = client.
|
|
3851
|
+
rsp = client.DescribeUserGroupMembers(model)
|
|
3642
3852
|
result = rsp.to_json_string()
|
|
3643
3853
|
try:
|
|
3644
3854
|
json_obj = json.loads(result)
|
|
@@ -3657,7 +3867,7 @@ def doImportExternalDevice(args, parsed_globals):
|
|
|
3657
3867
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3658
3868
|
|
|
3659
3869
|
|
|
3660
|
-
def
|
|
3870
|
+
def doUnlockUser(args, parsed_globals):
|
|
3661
3871
|
g_param = parse_global_arg(parsed_globals)
|
|
3662
3872
|
|
|
3663
3873
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3667,7 +3877,10 @@ def doDescribeChangePwdTask(args, parsed_globals):
|
|
|
3667
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3879
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3885
|
else:
|
|
3673
3886
|
cred = credential.Credential(
|
|
@@ -3679,18 +3892,18 @@ def doDescribeChangePwdTask(args, parsed_globals):
|
|
|
3679
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
3894
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
3896
|
if g_param[OptionsDefine.Language]:
|
|
3684
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3686
3899
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3687
3900
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3688
3901
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3689
|
-
model = models.
|
|
3902
|
+
model = models.UnlockUserRequest()
|
|
3690
3903
|
model.from_json_string(json.dumps(args))
|
|
3691
3904
|
start_time = time.time()
|
|
3692
3905
|
while True:
|
|
3693
|
-
rsp = client.
|
|
3906
|
+
rsp = client.UnlockUser(model)
|
|
3694
3907
|
result = rsp.to_json_string()
|
|
3695
3908
|
try:
|
|
3696
3909
|
json_obj = json.loads(result)
|
|
@@ -3709,7 +3922,7 @@ def doDescribeChangePwdTask(args, parsed_globals):
|
|
|
3709
3922
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3710
3923
|
|
|
3711
3924
|
|
|
3712
|
-
def
|
|
3925
|
+
def doSearchFileBySid(args, parsed_globals):
|
|
3713
3926
|
g_param = parse_global_arg(parsed_globals)
|
|
3714
3927
|
|
|
3715
3928
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3719,7 +3932,10 @@ def doSearchFile(args, parsed_globals):
|
|
|
3719
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
3934
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
3940
|
else:
|
|
3725
3941
|
cred = credential.Credential(
|
|
@@ -3731,18 +3947,18 @@ def doSearchFile(args, parsed_globals):
|
|
|
3731
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
3949
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
3951
|
if g_param[OptionsDefine.Language]:
|
|
3736
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3738
3954
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3739
3955
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3740
3956
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3741
|
-
model = models.
|
|
3957
|
+
model = models.SearchFileBySidRequest()
|
|
3742
3958
|
model.from_json_string(json.dumps(args))
|
|
3743
3959
|
start_time = time.time()
|
|
3744
3960
|
while True:
|
|
3745
|
-
rsp = client.
|
|
3961
|
+
rsp = client.SearchFileBySid(model)
|
|
3746
3962
|
result = rsp.to_json_string()
|
|
3747
3963
|
try:
|
|
3748
3964
|
json_obj = json.loads(result)
|
|
@@ -3761,7 +3977,7 @@ def doSearchFile(args, parsed_globals):
|
|
|
3761
3977
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3762
3978
|
|
|
3763
3979
|
|
|
3764
|
-
def
|
|
3980
|
+
def doModifyAccessWhiteListAutoStatus(args, parsed_globals):
|
|
3765
3981
|
g_param = parse_global_arg(parsed_globals)
|
|
3766
3982
|
|
|
3767
3983
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3771,7 +3987,10 @@ def doCreateUserGroup(args, parsed_globals):
|
|
|
3771
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
3989
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
3995
|
else:
|
|
3777
3996
|
cred = credential.Credential(
|
|
@@ -3783,18 +4002,18 @@ def doCreateUserGroup(args, parsed_globals):
|
|
|
3783
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4004
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4006
|
if g_param[OptionsDefine.Language]:
|
|
3788
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3790
4009
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3791
4010
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3792
4011
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3793
|
-
model = models.
|
|
4012
|
+
model = models.ModifyAccessWhiteListAutoStatusRequest()
|
|
3794
4013
|
model.from_json_string(json.dumps(args))
|
|
3795
4014
|
start_time = time.time()
|
|
3796
4015
|
while True:
|
|
3797
|
-
rsp = client.
|
|
4016
|
+
rsp = client.ModifyAccessWhiteListAutoStatus(model)
|
|
3798
4017
|
result = rsp.to_json_string()
|
|
3799
4018
|
try:
|
|
3800
4019
|
json_obj = json.loads(result)
|
|
@@ -3813,7 +4032,7 @@ def doCreateUserGroup(args, parsed_globals):
|
|
|
3813
4032
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3814
4033
|
|
|
3815
4034
|
|
|
3816
|
-
def
|
|
4035
|
+
def doDescribeChangePwdTaskDetail(args, parsed_globals):
|
|
3817
4036
|
g_param = parse_global_arg(parsed_globals)
|
|
3818
4037
|
|
|
3819
4038
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3823,7 +4042,10 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
|
|
|
3823
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4044
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4050
|
else:
|
|
3829
4051
|
cred = credential.Credential(
|
|
@@ -3835,18 +4057,18 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
|
|
|
3835
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4059
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4061
|
if g_param[OptionsDefine.Language]:
|
|
3840
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3842
4064
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3843
4065
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3844
4066
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3845
|
-
model = models.
|
|
4067
|
+
model = models.DescribeChangePwdTaskDetailRequest()
|
|
3846
4068
|
model.from_json_string(json.dumps(args))
|
|
3847
4069
|
start_time = time.time()
|
|
3848
4070
|
while True:
|
|
3849
|
-
rsp = client.
|
|
4071
|
+
rsp = client.DescribeChangePwdTaskDetail(model)
|
|
3850
4072
|
result = rsp.to_json_string()
|
|
3851
4073
|
try:
|
|
3852
4074
|
json_obj = json.loads(result)
|
|
@@ -3865,7 +4087,7 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
|
|
|
3865
4087
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3866
4088
|
|
|
3867
4089
|
|
|
3868
|
-
def
|
|
4090
|
+
def doModifyReconnectionSetting(args, parsed_globals):
|
|
3869
4091
|
g_param = parse_global_arg(parsed_globals)
|
|
3870
4092
|
|
|
3871
4093
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3875,7 +4097,10 @@ def doDescribeChangePwdTaskDetail(args, parsed_globals):
|
|
|
3875
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4099
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4105
|
else:
|
|
3881
4106
|
cred = credential.Credential(
|
|
@@ -3887,18 +4112,18 @@ def doDescribeChangePwdTaskDetail(args, parsed_globals):
|
|
|
3887
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4114
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4116
|
if g_param[OptionsDefine.Language]:
|
|
3892
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3894
4119
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3895
4120
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3896
4121
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3897
|
-
model = models.
|
|
4122
|
+
model = models.ModifyReconnectionSettingRequest()
|
|
3898
4123
|
model.from_json_string(json.dumps(args))
|
|
3899
4124
|
start_time = time.time()
|
|
3900
4125
|
while True:
|
|
3901
|
-
rsp = client.
|
|
4126
|
+
rsp = client.ModifyReconnectionSetting(model)
|
|
3902
4127
|
result = rsp.to_json_string()
|
|
3903
4128
|
try:
|
|
3904
4129
|
json_obj = json.loads(result)
|
|
@@ -3917,7 +4142,7 @@ def doDescribeChangePwdTaskDetail(args, parsed_globals):
|
|
|
3917
4142
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3918
4143
|
|
|
3919
4144
|
|
|
3920
|
-
def
|
|
4145
|
+
def doDescribeDeviceGroupMembers(args, parsed_globals):
|
|
3921
4146
|
g_param = parse_global_arg(parsed_globals)
|
|
3922
4147
|
|
|
3923
4148
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3927,7 +4152,10 @@ def doSearchTaskResult(args, parsed_globals):
|
|
|
3927
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4154
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4160
|
else:
|
|
3933
4161
|
cred = credential.Credential(
|
|
@@ -3939,18 +4167,18 @@ def doSearchTaskResult(args, parsed_globals):
|
|
|
3939
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4169
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4171
|
if g_param[OptionsDefine.Language]:
|
|
3944
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3946
4174
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3947
4175
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3948
4176
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3949
|
-
model = models.
|
|
4177
|
+
model = models.DescribeDeviceGroupMembersRequest()
|
|
3950
4178
|
model.from_json_string(json.dumps(args))
|
|
3951
4179
|
start_time = time.time()
|
|
3952
4180
|
while True:
|
|
3953
|
-
rsp = client.
|
|
4181
|
+
rsp = client.DescribeDeviceGroupMembers(model)
|
|
3954
4182
|
result = rsp.to_json_string()
|
|
3955
4183
|
try:
|
|
3956
4184
|
json_obj = json.loads(result)
|
|
@@ -3969,7 +4197,7 @@ def doSearchTaskResult(args, parsed_globals):
|
|
|
3969
4197
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3970
4198
|
|
|
3971
4199
|
|
|
3972
|
-
def
|
|
4200
|
+
def doDisableIntranetAccess(args, parsed_globals):
|
|
3973
4201
|
g_param = parse_global_arg(parsed_globals)
|
|
3974
4202
|
|
|
3975
4203
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3979,7 +4207,10 @@ def doBindDeviceAccountPrivateKey(args, parsed_globals):
|
|
|
3979
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4209
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4215
|
else:
|
|
3985
4216
|
cred = credential.Credential(
|
|
@@ -3991,18 +4222,18 @@ def doBindDeviceAccountPrivateKey(args, parsed_globals):
|
|
|
3991
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4224
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4226
|
if g_param[OptionsDefine.Language]:
|
|
3996
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3998
4229
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3999
4230
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4000
4231
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4001
|
-
model = models.
|
|
4232
|
+
model = models.DisableIntranetAccessRequest()
|
|
4002
4233
|
model.from_json_string(json.dumps(args))
|
|
4003
4234
|
start_time = time.time()
|
|
4004
4235
|
while True:
|
|
4005
|
-
rsp = client.
|
|
4236
|
+
rsp = client.DisableIntranetAccess(model)
|
|
4006
4237
|
result = rsp.to_json_string()
|
|
4007
4238
|
try:
|
|
4008
4239
|
json_obj = json.loads(result)
|
|
@@ -4021,7 +4252,7 @@ def doBindDeviceAccountPrivateKey(args, parsed_globals):
|
|
|
4021
4252
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4022
4253
|
|
|
4023
4254
|
|
|
4024
|
-
def
|
|
4255
|
+
def doModifyAccessWhiteListRule(args, parsed_globals):
|
|
4025
4256
|
g_param = parse_global_arg(parsed_globals)
|
|
4026
4257
|
|
|
4027
4258
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4031,7 +4262,10 @@ def doSearchSubtaskResultById(args, parsed_globals):
|
|
|
4031
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4264
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4270
|
else:
|
|
4037
4271
|
cred = credential.Credential(
|
|
@@ -4043,18 +4277,18 @@ def doSearchSubtaskResultById(args, parsed_globals):
|
|
|
4043
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4279
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4281
|
if g_param[OptionsDefine.Language]:
|
|
4048
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4050
4284
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4051
4285
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4052
4286
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4053
|
-
model = models.
|
|
4287
|
+
model = models.ModifyAccessWhiteListRuleRequest()
|
|
4054
4288
|
model.from_json_string(json.dumps(args))
|
|
4055
4289
|
start_time = time.time()
|
|
4056
4290
|
while True:
|
|
4057
|
-
rsp = client.
|
|
4291
|
+
rsp = client.ModifyAccessWhiteListRule(model)
|
|
4058
4292
|
result = rsp.to_json_string()
|
|
4059
4293
|
try:
|
|
4060
4294
|
json_obj = json.loads(result)
|
|
@@ -4073,7 +4307,7 @@ def doSearchSubtaskResultById(args, parsed_globals):
|
|
|
4073
4307
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4074
4308
|
|
|
4075
4309
|
|
|
4076
|
-
def
|
|
4310
|
+
def doDeleteOperationTasks(args, parsed_globals):
|
|
4077
4311
|
g_param = parse_global_arg(parsed_globals)
|
|
4078
4312
|
|
|
4079
4313
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4083,7 +4317,10 @@ def doSearchSessionCommand(args, parsed_globals):
|
|
|
4083
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4319
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4325
|
else:
|
|
4089
4326
|
cred = credential.Credential(
|
|
@@ -4095,18 +4332,18 @@ def doSearchSessionCommand(args, parsed_globals):
|
|
|
4095
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4334
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4336
|
if g_param[OptionsDefine.Language]:
|
|
4100
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4102
4339
|
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4103
4340
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4104
4341
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4105
|
-
model = models.
|
|
4342
|
+
model = models.DeleteOperationTasksRequest()
|
|
4106
4343
|
model.from_json_string(json.dumps(args))
|
|
4107
4344
|
start_time = time.time()
|
|
4108
4345
|
while True:
|
|
4109
|
-
rsp = client.
|
|
4346
|
+
rsp = client.DeleteOperationTasks(model)
|
|
4110
4347
|
result = rsp.to_json_string()
|
|
4111
4348
|
try:
|
|
4112
4349
|
json_obj = json.loads(result)
|
|
@@ -4125,96 +4362,1328 @@ def doSearchSessionCommand(args, parsed_globals):
|
|
|
4125
4362
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4126
4363
|
|
|
4127
4364
|
|
|
4128
|
-
|
|
4129
|
-
|
|
4365
|
+
def doDeleteDevices(args, parsed_globals):
|
|
4366
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4130
4367
|
|
|
4131
|
-
|
|
4368
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4369
|
+
cred = credential.CVMRoleCredential()
|
|
4370
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4371
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4372
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4373
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4374
|
+
)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4379
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4380
|
+
else:
|
|
4381
|
+
cred = credential.Credential(
|
|
4382
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4383
|
+
)
|
|
4384
|
+
http_profile = HttpProfile(
|
|
4385
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4386
|
+
reqMethod="POST",
|
|
4387
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4388
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4389
|
+
)
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4391
|
+
if g_param[OptionsDefine.Language]:
|
|
4392
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4393
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4394
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4395
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4396
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4397
|
+
model = models.DeleteDevicesRequest()
|
|
4398
|
+
model.from_json_string(json.dumps(args))
|
|
4399
|
+
start_time = time.time()
|
|
4400
|
+
while True:
|
|
4401
|
+
rsp = client.DeleteDevices(model)
|
|
4402
|
+
result = rsp.to_json_string()
|
|
4403
|
+
try:
|
|
4404
|
+
json_obj = json.loads(result)
|
|
4405
|
+
except TypeError as e:
|
|
4406
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4407
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4408
|
+
break
|
|
4409
|
+
cur_time = time.time()
|
|
4410
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4411
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4412
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4413
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4414
|
+
else:
|
|
4415
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4416
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4417
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4132
4418
|
|
|
4133
|
-
MODELS_MAP = {
|
|
4134
|
-
"v20230418": models_v20230418,
|
|
4135
4419
|
|
|
4136
|
-
|
|
4420
|
+
def doDescribeUsers(args, parsed_globals):
|
|
4421
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4137
4422
|
|
|
4138
|
-
|
|
4139
|
-
|
|
4140
|
-
|
|
4141
|
-
|
|
4142
|
-
|
|
4143
|
-
|
|
4144
|
-
|
|
4145
|
-
|
|
4146
|
-
|
|
4147
|
-
|
|
4148
|
-
|
|
4149
|
-
|
|
4150
|
-
|
|
4151
|
-
|
|
4152
|
-
|
|
4153
|
-
|
|
4154
|
-
|
|
4155
|
-
|
|
4156
|
-
|
|
4157
|
-
|
|
4158
|
-
|
|
4159
|
-
|
|
4160
|
-
"
|
|
4161
|
-
|
|
4162
|
-
|
|
4163
|
-
|
|
4164
|
-
|
|
4165
|
-
"
|
|
4166
|
-
|
|
4167
|
-
|
|
4168
|
-
|
|
4169
|
-
|
|
4170
|
-
|
|
4171
|
-
|
|
4172
|
-
|
|
4173
|
-
|
|
4174
|
-
|
|
4175
|
-
|
|
4176
|
-
|
|
4177
|
-
|
|
4178
|
-
|
|
4179
|
-
|
|
4180
|
-
|
|
4181
|
-
|
|
4182
|
-
|
|
4183
|
-
|
|
4184
|
-
|
|
4185
|
-
|
|
4186
|
-
|
|
4187
|
-
"
|
|
4188
|
-
|
|
4189
|
-
|
|
4423
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4424
|
+
cred = credential.CVMRoleCredential()
|
|
4425
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4426
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4427
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4428
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4429
|
+
)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4434
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4435
|
+
else:
|
|
4436
|
+
cred = credential.Credential(
|
|
4437
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4438
|
+
)
|
|
4439
|
+
http_profile = HttpProfile(
|
|
4440
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4441
|
+
reqMethod="POST",
|
|
4442
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4443
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4444
|
+
)
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4446
|
+
if g_param[OptionsDefine.Language]:
|
|
4447
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4448
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4449
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4450
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4451
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4452
|
+
model = models.DescribeUsersRequest()
|
|
4453
|
+
model.from_json_string(json.dumps(args))
|
|
4454
|
+
start_time = time.time()
|
|
4455
|
+
while True:
|
|
4456
|
+
rsp = client.DescribeUsers(model)
|
|
4457
|
+
result = rsp.to_json_string()
|
|
4458
|
+
try:
|
|
4459
|
+
json_obj = json.loads(result)
|
|
4460
|
+
except TypeError as e:
|
|
4461
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4462
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4463
|
+
break
|
|
4464
|
+
cur_time = time.time()
|
|
4465
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4466
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4467
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4468
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4469
|
+
else:
|
|
4470
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4471
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4472
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4473
|
+
|
|
4474
|
+
|
|
4475
|
+
def doSyncDevicesToIOA(args, parsed_globals):
|
|
4476
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4477
|
+
|
|
4478
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4479
|
+
cred = credential.CVMRoleCredential()
|
|
4480
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4481
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4482
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4483
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4484
|
+
)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4489
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4490
|
+
else:
|
|
4491
|
+
cred = credential.Credential(
|
|
4492
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4493
|
+
)
|
|
4494
|
+
http_profile = HttpProfile(
|
|
4495
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4496
|
+
reqMethod="POST",
|
|
4497
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4498
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4499
|
+
)
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4501
|
+
if g_param[OptionsDefine.Language]:
|
|
4502
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4503
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4504
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4505
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4506
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4507
|
+
model = models.SyncDevicesToIOARequest()
|
|
4508
|
+
model.from_json_string(json.dumps(args))
|
|
4509
|
+
start_time = time.time()
|
|
4510
|
+
while True:
|
|
4511
|
+
rsp = client.SyncDevicesToIOA(model)
|
|
4512
|
+
result = rsp.to_json_string()
|
|
4513
|
+
try:
|
|
4514
|
+
json_obj = json.loads(result)
|
|
4515
|
+
except TypeError as e:
|
|
4516
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4517
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4518
|
+
break
|
|
4519
|
+
cur_time = time.time()
|
|
4520
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4521
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4522
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4523
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4524
|
+
else:
|
|
4525
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4526
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4527
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4528
|
+
|
|
4529
|
+
|
|
4530
|
+
def doModifyChangePwdTask(args, parsed_globals):
|
|
4531
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4532
|
+
|
|
4533
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4534
|
+
cred = credential.CVMRoleCredential()
|
|
4535
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4536
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4537
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4538
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4539
|
+
)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4544
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4545
|
+
else:
|
|
4546
|
+
cred = credential.Credential(
|
|
4547
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4548
|
+
)
|
|
4549
|
+
http_profile = HttpProfile(
|
|
4550
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4551
|
+
reqMethod="POST",
|
|
4552
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4553
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4554
|
+
)
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4556
|
+
if g_param[OptionsDefine.Language]:
|
|
4557
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4558
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4559
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4560
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4561
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4562
|
+
model = models.ModifyChangePwdTaskRequest()
|
|
4563
|
+
model.from_json_string(json.dumps(args))
|
|
4564
|
+
start_time = time.time()
|
|
4565
|
+
while True:
|
|
4566
|
+
rsp = client.ModifyChangePwdTask(model)
|
|
4567
|
+
result = rsp.to_json_string()
|
|
4568
|
+
try:
|
|
4569
|
+
json_obj = json.loads(result)
|
|
4570
|
+
except TypeError as e:
|
|
4571
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4572
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4573
|
+
break
|
|
4574
|
+
cur_time = time.time()
|
|
4575
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4576
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4577
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4578
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4579
|
+
else:
|
|
4580
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4581
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4582
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4583
|
+
|
|
4584
|
+
|
|
4585
|
+
def doRunChangePwdTask(args, parsed_globals):
|
|
4586
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4587
|
+
|
|
4588
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4589
|
+
cred = credential.CVMRoleCredential()
|
|
4590
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4591
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4592
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4593
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4594
|
+
)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4599
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4600
|
+
else:
|
|
4601
|
+
cred = credential.Credential(
|
|
4602
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4603
|
+
)
|
|
4604
|
+
http_profile = HttpProfile(
|
|
4605
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4606
|
+
reqMethod="POST",
|
|
4607
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4608
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4609
|
+
)
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4611
|
+
if g_param[OptionsDefine.Language]:
|
|
4612
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4613
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4614
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4615
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4616
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4617
|
+
model = models.RunChangePwdTaskRequest()
|
|
4618
|
+
model.from_json_string(json.dumps(args))
|
|
4619
|
+
start_time = time.time()
|
|
4620
|
+
while True:
|
|
4621
|
+
rsp = client.RunChangePwdTask(model)
|
|
4622
|
+
result = rsp.to_json_string()
|
|
4623
|
+
try:
|
|
4624
|
+
json_obj = json.loads(result)
|
|
4625
|
+
except TypeError as e:
|
|
4626
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4627
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4628
|
+
break
|
|
4629
|
+
cur_time = time.time()
|
|
4630
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4631
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4632
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4633
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4634
|
+
else:
|
|
4635
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4636
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4637
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4638
|
+
|
|
4639
|
+
|
|
4640
|
+
def doResetDeviceAccountPassword(args, parsed_globals):
|
|
4641
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4642
|
+
|
|
4643
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4644
|
+
cred = credential.CVMRoleCredential()
|
|
4645
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4646
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4647
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4648
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4649
|
+
)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4654
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4655
|
+
else:
|
|
4656
|
+
cred = credential.Credential(
|
|
4657
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4658
|
+
)
|
|
4659
|
+
http_profile = HttpProfile(
|
|
4660
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4661
|
+
reqMethod="POST",
|
|
4662
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4663
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4664
|
+
)
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4666
|
+
if g_param[OptionsDefine.Language]:
|
|
4667
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4668
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4669
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4670
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4671
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4672
|
+
model = models.ResetDeviceAccountPasswordRequest()
|
|
4673
|
+
model.from_json_string(json.dumps(args))
|
|
4674
|
+
start_time = time.time()
|
|
4675
|
+
while True:
|
|
4676
|
+
rsp = client.ResetDeviceAccountPassword(model)
|
|
4677
|
+
result = rsp.to_json_string()
|
|
4678
|
+
try:
|
|
4679
|
+
json_obj = json.loads(result)
|
|
4680
|
+
except TypeError as e:
|
|
4681
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4682
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4683
|
+
break
|
|
4684
|
+
cur_time = time.time()
|
|
4685
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4686
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4687
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4688
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4689
|
+
else:
|
|
4690
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4691
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4692
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4693
|
+
|
|
4694
|
+
|
|
4695
|
+
def doDeleteDeviceGroups(args, parsed_globals):
|
|
4696
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4697
|
+
|
|
4698
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4699
|
+
cred = credential.CVMRoleCredential()
|
|
4700
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4701
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4702
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4703
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4704
|
+
)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4709
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4710
|
+
else:
|
|
4711
|
+
cred = credential.Credential(
|
|
4712
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4713
|
+
)
|
|
4714
|
+
http_profile = HttpProfile(
|
|
4715
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4716
|
+
reqMethod="POST",
|
|
4717
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4718
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4719
|
+
)
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4721
|
+
if g_param[OptionsDefine.Language]:
|
|
4722
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4723
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4724
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4725
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4726
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4727
|
+
model = models.DeleteDeviceGroupsRequest()
|
|
4728
|
+
model.from_json_string(json.dumps(args))
|
|
4729
|
+
start_time = time.time()
|
|
4730
|
+
while True:
|
|
4731
|
+
rsp = client.DeleteDeviceGroups(model)
|
|
4732
|
+
result = rsp.to_json_string()
|
|
4733
|
+
try:
|
|
4734
|
+
json_obj = json.loads(result)
|
|
4735
|
+
except TypeError as e:
|
|
4736
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4737
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4738
|
+
break
|
|
4739
|
+
cur_time = time.time()
|
|
4740
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4741
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4742
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4743
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4744
|
+
else:
|
|
4745
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4746
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4747
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4748
|
+
|
|
4749
|
+
|
|
4750
|
+
def doCreateAcl(args, parsed_globals):
|
|
4751
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4752
|
+
|
|
4753
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4754
|
+
cred = credential.CVMRoleCredential()
|
|
4755
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4756
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4757
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4758
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4759
|
+
)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4764
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4765
|
+
else:
|
|
4766
|
+
cred = credential.Credential(
|
|
4767
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4768
|
+
)
|
|
4769
|
+
http_profile = HttpProfile(
|
|
4770
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4771
|
+
reqMethod="POST",
|
|
4772
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4773
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4774
|
+
)
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4776
|
+
if g_param[OptionsDefine.Language]:
|
|
4777
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4778
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4779
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4780
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4781
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4782
|
+
model = models.CreateAclRequest()
|
|
4783
|
+
model.from_json_string(json.dumps(args))
|
|
4784
|
+
start_time = time.time()
|
|
4785
|
+
while True:
|
|
4786
|
+
rsp = client.CreateAcl(model)
|
|
4787
|
+
result = rsp.to_json_string()
|
|
4788
|
+
try:
|
|
4789
|
+
json_obj = json.loads(result)
|
|
4790
|
+
except TypeError as e:
|
|
4791
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4792
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4793
|
+
break
|
|
4794
|
+
cur_time = time.time()
|
|
4795
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4796
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4797
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4798
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4799
|
+
else:
|
|
4800
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4801
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4802
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4803
|
+
|
|
4804
|
+
|
|
4805
|
+
def doDescribeUserSyncStatus(args, parsed_globals):
|
|
4806
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4807
|
+
|
|
4808
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4809
|
+
cred = credential.CVMRoleCredential()
|
|
4810
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4811
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4812
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4813
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4814
|
+
)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4819
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4820
|
+
else:
|
|
4821
|
+
cred = credential.Credential(
|
|
4822
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4823
|
+
)
|
|
4824
|
+
http_profile = HttpProfile(
|
|
4825
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4826
|
+
reqMethod="POST",
|
|
4827
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4828
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4829
|
+
)
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4831
|
+
if g_param[OptionsDefine.Language]:
|
|
4832
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4833
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4834
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4835
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4836
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4837
|
+
model = models.DescribeUserSyncStatusRequest()
|
|
4838
|
+
model.from_json_string(json.dumps(args))
|
|
4839
|
+
start_time = time.time()
|
|
4840
|
+
while True:
|
|
4841
|
+
rsp = client.DescribeUserSyncStatus(model)
|
|
4842
|
+
result = rsp.to_json_string()
|
|
4843
|
+
try:
|
|
4844
|
+
json_obj = json.loads(result)
|
|
4845
|
+
except TypeError as e:
|
|
4846
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4847
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4848
|
+
break
|
|
4849
|
+
cur_time = time.time()
|
|
4850
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4851
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4852
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4853
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4854
|
+
else:
|
|
4855
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4856
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4857
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4858
|
+
|
|
4859
|
+
|
|
4860
|
+
def doCreateResource(args, parsed_globals):
|
|
4861
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4862
|
+
|
|
4863
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4864
|
+
cred = credential.CVMRoleCredential()
|
|
4865
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4866
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4867
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4868
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4869
|
+
)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4874
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4875
|
+
else:
|
|
4876
|
+
cred = credential.Credential(
|
|
4877
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4878
|
+
)
|
|
4879
|
+
http_profile = HttpProfile(
|
|
4880
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4881
|
+
reqMethod="POST",
|
|
4882
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4883
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4884
|
+
)
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4886
|
+
if g_param[OptionsDefine.Language]:
|
|
4887
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4888
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4889
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4890
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4891
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4892
|
+
model = models.CreateResourceRequest()
|
|
4893
|
+
model.from_json_string(json.dumps(args))
|
|
4894
|
+
start_time = time.time()
|
|
4895
|
+
while True:
|
|
4896
|
+
rsp = client.CreateResource(model)
|
|
4897
|
+
result = rsp.to_json_string()
|
|
4898
|
+
try:
|
|
4899
|
+
json_obj = json.loads(result)
|
|
4900
|
+
except TypeError as e:
|
|
4901
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4902
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4903
|
+
break
|
|
4904
|
+
cur_time = time.time()
|
|
4905
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4906
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4907
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4908
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4909
|
+
else:
|
|
4910
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4911
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4912
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4913
|
+
|
|
4914
|
+
|
|
4915
|
+
def doCreateAccessWhiteListRule(args, parsed_globals):
|
|
4916
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4917
|
+
|
|
4918
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4919
|
+
cred = credential.CVMRoleCredential()
|
|
4920
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4921
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4922
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4923
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4924
|
+
)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4929
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4930
|
+
else:
|
|
4931
|
+
cred = credential.Credential(
|
|
4932
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4933
|
+
)
|
|
4934
|
+
http_profile = HttpProfile(
|
|
4935
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4936
|
+
reqMethod="POST",
|
|
4937
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4938
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4939
|
+
)
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4941
|
+
if g_param[OptionsDefine.Language]:
|
|
4942
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4943
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4944
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4945
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4946
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4947
|
+
model = models.CreateAccessWhiteListRuleRequest()
|
|
4948
|
+
model.from_json_string(json.dumps(args))
|
|
4949
|
+
start_time = time.time()
|
|
4950
|
+
while True:
|
|
4951
|
+
rsp = client.CreateAccessWhiteListRule(model)
|
|
4952
|
+
result = rsp.to_json_string()
|
|
4953
|
+
try:
|
|
4954
|
+
json_obj = json.loads(result)
|
|
4955
|
+
except TypeError as e:
|
|
4956
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4957
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4958
|
+
break
|
|
4959
|
+
cur_time = time.time()
|
|
4960
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4961
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4962
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4963
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4964
|
+
else:
|
|
4965
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4966
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4967
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4968
|
+
|
|
4969
|
+
|
|
4970
|
+
def doDescribeAcls(args, parsed_globals):
|
|
4971
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4972
|
+
|
|
4973
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4974
|
+
cred = credential.CVMRoleCredential()
|
|
4975
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4976
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4977
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4978
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4979
|
+
)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4984
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4985
|
+
else:
|
|
4986
|
+
cred = credential.Credential(
|
|
4987
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4988
|
+
)
|
|
4989
|
+
http_profile = HttpProfile(
|
|
4990
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4991
|
+
reqMethod="POST",
|
|
4992
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4993
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4994
|
+
)
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4996
|
+
if g_param[OptionsDefine.Language]:
|
|
4997
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4998
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4999
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5000
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5001
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5002
|
+
model = models.DescribeAclsRequest()
|
|
5003
|
+
model.from_json_string(json.dumps(args))
|
|
5004
|
+
start_time = time.time()
|
|
5005
|
+
while True:
|
|
5006
|
+
rsp = client.DescribeAcls(model)
|
|
5007
|
+
result = rsp.to_json_string()
|
|
5008
|
+
try:
|
|
5009
|
+
json_obj = json.loads(result)
|
|
5010
|
+
except TypeError as e:
|
|
5011
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5012
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5013
|
+
break
|
|
5014
|
+
cur_time = time.time()
|
|
5015
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5016
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5017
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5018
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5019
|
+
else:
|
|
5020
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5021
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5022
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5023
|
+
|
|
5024
|
+
|
|
5025
|
+
def doModifyLDAPSetting(args, parsed_globals):
|
|
5026
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5027
|
+
|
|
5028
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5029
|
+
cred = credential.CVMRoleCredential()
|
|
5030
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5031
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5032
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5033
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5034
|
+
)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5039
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5040
|
+
else:
|
|
5041
|
+
cred = credential.Credential(
|
|
5042
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5043
|
+
)
|
|
5044
|
+
http_profile = HttpProfile(
|
|
5045
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5046
|
+
reqMethod="POST",
|
|
5047
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5048
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5049
|
+
)
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5051
|
+
if g_param[OptionsDefine.Language]:
|
|
5052
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5053
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5054
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5055
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5056
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5057
|
+
model = models.ModifyLDAPSettingRequest()
|
|
5058
|
+
model.from_json_string(json.dumps(args))
|
|
5059
|
+
start_time = time.time()
|
|
5060
|
+
while True:
|
|
5061
|
+
rsp = client.ModifyLDAPSetting(model)
|
|
5062
|
+
result = rsp.to_json_string()
|
|
5063
|
+
try:
|
|
5064
|
+
json_obj = json.loads(result)
|
|
5065
|
+
except TypeError as e:
|
|
5066
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5067
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5068
|
+
break
|
|
5069
|
+
cur_time = time.time()
|
|
5070
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5071
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5072
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5073
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5074
|
+
else:
|
|
5075
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5076
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5077
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5078
|
+
|
|
5079
|
+
|
|
5080
|
+
def doModifyResource(args, parsed_globals):
|
|
5081
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5082
|
+
|
|
5083
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5084
|
+
cred = credential.CVMRoleCredential()
|
|
5085
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5086
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5087
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5088
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5089
|
+
)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5094
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5095
|
+
else:
|
|
5096
|
+
cred = credential.Credential(
|
|
5097
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5098
|
+
)
|
|
5099
|
+
http_profile = HttpProfile(
|
|
5100
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5101
|
+
reqMethod="POST",
|
|
5102
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5103
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5104
|
+
)
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5106
|
+
if g_param[OptionsDefine.Language]:
|
|
5107
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5108
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5109
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5110
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5111
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5112
|
+
model = models.ModifyResourceRequest()
|
|
5113
|
+
model.from_json_string(json.dumps(args))
|
|
5114
|
+
start_time = time.time()
|
|
5115
|
+
while True:
|
|
5116
|
+
rsp = client.ModifyResource(model)
|
|
5117
|
+
result = rsp.to_json_string()
|
|
5118
|
+
try:
|
|
5119
|
+
json_obj = json.loads(result)
|
|
5120
|
+
except TypeError as e:
|
|
5121
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5122
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5123
|
+
break
|
|
5124
|
+
cur_time = time.time()
|
|
5125
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5126
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5127
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5128
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5129
|
+
else:
|
|
5130
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5131
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5132
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5133
|
+
|
|
5134
|
+
|
|
5135
|
+
def doModifyAssetSyncFlag(args, parsed_globals):
|
|
5136
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5137
|
+
|
|
5138
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5139
|
+
cred = credential.CVMRoleCredential()
|
|
5140
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5141
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5142
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5143
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5144
|
+
)
|
|
5145
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5146
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5147
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5148
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5149
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5150
|
+
else:
|
|
5151
|
+
cred = credential.Credential(
|
|
5152
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5153
|
+
)
|
|
5154
|
+
http_profile = HttpProfile(
|
|
5155
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5156
|
+
reqMethod="POST",
|
|
5157
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5158
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5159
|
+
)
|
|
5160
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5161
|
+
if g_param[OptionsDefine.Language]:
|
|
5162
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5163
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5164
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5165
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5166
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5167
|
+
model = models.ModifyAssetSyncFlagRequest()
|
|
5168
|
+
model.from_json_string(json.dumps(args))
|
|
5169
|
+
start_time = time.time()
|
|
5170
|
+
while True:
|
|
5171
|
+
rsp = client.ModifyAssetSyncFlag(model)
|
|
5172
|
+
result = rsp.to_json_string()
|
|
5173
|
+
try:
|
|
5174
|
+
json_obj = json.loads(result)
|
|
5175
|
+
except TypeError as e:
|
|
5176
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5177
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5178
|
+
break
|
|
5179
|
+
cur_time = time.time()
|
|
5180
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5181
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5182
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5183
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5184
|
+
else:
|
|
5185
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5186
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5187
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5188
|
+
|
|
5189
|
+
|
|
5190
|
+
def doModifyUser(args, parsed_globals):
|
|
5191
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5192
|
+
|
|
5193
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5194
|
+
cred = credential.CVMRoleCredential()
|
|
5195
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5196
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5197
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5198
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5199
|
+
)
|
|
5200
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5201
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5202
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5203
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5204
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5205
|
+
else:
|
|
5206
|
+
cred = credential.Credential(
|
|
5207
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5208
|
+
)
|
|
5209
|
+
http_profile = HttpProfile(
|
|
5210
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5211
|
+
reqMethod="POST",
|
|
5212
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5213
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5214
|
+
)
|
|
5215
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5216
|
+
if g_param[OptionsDefine.Language]:
|
|
5217
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5218
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5219
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5220
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5221
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5222
|
+
model = models.ModifyUserRequest()
|
|
5223
|
+
model.from_json_string(json.dumps(args))
|
|
5224
|
+
start_time = time.time()
|
|
5225
|
+
while True:
|
|
5226
|
+
rsp = client.ModifyUser(model)
|
|
5227
|
+
result = rsp.to_json_string()
|
|
5228
|
+
try:
|
|
5229
|
+
json_obj = json.loads(result)
|
|
5230
|
+
except TypeError as e:
|
|
5231
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5232
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5233
|
+
break
|
|
5234
|
+
cur_time = time.time()
|
|
5235
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5236
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5237
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5238
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5239
|
+
else:
|
|
5240
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5241
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5242
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5243
|
+
|
|
5244
|
+
|
|
5245
|
+
def doDescribeCmdTemplates(args, parsed_globals):
|
|
5246
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5247
|
+
|
|
5248
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5249
|
+
cred = credential.CVMRoleCredential()
|
|
5250
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5251
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5252
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5253
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5254
|
+
)
|
|
5255
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5256
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5257
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5258
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5259
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5260
|
+
else:
|
|
5261
|
+
cred = credential.Credential(
|
|
5262
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5263
|
+
)
|
|
5264
|
+
http_profile = HttpProfile(
|
|
5265
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5266
|
+
reqMethod="POST",
|
|
5267
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5268
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5269
|
+
)
|
|
5270
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5271
|
+
if g_param[OptionsDefine.Language]:
|
|
5272
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5273
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5274
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5275
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5276
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5277
|
+
model = models.DescribeCmdTemplatesRequest()
|
|
5278
|
+
model.from_json_string(json.dumps(args))
|
|
5279
|
+
start_time = time.time()
|
|
5280
|
+
while True:
|
|
5281
|
+
rsp = client.DescribeCmdTemplates(model)
|
|
5282
|
+
result = rsp.to_json_string()
|
|
5283
|
+
try:
|
|
5284
|
+
json_obj = json.loads(result)
|
|
5285
|
+
except TypeError as e:
|
|
5286
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5287
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5288
|
+
break
|
|
5289
|
+
cur_time = time.time()
|
|
5290
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5291
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5292
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5293
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5294
|
+
else:
|
|
5295
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5296
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5297
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5298
|
+
|
|
5299
|
+
|
|
5300
|
+
def doDeleteDeviceGroupMembers(args, parsed_globals):
|
|
5301
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5302
|
+
|
|
5303
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5304
|
+
cred = credential.CVMRoleCredential()
|
|
5305
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5306
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5307
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5308
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5309
|
+
)
|
|
5310
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5311
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5312
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5313
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5314
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5315
|
+
else:
|
|
5316
|
+
cred = credential.Credential(
|
|
5317
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5318
|
+
)
|
|
5319
|
+
http_profile = HttpProfile(
|
|
5320
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5321
|
+
reqMethod="POST",
|
|
5322
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5323
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5324
|
+
)
|
|
5325
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5326
|
+
if g_param[OptionsDefine.Language]:
|
|
5327
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5328
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5329
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5330
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5331
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5332
|
+
model = models.DeleteDeviceGroupMembersRequest()
|
|
5333
|
+
model.from_json_string(json.dumps(args))
|
|
5334
|
+
start_time = time.time()
|
|
5335
|
+
while True:
|
|
5336
|
+
rsp = client.DeleteDeviceGroupMembers(model)
|
|
5337
|
+
result = rsp.to_json_string()
|
|
5338
|
+
try:
|
|
5339
|
+
json_obj = json.loads(result)
|
|
5340
|
+
except TypeError as e:
|
|
5341
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5342
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5343
|
+
break
|
|
5344
|
+
cur_time = time.time()
|
|
5345
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5346
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5347
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5348
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5349
|
+
else:
|
|
5350
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5351
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5352
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5353
|
+
|
|
5354
|
+
|
|
5355
|
+
def doDescribeDeviceGroups(args, parsed_globals):
|
|
5356
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5357
|
+
|
|
5358
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5359
|
+
cred = credential.CVMRoleCredential()
|
|
5360
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5361
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5362
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5363
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5364
|
+
)
|
|
5365
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5366
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5367
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5368
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5369
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5370
|
+
else:
|
|
5371
|
+
cred = credential.Credential(
|
|
5372
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5373
|
+
)
|
|
5374
|
+
http_profile = HttpProfile(
|
|
5375
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5376
|
+
reqMethod="POST",
|
|
5377
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5378
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5379
|
+
)
|
|
5380
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5381
|
+
if g_param[OptionsDefine.Language]:
|
|
5382
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5383
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5384
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5385
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5386
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5387
|
+
model = models.DescribeDeviceGroupsRequest()
|
|
5388
|
+
model.from_json_string(json.dumps(args))
|
|
5389
|
+
start_time = time.time()
|
|
5390
|
+
while True:
|
|
5391
|
+
rsp = client.DescribeDeviceGroups(model)
|
|
5392
|
+
result = rsp.to_json_string()
|
|
5393
|
+
try:
|
|
5394
|
+
json_obj = json.loads(result)
|
|
5395
|
+
except TypeError as e:
|
|
5396
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5397
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5398
|
+
break
|
|
5399
|
+
cur_time = time.time()
|
|
5400
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5401
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5402
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5403
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5404
|
+
else:
|
|
5405
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5406
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5407
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5408
|
+
|
|
5409
|
+
|
|
5410
|
+
def doDescribeDevices(args, parsed_globals):
|
|
5411
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5412
|
+
|
|
5413
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5414
|
+
cred = credential.CVMRoleCredential()
|
|
5415
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5416
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5417
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5418
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5419
|
+
)
|
|
5420
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5421
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5422
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5423
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5424
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5425
|
+
else:
|
|
5426
|
+
cred = credential.Credential(
|
|
5427
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5428
|
+
)
|
|
5429
|
+
http_profile = HttpProfile(
|
|
5430
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5431
|
+
reqMethod="POST",
|
|
5432
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5433
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5434
|
+
)
|
|
5435
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5436
|
+
if g_param[OptionsDefine.Language]:
|
|
5437
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5438
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5439
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5440
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5441
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5442
|
+
model = models.DescribeDevicesRequest()
|
|
5443
|
+
model.from_json_string(json.dumps(args))
|
|
5444
|
+
start_time = time.time()
|
|
5445
|
+
while True:
|
|
5446
|
+
rsp = client.DescribeDevices(model)
|
|
5447
|
+
result = rsp.to_json_string()
|
|
5448
|
+
try:
|
|
5449
|
+
json_obj = json.loads(result)
|
|
5450
|
+
except TypeError as e:
|
|
5451
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5452
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5453
|
+
break
|
|
5454
|
+
cur_time = time.time()
|
|
5455
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5456
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5457
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5458
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5459
|
+
else:
|
|
5460
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5461
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5462
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5463
|
+
|
|
5464
|
+
|
|
5465
|
+
def doAddDeviceGroupMembers(args, parsed_globals):
|
|
5466
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5467
|
+
|
|
5468
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5469
|
+
cred = credential.CVMRoleCredential()
|
|
5470
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5471
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5472
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5473
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5474
|
+
)
|
|
5475
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5476
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5477
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5478
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5479
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5480
|
+
else:
|
|
5481
|
+
cred = credential.Credential(
|
|
5482
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5483
|
+
)
|
|
5484
|
+
http_profile = HttpProfile(
|
|
5485
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5486
|
+
reqMethod="POST",
|
|
5487
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5488
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5489
|
+
)
|
|
5490
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5491
|
+
if g_param[OptionsDefine.Language]:
|
|
5492
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5493
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5494
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5495
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5496
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5497
|
+
model = models.AddDeviceGroupMembersRequest()
|
|
5498
|
+
model.from_json_string(json.dumps(args))
|
|
5499
|
+
start_time = time.time()
|
|
5500
|
+
while True:
|
|
5501
|
+
rsp = client.AddDeviceGroupMembers(model)
|
|
5502
|
+
result = rsp.to_json_string()
|
|
5503
|
+
try:
|
|
5504
|
+
json_obj = json.loads(result)
|
|
5505
|
+
except TypeError as e:
|
|
5506
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5507
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5508
|
+
break
|
|
5509
|
+
cur_time = time.time()
|
|
5510
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5511
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5512
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5513
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5514
|
+
else:
|
|
5515
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5516
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5517
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5518
|
+
|
|
5519
|
+
|
|
5520
|
+
def doBindDeviceAccountPrivateKey(args, parsed_globals):
|
|
5521
|
+
g_param = parse_global_arg(parsed_globals)
|
|
5522
|
+
|
|
5523
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
5524
|
+
cred = credential.CVMRoleCredential()
|
|
5525
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
5526
|
+
cred = credential.STSAssumeRoleCredential(
|
|
5527
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
5528
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
5529
|
+
)
|
|
5530
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5531
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5532
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5533
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
5534
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
5535
|
+
else:
|
|
5536
|
+
cred = credential.Credential(
|
|
5537
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
5538
|
+
)
|
|
5539
|
+
http_profile = HttpProfile(
|
|
5540
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
5541
|
+
reqMethod="POST",
|
|
5542
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
5543
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
5544
|
+
)
|
|
5545
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
5546
|
+
if g_param[OptionsDefine.Language]:
|
|
5547
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
5548
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
5549
|
+
client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
|
|
5550
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
5551
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
5552
|
+
model = models.BindDeviceAccountPrivateKeyRequest()
|
|
5553
|
+
model.from_json_string(json.dumps(args))
|
|
5554
|
+
start_time = time.time()
|
|
5555
|
+
while True:
|
|
5556
|
+
rsp = client.BindDeviceAccountPrivateKey(model)
|
|
5557
|
+
result = rsp.to_json_string()
|
|
5558
|
+
try:
|
|
5559
|
+
json_obj = json.loads(result)
|
|
5560
|
+
except TypeError as e:
|
|
5561
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
5562
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
5563
|
+
break
|
|
5564
|
+
cur_time = time.time()
|
|
5565
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
5566
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
5567
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
5568
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
5569
|
+
else:
|
|
5570
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
5571
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
5572
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
5573
|
+
|
|
5574
|
+
|
|
5575
|
+
CLIENT_MAP = {
|
|
5576
|
+
"v20230418": bh_client_v20230418,
|
|
5577
|
+
|
|
5578
|
+
}
|
|
5579
|
+
|
|
5580
|
+
MODELS_MAP = {
|
|
5581
|
+
"v20230418": models_v20230418,
|
|
5582
|
+
|
|
5583
|
+
}
|
|
5584
|
+
|
|
5585
|
+
ACTION_MAP = {
|
|
5586
|
+
"DeleteDeviceAccounts": doDeleteDeviceAccounts,
|
|
5587
|
+
"ResetUser": doResetUser,
|
|
5588
|
+
"DescribeOperationTask": doDescribeOperationTask,
|
|
5589
|
+
"DescribeDomains": doDescribeDomains,
|
|
5590
|
+
"ModifyUserDirectory": doModifyUserDirectory,
|
|
5591
|
+
"ImportExternalDevice": doImportExternalDevice,
|
|
5592
|
+
"DescribeUserDirectory": doDescribeUserDirectory,
|
|
5593
|
+
"DeleteUserGroupMembers": doDeleteUserGroupMembers,
|
|
5594
|
+
"CreateAssetSyncJob": doCreateAssetSyncJob,
|
|
5595
|
+
"CreateUserDirectory": doCreateUserDirectory,
|
|
5596
|
+
"SyncUserToIOA": doSyncUserToIOA,
|
|
5597
|
+
"SearchSubtaskResultById": doSearchSubtaskResultById,
|
|
5598
|
+
"ModifyAcl": doModifyAcl,
|
|
5599
|
+
"DeleteUsers": doDeleteUsers,
|
|
5600
|
+
"DescribeAssetSyncFlag": doDescribeAssetSyncFlag,
|
|
5601
|
+
"DescribeAccessWhiteListRules": doDescribeAccessWhiteListRules,
|
|
5602
|
+
"DescribeAssetSyncStatus": doDescribeAssetSyncStatus,
|
|
5603
|
+
"DescribeOperationEvent": doDescribeOperationEvent,
|
|
5604
|
+
"DescribeAccountGroups": doDescribeAccountGroups,
|
|
5605
|
+
"DeleteCmdTemplates": doDeleteCmdTemplates,
|
|
5606
|
+
"ModifyAccessWhiteListStatus": doModifyAccessWhiteListStatus,
|
|
5607
|
+
"DescribeChangePwdTask": doDescribeChangePwdTask,
|
|
5608
|
+
"SearchFile": doSearchFile,
|
|
5609
|
+
"CreateUserGroup": doCreateUserGroup,
|
|
5610
|
+
"CreateUser": doCreateUser,
|
|
5611
|
+
"SearchTaskResult": doSearchTaskResult,
|
|
5612
|
+
"DeleteAccessWhiteListRules": doDeleteAccessWhiteListRules,
|
|
5613
|
+
"CreateDeviceGroup": doCreateDeviceGroup,
|
|
5614
|
+
"CheckLDAPConnection": doCheckLDAPConnection,
|
|
5615
|
+
"DescribeUserGroups": doDescribeUserGroups,
|
|
5616
|
+
"DeployResource": doDeployResource,
|
|
5617
|
+
"ModifyDevice": doModifyDevice,
|
|
5618
|
+
"BindDeviceResource": doBindDeviceResource,
|
|
5619
|
+
"SearchSession": doSearchSession,
|
|
5620
|
+
"DescribeSecuritySetting": doDescribeSecuritySetting,
|
|
5621
|
+
"AccessDevices": doAccessDevices,
|
|
5622
|
+
"DescribeResources": doDescribeResources,
|
|
5623
|
+
"EnableExternalAccess": doEnableExternalAccess,
|
|
5624
|
+
"DisableExternalAccess": doDisableExternalAccess,
|
|
5625
|
+
"SearchCommandBySid": doSearchCommandBySid,
|
|
5626
|
+
"ModifyCmdTemplate": doModifyCmdTemplate,
|
|
5627
|
+
"CreateCmdTemplate": doCreateCmdTemplate,
|
|
5628
|
+
"ReplaySession": doReplaySession,
|
|
5629
|
+
"ResetDeviceAccountPrivateKey": doResetDeviceAccountPrivateKey,
|
|
5630
|
+
"SearchAuditLog": doSearchAuditLog,
|
|
5631
|
+
"ModifyAuthModeSetting": doModifyAuthModeSetting,
|
|
5632
|
+
"SearchSessionCommand": doSearchSessionCommand,
|
|
5633
|
+
"ModifyDeviceGroup": doModifyDeviceGroup,
|
|
5634
|
+
"ModifyOAuthSetting": doModifyOAuthSetting,
|
|
5635
|
+
"DescribeLoginEvent": doDescribeLoginEvent,
|
|
5636
|
+
"CreateOperationTask": doCreateOperationTask,
|
|
5637
|
+
"AddUserGroupMembers": doAddUserGroupMembers,
|
|
5638
|
+
"SetLDAPSyncFlag": doSetLDAPSyncFlag,
|
|
5639
|
+
"BindDeviceAccountPassword": doBindDeviceAccountPassword,
|
|
5640
|
+
"DescribeLDAPUnitSet": doDescribeLDAPUnitSet,
|
|
5641
|
+
"DeleteAcls": doDeleteAcls,
|
|
5642
|
+
"DeleteUserDirectory": doDeleteUserDirectory,
|
|
5643
|
+
"ModifyUserGroup": doModifyUserGroup,
|
|
5644
|
+
"DescribeSourceTypes": doDescribeSourceTypes,
|
|
5645
|
+
"CreateDeviceAccount": doCreateDeviceAccount,
|
|
5646
|
+
"DeleteChangePwdTask": doDeleteChangePwdTask,
|
|
5647
|
+
"ModifyOperationTask": doModifyOperationTask,
|
|
4190
5648
|
"DescribeDeviceAccounts": doDescribeDeviceAccounts,
|
|
4191
5649
|
"DeleteUserGroups": doDeleteUserGroups,
|
|
4192
5650
|
"RunOperationTask": doRunOperationTask,
|
|
5651
|
+
"EnableIntranetAccess": doEnableIntranetAccess,
|
|
5652
|
+
"CreateSyncUserTask": doCreateSyncUserTask,
|
|
5653
|
+
"CreateChangePwdTask": doCreateChangePwdTask,
|
|
5654
|
+
"SearchCommand": doSearchCommand,
|
|
5655
|
+
"DescribeUserGroupMembers": doDescribeUserGroupMembers,
|
|
5656
|
+
"UnlockUser": doUnlockUser,
|
|
5657
|
+
"SearchFileBySid": doSearchFileBySid,
|
|
5658
|
+
"ModifyAccessWhiteListAutoStatus": doModifyAccessWhiteListAutoStatus,
|
|
5659
|
+
"DescribeChangePwdTaskDetail": doDescribeChangePwdTaskDetail,
|
|
5660
|
+
"ModifyReconnectionSetting": doModifyReconnectionSetting,
|
|
5661
|
+
"DescribeDeviceGroupMembers": doDescribeDeviceGroupMembers,
|
|
5662
|
+
"DisableIntranetAccess": doDisableIntranetAccess,
|
|
5663
|
+
"ModifyAccessWhiteListRule": doModifyAccessWhiteListRule,
|
|
5664
|
+
"DeleteOperationTasks": doDeleteOperationTasks,
|
|
4193
5665
|
"DeleteDevices": doDeleteDevices,
|
|
5666
|
+
"DescribeUsers": doDescribeUsers,
|
|
5667
|
+
"SyncDevicesToIOA": doSyncDevicesToIOA,
|
|
5668
|
+
"ModifyChangePwdTask": doModifyChangePwdTask,
|
|
5669
|
+
"RunChangePwdTask": doRunChangePwdTask,
|
|
5670
|
+
"ResetDeviceAccountPassword": doResetDeviceAccountPassword,
|
|
5671
|
+
"DeleteDeviceGroups": doDeleteDeviceGroups,
|
|
5672
|
+
"CreateAcl": doCreateAcl,
|
|
5673
|
+
"DescribeUserSyncStatus": doDescribeUserSyncStatus,
|
|
5674
|
+
"CreateResource": doCreateResource,
|
|
5675
|
+
"CreateAccessWhiteListRule": doCreateAccessWhiteListRule,
|
|
5676
|
+
"DescribeAcls": doDescribeAcls,
|
|
5677
|
+
"ModifyLDAPSetting": doModifyLDAPSetting,
|
|
4194
5678
|
"ModifyResource": doModifyResource,
|
|
4195
|
-
"
|
|
5679
|
+
"ModifyAssetSyncFlag": doModifyAssetSyncFlag,
|
|
4196
5680
|
"ModifyUser": doModifyUser,
|
|
4197
5681
|
"DescribeCmdTemplates": doDescribeCmdTemplates,
|
|
4198
|
-
"
|
|
4199
|
-
"DescribeAssetSyncStatus": doDescribeAssetSyncStatus,
|
|
5682
|
+
"DeleteDeviceGroupMembers": doDeleteDeviceGroupMembers,
|
|
4200
5683
|
"DescribeDeviceGroups": doDescribeDeviceGroups,
|
|
4201
|
-
"DescribeUsers": doDescribeUsers,
|
|
4202
5684
|
"DescribeDevices": doDescribeDevices,
|
|
4203
|
-
"
|
|
4204
|
-
"SearchCommand": doSearchCommand,
|
|
4205
|
-
"ReplaySession": doReplaySession,
|
|
4206
|
-
"UnlockUser": doUnlockUser,
|
|
4207
|
-
"SearchFileBySid": doSearchFileBySid,
|
|
4208
|
-
"ImportExternalDevice": doImportExternalDevice,
|
|
4209
|
-
"DescribeChangePwdTask": doDescribeChangePwdTask,
|
|
4210
|
-
"SearchFile": doSearchFile,
|
|
4211
|
-
"CreateUserGroup": doCreateUserGroup,
|
|
4212
|
-
"ResetDeviceAccountPrivateKey": doResetDeviceAccountPrivateKey,
|
|
4213
|
-
"DescribeChangePwdTaskDetail": doDescribeChangePwdTaskDetail,
|
|
4214
|
-
"SearchTaskResult": doSearchTaskResult,
|
|
5685
|
+
"AddDeviceGroupMembers": doAddDeviceGroupMembers,
|
|
4215
5686
|
"BindDeviceAccountPrivateKey": doBindDeviceAccountPrivateKey,
|
|
4216
|
-
"SearchSubtaskResultById": doSearchSubtaskResultById,
|
|
4217
|
-
"SearchSessionCommand": doSearchSessionCommand,
|
|
4218
5687
|
|
|
4219
5688
|
}
|
|
4220
5689
|
|