tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -17,7 +17,7 @@ from tencentcloud.bh.v20230418 import models as models_v20230418
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
- def doModifyDeviceGroup(args, parsed_globals):
20
+ def doDeleteDeviceAccounts(args, parsed_globals):
21
21
  g_param = parse_global_arg(parsed_globals)
22
22
 
23
23
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -27,7 +27,10 @@ def doModifyDeviceGroup(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,18 +42,18 @@ def doModifyDeviceGroup(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
46
49
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
47
50
  client._sdkVersion += ("_CLI_" + __version__)
48
51
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
49
- model = models.ModifyDeviceGroupRequest()
52
+ model = models.DeleteDeviceAccountsRequest()
50
53
  model.from_json_string(json.dumps(args))
51
54
  start_time = time.time()
52
55
  while True:
53
- rsp = client.ModifyDeviceGroup(model)
56
+ rsp = client.DeleteDeviceAccounts(model)
54
57
  result = rsp.to_json_string()
55
58
  try:
56
59
  json_obj = json.loads(result)
@@ -69,7 +72,7 @@ def doModifyDeviceGroup(args, parsed_globals):
69
72
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
73
 
71
74
 
72
- def doDescribeDeviceGroupMembers(args, parsed_globals):
75
+ def doResetUser(args, parsed_globals):
73
76
  g_param = parse_global_arg(parsed_globals)
74
77
 
75
78
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -79,7 +82,10 @@ def doDescribeDeviceGroupMembers(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,18 +97,18 @@ def doDescribeDeviceGroupMembers(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
98
104
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
99
105
  client._sdkVersion += ("_CLI_" + __version__)
100
106
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.DescribeDeviceGroupMembersRequest()
107
+ model = models.ResetUserRequest()
102
108
  model.from_json_string(json.dumps(args))
103
109
  start_time = time.time()
104
110
  while True:
105
- rsp = client.DescribeDeviceGroupMembers(model)
111
+ rsp = client.ResetUser(model)
106
112
  result = rsp.to_json_string()
107
113
  try:
108
114
  json_obj = json.loads(result)
@@ -121,7 +127,7 @@ def doDescribeDeviceGroupMembers(args, parsed_globals):
121
127
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
122
128
 
123
129
 
124
- def doModifyOAuthSetting(args, parsed_globals):
130
+ def doDescribeOperationTask(args, parsed_globals):
125
131
  g_param = parse_global_arg(parsed_globals)
126
132
 
127
133
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -131,7 +137,10 @@ def doModifyOAuthSetting(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,18 +152,18 @@ def doModifyOAuthSetting(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
150
159
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
151
160
  client._sdkVersion += ("_CLI_" + __version__)
152
161
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
153
- model = models.ModifyOAuthSettingRequest()
162
+ model = models.DescribeOperationTaskRequest()
154
163
  model.from_json_string(json.dumps(args))
155
164
  start_time = time.time()
156
165
  while True:
157
- rsp = client.ModifyOAuthSetting(model)
166
+ rsp = client.DescribeOperationTask(model)
158
167
  result = rsp.to_json_string()
159
168
  try:
160
169
  json_obj = json.loads(result)
@@ -173,7 +182,7 @@ def doModifyOAuthSetting(args, parsed_globals):
173
182
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
183
 
175
184
 
176
- def doDeleteDeviceGroupMembers(args, parsed_globals):
185
+ def doDescribeDomains(args, parsed_globals):
177
186
  g_param = parse_global_arg(parsed_globals)
178
187
 
179
188
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -183,7 +192,10 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,18 +207,18 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
202
214
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
203
215
  client._sdkVersion += ("_CLI_" + __version__)
204
216
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
- model = models.DeleteDeviceGroupMembersRequest()
217
+ model = models.DescribeDomainsRequest()
206
218
  model.from_json_string(json.dumps(args))
207
219
  start_time = time.time()
208
220
  while True:
209
- rsp = client.DeleteDeviceGroupMembers(model)
221
+ rsp = client.DescribeDomains(model)
210
222
  result = rsp.to_json_string()
211
223
  try:
212
224
  json_obj = json.loads(result)
@@ -225,7 +237,7 @@ def doDeleteDeviceGroupMembers(args, parsed_globals):
225
237
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
238
 
227
239
 
228
- def doCreateAcl(args, parsed_globals):
240
+ def doModifyUserDirectory(args, parsed_globals):
229
241
  g_param = parse_global_arg(parsed_globals)
230
242
 
231
243
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -235,7 +247,10 @@ def doCreateAcl(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,18 +262,18 @@ def doCreateAcl(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
254
269
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
255
270
  client._sdkVersion += ("_CLI_" + __version__)
256
271
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.CreateAclRequest()
272
+ model = models.ModifyUserDirectoryRequest()
258
273
  model.from_json_string(json.dumps(args))
259
274
  start_time = time.time()
260
275
  while True:
261
- rsp = client.CreateAcl(model)
276
+ rsp = client.ModifyUserDirectory(model)
262
277
  result = rsp.to_json_string()
263
278
  try:
264
279
  json_obj = json.loads(result)
@@ -277,7 +292,7 @@ def doCreateAcl(args, parsed_globals):
277
292
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
278
293
 
279
294
 
280
- def doDeleteUserGroupMembers(args, parsed_globals):
295
+ def doImportExternalDevice(args, parsed_globals):
281
296
  g_param = parse_global_arg(parsed_globals)
282
297
 
283
298
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -287,7 +302,10 @@ def doDeleteUserGroupMembers(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,18 +317,18 @@ def doDeleteUserGroupMembers(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
306
324
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
307
325
  client._sdkVersion += ("_CLI_" + __version__)
308
326
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.DeleteUserGroupMembersRequest()
327
+ model = models.ImportExternalDeviceRequest()
310
328
  model.from_json_string(json.dumps(args))
311
329
  start_time = time.time()
312
330
  while True:
313
- rsp = client.DeleteUserGroupMembers(model)
331
+ rsp = client.ImportExternalDevice(model)
314
332
  result = rsp.to_json_string()
315
333
  try:
316
334
  json_obj = json.loads(result)
@@ -329,7 +347,7 @@ def doDeleteUserGroupMembers(args, parsed_globals):
329
347
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
348
 
331
349
 
332
- def doCreateDeviceGroup(args, parsed_globals):
350
+ def doDescribeUserDirectory(args, parsed_globals):
333
351
  g_param = parse_global_arg(parsed_globals)
334
352
 
335
353
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -339,7 +357,10 @@ def doCreateDeviceGroup(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,18 +372,18 @@ def doCreateDeviceGroup(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
379
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
359
380
  client._sdkVersion += ("_CLI_" + __version__)
360
381
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.CreateDeviceGroupRequest()
382
+ model = models.DescribeUserDirectoryRequest()
362
383
  model.from_json_string(json.dumps(args))
363
384
  start_time = time.time()
364
385
  while True:
365
- rsp = client.CreateDeviceGroup(model)
386
+ rsp = client.DescribeUserDirectory(model)
366
387
  result = rsp.to_json_string()
367
388
  try:
368
389
  json_obj = json.loads(result)
@@ -381,7 +402,7 @@ def doCreateDeviceGroup(args, parsed_globals):
381
402
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
403
 
383
404
 
384
- def doDeleteDeviceAccounts(args, parsed_globals):
405
+ def doDeleteUserGroupMembers(args, parsed_globals):
385
406
  g_param = parse_global_arg(parsed_globals)
386
407
 
387
408
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -391,7 +412,10 @@ def doDeleteDeviceAccounts(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,18 +427,18 @@ def doDeleteDeviceAccounts(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
434
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
411
435
  client._sdkVersion += ("_CLI_" + __version__)
412
436
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.DeleteDeviceAccountsRequest()
437
+ model = models.DeleteUserGroupMembersRequest()
414
438
  model.from_json_string(json.dumps(args))
415
439
  start_time = time.time()
416
440
  while True:
417
- rsp = client.DeleteDeviceAccounts(model)
441
+ rsp = client.DeleteUserGroupMembers(model)
418
442
  result = rsp.to_json_string()
419
443
  try:
420
444
  json_obj = json.loads(result)
@@ -433,7 +457,7 @@ def doDeleteDeviceAccounts(args, parsed_globals):
433
457
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
458
 
435
459
 
436
- def doCheckLDAPConnection(args, parsed_globals):
460
+ def doCreateAssetSyncJob(args, parsed_globals):
437
461
  g_param = parse_global_arg(parsed_globals)
438
462
 
439
463
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -443,7 +467,10 @@ def doCheckLDAPConnection(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,18 +482,18 @@ def doCheckLDAPConnection(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
462
489
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
463
490
  client._sdkVersion += ("_CLI_" + __version__)
464
491
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.CheckLDAPConnectionRequest()
492
+ model = models.CreateAssetSyncJobRequest()
466
493
  model.from_json_string(json.dumps(args))
467
494
  start_time = time.time()
468
495
  while True:
469
- rsp = client.CheckLDAPConnection(model)
496
+ rsp = client.CreateAssetSyncJob(model)
470
497
  result = rsp.to_json_string()
471
498
  try:
472
499
  json_obj = json.loads(result)
@@ -485,7 +512,7 @@ def doCheckLDAPConnection(args, parsed_globals):
485
512
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
513
 
487
514
 
488
- def doResetUser(args, parsed_globals):
515
+ def doCreateUserDirectory(args, parsed_globals):
489
516
  g_param = parse_global_arg(parsed_globals)
490
517
 
491
518
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -495,7 +522,10 @@ def doResetUser(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,18 +537,18 @@ def doResetUser(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
514
544
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
515
545
  client._sdkVersion += ("_CLI_" + __version__)
516
546
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.ResetUserRequest()
547
+ model = models.CreateUserDirectoryRequest()
518
548
  model.from_json_string(json.dumps(args))
519
549
  start_time = time.time()
520
550
  while True:
521
- rsp = client.ResetUser(model)
551
+ rsp = client.CreateUserDirectory(model)
522
552
  result = rsp.to_json_string()
523
553
  try:
524
554
  json_obj = json.loads(result)
@@ -537,7 +567,7 @@ def doResetUser(args, parsed_globals):
537
567
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
568
 
539
569
 
540
- def doCreateOperationTask(args, parsed_globals):
570
+ def doSyncUserToIOA(args, parsed_globals):
541
571
  g_param = parse_global_arg(parsed_globals)
542
572
 
543
573
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -547,7 +577,10 @@ def doCreateOperationTask(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,18 +592,18 @@ def doCreateOperationTask(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
566
599
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
567
600
  client._sdkVersion += ("_CLI_" + __version__)
568
601
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.CreateOperationTaskRequest()
602
+ model = models.SyncUserToIOARequest()
570
603
  model.from_json_string(json.dumps(args))
571
604
  start_time = time.time()
572
605
  while True:
573
- rsp = client.CreateOperationTask(model)
606
+ rsp = client.SyncUserToIOA(model)
574
607
  result = rsp.to_json_string()
575
608
  try:
576
609
  json_obj = json.loads(result)
@@ -589,7 +622,7 @@ def doCreateOperationTask(args, parsed_globals):
589
622
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
623
 
591
624
 
592
- def doCreateChangePwdTask(args, parsed_globals):
625
+ def doSearchSubtaskResultById(args, parsed_globals):
593
626
  g_param = parse_global_arg(parsed_globals)
594
627
 
595
628
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -599,7 +632,10 @@ def doCreateChangePwdTask(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,18 +647,18 @@ def doCreateChangePwdTask(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
618
654
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
619
655
  client._sdkVersion += ("_CLI_" + __version__)
620
656
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.CreateChangePwdTaskRequest()
657
+ model = models.SearchSubtaskResultByIdRequest()
622
658
  model.from_json_string(json.dumps(args))
623
659
  start_time = time.time()
624
660
  while True:
625
- rsp = client.CreateChangePwdTask(model)
661
+ rsp = client.SearchSubtaskResultById(model)
626
662
  result = rsp.to_json_string()
627
663
  try:
628
664
  json_obj = json.loads(result)
@@ -641,7 +677,7 @@ def doCreateChangePwdTask(args, parsed_globals):
641
677
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
678
 
643
679
 
644
- def doSetLDAPSyncFlag(args, parsed_globals):
680
+ def doModifyAcl(args, parsed_globals):
645
681
  g_param = parse_global_arg(parsed_globals)
646
682
 
647
683
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -651,7 +687,10 @@ def doSetLDAPSyncFlag(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,18 +702,18 @@ def doSetLDAPSyncFlag(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
670
709
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
671
710
  client._sdkVersion += ("_CLI_" + __version__)
672
711
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.SetLDAPSyncFlagRequest()
712
+ model = models.ModifyAclRequest()
674
713
  model.from_json_string(json.dumps(args))
675
714
  start_time = time.time()
676
715
  while True:
677
- rsp = client.SetLDAPSyncFlag(model)
716
+ rsp = client.ModifyAcl(model)
678
717
  result = rsp.to_json_string()
679
718
  try:
680
719
  json_obj = json.loads(result)
@@ -693,7 +732,7 @@ def doSetLDAPSyncFlag(args, parsed_globals):
693
732
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
733
 
695
734
 
696
- def doDescribeUserGroups(args, parsed_globals):
735
+ def doDeleteUsers(args, parsed_globals):
697
736
  g_param = parse_global_arg(parsed_globals)
698
737
 
699
738
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -703,7 +742,10 @@ def doDescribeUserGroups(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,18 +757,18 @@ def doDescribeUserGroups(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
722
764
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
723
765
  client._sdkVersion += ("_CLI_" + __version__)
724
766
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.DescribeUserGroupsRequest()
767
+ model = models.DeleteUsersRequest()
726
768
  model.from_json_string(json.dumps(args))
727
769
  start_time = time.time()
728
770
  while True:
729
- rsp = client.DescribeUserGroups(model)
771
+ rsp = client.DeleteUsers(model)
730
772
  result = rsp.to_json_string()
731
773
  try:
732
774
  json_obj = json.loads(result)
@@ -745,7 +787,7 @@ def doDescribeUserGroups(args, parsed_globals):
745
787
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
788
 
747
789
 
748
- def doDescribeDomains(args, parsed_globals):
790
+ def doDescribeAssetSyncFlag(args, parsed_globals):
749
791
  g_param = parse_global_arg(parsed_globals)
750
792
 
751
793
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -755,7 +797,10 @@ def doDescribeDomains(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,18 +812,18 @@ def doDescribeDomains(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
774
819
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
775
820
  client._sdkVersion += ("_CLI_" + __version__)
776
821
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.DescribeDomainsRequest()
822
+ model = models.DescribeAssetSyncFlagRequest()
778
823
  model.from_json_string(json.dumps(args))
779
824
  start_time = time.time()
780
825
  while True:
781
- rsp = client.DescribeDomains(model)
826
+ rsp = client.DescribeAssetSyncFlag(model)
782
827
  result = rsp.to_json_string()
783
828
  try:
784
829
  json_obj = json.loads(result)
@@ -797,7 +842,7 @@ def doDescribeDomains(args, parsed_globals):
797
842
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
843
 
799
844
 
800
- def doDeployResource(args, parsed_globals):
845
+ def doDescribeAccessWhiteListRules(args, parsed_globals):
801
846
  g_param = parse_global_arg(parsed_globals)
802
847
 
803
848
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -807,7 +852,10 @@ def doDeployResource(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,18 +867,18 @@ def doDeployResource(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
826
874
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
827
875
  client._sdkVersion += ("_CLI_" + __version__)
828
876
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.DeployResourceRequest()
877
+ model = models.DescribeAccessWhiteListRulesRequest()
830
878
  model.from_json_string(json.dumps(args))
831
879
  start_time = time.time()
832
880
  while True:
833
- rsp = client.DeployResource(model)
881
+ rsp = client.DescribeAccessWhiteListRules(model)
834
882
  result = rsp.to_json_string()
835
883
  try:
836
884
  json_obj = json.loads(result)
@@ -849,7 +897,7 @@ def doDeployResource(args, parsed_globals):
849
897
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
898
 
851
899
 
852
- def doModifyDevice(args, parsed_globals):
900
+ def doDescribeAssetSyncStatus(args, parsed_globals):
853
901
  g_param = parse_global_arg(parsed_globals)
854
902
 
855
903
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -859,7 +907,10 @@ def doModifyDevice(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,18 +922,18 @@ def doModifyDevice(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
878
929
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
879
930
  client._sdkVersion += ("_CLI_" + __version__)
880
931
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.ModifyDeviceRequest()
932
+ model = models.DescribeAssetSyncStatusRequest()
882
933
  model.from_json_string(json.dumps(args))
883
934
  start_time = time.time()
884
935
  while True:
885
- rsp = client.ModifyDevice(model)
936
+ rsp = client.DescribeAssetSyncStatus(model)
886
937
  result = rsp.to_json_string()
887
938
  try:
888
939
  json_obj = json.loads(result)
@@ -901,7 +952,7 @@ def doModifyDevice(args, parsed_globals):
901
952
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
953
 
903
954
 
904
- def doBindDeviceResource(args, parsed_globals):
955
+ def doDescribeOperationEvent(args, parsed_globals):
905
956
  g_param = parse_global_arg(parsed_globals)
906
957
 
907
958
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -911,7 +962,10 @@ def doBindDeviceResource(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,18 +977,18 @@ def doBindDeviceResource(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
930
984
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
931
985
  client._sdkVersion += ("_CLI_" + __version__)
932
986
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.BindDeviceResourceRequest()
987
+ model = models.DescribeOperationEventRequest()
934
988
  model.from_json_string(json.dumps(args))
935
989
  start_time = time.time()
936
990
  while True:
937
- rsp = client.BindDeviceResource(model)
991
+ rsp = client.DescribeOperationEvent(model)
938
992
  result = rsp.to_json_string()
939
993
  try:
940
994
  json_obj = json.loads(result)
@@ -953,7 +1007,7 @@ def doBindDeviceResource(args, parsed_globals):
953
1007
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
1008
 
955
1009
 
956
- def doBindDeviceAccountPassword(args, parsed_globals):
1010
+ def doDescribeAccountGroups(args, parsed_globals):
957
1011
  g_param = parse_global_arg(parsed_globals)
958
1012
 
959
1013
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -963,7 +1017,10 @@ def doBindDeviceAccountPassword(args, parsed_globals):
963
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1019
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1025
  else:
969
1026
  cred = credential.Credential(
@@ -975,18 +1032,18 @@ def doBindDeviceAccountPassword(args, parsed_globals):
975
1032
  endpoint=g_param[OptionsDefine.Endpoint],
976
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1034
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1036
  if g_param[OptionsDefine.Language]:
980
1037
  profile.language = g_param[OptionsDefine.Language]
981
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
982
1039
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
983
1040
  client._sdkVersion += ("_CLI_" + __version__)
984
1041
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
985
- model = models.BindDeviceAccountPasswordRequest()
1042
+ model = models.DescribeAccountGroupsRequest()
986
1043
  model.from_json_string(json.dumps(args))
987
1044
  start_time = time.time()
988
1045
  while True:
989
- rsp = client.BindDeviceAccountPassword(model)
1046
+ rsp = client.DescribeAccountGroups(model)
990
1047
  result = rsp.to_json_string()
991
1048
  try:
992
1049
  json_obj = json.loads(result)
@@ -1005,7 +1062,7 @@ def doBindDeviceAccountPassword(args, parsed_globals):
1005
1062
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1063
 
1007
1064
 
1008
- def doDescribeLDAPUnitSet(args, parsed_globals):
1065
+ def doDeleteCmdTemplates(args, parsed_globals):
1009
1066
  g_param = parse_global_arg(parsed_globals)
1010
1067
 
1011
1068
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1015,7 +1072,10 @@ def doDescribeLDAPUnitSet(args, parsed_globals):
1015
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1074
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1080
  else:
1021
1081
  cred = credential.Credential(
@@ -1027,18 +1087,18 @@ def doDescribeLDAPUnitSet(args, parsed_globals):
1027
1087
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1089
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1091
  if g_param[OptionsDefine.Language]:
1032
1092
  profile.language = g_param[OptionsDefine.Language]
1033
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1034
1094
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1035
1095
  client._sdkVersion += ("_CLI_" + __version__)
1036
1096
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.DescribeLDAPUnitSetRequest()
1097
+ model = models.DeleteCmdTemplatesRequest()
1038
1098
  model.from_json_string(json.dumps(args))
1039
1099
  start_time = time.time()
1040
1100
  while True:
1041
- rsp = client.DescribeLDAPUnitSet(model)
1101
+ rsp = client.DeleteCmdTemplates(model)
1042
1102
  result = rsp.to_json_string()
1043
1103
  try:
1044
1104
  json_obj = json.loads(result)
@@ -1057,7 +1117,7 @@ def doDescribeLDAPUnitSet(args, parsed_globals):
1057
1117
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1118
 
1059
1119
 
1060
- def doCreateCmdTemplate(args, parsed_globals):
1120
+ def doModifyAccessWhiteListStatus(args, parsed_globals):
1061
1121
  g_param = parse_global_arg(parsed_globals)
1062
1122
 
1063
1123
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1067,7 +1127,10 @@ def doCreateCmdTemplate(args, parsed_globals):
1067
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1129
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1135
  else:
1073
1136
  cred = credential.Credential(
@@ -1079,18 +1142,18 @@ def doCreateCmdTemplate(args, parsed_globals):
1079
1142
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1144
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1146
  if g_param[OptionsDefine.Language]:
1084
1147
  profile.language = g_param[OptionsDefine.Language]
1085
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
1149
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1087
1150
  client._sdkVersion += ("_CLI_" + __version__)
1088
1151
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.CreateCmdTemplateRequest()
1152
+ model = models.ModifyAccessWhiteListStatusRequest()
1090
1153
  model.from_json_string(json.dumps(args))
1091
1154
  start_time = time.time()
1092
1155
  while True:
1093
- rsp = client.CreateCmdTemplate(model)
1156
+ rsp = client.ModifyAccessWhiteListStatus(model)
1094
1157
  result = rsp.to_json_string()
1095
1158
  try:
1096
1159
  json_obj = json.loads(result)
@@ -1109,7 +1172,7 @@ def doCreateCmdTemplate(args, parsed_globals):
1109
1172
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
1173
 
1111
1174
 
1112
- def doSearchSession(args, parsed_globals):
1175
+ def doDescribeChangePwdTask(args, parsed_globals):
1113
1176
  g_param = parse_global_arg(parsed_globals)
1114
1177
 
1115
1178
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1119,7 +1182,10 @@ def doSearchSession(args, parsed_globals):
1119
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1184
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1190
  else:
1125
1191
  cred = credential.Credential(
@@ -1131,18 +1197,18 @@ def doSearchSession(args, parsed_globals):
1131
1197
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1199
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1201
  if g_param[OptionsDefine.Language]:
1136
1202
  profile.language = g_param[OptionsDefine.Language]
1137
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1138
1204
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1139
1205
  client._sdkVersion += ("_CLI_" + __version__)
1140
1206
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1141
- model = models.SearchSessionRequest()
1207
+ model = models.DescribeChangePwdTaskRequest()
1142
1208
  model.from_json_string(json.dumps(args))
1143
1209
  start_time = time.time()
1144
1210
  while True:
1145
- rsp = client.SearchSession(model)
1211
+ rsp = client.DescribeChangePwdTask(model)
1146
1212
  result = rsp.to_json_string()
1147
1213
  try:
1148
1214
  json_obj = json.loads(result)
@@ -1161,7 +1227,7 @@ def doSearchSession(args, parsed_globals):
1161
1227
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
1228
 
1163
1229
 
1164
- def doDeleteAcls(args, parsed_globals):
1230
+ def doSearchFile(args, parsed_globals):
1165
1231
  g_param = parse_global_arg(parsed_globals)
1166
1232
 
1167
1233
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1171,7 +1237,10 @@ def doDeleteAcls(args, parsed_globals):
1171
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1239
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1245
  else:
1177
1246
  cred = credential.Credential(
@@ -1183,18 +1252,18 @@ def doDeleteAcls(args, parsed_globals):
1183
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1254
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1256
  if g_param[OptionsDefine.Language]:
1188
1257
  profile.language = g_param[OptionsDefine.Language]
1189
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1190
1259
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1191
1260
  client._sdkVersion += ("_CLI_" + __version__)
1192
1261
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1193
- model = models.DeleteAclsRequest()
1262
+ model = models.SearchFileRequest()
1194
1263
  model.from_json_string(json.dumps(args))
1195
1264
  start_time = time.time()
1196
1265
  while True:
1197
- rsp = client.DeleteAcls(model)
1266
+ rsp = client.SearchFile(model)
1198
1267
  result = rsp.to_json_string()
1199
1268
  try:
1200
1269
  json_obj = json.loads(result)
@@ -1213,7 +1282,7 @@ def doDeleteAcls(args, parsed_globals):
1213
1282
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
1283
 
1215
1284
 
1216
- def doAccessDevices(args, parsed_globals):
1285
+ def doCreateUserGroup(args, parsed_globals):
1217
1286
  g_param = parse_global_arg(parsed_globals)
1218
1287
 
1219
1288
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1223,7 +1292,10 @@ def doAccessDevices(args, parsed_globals):
1223
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1294
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1300
  else:
1229
1301
  cred = credential.Credential(
@@ -1235,18 +1307,18 @@ def doAccessDevices(args, parsed_globals):
1235
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1309
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1311
  if g_param[OptionsDefine.Language]:
1240
1312
  profile.language = g_param[OptionsDefine.Language]
1241
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1242
1314
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1243
1315
  client._sdkVersion += ("_CLI_" + __version__)
1244
1316
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1245
- model = models.AccessDevicesRequest()
1317
+ model = models.CreateUserGroupRequest()
1246
1318
  model.from_json_string(json.dumps(args))
1247
1319
  start_time = time.time()
1248
1320
  while True:
1249
- rsp = client.AccessDevices(model)
1321
+ rsp = client.CreateUserGroup(model)
1250
1322
  result = rsp.to_json_string()
1251
1323
  try:
1252
1324
  json_obj = json.loads(result)
@@ -1265,7 +1337,7 @@ def doAccessDevices(args, parsed_globals):
1265
1337
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1338
 
1267
1339
 
1268
- def doDescribeResources(args, parsed_globals):
1340
+ def doCreateUser(args, parsed_globals):
1269
1341
  g_param = parse_global_arg(parsed_globals)
1270
1342
 
1271
1343
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1275,7 +1347,10 @@ def doDescribeResources(args, parsed_globals):
1275
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1349
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1355
  else:
1281
1356
  cred = credential.Credential(
@@ -1287,18 +1362,18 @@ def doDescribeResources(args, parsed_globals):
1287
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1364
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1366
  if g_param[OptionsDefine.Language]:
1292
1367
  profile.language = g_param[OptionsDefine.Language]
1293
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1294
1369
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1295
1370
  client._sdkVersion += ("_CLI_" + __version__)
1296
1371
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
- model = models.DescribeResourcesRequest()
1372
+ model = models.CreateUserRequest()
1298
1373
  model.from_json_string(json.dumps(args))
1299
1374
  start_time = time.time()
1300
1375
  while True:
1301
- rsp = client.DescribeResources(model)
1376
+ rsp = client.CreateUser(model)
1302
1377
  result = rsp.to_json_string()
1303
1378
  try:
1304
1379
  json_obj = json.loads(result)
@@ -1317,7 +1392,7 @@ def doDescribeResources(args, parsed_globals):
1317
1392
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1393
 
1319
1394
 
1320
- def doDescribeLoginEvent(args, parsed_globals):
1395
+ def doSearchTaskResult(args, parsed_globals):
1321
1396
  g_param = parse_global_arg(parsed_globals)
1322
1397
 
1323
1398
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1327,7 +1402,10 @@ def doDescribeLoginEvent(args, parsed_globals):
1327
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1404
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1410
  else:
1333
1411
  cred = credential.Credential(
@@ -1339,18 +1417,18 @@ def doDescribeLoginEvent(args, parsed_globals):
1339
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1419
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1421
  if g_param[OptionsDefine.Language]:
1344
1422
  profile.language = g_param[OptionsDefine.Language]
1345
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1346
1424
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1347
1425
  client._sdkVersion += ("_CLI_" + __version__)
1348
1426
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.DescribeLoginEventRequest()
1427
+ model = models.SearchTaskResultRequest()
1350
1428
  model.from_json_string(json.dumps(args))
1351
1429
  start_time = time.time()
1352
1430
  while True:
1353
- rsp = client.DescribeLoginEvent(model)
1431
+ rsp = client.SearchTaskResult(model)
1354
1432
  result = rsp.to_json_string()
1355
1433
  try:
1356
1434
  json_obj = json.loads(result)
@@ -1369,7 +1447,7 @@ def doDescribeLoginEvent(args, parsed_globals):
1369
1447
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
1448
 
1371
1449
 
1372
- def doModifyChangePwdTask(args, parsed_globals):
1450
+ def doDeleteAccessWhiteListRules(args, parsed_globals):
1373
1451
  g_param = parse_global_arg(parsed_globals)
1374
1452
 
1375
1453
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1379,7 +1457,10 @@ def doModifyChangePwdTask(args, parsed_globals):
1379
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1459
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1465
  else:
1385
1466
  cred = credential.Credential(
@@ -1391,18 +1472,18 @@ def doModifyChangePwdTask(args, parsed_globals):
1391
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1474
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1476
  if g_param[OptionsDefine.Language]:
1396
1477
  profile.language = g_param[OptionsDefine.Language]
1397
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1398
1479
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1399
1480
  client._sdkVersion += ("_CLI_" + __version__)
1400
1481
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.ModifyChangePwdTaskRequest()
1482
+ model = models.DeleteAccessWhiteListRulesRequest()
1402
1483
  model.from_json_string(json.dumps(args))
1403
1484
  start_time = time.time()
1404
1485
  while True:
1405
- rsp = client.ModifyChangePwdTask(model)
1486
+ rsp = client.DeleteAccessWhiteListRules(model)
1406
1487
  result = rsp.to_json_string()
1407
1488
  try:
1408
1489
  json_obj = json.loads(result)
@@ -1421,7 +1502,7 @@ def doModifyChangePwdTask(args, parsed_globals):
1421
1502
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
1503
 
1423
1504
 
1424
- def doCreateAssetSyncJob(args, parsed_globals):
1505
+ def doCreateDeviceGroup(args, parsed_globals):
1425
1506
  g_param = parse_global_arg(parsed_globals)
1426
1507
 
1427
1508
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1431,7 +1512,10 @@ def doCreateAssetSyncJob(args, parsed_globals):
1431
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1514
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1520
  else:
1437
1521
  cred = credential.Credential(
@@ -1443,18 +1527,18 @@ def doCreateAssetSyncJob(args, parsed_globals):
1443
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1529
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1531
  if g_param[OptionsDefine.Language]:
1448
1532
  profile.language = g_param[OptionsDefine.Language]
1449
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1450
1534
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1451
1535
  client._sdkVersion += ("_CLI_" + __version__)
1452
1536
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.CreateAssetSyncJobRequest()
1537
+ model = models.CreateDeviceGroupRequest()
1454
1538
  model.from_json_string(json.dumps(args))
1455
1539
  start_time = time.time()
1456
1540
  while True:
1457
- rsp = client.CreateAssetSyncJob(model)
1541
+ rsp = client.CreateDeviceGroup(model)
1458
1542
  result = rsp.to_json_string()
1459
1543
  try:
1460
1544
  json_obj = json.loads(result)
@@ -1473,7 +1557,7 @@ def doCreateAssetSyncJob(args, parsed_globals):
1473
1557
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1474
1558
 
1475
1559
 
1476
- def doCreateDeviceAccount(args, parsed_globals):
1560
+ def doCheckLDAPConnection(args, parsed_globals):
1477
1561
  g_param = parse_global_arg(parsed_globals)
1478
1562
 
1479
1563
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1483,7 +1567,10 @@ def doCreateDeviceAccount(args, parsed_globals):
1483
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1569
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1575
  else:
1489
1576
  cred = credential.Credential(
@@ -1495,18 +1582,18 @@ def doCreateDeviceAccount(args, parsed_globals):
1495
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1584
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1586
  if g_param[OptionsDefine.Language]:
1500
1587
  profile.language = g_param[OptionsDefine.Language]
1501
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1502
1589
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1503
1590
  client._sdkVersion += ("_CLI_" + __version__)
1504
1591
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1505
- model = models.CreateDeviceAccountRequest()
1592
+ model = models.CheckLDAPConnectionRequest()
1506
1593
  model.from_json_string(json.dumps(args))
1507
1594
  start_time = time.time()
1508
1595
  while True:
1509
- rsp = client.CreateDeviceAccount(model)
1596
+ rsp = client.CheckLDAPConnection(model)
1510
1597
  result = rsp.to_json_string()
1511
1598
  try:
1512
1599
  json_obj = json.loads(result)
@@ -1525,7 +1612,7 @@ def doCreateDeviceAccount(args, parsed_globals):
1525
1612
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1526
1613
 
1527
1614
 
1528
- def doRunChangePwdTask(args, parsed_globals):
1615
+ def doDescribeUserGroups(args, parsed_globals):
1529
1616
  g_param = parse_global_arg(parsed_globals)
1530
1617
 
1531
1618
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1535,7 +1622,10 @@ def doRunChangePwdTask(args, parsed_globals):
1535
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1624
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1630
  else:
1541
1631
  cred = credential.Credential(
@@ -1547,18 +1637,18 @@ def doRunChangePwdTask(args, parsed_globals):
1547
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1639
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1641
  if g_param[OptionsDefine.Language]:
1552
1642
  profile.language = g_param[OptionsDefine.Language]
1553
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1554
1644
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1555
1645
  client._sdkVersion += ("_CLI_" + __version__)
1556
1646
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1557
- model = models.RunChangePwdTaskRequest()
1647
+ model = models.DescribeUserGroupsRequest()
1558
1648
  model.from_json_string(json.dumps(args))
1559
1649
  start_time = time.time()
1560
1650
  while True:
1561
- rsp = client.RunChangePwdTask(model)
1651
+ rsp = client.DescribeUserGroups(model)
1562
1652
  result = rsp.to_json_string()
1563
1653
  try:
1564
1654
  json_obj = json.loads(result)
@@ -1577,7 +1667,7 @@ def doRunChangePwdTask(args, parsed_globals):
1577
1667
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1578
1668
 
1579
1669
 
1580
- def doResetDeviceAccountPassword(args, parsed_globals):
1670
+ def doDeployResource(args, parsed_globals):
1581
1671
  g_param = parse_global_arg(parsed_globals)
1582
1672
 
1583
1673
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1587,7 +1677,10 @@ def doResetDeviceAccountPassword(args, parsed_globals):
1587
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1679
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1685
  else:
1593
1686
  cred = credential.Credential(
@@ -1599,18 +1692,18 @@ def doResetDeviceAccountPassword(args, parsed_globals):
1599
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1694
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1696
  if g_param[OptionsDefine.Language]:
1604
1697
  profile.language = g_param[OptionsDefine.Language]
1605
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1606
1699
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1607
1700
  client._sdkVersion += ("_CLI_" + __version__)
1608
1701
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1609
- model = models.ResetDeviceAccountPasswordRequest()
1702
+ model = models.DeployResourceRequest()
1610
1703
  model.from_json_string(json.dumps(args))
1611
1704
  start_time = time.time()
1612
1705
  while True:
1613
- rsp = client.ResetDeviceAccountPassword(model)
1706
+ rsp = client.DeployResource(model)
1614
1707
  result = rsp.to_json_string()
1615
1708
  try:
1616
1709
  json_obj = json.loads(result)
@@ -1629,7 +1722,7 @@ def doResetDeviceAccountPassword(args, parsed_globals):
1629
1722
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1630
1723
 
1631
1724
 
1632
- def doModifyUserGroup(args, parsed_globals):
1725
+ def doModifyDevice(args, parsed_globals):
1633
1726
  g_param = parse_global_arg(parsed_globals)
1634
1727
 
1635
1728
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1639,7 +1732,10 @@ def doModifyUserGroup(args, parsed_globals):
1639
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1734
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1740
  else:
1645
1741
  cred = credential.Credential(
@@ -1651,18 +1747,18 @@ def doModifyUserGroup(args, parsed_globals):
1651
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1749
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1751
  if g_param[OptionsDefine.Language]:
1656
1752
  profile.language = g_param[OptionsDefine.Language]
1657
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1658
1754
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1659
1755
  client._sdkVersion += ("_CLI_" + __version__)
1660
1756
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1661
- model = models.ModifyUserGroupRequest()
1757
+ model = models.ModifyDeviceRequest()
1662
1758
  model.from_json_string(json.dumps(args))
1663
1759
  start_time = time.time()
1664
1760
  while True:
1665
- rsp = client.ModifyUserGroup(model)
1761
+ rsp = client.ModifyDevice(model)
1666
1762
  result = rsp.to_json_string()
1667
1763
  try:
1668
1764
  json_obj = json.loads(result)
@@ -1681,7 +1777,7 @@ def doModifyUserGroup(args, parsed_globals):
1681
1777
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1682
1778
 
1683
1779
 
1684
- def doDeleteDeviceGroups(args, parsed_globals):
1780
+ def doBindDeviceResource(args, parsed_globals):
1685
1781
  g_param = parse_global_arg(parsed_globals)
1686
1782
 
1687
1783
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1691,7 +1787,10 @@ def doDeleteDeviceGroups(args, parsed_globals):
1691
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1789
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1795
  else:
1697
1796
  cred = credential.Credential(
@@ -1703,18 +1802,18 @@ def doDeleteDeviceGroups(args, parsed_globals):
1703
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1804
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1806
  if g_param[OptionsDefine.Language]:
1708
1807
  profile.language = g_param[OptionsDefine.Language]
1709
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1710
1809
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1711
1810
  client._sdkVersion += ("_CLI_" + __version__)
1712
1811
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1713
- model = models.DeleteDeviceGroupsRequest()
1812
+ model = models.BindDeviceResourceRequest()
1714
1813
  model.from_json_string(json.dumps(args))
1715
1814
  start_time = time.time()
1716
1815
  while True:
1717
- rsp = client.DeleteDeviceGroups(model)
1816
+ rsp = client.BindDeviceResource(model)
1718
1817
  result = rsp.to_json_string()
1719
1818
  try:
1720
1819
  json_obj = json.loads(result)
@@ -1733,7 +1832,7 @@ def doDeleteDeviceGroups(args, parsed_globals):
1733
1832
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1734
1833
 
1735
1834
 
1736
- def doCreateUser(args, parsed_globals):
1835
+ def doSearchSession(args, parsed_globals):
1737
1836
  g_param = parse_global_arg(parsed_globals)
1738
1837
 
1739
1838
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1743,7 +1842,10 @@ def doCreateUser(args, parsed_globals):
1743
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
1844
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
1850
  else:
1749
1851
  cred = credential.Credential(
@@ -1755,18 +1857,18 @@ def doCreateUser(args, parsed_globals):
1755
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1756
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
1859
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
1861
  if g_param[OptionsDefine.Language]:
1760
1862
  profile.language = g_param[OptionsDefine.Language]
1761
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1762
1864
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1763
1865
  client._sdkVersion += ("_CLI_" + __version__)
1764
1866
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1765
- model = models.CreateUserRequest()
1867
+ model = models.SearchSessionRequest()
1766
1868
  model.from_json_string(json.dumps(args))
1767
1869
  start_time = time.time()
1768
1870
  while True:
1769
- rsp = client.CreateUser(model)
1871
+ rsp = client.SearchSession(model)
1770
1872
  result = rsp.to_json_string()
1771
1873
  try:
1772
1874
  json_obj = json.loads(result)
@@ -1785,7 +1887,7 @@ def doCreateUser(args, parsed_globals):
1785
1887
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1786
1888
 
1787
1889
 
1788
- def doAddUserGroupMembers(args, parsed_globals):
1890
+ def doDescribeSecuritySetting(args, parsed_globals):
1789
1891
  g_param = parse_global_arg(parsed_globals)
1790
1892
 
1791
1893
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1795,7 +1897,10 @@ def doAddUserGroupMembers(args, parsed_globals):
1795
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
1899
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
1905
  else:
1801
1906
  cred = credential.Credential(
@@ -1807,18 +1912,18 @@ def doAddUserGroupMembers(args, parsed_globals):
1807
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1808
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
1914
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
1916
  if g_param[OptionsDefine.Language]:
1812
1917
  profile.language = g_param[OptionsDefine.Language]
1813
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1814
1919
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1815
1920
  client._sdkVersion += ("_CLI_" + __version__)
1816
1921
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1817
- model = models.AddUserGroupMembersRequest()
1922
+ model = models.DescribeSecuritySettingRequest()
1818
1923
  model.from_json_string(json.dumps(args))
1819
1924
  start_time = time.time()
1820
1925
  while True:
1821
- rsp = client.AddUserGroupMembers(model)
1926
+ rsp = client.DescribeSecuritySetting(model)
1822
1927
  result = rsp.to_json_string()
1823
1928
  try:
1824
1929
  json_obj = json.loads(result)
@@ -1837,7 +1942,7 @@ def doAddUserGroupMembers(args, parsed_globals):
1837
1942
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1838
1943
 
1839
1944
 
1840
- def doDeleteOperationTasks(args, parsed_globals):
1945
+ def doAccessDevices(args, parsed_globals):
1841
1946
  g_param = parse_global_arg(parsed_globals)
1842
1947
 
1843
1948
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1847,7 +1952,10 @@ def doDeleteOperationTasks(args, parsed_globals):
1847
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
1954
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
1960
  else:
1853
1961
  cred = credential.Credential(
@@ -1859,18 +1967,18 @@ def doDeleteOperationTasks(args, parsed_globals):
1859
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1860
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
1969
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
1971
  if g_param[OptionsDefine.Language]:
1864
1972
  profile.language = g_param[OptionsDefine.Language]
1865
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1866
1974
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1867
1975
  client._sdkVersion += ("_CLI_" + __version__)
1868
1976
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1869
- model = models.DeleteOperationTasksRequest()
1977
+ model = models.AccessDevicesRequest()
1870
1978
  model.from_json_string(json.dumps(args))
1871
1979
  start_time = time.time()
1872
1980
  while True:
1873
- rsp = client.DeleteOperationTasks(model)
1981
+ rsp = client.AccessDevices(model)
1874
1982
  result = rsp.to_json_string()
1875
1983
  try:
1876
1984
  json_obj = json.loads(result)
@@ -1889,7 +1997,7 @@ def doDeleteOperationTasks(args, parsed_globals):
1889
1997
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
1998
 
1891
1999
 
1892
- def doModifyAcl(args, parsed_globals):
2000
+ def doDescribeResources(args, parsed_globals):
1893
2001
  g_param = parse_global_arg(parsed_globals)
1894
2002
 
1895
2003
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1899,7 +2007,10 @@ def doModifyAcl(args, parsed_globals):
1899
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2009
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2015
  else:
1905
2016
  cred = credential.Credential(
@@ -1911,18 +2022,18 @@ def doModifyAcl(args, parsed_globals):
1911
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2024
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2026
  if g_param[OptionsDefine.Language]:
1916
2027
  profile.language = g_param[OptionsDefine.Language]
1917
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1918
2029
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1919
2030
  client._sdkVersion += ("_CLI_" + __version__)
1920
2031
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.ModifyAclRequest()
2032
+ model = models.DescribeResourcesRequest()
1922
2033
  model.from_json_string(json.dumps(args))
1923
2034
  start_time = time.time()
1924
2035
  while True:
1925
- rsp = client.ModifyAcl(model)
2036
+ rsp = client.DescribeResources(model)
1926
2037
  result = rsp.to_json_string()
1927
2038
  try:
1928
2039
  json_obj = json.loads(result)
@@ -1941,7 +2052,7 @@ def doModifyAcl(args, parsed_globals):
1941
2052
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
2053
 
1943
2054
 
1944
- def doDeleteUsers(args, parsed_globals):
2055
+ def doEnableExternalAccess(args, parsed_globals):
1945
2056
  g_param = parse_global_arg(parsed_globals)
1946
2057
 
1947
2058
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1951,7 +2062,10 @@ def doDeleteUsers(args, parsed_globals):
1951
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2064
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2070
  else:
1957
2071
  cred = credential.Credential(
@@ -1963,18 +2077,18 @@ def doDeleteUsers(args, parsed_globals):
1963
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2079
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2081
  if g_param[OptionsDefine.Language]:
1968
2082
  profile.language = g_param[OptionsDefine.Language]
1969
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1970
2084
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
1971
2085
  client._sdkVersion += ("_CLI_" + __version__)
1972
2086
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1973
- model = models.DeleteUsersRequest()
2087
+ model = models.EnableExternalAccessRequest()
1974
2088
  model.from_json_string(json.dumps(args))
1975
2089
  start_time = time.time()
1976
2090
  while True:
1977
- rsp = client.DeleteUsers(model)
2091
+ rsp = client.EnableExternalAccess(model)
1978
2092
  result = rsp.to_json_string()
1979
2093
  try:
1980
2094
  json_obj = json.loads(result)
@@ -1993,7 +2107,7 @@ def doDeleteUsers(args, parsed_globals):
1993
2107
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1994
2108
 
1995
2109
 
1996
- def doDeleteAccessWhiteListRules(args, parsed_globals):
2110
+ def doDisableExternalAccess(args, parsed_globals):
1997
2111
  g_param = parse_global_arg(parsed_globals)
1998
2112
 
1999
2113
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2003,7 +2117,10 @@ def doDeleteAccessWhiteListRules(args, parsed_globals):
2003
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2119
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2125
  else:
2009
2126
  cred = credential.Credential(
@@ -2015,18 +2132,18 @@ def doDeleteAccessWhiteListRules(args, parsed_globals):
2015
2132
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2134
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2136
  if g_param[OptionsDefine.Language]:
2020
2137
  profile.language = g_param[OptionsDefine.Language]
2021
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2022
2139
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2023
2140
  client._sdkVersion += ("_CLI_" + __version__)
2024
2141
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2025
- model = models.DeleteAccessWhiteListRulesRequest()
2142
+ model = models.DisableExternalAccessRequest()
2026
2143
  model.from_json_string(json.dumps(args))
2027
2144
  start_time = time.time()
2028
2145
  while True:
2029
- rsp = client.DeleteAccessWhiteListRules(model)
2146
+ rsp = client.DisableExternalAccess(model)
2030
2147
  result = rsp.to_json_string()
2031
2148
  try:
2032
2149
  json_obj = json.loads(result)
@@ -2055,7 +2172,10 @@ def doSearchCommandBySid(args, parsed_globals):
2055
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2174
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2180
  else:
2061
2181
  cred = credential.Credential(
@@ -2067,7 +2187,7 @@ def doSearchCommandBySid(args, parsed_globals):
2067
2187
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2189
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2191
  if g_param[OptionsDefine.Language]:
2072
2192
  profile.language = g_param[OptionsDefine.Language]
2073
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2097,7 +2217,7 @@ def doSearchCommandBySid(args, parsed_globals):
2097
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2098
2218
 
2099
2219
 
2100
- def doCreateResource(args, parsed_globals):
2220
+ def doModifyCmdTemplate(args, parsed_globals):
2101
2221
  g_param = parse_global_arg(parsed_globals)
2102
2222
 
2103
2223
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2107,7 +2227,10 @@ def doCreateResource(args, parsed_globals):
2107
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2229
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2235
  else:
2113
2236
  cred = credential.Credential(
@@ -2119,18 +2242,18 @@ def doCreateResource(args, parsed_globals):
2119
2242
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2244
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2246
  if g_param[OptionsDefine.Language]:
2124
2247
  profile.language = g_param[OptionsDefine.Language]
2125
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2126
2249
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2127
2250
  client._sdkVersion += ("_CLI_" + __version__)
2128
2251
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2129
- model = models.CreateResourceRequest()
2252
+ model = models.ModifyCmdTemplateRequest()
2130
2253
  model.from_json_string(json.dumps(args))
2131
2254
  start_time = time.time()
2132
2255
  while True:
2133
- rsp = client.CreateResource(model)
2256
+ rsp = client.ModifyCmdTemplate(model)
2134
2257
  result = rsp.to_json_string()
2135
2258
  try:
2136
2259
  json_obj = json.loads(result)
@@ -2149,7 +2272,7 @@ def doCreateResource(args, parsed_globals):
2149
2272
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2150
2273
 
2151
2274
 
2152
- def doCreateAccessWhiteListRule(args, parsed_globals):
2275
+ def doCreateCmdTemplate(args, parsed_globals):
2153
2276
  g_param = parse_global_arg(parsed_globals)
2154
2277
 
2155
2278
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2159,7 +2282,10 @@ def doCreateAccessWhiteListRule(args, parsed_globals):
2159
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2284
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2290
  else:
2165
2291
  cred = credential.Credential(
@@ -2171,18 +2297,18 @@ def doCreateAccessWhiteListRule(args, parsed_globals):
2171
2297
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2299
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2301
  if g_param[OptionsDefine.Language]:
2176
2302
  profile.language = g_param[OptionsDefine.Language]
2177
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2178
2304
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2179
2305
  client._sdkVersion += ("_CLI_" + __version__)
2180
2306
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2181
- model = models.CreateAccessWhiteListRuleRequest()
2307
+ model = models.CreateCmdTemplateRequest()
2182
2308
  model.from_json_string(json.dumps(args))
2183
2309
  start_time = time.time()
2184
2310
  while True:
2185
- rsp = client.CreateAccessWhiteListRule(model)
2311
+ rsp = client.CreateCmdTemplate(model)
2186
2312
  result = rsp.to_json_string()
2187
2313
  try:
2188
2314
  json_obj = json.loads(result)
@@ -2201,7 +2327,7 @@ def doCreateAccessWhiteListRule(args, parsed_globals):
2201
2327
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2202
2328
 
2203
2329
 
2204
- def doDescribeAcls(args, parsed_globals):
2330
+ def doReplaySession(args, parsed_globals):
2205
2331
  g_param = parse_global_arg(parsed_globals)
2206
2332
 
2207
2333
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2211,7 +2337,10 @@ def doDescribeAcls(args, parsed_globals):
2211
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2339
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2345
  else:
2217
2346
  cred = credential.Credential(
@@ -2223,18 +2352,18 @@ def doDescribeAcls(args, parsed_globals):
2223
2352
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2354
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2356
  if g_param[OptionsDefine.Language]:
2228
2357
  profile.language = g_param[OptionsDefine.Language]
2229
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2230
2359
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2231
2360
  client._sdkVersion += ("_CLI_" + __version__)
2232
2361
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2233
- model = models.DescribeAclsRequest()
2362
+ model = models.ReplaySessionRequest()
2234
2363
  model.from_json_string(json.dumps(args))
2235
2364
  start_time = time.time()
2236
2365
  while True:
2237
- rsp = client.DescribeAcls(model)
2366
+ rsp = client.ReplaySession(model)
2238
2367
  result = rsp.to_json_string()
2239
2368
  try:
2240
2369
  json_obj = json.loads(result)
@@ -2253,7 +2382,7 @@ def doDescribeAcls(args, parsed_globals):
2253
2382
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2254
2383
 
2255
2384
 
2256
- def doDescribeAccessWhiteListRules(args, parsed_globals):
2385
+ def doResetDeviceAccountPrivateKey(args, parsed_globals):
2257
2386
  g_param = parse_global_arg(parsed_globals)
2258
2387
 
2259
2388
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2263,7 +2392,10 @@ def doDescribeAccessWhiteListRules(args, parsed_globals):
2263
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2394
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
2400
  else:
2269
2401
  cred = credential.Credential(
@@ -2275,18 +2407,18 @@ def doDescribeAccessWhiteListRules(args, parsed_globals):
2275
2407
  endpoint=g_param[OptionsDefine.Endpoint],
2276
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
2409
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
2411
  if g_param[OptionsDefine.Language]:
2280
2412
  profile.language = g_param[OptionsDefine.Language]
2281
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2282
2414
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2283
2415
  client._sdkVersion += ("_CLI_" + __version__)
2284
2416
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2285
- model = models.DescribeAccessWhiteListRulesRequest()
2417
+ model = models.ResetDeviceAccountPrivateKeyRequest()
2286
2418
  model.from_json_string(json.dumps(args))
2287
2419
  start_time = time.time()
2288
2420
  while True:
2289
- rsp = client.DescribeAccessWhiteListRules(model)
2421
+ rsp = client.ResetDeviceAccountPrivateKey(model)
2290
2422
  result = rsp.to_json_string()
2291
2423
  try:
2292
2424
  json_obj = json.loads(result)
@@ -2315,7 +2447,10 @@ def doSearchAuditLog(args, parsed_globals):
2315
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
2449
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
2455
  else:
2321
2456
  cred = credential.Credential(
@@ -2327,7 +2462,7 @@ def doSearchAuditLog(args, parsed_globals):
2327
2462
  endpoint=g_param[OptionsDefine.Endpoint],
2328
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
2464
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
2466
  if g_param[OptionsDefine.Language]:
2332
2467
  profile.language = g_param[OptionsDefine.Language]
2333
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2357,7 +2492,7 @@ def doSearchAuditLog(args, parsed_globals):
2357
2492
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
2493
 
2359
2494
 
2360
- def doAddDeviceGroupMembers(args, parsed_globals):
2495
+ def doModifyAuthModeSetting(args, parsed_globals):
2361
2496
  g_param = parse_global_arg(parsed_globals)
2362
2497
 
2363
2498
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2367,7 +2502,10 @@ def doAddDeviceGroupMembers(args, parsed_globals):
2367
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2504
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2510
  else:
2373
2511
  cred = credential.Credential(
@@ -2379,18 +2517,18 @@ def doAddDeviceGroupMembers(args, parsed_globals):
2379
2517
  endpoint=g_param[OptionsDefine.Endpoint],
2380
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
2519
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
2521
  if g_param[OptionsDefine.Language]:
2384
2522
  profile.language = g_param[OptionsDefine.Language]
2385
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2386
2524
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2387
2525
  client._sdkVersion += ("_CLI_" + __version__)
2388
2526
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
- model = models.AddDeviceGroupMembersRequest()
2527
+ model = models.ModifyAuthModeSettingRequest()
2390
2528
  model.from_json_string(json.dumps(args))
2391
2529
  start_time = time.time()
2392
2530
  while True:
2393
- rsp = client.AddDeviceGroupMembers(model)
2531
+ rsp = client.ModifyAuthModeSetting(model)
2394
2532
  result = rsp.to_json_string()
2395
2533
  try:
2396
2534
  json_obj = json.loads(result)
@@ -2409,7 +2547,7 @@ def doAddDeviceGroupMembers(args, parsed_globals):
2409
2547
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
2548
 
2411
2549
 
2412
- def doModifyCmdTemplate(args, parsed_globals):
2550
+ def doSearchSessionCommand(args, parsed_globals):
2413
2551
  g_param = parse_global_arg(parsed_globals)
2414
2552
 
2415
2553
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2419,7 +2557,10 @@ def doModifyCmdTemplate(args, parsed_globals):
2419
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2559
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2565
  else:
2425
2566
  cred = credential.Credential(
@@ -2431,18 +2572,18 @@ def doModifyCmdTemplate(args, parsed_globals):
2431
2572
  endpoint=g_param[OptionsDefine.Endpoint],
2432
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
2574
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
2576
  if g_param[OptionsDefine.Language]:
2436
2577
  profile.language = g_param[OptionsDefine.Language]
2437
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2438
2579
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2439
2580
  client._sdkVersion += ("_CLI_" + __version__)
2440
2581
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2441
- model = models.ModifyCmdTemplateRequest()
2582
+ model = models.SearchSessionCommandRequest()
2442
2583
  model.from_json_string(json.dumps(args))
2443
2584
  start_time = time.time()
2444
2585
  while True:
2445
- rsp = client.ModifyCmdTemplate(model)
2586
+ rsp = client.SearchSessionCommand(model)
2446
2587
  result = rsp.to_json_string()
2447
2588
  try:
2448
2589
  json_obj = json.loads(result)
@@ -2461,7 +2602,7 @@ def doModifyCmdTemplate(args, parsed_globals):
2461
2602
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2462
2603
 
2463
2604
 
2464
- def doDeleteChangePwdTask(args, parsed_globals):
2605
+ def doModifyDeviceGroup(args, parsed_globals):
2465
2606
  g_param = parse_global_arg(parsed_globals)
2466
2607
 
2467
2608
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2471,7 +2612,10 @@ def doDeleteChangePwdTask(args, parsed_globals):
2471
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2614
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2620
  else:
2477
2621
  cred = credential.Credential(
@@ -2483,18 +2627,18 @@ def doDeleteChangePwdTask(args, parsed_globals):
2483
2627
  endpoint=g_param[OptionsDefine.Endpoint],
2484
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
2629
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
2631
  if g_param[OptionsDefine.Language]:
2488
2632
  profile.language = g_param[OptionsDefine.Language]
2489
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2490
2634
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2491
2635
  client._sdkVersion += ("_CLI_" + __version__)
2492
2636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2493
- model = models.DeleteChangePwdTaskRequest()
2637
+ model = models.ModifyDeviceGroupRequest()
2494
2638
  model.from_json_string(json.dumps(args))
2495
2639
  start_time = time.time()
2496
2640
  while True:
2497
- rsp = client.DeleteChangePwdTask(model)
2641
+ rsp = client.ModifyDeviceGroup(model)
2498
2642
  result = rsp.to_json_string()
2499
2643
  try:
2500
2644
  json_obj = json.loads(result)
@@ -2513,7 +2657,7 @@ def doDeleteChangePwdTask(args, parsed_globals):
2513
2657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2514
2658
 
2515
2659
 
2516
- def doDescribeOperationEvent(args, parsed_globals):
2660
+ def doModifyOAuthSetting(args, parsed_globals):
2517
2661
  g_param = parse_global_arg(parsed_globals)
2518
2662
 
2519
2663
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2523,7 +2667,10 @@ def doDescribeOperationEvent(args, parsed_globals):
2523
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2669
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2675
  else:
2529
2676
  cred = credential.Credential(
@@ -2535,18 +2682,18 @@ def doDescribeOperationEvent(args, parsed_globals):
2535
2682
  endpoint=g_param[OptionsDefine.Endpoint],
2536
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
2684
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
2686
  if g_param[OptionsDefine.Language]:
2540
2687
  profile.language = g_param[OptionsDefine.Language]
2541
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2542
2689
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2543
2690
  client._sdkVersion += ("_CLI_" + __version__)
2544
2691
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2545
- model = models.DescribeOperationEventRequest()
2692
+ model = models.ModifyOAuthSettingRequest()
2546
2693
  model.from_json_string(json.dumps(args))
2547
2694
  start_time = time.time()
2548
2695
  while True:
2549
- rsp = client.DescribeOperationEvent(model)
2696
+ rsp = client.ModifyOAuthSetting(model)
2550
2697
  result = rsp.to_json_string()
2551
2698
  try:
2552
2699
  json_obj = json.loads(result)
@@ -2565,7 +2712,7 @@ def doDescribeOperationEvent(args, parsed_globals):
2565
2712
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
2713
 
2567
2714
 
2568
- def doModifyOperationTask(args, parsed_globals):
2715
+ def doDescribeLoginEvent(args, parsed_globals):
2569
2716
  g_param = parse_global_arg(parsed_globals)
2570
2717
 
2571
2718
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2575,7 +2722,10 @@ def doModifyOperationTask(args, parsed_globals):
2575
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2724
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2730
  else:
2581
2731
  cred = credential.Credential(
@@ -2587,18 +2737,18 @@ def doModifyOperationTask(args, parsed_globals):
2587
2737
  endpoint=g_param[OptionsDefine.Endpoint],
2588
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
2739
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
2741
  if g_param[OptionsDefine.Language]:
2592
2742
  profile.language = g_param[OptionsDefine.Language]
2593
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2594
2744
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2595
2745
  client._sdkVersion += ("_CLI_" + __version__)
2596
2746
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2597
- model = models.ModifyOperationTaskRequest()
2747
+ model = models.DescribeLoginEventRequest()
2598
2748
  model.from_json_string(json.dumps(args))
2599
2749
  start_time = time.time()
2600
2750
  while True:
2601
- rsp = client.ModifyOperationTask(model)
2751
+ rsp = client.DescribeLoginEvent(model)
2602
2752
  result = rsp.to_json_string()
2603
2753
  try:
2604
2754
  json_obj = json.loads(result)
@@ -2617,7 +2767,7 @@ def doModifyOperationTask(args, parsed_globals):
2617
2767
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2618
2768
 
2619
2769
 
2620
- def doModifyLDAPSetting(args, parsed_globals):
2770
+ def doCreateOperationTask(args, parsed_globals):
2621
2771
  g_param = parse_global_arg(parsed_globals)
2622
2772
 
2623
2773
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2627,7 +2777,10 @@ def doModifyLDAPSetting(args, parsed_globals):
2627
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2779
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
2785
  else:
2633
2786
  cred = credential.Credential(
@@ -2639,18 +2792,18 @@ def doModifyLDAPSetting(args, parsed_globals):
2639
2792
  endpoint=g_param[OptionsDefine.Endpoint],
2640
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
2794
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
2796
  if g_param[OptionsDefine.Language]:
2644
2797
  profile.language = g_param[OptionsDefine.Language]
2645
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2646
2799
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2647
2800
  client._sdkVersion += ("_CLI_" + __version__)
2648
2801
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2649
- model = models.ModifyLDAPSettingRequest()
2802
+ model = models.CreateOperationTaskRequest()
2650
2803
  model.from_json_string(json.dumps(args))
2651
2804
  start_time = time.time()
2652
2805
  while True:
2653
- rsp = client.ModifyLDAPSetting(model)
2806
+ rsp = client.CreateOperationTask(model)
2654
2807
  result = rsp.to_json_string()
2655
2808
  try:
2656
2809
  json_obj = json.loads(result)
@@ -2669,7 +2822,7 @@ def doModifyLDAPSetting(args, parsed_globals):
2669
2822
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2670
2823
 
2671
2824
 
2672
- def doDescribeDeviceAccounts(args, parsed_globals):
2825
+ def doAddUserGroupMembers(args, parsed_globals):
2673
2826
  g_param = parse_global_arg(parsed_globals)
2674
2827
 
2675
2828
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2679,7 +2832,10 @@ def doDescribeDeviceAccounts(args, parsed_globals):
2679
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
2834
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
2840
  else:
2685
2841
  cred = credential.Credential(
@@ -2691,18 +2847,18 @@ def doDescribeDeviceAccounts(args, parsed_globals):
2691
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2692
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
2849
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
2851
  if g_param[OptionsDefine.Language]:
2696
2852
  profile.language = g_param[OptionsDefine.Language]
2697
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2698
2854
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2699
2855
  client._sdkVersion += ("_CLI_" + __version__)
2700
2856
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2701
- model = models.DescribeDeviceAccountsRequest()
2857
+ model = models.AddUserGroupMembersRequest()
2702
2858
  model.from_json_string(json.dumps(args))
2703
2859
  start_time = time.time()
2704
2860
  while True:
2705
- rsp = client.DescribeDeviceAccounts(model)
2861
+ rsp = client.AddUserGroupMembers(model)
2706
2862
  result = rsp.to_json_string()
2707
2863
  try:
2708
2864
  json_obj = json.loads(result)
@@ -2721,7 +2877,7 @@ def doDescribeDeviceAccounts(args, parsed_globals):
2721
2877
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2722
2878
 
2723
2879
 
2724
- def doDeleteUserGroups(args, parsed_globals):
2880
+ def doSetLDAPSyncFlag(args, parsed_globals):
2725
2881
  g_param = parse_global_arg(parsed_globals)
2726
2882
 
2727
2883
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2731,7 +2887,10 @@ def doDeleteUserGroups(args, parsed_globals):
2731
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
2889
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
2895
  else:
2737
2896
  cred = credential.Credential(
@@ -2743,18 +2902,18 @@ def doDeleteUserGroups(args, parsed_globals):
2743
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2744
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
2904
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
2906
  if g_param[OptionsDefine.Language]:
2748
2907
  profile.language = g_param[OptionsDefine.Language]
2749
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2750
2909
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2751
2910
  client._sdkVersion += ("_CLI_" + __version__)
2752
2911
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2753
- model = models.DeleteUserGroupsRequest()
2912
+ model = models.SetLDAPSyncFlagRequest()
2754
2913
  model.from_json_string(json.dumps(args))
2755
2914
  start_time = time.time()
2756
2915
  while True:
2757
- rsp = client.DeleteUserGroups(model)
2916
+ rsp = client.SetLDAPSyncFlag(model)
2758
2917
  result = rsp.to_json_string()
2759
2918
  try:
2760
2919
  json_obj = json.loads(result)
@@ -2773,7 +2932,7 @@ def doDeleteUserGroups(args, parsed_globals):
2773
2932
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2774
2933
 
2775
2934
 
2776
- def doRunOperationTask(args, parsed_globals):
2935
+ def doBindDeviceAccountPassword(args, parsed_globals):
2777
2936
  g_param = parse_global_arg(parsed_globals)
2778
2937
 
2779
2938
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2783,7 +2942,10 @@ def doRunOperationTask(args, parsed_globals):
2783
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
2944
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
2950
  else:
2789
2951
  cred = credential.Credential(
@@ -2795,18 +2957,18 @@ def doRunOperationTask(args, parsed_globals):
2795
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2796
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
2959
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
2961
  if g_param[OptionsDefine.Language]:
2800
2962
  profile.language = g_param[OptionsDefine.Language]
2801
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2802
2964
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2803
2965
  client._sdkVersion += ("_CLI_" + __version__)
2804
2966
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2805
- model = models.RunOperationTaskRequest()
2967
+ model = models.BindDeviceAccountPasswordRequest()
2806
2968
  model.from_json_string(json.dumps(args))
2807
2969
  start_time = time.time()
2808
2970
  while True:
2809
- rsp = client.RunOperationTask(model)
2971
+ rsp = client.BindDeviceAccountPassword(model)
2810
2972
  result = rsp.to_json_string()
2811
2973
  try:
2812
2974
  json_obj = json.loads(result)
@@ -2825,7 +2987,7 @@ def doRunOperationTask(args, parsed_globals):
2825
2987
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2826
2988
 
2827
2989
 
2828
- def doDeleteDevices(args, parsed_globals):
2990
+ def doDescribeLDAPUnitSet(args, parsed_globals):
2829
2991
  g_param = parse_global_arg(parsed_globals)
2830
2992
 
2831
2993
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2835,7 +2997,10 @@ def doDeleteDevices(args, parsed_globals):
2835
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
2999
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
3005
  else:
2841
3006
  cred = credential.Credential(
@@ -2847,18 +3012,18 @@ def doDeleteDevices(args, parsed_globals):
2847
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2848
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
3014
  )
2850
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
3016
  if g_param[OptionsDefine.Language]:
2852
3017
  profile.language = g_param[OptionsDefine.Language]
2853
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2854
3019
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2855
3020
  client._sdkVersion += ("_CLI_" + __version__)
2856
3021
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2857
- model = models.DeleteDevicesRequest()
3022
+ model = models.DescribeLDAPUnitSetRequest()
2858
3023
  model.from_json_string(json.dumps(args))
2859
3024
  start_time = time.time()
2860
3025
  while True:
2861
- rsp = client.DeleteDevices(model)
3026
+ rsp = client.DescribeLDAPUnitSet(model)
2862
3027
  result = rsp.to_json_string()
2863
3028
  try:
2864
3029
  json_obj = json.loads(result)
@@ -2877,7 +3042,7 @@ def doDeleteDevices(args, parsed_globals):
2877
3042
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2878
3043
 
2879
3044
 
2880
- def doModifyResource(args, parsed_globals):
3045
+ def doDeleteAcls(args, parsed_globals):
2881
3046
  g_param = parse_global_arg(parsed_globals)
2882
3047
 
2883
3048
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2887,7 +3052,10 @@ def doModifyResource(args, parsed_globals):
2887
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
3054
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
3060
  else:
2893
3061
  cred = credential.Credential(
@@ -2899,18 +3067,18 @@ def doModifyResource(args, parsed_globals):
2899
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2900
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2901
3069
  )
2902
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2903
3071
  if g_param[OptionsDefine.Language]:
2904
3072
  profile.language = g_param[OptionsDefine.Language]
2905
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2906
3074
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2907
3075
  client._sdkVersion += ("_CLI_" + __version__)
2908
3076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2909
- model = models.ModifyResourceRequest()
3077
+ model = models.DeleteAclsRequest()
2910
3078
  model.from_json_string(json.dumps(args))
2911
3079
  start_time = time.time()
2912
3080
  while True:
2913
- rsp = client.ModifyResource(model)
3081
+ rsp = client.DeleteAcls(model)
2914
3082
  result = rsp.to_json_string()
2915
3083
  try:
2916
3084
  json_obj = json.loads(result)
@@ -2929,7 +3097,7 @@ def doModifyResource(args, parsed_globals):
2929
3097
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2930
3098
 
2931
3099
 
2932
- def doDescribeOperationTask(args, parsed_globals):
3100
+ def doDeleteUserDirectory(args, parsed_globals):
2933
3101
  g_param = parse_global_arg(parsed_globals)
2934
3102
 
2935
3103
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2939,7 +3107,10 @@ def doDescribeOperationTask(args, parsed_globals):
2939
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
3109
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
3115
  else:
2945
3116
  cred = credential.Credential(
@@ -2951,18 +3122,18 @@ def doDescribeOperationTask(args, parsed_globals):
2951
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2952
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2953
3124
  )
2954
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2955
3126
  if g_param[OptionsDefine.Language]:
2956
3127
  profile.language = g_param[OptionsDefine.Language]
2957
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2958
3129
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
2959
3130
  client._sdkVersion += ("_CLI_" + __version__)
2960
3131
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2961
- model = models.DescribeOperationTaskRequest()
3132
+ model = models.DeleteUserDirectoryRequest()
2962
3133
  model.from_json_string(json.dumps(args))
2963
3134
  start_time = time.time()
2964
3135
  while True:
2965
- rsp = client.DescribeOperationTask(model)
3136
+ rsp = client.DeleteUserDirectory(model)
2966
3137
  result = rsp.to_json_string()
2967
3138
  try:
2968
3139
  json_obj = json.loads(result)
@@ -2981,7 +3152,7 @@ def doDescribeOperationTask(args, parsed_globals):
2981
3152
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2982
3153
 
2983
3154
 
2984
- def doModifyUser(args, parsed_globals):
3155
+ def doModifyUserGroup(args, parsed_globals):
2985
3156
  g_param = parse_global_arg(parsed_globals)
2986
3157
 
2987
3158
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2991,7 +3162,10 @@ def doModifyUser(args, parsed_globals):
2991
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
3164
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3170
  else:
2997
3171
  cred = credential.Credential(
@@ -3003,18 +3177,18 @@ def doModifyUser(args, parsed_globals):
3003
3177
  endpoint=g_param[OptionsDefine.Endpoint],
3004
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3005
3179
  )
3006
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3007
3181
  if g_param[OptionsDefine.Language]:
3008
3182
  profile.language = g_param[OptionsDefine.Language]
3009
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3010
3184
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3011
3185
  client._sdkVersion += ("_CLI_" + __version__)
3012
3186
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3013
- model = models.ModifyUserRequest()
3187
+ model = models.ModifyUserGroupRequest()
3014
3188
  model.from_json_string(json.dumps(args))
3015
3189
  start_time = time.time()
3016
3190
  while True:
3017
- rsp = client.ModifyUser(model)
3191
+ rsp = client.ModifyUserGroup(model)
3018
3192
  result = rsp.to_json_string()
3019
3193
  try:
3020
3194
  json_obj = json.loads(result)
@@ -3033,7 +3207,7 @@ def doModifyUser(args, parsed_globals):
3033
3207
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3034
3208
 
3035
3209
 
3036
- def doDescribeCmdTemplates(args, parsed_globals):
3210
+ def doDescribeSourceTypes(args, parsed_globals):
3037
3211
  g_param = parse_global_arg(parsed_globals)
3038
3212
 
3039
3213
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3043,7 +3217,10 @@ def doDescribeCmdTemplates(args, parsed_globals):
3043
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3219
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3225
  else:
3049
3226
  cred = credential.Credential(
@@ -3055,18 +3232,18 @@ def doDescribeCmdTemplates(args, parsed_globals):
3055
3232
  endpoint=g_param[OptionsDefine.Endpoint],
3056
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3057
3234
  )
3058
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3059
3236
  if g_param[OptionsDefine.Language]:
3060
3237
  profile.language = g_param[OptionsDefine.Language]
3061
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3062
3239
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3063
3240
  client._sdkVersion += ("_CLI_" + __version__)
3064
3241
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3065
- model = models.DescribeCmdTemplatesRequest()
3242
+ model = models.DescribeSourceTypesRequest()
3066
3243
  model.from_json_string(json.dumps(args))
3067
3244
  start_time = time.time()
3068
3245
  while True:
3069
- rsp = client.DescribeCmdTemplates(model)
3246
+ rsp = client.DescribeSourceTypes(model)
3070
3247
  result = rsp.to_json_string()
3071
3248
  try:
3072
3249
  json_obj = json.loads(result)
@@ -3085,7 +3262,7 @@ def doDescribeCmdTemplates(args, parsed_globals):
3085
3262
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3086
3263
 
3087
3264
 
3088
- def doDeleteCmdTemplates(args, parsed_globals):
3265
+ def doCreateDeviceAccount(args, parsed_globals):
3089
3266
  g_param = parse_global_arg(parsed_globals)
3090
3267
 
3091
3268
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3095,7 +3272,10 @@ def doDeleteCmdTemplates(args, parsed_globals):
3095
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3274
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3280
  else:
3101
3281
  cred = credential.Credential(
@@ -3107,18 +3287,18 @@ def doDeleteCmdTemplates(args, parsed_globals):
3107
3287
  endpoint=g_param[OptionsDefine.Endpoint],
3108
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
3289
  )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3111
3291
  if g_param[OptionsDefine.Language]:
3112
3292
  profile.language = g_param[OptionsDefine.Language]
3113
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3114
3294
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3115
3295
  client._sdkVersion += ("_CLI_" + __version__)
3116
3296
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3117
- model = models.DeleteCmdTemplatesRequest()
3297
+ model = models.CreateDeviceAccountRequest()
3118
3298
  model.from_json_string(json.dumps(args))
3119
3299
  start_time = time.time()
3120
3300
  while True:
3121
- rsp = client.DeleteCmdTemplates(model)
3301
+ rsp = client.CreateDeviceAccount(model)
3122
3302
  result = rsp.to_json_string()
3123
3303
  try:
3124
3304
  json_obj = json.loads(result)
@@ -3137,7 +3317,7 @@ def doDeleteCmdTemplates(args, parsed_globals):
3137
3317
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3138
3318
 
3139
3319
 
3140
- def doDescribeAssetSyncStatus(args, parsed_globals):
3320
+ def doDeleteChangePwdTask(args, parsed_globals):
3141
3321
  g_param = parse_global_arg(parsed_globals)
3142
3322
 
3143
3323
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3147,7 +3327,10 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
3147
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3329
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3335
  else:
3153
3336
  cred = credential.Credential(
@@ -3159,18 +3342,18 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
3159
3342
  endpoint=g_param[OptionsDefine.Endpoint],
3160
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3161
3344
  )
3162
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3163
3346
  if g_param[OptionsDefine.Language]:
3164
3347
  profile.language = g_param[OptionsDefine.Language]
3165
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3166
3349
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3167
3350
  client._sdkVersion += ("_CLI_" + __version__)
3168
3351
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3169
- model = models.DescribeAssetSyncStatusRequest()
3352
+ model = models.DeleteChangePwdTaskRequest()
3170
3353
  model.from_json_string(json.dumps(args))
3171
3354
  start_time = time.time()
3172
3355
  while True:
3173
- rsp = client.DescribeAssetSyncStatus(model)
3356
+ rsp = client.DeleteChangePwdTask(model)
3174
3357
  result = rsp.to_json_string()
3175
3358
  try:
3176
3359
  json_obj = json.loads(result)
@@ -3189,7 +3372,7 @@ def doDescribeAssetSyncStatus(args, parsed_globals):
3189
3372
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3190
3373
 
3191
3374
 
3192
- def doDescribeDeviceGroups(args, parsed_globals):
3375
+ def doModifyOperationTask(args, parsed_globals):
3193
3376
  g_param = parse_global_arg(parsed_globals)
3194
3377
 
3195
3378
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3199,7 +3382,10 @@ def doDescribeDeviceGroups(args, parsed_globals):
3199
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3384
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3390
  else:
3205
3391
  cred = credential.Credential(
@@ -3211,18 +3397,18 @@ def doDescribeDeviceGroups(args, parsed_globals):
3211
3397
  endpoint=g_param[OptionsDefine.Endpoint],
3212
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3213
3399
  )
3214
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3215
3401
  if g_param[OptionsDefine.Language]:
3216
3402
  profile.language = g_param[OptionsDefine.Language]
3217
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3218
3404
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3219
3405
  client._sdkVersion += ("_CLI_" + __version__)
3220
3406
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3221
- model = models.DescribeDeviceGroupsRequest()
3407
+ model = models.ModifyOperationTaskRequest()
3222
3408
  model.from_json_string(json.dumps(args))
3223
3409
  start_time = time.time()
3224
3410
  while True:
3225
- rsp = client.DescribeDeviceGroups(model)
3411
+ rsp = client.ModifyOperationTask(model)
3226
3412
  result = rsp.to_json_string()
3227
3413
  try:
3228
3414
  json_obj = json.loads(result)
@@ -3241,7 +3427,7 @@ def doDescribeDeviceGroups(args, parsed_globals):
3241
3427
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3242
3428
 
3243
3429
 
3244
- def doDescribeUsers(args, parsed_globals):
3430
+ def doDescribeDeviceAccounts(args, parsed_globals):
3245
3431
  g_param = parse_global_arg(parsed_globals)
3246
3432
 
3247
3433
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3251,7 +3437,10 @@ def doDescribeUsers(args, parsed_globals):
3251
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3439
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3445
  else:
3257
3446
  cred = credential.Credential(
@@ -3263,18 +3452,18 @@ def doDescribeUsers(args, parsed_globals):
3263
3452
  endpoint=g_param[OptionsDefine.Endpoint],
3264
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
3454
  )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3267
3456
  if g_param[OptionsDefine.Language]:
3268
3457
  profile.language = g_param[OptionsDefine.Language]
3269
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3270
3459
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3271
3460
  client._sdkVersion += ("_CLI_" + __version__)
3272
3461
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3273
- model = models.DescribeUsersRequest()
3462
+ model = models.DescribeDeviceAccountsRequest()
3274
3463
  model.from_json_string(json.dumps(args))
3275
3464
  start_time = time.time()
3276
3465
  while True:
3277
- rsp = client.DescribeUsers(model)
3466
+ rsp = client.DescribeDeviceAccounts(model)
3278
3467
  result = rsp.to_json_string()
3279
3468
  try:
3280
3469
  json_obj = json.loads(result)
@@ -3293,7 +3482,7 @@ def doDescribeUsers(args, parsed_globals):
3293
3482
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3294
3483
 
3295
3484
 
3296
- def doDescribeDevices(args, parsed_globals):
3485
+ def doDeleteUserGroups(args, parsed_globals):
3297
3486
  g_param = parse_global_arg(parsed_globals)
3298
3487
 
3299
3488
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3303,7 +3492,10 @@ def doDescribeDevices(args, parsed_globals):
3303
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3494
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3500
  else:
3309
3501
  cred = credential.Credential(
@@ -3315,18 +3507,18 @@ def doDescribeDevices(args, parsed_globals):
3315
3507
  endpoint=g_param[OptionsDefine.Endpoint],
3316
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3317
3509
  )
3318
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3319
3511
  if g_param[OptionsDefine.Language]:
3320
3512
  profile.language = g_param[OptionsDefine.Language]
3321
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3322
3514
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3323
3515
  client._sdkVersion += ("_CLI_" + __version__)
3324
3516
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3325
- model = models.DescribeDevicesRequest()
3517
+ model = models.DeleteUserGroupsRequest()
3326
3518
  model.from_json_string(json.dumps(args))
3327
3519
  start_time = time.time()
3328
3520
  while True:
3329
- rsp = client.DescribeDevices(model)
3521
+ rsp = client.DeleteUserGroups(model)
3330
3522
  result = rsp.to_json_string()
3331
3523
  try:
3332
3524
  json_obj = json.loads(result)
@@ -3345,7 +3537,7 @@ def doDescribeDevices(args, parsed_globals):
3345
3537
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3346
3538
 
3347
3539
 
3348
- def doDescribeUserGroupMembers(args, parsed_globals):
3540
+ def doRunOperationTask(args, parsed_globals):
3349
3541
  g_param = parse_global_arg(parsed_globals)
3350
3542
 
3351
3543
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3355,7 +3547,10 @@ def doDescribeUserGroupMembers(args, parsed_globals):
3355
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3549
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3555
  else:
3361
3556
  cred = credential.Credential(
@@ -3367,18 +3562,18 @@ def doDescribeUserGroupMembers(args, parsed_globals):
3367
3562
  endpoint=g_param[OptionsDefine.Endpoint],
3368
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3369
3564
  )
3370
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3371
3566
  if g_param[OptionsDefine.Language]:
3372
3567
  profile.language = g_param[OptionsDefine.Language]
3373
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3374
3569
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3375
3570
  client._sdkVersion += ("_CLI_" + __version__)
3376
3571
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3377
- model = models.DescribeUserGroupMembersRequest()
3572
+ model = models.RunOperationTaskRequest()
3378
3573
  model.from_json_string(json.dumps(args))
3379
3574
  start_time = time.time()
3380
3575
  while True:
3381
- rsp = client.DescribeUserGroupMembers(model)
3576
+ rsp = client.RunOperationTask(model)
3382
3577
  result = rsp.to_json_string()
3383
3578
  try:
3384
3579
  json_obj = json.loads(result)
@@ -3397,7 +3592,7 @@ def doDescribeUserGroupMembers(args, parsed_globals):
3397
3592
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3398
3593
 
3399
3594
 
3400
- def doSearchCommand(args, parsed_globals):
3595
+ def doEnableIntranetAccess(args, parsed_globals):
3401
3596
  g_param = parse_global_arg(parsed_globals)
3402
3597
 
3403
3598
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3407,7 +3602,10 @@ def doSearchCommand(args, parsed_globals):
3407
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3604
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3610
  else:
3413
3611
  cred = credential.Credential(
@@ -3419,18 +3617,18 @@ def doSearchCommand(args, parsed_globals):
3419
3617
  endpoint=g_param[OptionsDefine.Endpoint],
3420
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3421
3619
  )
3422
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3423
3621
  if g_param[OptionsDefine.Language]:
3424
3622
  profile.language = g_param[OptionsDefine.Language]
3425
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3426
3624
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3427
3625
  client._sdkVersion += ("_CLI_" + __version__)
3428
3626
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3429
- model = models.SearchCommandRequest()
3627
+ model = models.EnableIntranetAccessRequest()
3430
3628
  model.from_json_string(json.dumps(args))
3431
3629
  start_time = time.time()
3432
3630
  while True:
3433
- rsp = client.SearchCommand(model)
3631
+ rsp = client.EnableIntranetAccess(model)
3434
3632
  result = rsp.to_json_string()
3435
3633
  try:
3436
3634
  json_obj = json.loads(result)
@@ -3449,7 +3647,7 @@ def doSearchCommand(args, parsed_globals):
3449
3647
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3450
3648
 
3451
3649
 
3452
- def doReplaySession(args, parsed_globals):
3650
+ def doCreateSyncUserTask(args, parsed_globals):
3453
3651
  g_param = parse_global_arg(parsed_globals)
3454
3652
 
3455
3653
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3459,7 +3657,10 @@ def doReplaySession(args, parsed_globals):
3459
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3659
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3665
  else:
3465
3666
  cred = credential.Credential(
@@ -3471,18 +3672,18 @@ def doReplaySession(args, parsed_globals):
3471
3672
  endpoint=g_param[OptionsDefine.Endpoint],
3472
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3473
3674
  )
3474
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3475
3676
  if g_param[OptionsDefine.Language]:
3476
3677
  profile.language = g_param[OptionsDefine.Language]
3477
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3478
3679
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3479
3680
  client._sdkVersion += ("_CLI_" + __version__)
3480
3681
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3481
- model = models.ReplaySessionRequest()
3682
+ model = models.CreateSyncUserTaskRequest()
3482
3683
  model.from_json_string(json.dumps(args))
3483
3684
  start_time = time.time()
3484
3685
  while True:
3485
- rsp = client.ReplaySession(model)
3686
+ rsp = client.CreateSyncUserTask(model)
3486
3687
  result = rsp.to_json_string()
3487
3688
  try:
3488
3689
  json_obj = json.loads(result)
@@ -3501,7 +3702,7 @@ def doReplaySession(args, parsed_globals):
3501
3702
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3502
3703
 
3503
3704
 
3504
- def doUnlockUser(args, parsed_globals):
3705
+ def doCreateChangePwdTask(args, parsed_globals):
3505
3706
  g_param = parse_global_arg(parsed_globals)
3506
3707
 
3507
3708
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3511,7 +3712,10 @@ def doUnlockUser(args, parsed_globals):
3511
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
3714
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
3720
  else:
3517
3721
  cred = credential.Credential(
@@ -3523,18 +3727,18 @@ def doUnlockUser(args, parsed_globals):
3523
3727
  endpoint=g_param[OptionsDefine.Endpoint],
3524
3728
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3525
3729
  )
3526
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3730
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3527
3731
  if g_param[OptionsDefine.Language]:
3528
3732
  profile.language = g_param[OptionsDefine.Language]
3529
3733
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3530
3734
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3531
3735
  client._sdkVersion += ("_CLI_" + __version__)
3532
3736
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3533
- model = models.UnlockUserRequest()
3737
+ model = models.CreateChangePwdTaskRequest()
3534
3738
  model.from_json_string(json.dumps(args))
3535
3739
  start_time = time.time()
3536
3740
  while True:
3537
- rsp = client.UnlockUser(model)
3741
+ rsp = client.CreateChangePwdTask(model)
3538
3742
  result = rsp.to_json_string()
3539
3743
  try:
3540
3744
  json_obj = json.loads(result)
@@ -3553,7 +3757,7 @@ def doUnlockUser(args, parsed_globals):
3553
3757
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3554
3758
 
3555
3759
 
3556
- def doSearchFileBySid(args, parsed_globals):
3760
+ def doSearchCommand(args, parsed_globals):
3557
3761
  g_param = parse_global_arg(parsed_globals)
3558
3762
 
3559
3763
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3563,7 +3767,10 @@ def doSearchFileBySid(args, parsed_globals):
3563
3767
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
3768
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
3769
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
3774
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
3775
  else:
3569
3776
  cred = credential.Credential(
@@ -3575,18 +3782,18 @@ def doSearchFileBySid(args, parsed_globals):
3575
3782
  endpoint=g_param[OptionsDefine.Endpoint],
3576
3783
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3577
3784
  )
3578
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3785
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3579
3786
  if g_param[OptionsDefine.Language]:
3580
3787
  profile.language = g_param[OptionsDefine.Language]
3581
3788
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3582
3789
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3583
3790
  client._sdkVersion += ("_CLI_" + __version__)
3584
3791
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3585
- model = models.SearchFileBySidRequest()
3792
+ model = models.SearchCommandRequest()
3586
3793
  model.from_json_string(json.dumps(args))
3587
3794
  start_time = time.time()
3588
3795
  while True:
3589
- rsp = client.SearchFileBySid(model)
3796
+ rsp = client.SearchCommand(model)
3590
3797
  result = rsp.to_json_string()
3591
3798
  try:
3592
3799
  json_obj = json.loads(result)
@@ -3605,7 +3812,7 @@ def doSearchFileBySid(args, parsed_globals):
3605
3812
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3606
3813
 
3607
3814
 
3608
- def doImportExternalDevice(args, parsed_globals):
3815
+ def doDescribeUserGroupMembers(args, parsed_globals):
3609
3816
  g_param = parse_global_arg(parsed_globals)
3610
3817
 
3611
3818
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3615,7 +3822,10 @@ def doImportExternalDevice(args, parsed_globals):
3615
3822
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
3823
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
3824
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
3829
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
3830
  else:
3621
3831
  cred = credential.Credential(
@@ -3627,18 +3837,18 @@ def doImportExternalDevice(args, parsed_globals):
3627
3837
  endpoint=g_param[OptionsDefine.Endpoint],
3628
3838
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3629
3839
  )
3630
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3840
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3631
3841
  if g_param[OptionsDefine.Language]:
3632
3842
  profile.language = g_param[OptionsDefine.Language]
3633
3843
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3634
3844
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3635
3845
  client._sdkVersion += ("_CLI_" + __version__)
3636
3846
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3637
- model = models.ImportExternalDeviceRequest()
3847
+ model = models.DescribeUserGroupMembersRequest()
3638
3848
  model.from_json_string(json.dumps(args))
3639
3849
  start_time = time.time()
3640
3850
  while True:
3641
- rsp = client.ImportExternalDevice(model)
3851
+ rsp = client.DescribeUserGroupMembers(model)
3642
3852
  result = rsp.to_json_string()
3643
3853
  try:
3644
3854
  json_obj = json.loads(result)
@@ -3657,7 +3867,7 @@ def doImportExternalDevice(args, parsed_globals):
3657
3867
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3658
3868
 
3659
3869
 
3660
- def doDescribeChangePwdTask(args, parsed_globals):
3870
+ def doUnlockUser(args, parsed_globals):
3661
3871
  g_param = parse_global_arg(parsed_globals)
3662
3872
 
3663
3873
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3667,7 +3877,10 @@ def doDescribeChangePwdTask(args, parsed_globals):
3667
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
3879
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
3885
  else:
3673
3886
  cred = credential.Credential(
@@ -3679,18 +3892,18 @@ def doDescribeChangePwdTask(args, parsed_globals):
3679
3892
  endpoint=g_param[OptionsDefine.Endpoint],
3680
3893
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
3894
  )
3682
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3895
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3683
3896
  if g_param[OptionsDefine.Language]:
3684
3897
  profile.language = g_param[OptionsDefine.Language]
3685
3898
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3686
3899
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3687
3900
  client._sdkVersion += ("_CLI_" + __version__)
3688
3901
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3689
- model = models.DescribeChangePwdTaskRequest()
3902
+ model = models.UnlockUserRequest()
3690
3903
  model.from_json_string(json.dumps(args))
3691
3904
  start_time = time.time()
3692
3905
  while True:
3693
- rsp = client.DescribeChangePwdTask(model)
3906
+ rsp = client.UnlockUser(model)
3694
3907
  result = rsp.to_json_string()
3695
3908
  try:
3696
3909
  json_obj = json.loads(result)
@@ -3709,7 +3922,7 @@ def doDescribeChangePwdTask(args, parsed_globals):
3709
3922
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
3923
 
3711
3924
 
3712
- def doSearchFile(args, parsed_globals):
3925
+ def doSearchFileBySid(args, parsed_globals):
3713
3926
  g_param = parse_global_arg(parsed_globals)
3714
3927
 
3715
3928
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3719,7 +3932,10 @@ def doSearchFile(args, parsed_globals):
3719
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
3934
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
3940
  else:
3725
3941
  cred = credential.Credential(
@@ -3731,18 +3947,18 @@ def doSearchFile(args, parsed_globals):
3731
3947
  endpoint=g_param[OptionsDefine.Endpoint],
3732
3948
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3733
3949
  )
3734
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3950
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3735
3951
  if g_param[OptionsDefine.Language]:
3736
3952
  profile.language = g_param[OptionsDefine.Language]
3737
3953
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3738
3954
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3739
3955
  client._sdkVersion += ("_CLI_" + __version__)
3740
3956
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3741
- model = models.SearchFileRequest()
3957
+ model = models.SearchFileBySidRequest()
3742
3958
  model.from_json_string(json.dumps(args))
3743
3959
  start_time = time.time()
3744
3960
  while True:
3745
- rsp = client.SearchFile(model)
3961
+ rsp = client.SearchFileBySid(model)
3746
3962
  result = rsp.to_json_string()
3747
3963
  try:
3748
3964
  json_obj = json.loads(result)
@@ -3761,7 +3977,7 @@ def doSearchFile(args, parsed_globals):
3761
3977
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3762
3978
 
3763
3979
 
3764
- def doCreateUserGroup(args, parsed_globals):
3980
+ def doModifyAccessWhiteListAutoStatus(args, parsed_globals):
3765
3981
  g_param = parse_global_arg(parsed_globals)
3766
3982
 
3767
3983
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3771,7 +3987,10 @@ def doCreateUserGroup(args, parsed_globals):
3771
3987
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
3988
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
3989
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
3994
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
3995
  else:
3777
3996
  cred = credential.Credential(
@@ -3783,18 +4002,18 @@ def doCreateUserGroup(args, parsed_globals):
3783
4002
  endpoint=g_param[OptionsDefine.Endpoint],
3784
4003
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3785
4004
  )
3786
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4005
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3787
4006
  if g_param[OptionsDefine.Language]:
3788
4007
  profile.language = g_param[OptionsDefine.Language]
3789
4008
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3790
4009
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3791
4010
  client._sdkVersion += ("_CLI_" + __version__)
3792
4011
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3793
- model = models.CreateUserGroupRequest()
4012
+ model = models.ModifyAccessWhiteListAutoStatusRequest()
3794
4013
  model.from_json_string(json.dumps(args))
3795
4014
  start_time = time.time()
3796
4015
  while True:
3797
- rsp = client.CreateUserGroup(model)
4016
+ rsp = client.ModifyAccessWhiteListAutoStatus(model)
3798
4017
  result = rsp.to_json_string()
3799
4018
  try:
3800
4019
  json_obj = json.loads(result)
@@ -3813,7 +4032,7 @@ def doCreateUserGroup(args, parsed_globals):
3813
4032
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3814
4033
 
3815
4034
 
3816
- def doResetDeviceAccountPrivateKey(args, parsed_globals):
4035
+ def doDescribeChangePwdTaskDetail(args, parsed_globals):
3817
4036
  g_param = parse_global_arg(parsed_globals)
3818
4037
 
3819
4038
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3823,7 +4042,10 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
3823
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
4044
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
4050
  else:
3829
4051
  cred = credential.Credential(
@@ -3835,18 +4057,18 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
3835
4057
  endpoint=g_param[OptionsDefine.Endpoint],
3836
4058
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
4059
  )
3838
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4060
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3839
4061
  if g_param[OptionsDefine.Language]:
3840
4062
  profile.language = g_param[OptionsDefine.Language]
3841
4063
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3842
4064
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3843
4065
  client._sdkVersion += ("_CLI_" + __version__)
3844
4066
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3845
- model = models.ResetDeviceAccountPrivateKeyRequest()
4067
+ model = models.DescribeChangePwdTaskDetailRequest()
3846
4068
  model.from_json_string(json.dumps(args))
3847
4069
  start_time = time.time()
3848
4070
  while True:
3849
- rsp = client.ResetDeviceAccountPrivateKey(model)
4071
+ rsp = client.DescribeChangePwdTaskDetail(model)
3850
4072
  result = rsp.to_json_string()
3851
4073
  try:
3852
4074
  json_obj = json.loads(result)
@@ -3865,7 +4087,7 @@ def doResetDeviceAccountPrivateKey(args, parsed_globals):
3865
4087
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
4088
 
3867
4089
 
3868
- def doDescribeChangePwdTaskDetail(args, parsed_globals):
4090
+ def doModifyReconnectionSetting(args, parsed_globals):
3869
4091
  g_param = parse_global_arg(parsed_globals)
3870
4092
 
3871
4093
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3875,7 +4097,10 @@ def doDescribeChangePwdTaskDetail(args, parsed_globals):
3875
4097
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3876
4098
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3877
4099
  )
3878
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3879
4104
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3880
4105
  else:
3881
4106
  cred = credential.Credential(
@@ -3887,18 +4112,18 @@ def doDescribeChangePwdTaskDetail(args, parsed_globals):
3887
4112
  endpoint=g_param[OptionsDefine.Endpoint],
3888
4113
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3889
4114
  )
3890
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4115
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3891
4116
  if g_param[OptionsDefine.Language]:
3892
4117
  profile.language = g_param[OptionsDefine.Language]
3893
4118
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3894
4119
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3895
4120
  client._sdkVersion += ("_CLI_" + __version__)
3896
4121
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3897
- model = models.DescribeChangePwdTaskDetailRequest()
4122
+ model = models.ModifyReconnectionSettingRequest()
3898
4123
  model.from_json_string(json.dumps(args))
3899
4124
  start_time = time.time()
3900
4125
  while True:
3901
- rsp = client.DescribeChangePwdTaskDetail(model)
4126
+ rsp = client.ModifyReconnectionSetting(model)
3902
4127
  result = rsp.to_json_string()
3903
4128
  try:
3904
4129
  json_obj = json.loads(result)
@@ -3917,7 +4142,7 @@ def doDescribeChangePwdTaskDetail(args, parsed_globals):
3917
4142
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3918
4143
 
3919
4144
 
3920
- def doSearchTaskResult(args, parsed_globals):
4145
+ def doDescribeDeviceGroupMembers(args, parsed_globals):
3921
4146
  g_param = parse_global_arg(parsed_globals)
3922
4147
 
3923
4148
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3927,7 +4152,10 @@ def doSearchTaskResult(args, parsed_globals):
3927
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3928
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3929
4154
  )
3930
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3931
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3932
4160
  else:
3933
4161
  cred = credential.Credential(
@@ -3939,18 +4167,18 @@ def doSearchTaskResult(args, parsed_globals):
3939
4167
  endpoint=g_param[OptionsDefine.Endpoint],
3940
4168
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3941
4169
  )
3942
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4170
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3943
4171
  if g_param[OptionsDefine.Language]:
3944
4172
  profile.language = g_param[OptionsDefine.Language]
3945
4173
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3946
4174
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3947
4175
  client._sdkVersion += ("_CLI_" + __version__)
3948
4176
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3949
- model = models.SearchTaskResultRequest()
4177
+ model = models.DescribeDeviceGroupMembersRequest()
3950
4178
  model.from_json_string(json.dumps(args))
3951
4179
  start_time = time.time()
3952
4180
  while True:
3953
- rsp = client.SearchTaskResult(model)
4181
+ rsp = client.DescribeDeviceGroupMembers(model)
3954
4182
  result = rsp.to_json_string()
3955
4183
  try:
3956
4184
  json_obj = json.loads(result)
@@ -3969,7 +4197,7 @@ def doSearchTaskResult(args, parsed_globals):
3969
4197
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3970
4198
 
3971
4199
 
3972
- def doBindDeviceAccountPrivateKey(args, parsed_globals):
4200
+ def doDisableIntranetAccess(args, parsed_globals):
3973
4201
  g_param = parse_global_arg(parsed_globals)
3974
4202
 
3975
4203
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3979,7 +4207,10 @@ def doBindDeviceAccountPrivateKey(args, parsed_globals):
3979
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3980
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3981
4209
  )
3982
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3983
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3984
4215
  else:
3985
4216
  cred = credential.Credential(
@@ -3991,18 +4222,18 @@ def doBindDeviceAccountPrivateKey(args, parsed_globals):
3991
4222
  endpoint=g_param[OptionsDefine.Endpoint],
3992
4223
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3993
4224
  )
3994
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4225
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3995
4226
  if g_param[OptionsDefine.Language]:
3996
4227
  profile.language = g_param[OptionsDefine.Language]
3997
4228
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3998
4229
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
3999
4230
  client._sdkVersion += ("_CLI_" + __version__)
4000
4231
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4001
- model = models.BindDeviceAccountPrivateKeyRequest()
4232
+ model = models.DisableIntranetAccessRequest()
4002
4233
  model.from_json_string(json.dumps(args))
4003
4234
  start_time = time.time()
4004
4235
  while True:
4005
- rsp = client.BindDeviceAccountPrivateKey(model)
4236
+ rsp = client.DisableIntranetAccess(model)
4006
4237
  result = rsp.to_json_string()
4007
4238
  try:
4008
4239
  json_obj = json.loads(result)
@@ -4021,7 +4252,7 @@ def doBindDeviceAccountPrivateKey(args, parsed_globals):
4021
4252
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4022
4253
 
4023
4254
 
4024
- def doSearchSubtaskResultById(args, parsed_globals):
4255
+ def doModifyAccessWhiteListRule(args, parsed_globals):
4025
4256
  g_param = parse_global_arg(parsed_globals)
4026
4257
 
4027
4258
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4031,7 +4262,10 @@ def doSearchSubtaskResultById(args, parsed_globals):
4031
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
4264
  )
4034
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
4270
  else:
4037
4271
  cred = credential.Credential(
@@ -4043,18 +4277,18 @@ def doSearchSubtaskResultById(args, parsed_globals):
4043
4277
  endpoint=g_param[OptionsDefine.Endpoint],
4044
4278
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4045
4279
  )
4046
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4280
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4047
4281
  if g_param[OptionsDefine.Language]:
4048
4282
  profile.language = g_param[OptionsDefine.Language]
4049
4283
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4050
4284
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4051
4285
  client._sdkVersion += ("_CLI_" + __version__)
4052
4286
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4053
- model = models.SearchSubtaskResultByIdRequest()
4287
+ model = models.ModifyAccessWhiteListRuleRequest()
4054
4288
  model.from_json_string(json.dumps(args))
4055
4289
  start_time = time.time()
4056
4290
  while True:
4057
- rsp = client.SearchSubtaskResultById(model)
4291
+ rsp = client.ModifyAccessWhiteListRule(model)
4058
4292
  result = rsp.to_json_string()
4059
4293
  try:
4060
4294
  json_obj = json.loads(result)
@@ -4073,7 +4307,7 @@ def doSearchSubtaskResultById(args, parsed_globals):
4073
4307
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4074
4308
 
4075
4309
 
4076
- def doSearchSessionCommand(args, parsed_globals):
4310
+ def doDeleteOperationTasks(args, parsed_globals):
4077
4311
  g_param = parse_global_arg(parsed_globals)
4078
4312
 
4079
4313
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4083,7 +4317,10 @@ def doSearchSessionCommand(args, parsed_globals):
4083
4317
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4084
4318
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4085
4319
  )
4086
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4087
4324
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4088
4325
  else:
4089
4326
  cred = credential.Credential(
@@ -4095,18 +4332,18 @@ def doSearchSessionCommand(args, parsed_globals):
4095
4332
  endpoint=g_param[OptionsDefine.Endpoint],
4096
4333
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4097
4334
  )
4098
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4335
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4099
4336
  if g_param[OptionsDefine.Language]:
4100
4337
  profile.language = g_param[OptionsDefine.Language]
4101
4338
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4102
4339
  client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4103
4340
  client._sdkVersion += ("_CLI_" + __version__)
4104
4341
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4105
- model = models.SearchSessionCommandRequest()
4342
+ model = models.DeleteOperationTasksRequest()
4106
4343
  model.from_json_string(json.dumps(args))
4107
4344
  start_time = time.time()
4108
4345
  while True:
4109
- rsp = client.SearchSessionCommand(model)
4346
+ rsp = client.DeleteOperationTasks(model)
4110
4347
  result = rsp.to_json_string()
4111
4348
  try:
4112
4349
  json_obj = json.loads(result)
@@ -4125,96 +4362,1328 @@ def doSearchSessionCommand(args, parsed_globals):
4125
4362
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4126
4363
 
4127
4364
 
4128
- CLIENT_MAP = {
4129
- "v20230418": bh_client_v20230418,
4365
+ def doDeleteDevices(args, parsed_globals):
4366
+ g_param = parse_global_arg(parsed_globals)
4130
4367
 
4131
- }
4368
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4369
+ cred = credential.CVMRoleCredential()
4370
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4371
+ cred = credential.STSAssumeRoleCredential(
4372
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4373
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4374
+ )
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4379
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4380
+ else:
4381
+ cred = credential.Credential(
4382
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4383
+ )
4384
+ http_profile = HttpProfile(
4385
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4386
+ reqMethod="POST",
4387
+ endpoint=g_param[OptionsDefine.Endpoint],
4388
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4389
+ )
4390
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4391
+ if g_param[OptionsDefine.Language]:
4392
+ profile.language = g_param[OptionsDefine.Language]
4393
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4394
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4395
+ client._sdkVersion += ("_CLI_" + __version__)
4396
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4397
+ model = models.DeleteDevicesRequest()
4398
+ model.from_json_string(json.dumps(args))
4399
+ start_time = time.time()
4400
+ while True:
4401
+ rsp = client.DeleteDevices(model)
4402
+ result = rsp.to_json_string()
4403
+ try:
4404
+ json_obj = json.loads(result)
4405
+ except TypeError as e:
4406
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4407
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4408
+ break
4409
+ cur_time = time.time()
4410
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4411
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4412
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4413
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4414
+ else:
4415
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4416
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4417
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4132
4418
 
4133
- MODELS_MAP = {
4134
- "v20230418": models_v20230418,
4135
4419
 
4136
- }
4420
+ def doDescribeUsers(args, parsed_globals):
4421
+ g_param = parse_global_arg(parsed_globals)
4137
4422
 
4138
- ACTION_MAP = {
4139
- "ModifyDeviceGroup": doModifyDeviceGroup,
4140
- "DescribeDeviceGroupMembers": doDescribeDeviceGroupMembers,
4141
- "ModifyOAuthSetting": doModifyOAuthSetting,
4142
- "DeleteDeviceGroupMembers": doDeleteDeviceGroupMembers,
4143
- "CreateAcl": doCreateAcl,
4144
- "DeleteUserGroupMembers": doDeleteUserGroupMembers,
4145
- "CreateDeviceGroup": doCreateDeviceGroup,
4146
- "DeleteDeviceAccounts": doDeleteDeviceAccounts,
4147
- "CheckLDAPConnection": doCheckLDAPConnection,
4148
- "ResetUser": doResetUser,
4149
- "CreateOperationTask": doCreateOperationTask,
4150
- "CreateChangePwdTask": doCreateChangePwdTask,
4151
- "SetLDAPSyncFlag": doSetLDAPSyncFlag,
4152
- "DescribeUserGroups": doDescribeUserGroups,
4153
- "DescribeDomains": doDescribeDomains,
4154
- "DeployResource": doDeployResource,
4155
- "ModifyDevice": doModifyDevice,
4156
- "BindDeviceResource": doBindDeviceResource,
4157
- "BindDeviceAccountPassword": doBindDeviceAccountPassword,
4158
- "DescribeLDAPUnitSet": doDescribeLDAPUnitSet,
4159
- "CreateCmdTemplate": doCreateCmdTemplate,
4160
- "SearchSession": doSearchSession,
4161
- "DeleteAcls": doDeleteAcls,
4162
- "AccessDevices": doAccessDevices,
4163
- "DescribeResources": doDescribeResources,
4164
- "DescribeLoginEvent": doDescribeLoginEvent,
4165
- "ModifyChangePwdTask": doModifyChangePwdTask,
4166
- "CreateAssetSyncJob": doCreateAssetSyncJob,
4167
- "CreateDeviceAccount": doCreateDeviceAccount,
4168
- "RunChangePwdTask": doRunChangePwdTask,
4169
- "ResetDeviceAccountPassword": doResetDeviceAccountPassword,
4170
- "ModifyUserGroup": doModifyUserGroup,
4171
- "DeleteDeviceGroups": doDeleteDeviceGroups,
4172
- "CreateUser": doCreateUser,
4173
- "AddUserGroupMembers": doAddUserGroupMembers,
4174
- "DeleteOperationTasks": doDeleteOperationTasks,
4175
- "ModifyAcl": doModifyAcl,
4176
- "DeleteUsers": doDeleteUsers,
4177
- "DeleteAccessWhiteListRules": doDeleteAccessWhiteListRules,
4178
- "SearchCommandBySid": doSearchCommandBySid,
4179
- "CreateResource": doCreateResource,
4180
- "CreateAccessWhiteListRule": doCreateAccessWhiteListRule,
4181
- "DescribeAcls": doDescribeAcls,
4182
- "DescribeAccessWhiteListRules": doDescribeAccessWhiteListRules,
4183
- "SearchAuditLog": doSearchAuditLog,
4184
- "AddDeviceGroupMembers": doAddDeviceGroupMembers,
4185
- "ModifyCmdTemplate": doModifyCmdTemplate,
4186
- "DeleteChangePwdTask": doDeleteChangePwdTask,
4187
- "DescribeOperationEvent": doDescribeOperationEvent,
4188
- "ModifyOperationTask": doModifyOperationTask,
4189
- "ModifyLDAPSetting": doModifyLDAPSetting,
4423
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4424
+ cred = credential.CVMRoleCredential()
4425
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4426
+ cred = credential.STSAssumeRoleCredential(
4427
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4428
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4429
+ )
4430
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4431
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4432
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4434
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4435
+ else:
4436
+ cred = credential.Credential(
4437
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4438
+ )
4439
+ http_profile = HttpProfile(
4440
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4441
+ reqMethod="POST",
4442
+ endpoint=g_param[OptionsDefine.Endpoint],
4443
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4444
+ )
4445
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4446
+ if g_param[OptionsDefine.Language]:
4447
+ profile.language = g_param[OptionsDefine.Language]
4448
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4449
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4450
+ client._sdkVersion += ("_CLI_" + __version__)
4451
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4452
+ model = models.DescribeUsersRequest()
4453
+ model.from_json_string(json.dumps(args))
4454
+ start_time = time.time()
4455
+ while True:
4456
+ rsp = client.DescribeUsers(model)
4457
+ result = rsp.to_json_string()
4458
+ try:
4459
+ json_obj = json.loads(result)
4460
+ except TypeError as e:
4461
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4462
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4463
+ break
4464
+ cur_time = time.time()
4465
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4466
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4467
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4468
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4469
+ else:
4470
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4471
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4472
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4473
+
4474
+
4475
+ def doSyncDevicesToIOA(args, parsed_globals):
4476
+ g_param = parse_global_arg(parsed_globals)
4477
+
4478
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4479
+ cred = credential.CVMRoleCredential()
4480
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4481
+ cred = credential.STSAssumeRoleCredential(
4482
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4483
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4484
+ )
4485
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4486
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4487
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4489
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4490
+ else:
4491
+ cred = credential.Credential(
4492
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4493
+ )
4494
+ http_profile = HttpProfile(
4495
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4496
+ reqMethod="POST",
4497
+ endpoint=g_param[OptionsDefine.Endpoint],
4498
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4499
+ )
4500
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4501
+ if g_param[OptionsDefine.Language]:
4502
+ profile.language = g_param[OptionsDefine.Language]
4503
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4504
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4505
+ client._sdkVersion += ("_CLI_" + __version__)
4506
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4507
+ model = models.SyncDevicesToIOARequest()
4508
+ model.from_json_string(json.dumps(args))
4509
+ start_time = time.time()
4510
+ while True:
4511
+ rsp = client.SyncDevicesToIOA(model)
4512
+ result = rsp.to_json_string()
4513
+ try:
4514
+ json_obj = json.loads(result)
4515
+ except TypeError as e:
4516
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4517
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4518
+ break
4519
+ cur_time = time.time()
4520
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4521
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4522
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4523
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4524
+ else:
4525
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4526
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4527
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4528
+
4529
+
4530
+ def doModifyChangePwdTask(args, parsed_globals):
4531
+ g_param = parse_global_arg(parsed_globals)
4532
+
4533
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4534
+ cred = credential.CVMRoleCredential()
4535
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4536
+ cred = credential.STSAssumeRoleCredential(
4537
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4538
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4539
+ )
4540
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4541
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4542
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4544
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4545
+ else:
4546
+ cred = credential.Credential(
4547
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4548
+ )
4549
+ http_profile = HttpProfile(
4550
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4551
+ reqMethod="POST",
4552
+ endpoint=g_param[OptionsDefine.Endpoint],
4553
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4554
+ )
4555
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4556
+ if g_param[OptionsDefine.Language]:
4557
+ profile.language = g_param[OptionsDefine.Language]
4558
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4559
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4560
+ client._sdkVersion += ("_CLI_" + __version__)
4561
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4562
+ model = models.ModifyChangePwdTaskRequest()
4563
+ model.from_json_string(json.dumps(args))
4564
+ start_time = time.time()
4565
+ while True:
4566
+ rsp = client.ModifyChangePwdTask(model)
4567
+ result = rsp.to_json_string()
4568
+ try:
4569
+ json_obj = json.loads(result)
4570
+ except TypeError as e:
4571
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4572
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4573
+ break
4574
+ cur_time = time.time()
4575
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4576
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4577
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4578
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4579
+ else:
4580
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4581
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4582
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4583
+
4584
+
4585
+ def doRunChangePwdTask(args, parsed_globals):
4586
+ g_param = parse_global_arg(parsed_globals)
4587
+
4588
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4589
+ cred = credential.CVMRoleCredential()
4590
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4591
+ cred = credential.STSAssumeRoleCredential(
4592
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4593
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4594
+ )
4595
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4596
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4597
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4599
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4600
+ else:
4601
+ cred = credential.Credential(
4602
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4603
+ )
4604
+ http_profile = HttpProfile(
4605
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4606
+ reqMethod="POST",
4607
+ endpoint=g_param[OptionsDefine.Endpoint],
4608
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4609
+ )
4610
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4611
+ if g_param[OptionsDefine.Language]:
4612
+ profile.language = g_param[OptionsDefine.Language]
4613
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4614
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4615
+ client._sdkVersion += ("_CLI_" + __version__)
4616
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4617
+ model = models.RunChangePwdTaskRequest()
4618
+ model.from_json_string(json.dumps(args))
4619
+ start_time = time.time()
4620
+ while True:
4621
+ rsp = client.RunChangePwdTask(model)
4622
+ result = rsp.to_json_string()
4623
+ try:
4624
+ json_obj = json.loads(result)
4625
+ except TypeError as e:
4626
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4627
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4628
+ break
4629
+ cur_time = time.time()
4630
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4631
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4632
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4633
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4634
+ else:
4635
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4636
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4637
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4638
+
4639
+
4640
+ def doResetDeviceAccountPassword(args, parsed_globals):
4641
+ g_param = parse_global_arg(parsed_globals)
4642
+
4643
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4644
+ cred = credential.CVMRoleCredential()
4645
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4646
+ cred = credential.STSAssumeRoleCredential(
4647
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4648
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4649
+ )
4650
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4651
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4652
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4654
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4655
+ else:
4656
+ cred = credential.Credential(
4657
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4658
+ )
4659
+ http_profile = HttpProfile(
4660
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4661
+ reqMethod="POST",
4662
+ endpoint=g_param[OptionsDefine.Endpoint],
4663
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4664
+ )
4665
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4666
+ if g_param[OptionsDefine.Language]:
4667
+ profile.language = g_param[OptionsDefine.Language]
4668
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4669
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4670
+ client._sdkVersion += ("_CLI_" + __version__)
4671
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4672
+ model = models.ResetDeviceAccountPasswordRequest()
4673
+ model.from_json_string(json.dumps(args))
4674
+ start_time = time.time()
4675
+ while True:
4676
+ rsp = client.ResetDeviceAccountPassword(model)
4677
+ result = rsp.to_json_string()
4678
+ try:
4679
+ json_obj = json.loads(result)
4680
+ except TypeError as e:
4681
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4682
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4683
+ break
4684
+ cur_time = time.time()
4685
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4686
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4687
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4688
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4689
+ else:
4690
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4691
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4692
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4693
+
4694
+
4695
+ def doDeleteDeviceGroups(args, parsed_globals):
4696
+ g_param = parse_global_arg(parsed_globals)
4697
+
4698
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4699
+ cred = credential.CVMRoleCredential()
4700
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4701
+ cred = credential.STSAssumeRoleCredential(
4702
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4703
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4704
+ )
4705
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4706
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4707
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4709
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4710
+ else:
4711
+ cred = credential.Credential(
4712
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4713
+ )
4714
+ http_profile = HttpProfile(
4715
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4716
+ reqMethod="POST",
4717
+ endpoint=g_param[OptionsDefine.Endpoint],
4718
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4719
+ )
4720
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4721
+ if g_param[OptionsDefine.Language]:
4722
+ profile.language = g_param[OptionsDefine.Language]
4723
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4724
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4725
+ client._sdkVersion += ("_CLI_" + __version__)
4726
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4727
+ model = models.DeleteDeviceGroupsRequest()
4728
+ model.from_json_string(json.dumps(args))
4729
+ start_time = time.time()
4730
+ while True:
4731
+ rsp = client.DeleteDeviceGroups(model)
4732
+ result = rsp.to_json_string()
4733
+ try:
4734
+ json_obj = json.loads(result)
4735
+ except TypeError as e:
4736
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4737
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4738
+ break
4739
+ cur_time = time.time()
4740
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4741
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4742
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4743
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4744
+ else:
4745
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4746
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4747
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4748
+
4749
+
4750
+ def doCreateAcl(args, parsed_globals):
4751
+ g_param = parse_global_arg(parsed_globals)
4752
+
4753
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4754
+ cred = credential.CVMRoleCredential()
4755
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4756
+ cred = credential.STSAssumeRoleCredential(
4757
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4758
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4759
+ )
4760
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4761
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4762
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4763
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4764
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4765
+ else:
4766
+ cred = credential.Credential(
4767
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4768
+ )
4769
+ http_profile = HttpProfile(
4770
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4771
+ reqMethod="POST",
4772
+ endpoint=g_param[OptionsDefine.Endpoint],
4773
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4774
+ )
4775
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4776
+ if g_param[OptionsDefine.Language]:
4777
+ profile.language = g_param[OptionsDefine.Language]
4778
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4779
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4780
+ client._sdkVersion += ("_CLI_" + __version__)
4781
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4782
+ model = models.CreateAclRequest()
4783
+ model.from_json_string(json.dumps(args))
4784
+ start_time = time.time()
4785
+ while True:
4786
+ rsp = client.CreateAcl(model)
4787
+ result = rsp.to_json_string()
4788
+ try:
4789
+ json_obj = json.loads(result)
4790
+ except TypeError as e:
4791
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4792
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4793
+ break
4794
+ cur_time = time.time()
4795
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4796
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4797
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4798
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4799
+ else:
4800
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4801
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4802
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4803
+
4804
+
4805
+ def doDescribeUserSyncStatus(args, parsed_globals):
4806
+ g_param = parse_global_arg(parsed_globals)
4807
+
4808
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4809
+ cred = credential.CVMRoleCredential()
4810
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4811
+ cred = credential.STSAssumeRoleCredential(
4812
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4813
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4814
+ )
4815
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4816
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4817
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4818
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4819
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4820
+ else:
4821
+ cred = credential.Credential(
4822
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4823
+ )
4824
+ http_profile = HttpProfile(
4825
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4826
+ reqMethod="POST",
4827
+ endpoint=g_param[OptionsDefine.Endpoint],
4828
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4829
+ )
4830
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4831
+ if g_param[OptionsDefine.Language]:
4832
+ profile.language = g_param[OptionsDefine.Language]
4833
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4834
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4835
+ client._sdkVersion += ("_CLI_" + __version__)
4836
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4837
+ model = models.DescribeUserSyncStatusRequest()
4838
+ model.from_json_string(json.dumps(args))
4839
+ start_time = time.time()
4840
+ while True:
4841
+ rsp = client.DescribeUserSyncStatus(model)
4842
+ result = rsp.to_json_string()
4843
+ try:
4844
+ json_obj = json.loads(result)
4845
+ except TypeError as e:
4846
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4847
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4848
+ break
4849
+ cur_time = time.time()
4850
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4851
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4852
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4853
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4854
+ else:
4855
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4856
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4857
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4858
+
4859
+
4860
+ def doCreateResource(args, parsed_globals):
4861
+ g_param = parse_global_arg(parsed_globals)
4862
+
4863
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4864
+ cred = credential.CVMRoleCredential()
4865
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4866
+ cred = credential.STSAssumeRoleCredential(
4867
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4868
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4869
+ )
4870
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4871
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4872
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4873
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4874
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4875
+ else:
4876
+ cred = credential.Credential(
4877
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4878
+ )
4879
+ http_profile = HttpProfile(
4880
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4881
+ reqMethod="POST",
4882
+ endpoint=g_param[OptionsDefine.Endpoint],
4883
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4884
+ )
4885
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4886
+ if g_param[OptionsDefine.Language]:
4887
+ profile.language = g_param[OptionsDefine.Language]
4888
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4889
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4890
+ client._sdkVersion += ("_CLI_" + __version__)
4891
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4892
+ model = models.CreateResourceRequest()
4893
+ model.from_json_string(json.dumps(args))
4894
+ start_time = time.time()
4895
+ while True:
4896
+ rsp = client.CreateResource(model)
4897
+ result = rsp.to_json_string()
4898
+ try:
4899
+ json_obj = json.loads(result)
4900
+ except TypeError as e:
4901
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4902
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4903
+ break
4904
+ cur_time = time.time()
4905
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4906
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4907
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4908
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4909
+ else:
4910
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4911
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4912
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4913
+
4914
+
4915
+ def doCreateAccessWhiteListRule(args, parsed_globals):
4916
+ g_param = parse_global_arg(parsed_globals)
4917
+
4918
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4919
+ cred = credential.CVMRoleCredential()
4920
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4921
+ cred = credential.STSAssumeRoleCredential(
4922
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4923
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4924
+ )
4925
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4926
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4927
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4928
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4929
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4930
+ else:
4931
+ cred = credential.Credential(
4932
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4933
+ )
4934
+ http_profile = HttpProfile(
4935
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4936
+ reqMethod="POST",
4937
+ endpoint=g_param[OptionsDefine.Endpoint],
4938
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4939
+ )
4940
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4941
+ if g_param[OptionsDefine.Language]:
4942
+ profile.language = g_param[OptionsDefine.Language]
4943
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4944
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
4945
+ client._sdkVersion += ("_CLI_" + __version__)
4946
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4947
+ model = models.CreateAccessWhiteListRuleRequest()
4948
+ model.from_json_string(json.dumps(args))
4949
+ start_time = time.time()
4950
+ while True:
4951
+ rsp = client.CreateAccessWhiteListRule(model)
4952
+ result = rsp.to_json_string()
4953
+ try:
4954
+ json_obj = json.loads(result)
4955
+ except TypeError as e:
4956
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4957
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4958
+ break
4959
+ cur_time = time.time()
4960
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4961
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4962
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4963
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4964
+ else:
4965
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4966
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4967
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4968
+
4969
+
4970
+ def doDescribeAcls(args, parsed_globals):
4971
+ g_param = parse_global_arg(parsed_globals)
4972
+
4973
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4974
+ cred = credential.CVMRoleCredential()
4975
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4976
+ cred = credential.STSAssumeRoleCredential(
4977
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4978
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4979
+ )
4980
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4981
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4982
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4983
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4984
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4985
+ else:
4986
+ cred = credential.Credential(
4987
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4988
+ )
4989
+ http_profile = HttpProfile(
4990
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4991
+ reqMethod="POST",
4992
+ endpoint=g_param[OptionsDefine.Endpoint],
4993
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4994
+ )
4995
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4996
+ if g_param[OptionsDefine.Language]:
4997
+ profile.language = g_param[OptionsDefine.Language]
4998
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4999
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5000
+ client._sdkVersion += ("_CLI_" + __version__)
5001
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5002
+ model = models.DescribeAclsRequest()
5003
+ model.from_json_string(json.dumps(args))
5004
+ start_time = time.time()
5005
+ while True:
5006
+ rsp = client.DescribeAcls(model)
5007
+ result = rsp.to_json_string()
5008
+ try:
5009
+ json_obj = json.loads(result)
5010
+ except TypeError as e:
5011
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5012
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5013
+ break
5014
+ cur_time = time.time()
5015
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5016
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5017
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5018
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5019
+ else:
5020
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5021
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5022
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5023
+
5024
+
5025
+ def doModifyLDAPSetting(args, parsed_globals):
5026
+ g_param = parse_global_arg(parsed_globals)
5027
+
5028
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5029
+ cred = credential.CVMRoleCredential()
5030
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5031
+ cred = credential.STSAssumeRoleCredential(
5032
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5033
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5034
+ )
5035
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5036
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5037
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5038
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5039
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5040
+ else:
5041
+ cred = credential.Credential(
5042
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5043
+ )
5044
+ http_profile = HttpProfile(
5045
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5046
+ reqMethod="POST",
5047
+ endpoint=g_param[OptionsDefine.Endpoint],
5048
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5049
+ )
5050
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5051
+ if g_param[OptionsDefine.Language]:
5052
+ profile.language = g_param[OptionsDefine.Language]
5053
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5054
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5055
+ client._sdkVersion += ("_CLI_" + __version__)
5056
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5057
+ model = models.ModifyLDAPSettingRequest()
5058
+ model.from_json_string(json.dumps(args))
5059
+ start_time = time.time()
5060
+ while True:
5061
+ rsp = client.ModifyLDAPSetting(model)
5062
+ result = rsp.to_json_string()
5063
+ try:
5064
+ json_obj = json.loads(result)
5065
+ except TypeError as e:
5066
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5067
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5068
+ break
5069
+ cur_time = time.time()
5070
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5071
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5072
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5073
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5074
+ else:
5075
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5076
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5077
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5078
+
5079
+
5080
+ def doModifyResource(args, parsed_globals):
5081
+ g_param = parse_global_arg(parsed_globals)
5082
+
5083
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5084
+ cred = credential.CVMRoleCredential()
5085
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5086
+ cred = credential.STSAssumeRoleCredential(
5087
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5088
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5089
+ )
5090
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5091
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5092
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5093
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5094
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5095
+ else:
5096
+ cred = credential.Credential(
5097
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5098
+ )
5099
+ http_profile = HttpProfile(
5100
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5101
+ reqMethod="POST",
5102
+ endpoint=g_param[OptionsDefine.Endpoint],
5103
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5104
+ )
5105
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5106
+ if g_param[OptionsDefine.Language]:
5107
+ profile.language = g_param[OptionsDefine.Language]
5108
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5109
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5110
+ client._sdkVersion += ("_CLI_" + __version__)
5111
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5112
+ model = models.ModifyResourceRequest()
5113
+ model.from_json_string(json.dumps(args))
5114
+ start_time = time.time()
5115
+ while True:
5116
+ rsp = client.ModifyResource(model)
5117
+ result = rsp.to_json_string()
5118
+ try:
5119
+ json_obj = json.loads(result)
5120
+ except TypeError as e:
5121
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5122
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5123
+ break
5124
+ cur_time = time.time()
5125
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5126
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5127
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5128
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5129
+ else:
5130
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5131
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5132
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5133
+
5134
+
5135
+ def doModifyAssetSyncFlag(args, parsed_globals):
5136
+ g_param = parse_global_arg(parsed_globals)
5137
+
5138
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5139
+ cred = credential.CVMRoleCredential()
5140
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5141
+ cred = credential.STSAssumeRoleCredential(
5142
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5143
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5144
+ )
5145
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5146
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5147
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5148
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5149
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5150
+ else:
5151
+ cred = credential.Credential(
5152
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5153
+ )
5154
+ http_profile = HttpProfile(
5155
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5156
+ reqMethod="POST",
5157
+ endpoint=g_param[OptionsDefine.Endpoint],
5158
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5159
+ )
5160
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5161
+ if g_param[OptionsDefine.Language]:
5162
+ profile.language = g_param[OptionsDefine.Language]
5163
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5164
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5165
+ client._sdkVersion += ("_CLI_" + __version__)
5166
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5167
+ model = models.ModifyAssetSyncFlagRequest()
5168
+ model.from_json_string(json.dumps(args))
5169
+ start_time = time.time()
5170
+ while True:
5171
+ rsp = client.ModifyAssetSyncFlag(model)
5172
+ result = rsp.to_json_string()
5173
+ try:
5174
+ json_obj = json.loads(result)
5175
+ except TypeError as e:
5176
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5177
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5178
+ break
5179
+ cur_time = time.time()
5180
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5181
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5182
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5183
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5184
+ else:
5185
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5186
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5187
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5188
+
5189
+
5190
+ def doModifyUser(args, parsed_globals):
5191
+ g_param = parse_global_arg(parsed_globals)
5192
+
5193
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5194
+ cred = credential.CVMRoleCredential()
5195
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5196
+ cred = credential.STSAssumeRoleCredential(
5197
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5198
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5199
+ )
5200
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5201
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5202
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5203
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5204
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5205
+ else:
5206
+ cred = credential.Credential(
5207
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5208
+ )
5209
+ http_profile = HttpProfile(
5210
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5211
+ reqMethod="POST",
5212
+ endpoint=g_param[OptionsDefine.Endpoint],
5213
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5214
+ )
5215
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5216
+ if g_param[OptionsDefine.Language]:
5217
+ profile.language = g_param[OptionsDefine.Language]
5218
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5219
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5220
+ client._sdkVersion += ("_CLI_" + __version__)
5221
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5222
+ model = models.ModifyUserRequest()
5223
+ model.from_json_string(json.dumps(args))
5224
+ start_time = time.time()
5225
+ while True:
5226
+ rsp = client.ModifyUser(model)
5227
+ result = rsp.to_json_string()
5228
+ try:
5229
+ json_obj = json.loads(result)
5230
+ except TypeError as e:
5231
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5232
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5233
+ break
5234
+ cur_time = time.time()
5235
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5236
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5237
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5238
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5239
+ else:
5240
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5241
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5242
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5243
+
5244
+
5245
+ def doDescribeCmdTemplates(args, parsed_globals):
5246
+ g_param = parse_global_arg(parsed_globals)
5247
+
5248
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5249
+ cred = credential.CVMRoleCredential()
5250
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5251
+ cred = credential.STSAssumeRoleCredential(
5252
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5253
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5254
+ )
5255
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5256
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5257
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5258
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5259
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5260
+ else:
5261
+ cred = credential.Credential(
5262
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5263
+ )
5264
+ http_profile = HttpProfile(
5265
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5266
+ reqMethod="POST",
5267
+ endpoint=g_param[OptionsDefine.Endpoint],
5268
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5269
+ )
5270
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5271
+ if g_param[OptionsDefine.Language]:
5272
+ profile.language = g_param[OptionsDefine.Language]
5273
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5274
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5275
+ client._sdkVersion += ("_CLI_" + __version__)
5276
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5277
+ model = models.DescribeCmdTemplatesRequest()
5278
+ model.from_json_string(json.dumps(args))
5279
+ start_time = time.time()
5280
+ while True:
5281
+ rsp = client.DescribeCmdTemplates(model)
5282
+ result = rsp.to_json_string()
5283
+ try:
5284
+ json_obj = json.loads(result)
5285
+ except TypeError as e:
5286
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5287
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5288
+ break
5289
+ cur_time = time.time()
5290
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5291
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5292
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5293
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5294
+ else:
5295
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5296
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5297
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5298
+
5299
+
5300
+ def doDeleteDeviceGroupMembers(args, parsed_globals):
5301
+ g_param = parse_global_arg(parsed_globals)
5302
+
5303
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5304
+ cred = credential.CVMRoleCredential()
5305
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5306
+ cred = credential.STSAssumeRoleCredential(
5307
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5308
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5309
+ )
5310
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5311
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5312
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5313
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5314
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5315
+ else:
5316
+ cred = credential.Credential(
5317
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5318
+ )
5319
+ http_profile = HttpProfile(
5320
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5321
+ reqMethod="POST",
5322
+ endpoint=g_param[OptionsDefine.Endpoint],
5323
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5324
+ )
5325
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5326
+ if g_param[OptionsDefine.Language]:
5327
+ profile.language = g_param[OptionsDefine.Language]
5328
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5329
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5330
+ client._sdkVersion += ("_CLI_" + __version__)
5331
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5332
+ model = models.DeleteDeviceGroupMembersRequest()
5333
+ model.from_json_string(json.dumps(args))
5334
+ start_time = time.time()
5335
+ while True:
5336
+ rsp = client.DeleteDeviceGroupMembers(model)
5337
+ result = rsp.to_json_string()
5338
+ try:
5339
+ json_obj = json.loads(result)
5340
+ except TypeError as e:
5341
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5342
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5343
+ break
5344
+ cur_time = time.time()
5345
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5346
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5347
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5348
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5349
+ else:
5350
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5351
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5352
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5353
+
5354
+
5355
+ def doDescribeDeviceGroups(args, parsed_globals):
5356
+ g_param = parse_global_arg(parsed_globals)
5357
+
5358
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5359
+ cred = credential.CVMRoleCredential()
5360
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5361
+ cred = credential.STSAssumeRoleCredential(
5362
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5363
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5364
+ )
5365
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5366
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5367
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5368
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5369
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5370
+ else:
5371
+ cred = credential.Credential(
5372
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5373
+ )
5374
+ http_profile = HttpProfile(
5375
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5376
+ reqMethod="POST",
5377
+ endpoint=g_param[OptionsDefine.Endpoint],
5378
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5379
+ )
5380
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5381
+ if g_param[OptionsDefine.Language]:
5382
+ profile.language = g_param[OptionsDefine.Language]
5383
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5384
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5385
+ client._sdkVersion += ("_CLI_" + __version__)
5386
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5387
+ model = models.DescribeDeviceGroupsRequest()
5388
+ model.from_json_string(json.dumps(args))
5389
+ start_time = time.time()
5390
+ while True:
5391
+ rsp = client.DescribeDeviceGroups(model)
5392
+ result = rsp.to_json_string()
5393
+ try:
5394
+ json_obj = json.loads(result)
5395
+ except TypeError as e:
5396
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5397
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5398
+ break
5399
+ cur_time = time.time()
5400
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5401
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5402
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5403
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5404
+ else:
5405
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5406
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5407
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5408
+
5409
+
5410
+ def doDescribeDevices(args, parsed_globals):
5411
+ g_param = parse_global_arg(parsed_globals)
5412
+
5413
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5414
+ cred = credential.CVMRoleCredential()
5415
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5416
+ cred = credential.STSAssumeRoleCredential(
5417
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5418
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5419
+ )
5420
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5421
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5422
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5423
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5424
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5425
+ else:
5426
+ cred = credential.Credential(
5427
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5428
+ )
5429
+ http_profile = HttpProfile(
5430
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5431
+ reqMethod="POST",
5432
+ endpoint=g_param[OptionsDefine.Endpoint],
5433
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5434
+ )
5435
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5436
+ if g_param[OptionsDefine.Language]:
5437
+ profile.language = g_param[OptionsDefine.Language]
5438
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5439
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5440
+ client._sdkVersion += ("_CLI_" + __version__)
5441
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5442
+ model = models.DescribeDevicesRequest()
5443
+ model.from_json_string(json.dumps(args))
5444
+ start_time = time.time()
5445
+ while True:
5446
+ rsp = client.DescribeDevices(model)
5447
+ result = rsp.to_json_string()
5448
+ try:
5449
+ json_obj = json.loads(result)
5450
+ except TypeError as e:
5451
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5452
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5453
+ break
5454
+ cur_time = time.time()
5455
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5456
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5457
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5458
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5459
+ else:
5460
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5461
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5462
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5463
+
5464
+
5465
+ def doAddDeviceGroupMembers(args, parsed_globals):
5466
+ g_param = parse_global_arg(parsed_globals)
5467
+
5468
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5469
+ cred = credential.CVMRoleCredential()
5470
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5471
+ cred = credential.STSAssumeRoleCredential(
5472
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5473
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5474
+ )
5475
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5476
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5477
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5478
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5479
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5480
+ else:
5481
+ cred = credential.Credential(
5482
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5483
+ )
5484
+ http_profile = HttpProfile(
5485
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5486
+ reqMethod="POST",
5487
+ endpoint=g_param[OptionsDefine.Endpoint],
5488
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5489
+ )
5490
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5491
+ if g_param[OptionsDefine.Language]:
5492
+ profile.language = g_param[OptionsDefine.Language]
5493
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5494
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5495
+ client._sdkVersion += ("_CLI_" + __version__)
5496
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5497
+ model = models.AddDeviceGroupMembersRequest()
5498
+ model.from_json_string(json.dumps(args))
5499
+ start_time = time.time()
5500
+ while True:
5501
+ rsp = client.AddDeviceGroupMembers(model)
5502
+ result = rsp.to_json_string()
5503
+ try:
5504
+ json_obj = json.loads(result)
5505
+ except TypeError as e:
5506
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5507
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5508
+ break
5509
+ cur_time = time.time()
5510
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5511
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5512
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5513
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5514
+ else:
5515
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5516
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5517
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5518
+
5519
+
5520
+ def doBindDeviceAccountPrivateKey(args, parsed_globals):
5521
+ g_param = parse_global_arg(parsed_globals)
5522
+
5523
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5524
+ cred = credential.CVMRoleCredential()
5525
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5526
+ cred = credential.STSAssumeRoleCredential(
5527
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5528
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5529
+ )
5530
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5531
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5532
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5533
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5534
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5535
+ else:
5536
+ cred = credential.Credential(
5537
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5538
+ )
5539
+ http_profile = HttpProfile(
5540
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5541
+ reqMethod="POST",
5542
+ endpoint=g_param[OptionsDefine.Endpoint],
5543
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5544
+ )
5545
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
5546
+ if g_param[OptionsDefine.Language]:
5547
+ profile.language = g_param[OptionsDefine.Language]
5548
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5549
+ client = mod.BhClient(cred, g_param[OptionsDefine.Region], profile)
5550
+ client._sdkVersion += ("_CLI_" + __version__)
5551
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5552
+ model = models.BindDeviceAccountPrivateKeyRequest()
5553
+ model.from_json_string(json.dumps(args))
5554
+ start_time = time.time()
5555
+ while True:
5556
+ rsp = client.BindDeviceAccountPrivateKey(model)
5557
+ result = rsp.to_json_string()
5558
+ try:
5559
+ json_obj = json.loads(result)
5560
+ except TypeError as e:
5561
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5562
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5563
+ break
5564
+ cur_time = time.time()
5565
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5566
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5567
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5568
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5569
+ else:
5570
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5571
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5572
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5573
+
5574
+
5575
+ CLIENT_MAP = {
5576
+ "v20230418": bh_client_v20230418,
5577
+
5578
+ }
5579
+
5580
+ MODELS_MAP = {
5581
+ "v20230418": models_v20230418,
5582
+
5583
+ }
5584
+
5585
+ ACTION_MAP = {
5586
+ "DeleteDeviceAccounts": doDeleteDeviceAccounts,
5587
+ "ResetUser": doResetUser,
5588
+ "DescribeOperationTask": doDescribeOperationTask,
5589
+ "DescribeDomains": doDescribeDomains,
5590
+ "ModifyUserDirectory": doModifyUserDirectory,
5591
+ "ImportExternalDevice": doImportExternalDevice,
5592
+ "DescribeUserDirectory": doDescribeUserDirectory,
5593
+ "DeleteUserGroupMembers": doDeleteUserGroupMembers,
5594
+ "CreateAssetSyncJob": doCreateAssetSyncJob,
5595
+ "CreateUserDirectory": doCreateUserDirectory,
5596
+ "SyncUserToIOA": doSyncUserToIOA,
5597
+ "SearchSubtaskResultById": doSearchSubtaskResultById,
5598
+ "ModifyAcl": doModifyAcl,
5599
+ "DeleteUsers": doDeleteUsers,
5600
+ "DescribeAssetSyncFlag": doDescribeAssetSyncFlag,
5601
+ "DescribeAccessWhiteListRules": doDescribeAccessWhiteListRules,
5602
+ "DescribeAssetSyncStatus": doDescribeAssetSyncStatus,
5603
+ "DescribeOperationEvent": doDescribeOperationEvent,
5604
+ "DescribeAccountGroups": doDescribeAccountGroups,
5605
+ "DeleteCmdTemplates": doDeleteCmdTemplates,
5606
+ "ModifyAccessWhiteListStatus": doModifyAccessWhiteListStatus,
5607
+ "DescribeChangePwdTask": doDescribeChangePwdTask,
5608
+ "SearchFile": doSearchFile,
5609
+ "CreateUserGroup": doCreateUserGroup,
5610
+ "CreateUser": doCreateUser,
5611
+ "SearchTaskResult": doSearchTaskResult,
5612
+ "DeleteAccessWhiteListRules": doDeleteAccessWhiteListRules,
5613
+ "CreateDeviceGroup": doCreateDeviceGroup,
5614
+ "CheckLDAPConnection": doCheckLDAPConnection,
5615
+ "DescribeUserGroups": doDescribeUserGroups,
5616
+ "DeployResource": doDeployResource,
5617
+ "ModifyDevice": doModifyDevice,
5618
+ "BindDeviceResource": doBindDeviceResource,
5619
+ "SearchSession": doSearchSession,
5620
+ "DescribeSecuritySetting": doDescribeSecuritySetting,
5621
+ "AccessDevices": doAccessDevices,
5622
+ "DescribeResources": doDescribeResources,
5623
+ "EnableExternalAccess": doEnableExternalAccess,
5624
+ "DisableExternalAccess": doDisableExternalAccess,
5625
+ "SearchCommandBySid": doSearchCommandBySid,
5626
+ "ModifyCmdTemplate": doModifyCmdTemplate,
5627
+ "CreateCmdTemplate": doCreateCmdTemplate,
5628
+ "ReplaySession": doReplaySession,
5629
+ "ResetDeviceAccountPrivateKey": doResetDeviceAccountPrivateKey,
5630
+ "SearchAuditLog": doSearchAuditLog,
5631
+ "ModifyAuthModeSetting": doModifyAuthModeSetting,
5632
+ "SearchSessionCommand": doSearchSessionCommand,
5633
+ "ModifyDeviceGroup": doModifyDeviceGroup,
5634
+ "ModifyOAuthSetting": doModifyOAuthSetting,
5635
+ "DescribeLoginEvent": doDescribeLoginEvent,
5636
+ "CreateOperationTask": doCreateOperationTask,
5637
+ "AddUserGroupMembers": doAddUserGroupMembers,
5638
+ "SetLDAPSyncFlag": doSetLDAPSyncFlag,
5639
+ "BindDeviceAccountPassword": doBindDeviceAccountPassword,
5640
+ "DescribeLDAPUnitSet": doDescribeLDAPUnitSet,
5641
+ "DeleteAcls": doDeleteAcls,
5642
+ "DeleteUserDirectory": doDeleteUserDirectory,
5643
+ "ModifyUserGroup": doModifyUserGroup,
5644
+ "DescribeSourceTypes": doDescribeSourceTypes,
5645
+ "CreateDeviceAccount": doCreateDeviceAccount,
5646
+ "DeleteChangePwdTask": doDeleteChangePwdTask,
5647
+ "ModifyOperationTask": doModifyOperationTask,
4190
5648
  "DescribeDeviceAccounts": doDescribeDeviceAccounts,
4191
5649
  "DeleteUserGroups": doDeleteUserGroups,
4192
5650
  "RunOperationTask": doRunOperationTask,
5651
+ "EnableIntranetAccess": doEnableIntranetAccess,
5652
+ "CreateSyncUserTask": doCreateSyncUserTask,
5653
+ "CreateChangePwdTask": doCreateChangePwdTask,
5654
+ "SearchCommand": doSearchCommand,
5655
+ "DescribeUserGroupMembers": doDescribeUserGroupMembers,
5656
+ "UnlockUser": doUnlockUser,
5657
+ "SearchFileBySid": doSearchFileBySid,
5658
+ "ModifyAccessWhiteListAutoStatus": doModifyAccessWhiteListAutoStatus,
5659
+ "DescribeChangePwdTaskDetail": doDescribeChangePwdTaskDetail,
5660
+ "ModifyReconnectionSetting": doModifyReconnectionSetting,
5661
+ "DescribeDeviceGroupMembers": doDescribeDeviceGroupMembers,
5662
+ "DisableIntranetAccess": doDisableIntranetAccess,
5663
+ "ModifyAccessWhiteListRule": doModifyAccessWhiteListRule,
5664
+ "DeleteOperationTasks": doDeleteOperationTasks,
4193
5665
  "DeleteDevices": doDeleteDevices,
5666
+ "DescribeUsers": doDescribeUsers,
5667
+ "SyncDevicesToIOA": doSyncDevicesToIOA,
5668
+ "ModifyChangePwdTask": doModifyChangePwdTask,
5669
+ "RunChangePwdTask": doRunChangePwdTask,
5670
+ "ResetDeviceAccountPassword": doResetDeviceAccountPassword,
5671
+ "DeleteDeviceGroups": doDeleteDeviceGroups,
5672
+ "CreateAcl": doCreateAcl,
5673
+ "DescribeUserSyncStatus": doDescribeUserSyncStatus,
5674
+ "CreateResource": doCreateResource,
5675
+ "CreateAccessWhiteListRule": doCreateAccessWhiteListRule,
5676
+ "DescribeAcls": doDescribeAcls,
5677
+ "ModifyLDAPSetting": doModifyLDAPSetting,
4194
5678
  "ModifyResource": doModifyResource,
4195
- "DescribeOperationTask": doDescribeOperationTask,
5679
+ "ModifyAssetSyncFlag": doModifyAssetSyncFlag,
4196
5680
  "ModifyUser": doModifyUser,
4197
5681
  "DescribeCmdTemplates": doDescribeCmdTemplates,
4198
- "DeleteCmdTemplates": doDeleteCmdTemplates,
4199
- "DescribeAssetSyncStatus": doDescribeAssetSyncStatus,
5682
+ "DeleteDeviceGroupMembers": doDeleteDeviceGroupMembers,
4200
5683
  "DescribeDeviceGroups": doDescribeDeviceGroups,
4201
- "DescribeUsers": doDescribeUsers,
4202
5684
  "DescribeDevices": doDescribeDevices,
4203
- "DescribeUserGroupMembers": doDescribeUserGroupMembers,
4204
- "SearchCommand": doSearchCommand,
4205
- "ReplaySession": doReplaySession,
4206
- "UnlockUser": doUnlockUser,
4207
- "SearchFileBySid": doSearchFileBySid,
4208
- "ImportExternalDevice": doImportExternalDevice,
4209
- "DescribeChangePwdTask": doDescribeChangePwdTask,
4210
- "SearchFile": doSearchFile,
4211
- "CreateUserGroup": doCreateUserGroup,
4212
- "ResetDeviceAccountPrivateKey": doResetDeviceAccountPrivateKey,
4213
- "DescribeChangePwdTaskDetail": doDescribeChangePwdTaskDetail,
4214
- "SearchTaskResult": doSearchTaskResult,
5685
+ "AddDeviceGroupMembers": doAddDeviceGroupMembers,
4215
5686
  "BindDeviceAccountPrivateKey": doBindDeviceAccountPrivateKey,
4216
- "SearchSubtaskResultById": doSearchSubtaskResultById,
4217
- "SearchSessionCommand": doSearchSessionCommand,
4218
5687
 
4219
5688
  }
4220
5689