tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -27,7 +27,10 @@ def doDescribeGroupInfo(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doDescribeGroupInfo(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doDescribeCvmInfo(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doDescribeCvmInfo(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -121,6 +127,61 @@ def doDescribeCvmInfo(args, parsed_globals):
121
127
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
122
128
 
123
129
 
130
+ def doDescribeRegion(args, parsed_globals):
131
+ g_param = parse_global_arg(parsed_globals)
132
+
133
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
134
+ cred = credential.CVMRoleCredential()
135
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
136
+ cred = credential.STSAssumeRoleCredential(
137
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
138
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
139
+ )
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
144
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
145
+ else:
146
+ cred = credential.Credential(
147
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
148
+ )
149
+ http_profile = HttpProfile(
150
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
151
+ reqMethod="POST",
152
+ endpoint=g_param[OptionsDefine.Endpoint],
153
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
154
+ )
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
156
+ if g_param[OptionsDefine.Language]:
157
+ profile.language = g_param[OptionsDefine.Language]
158
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
159
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
160
+ client._sdkVersion += ("_CLI_" + __version__)
161
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
162
+ model = models.DescribeRegionRequest()
163
+ model.from_json_string(json.dumps(args))
164
+ start_time = time.time()
165
+ while True:
166
+ rsp = client.DescribeRegion(model)
167
+ result = rsp.to_json_string()
168
+ try:
169
+ json_obj = json.loads(result)
170
+ except TypeError as e:
171
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
172
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
173
+ break
174
+ cur_time = time.time()
175
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
176
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
177
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
178
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
179
+ else:
180
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
181
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
182
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
183
+
184
+
124
185
  def doModifyInstancePre(args, parsed_globals):
125
186
  g_param = parse_global_arg(parsed_globals)
126
187
 
@@ -131,7 +192,10 @@ def doModifyInstancePre(args, parsed_globals):
131
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
194
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
200
  else:
137
201
  cred = credential.Credential(
@@ -143,7 +207,7 @@ def doModifyInstancePre(args, parsed_globals):
143
207
  endpoint=g_param[OptionsDefine.Endpoint],
144
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
209
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
211
  if g_param[OptionsDefine.Language]:
148
212
  profile.language = g_param[OptionsDefine.Language]
149
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +247,10 @@ def doSendMessage(args, parsed_globals):
183
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
249
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
255
  else:
189
256
  cred = credential.Credential(
@@ -195,7 +262,7 @@ def doSendMessage(args, parsed_globals):
195
262
  endpoint=g_param[OptionsDefine.Endpoint],
196
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
264
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
266
  if g_param[OptionsDefine.Language]:
200
267
  profile.language = g_param[OptionsDefine.Language]
201
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +302,10 @@ def doDeleteConnectResource(args, parsed_globals):
235
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
304
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
310
  else:
241
311
  cred = credential.Credential(
@@ -247,7 +317,7 @@ def doDeleteConnectResource(args, parsed_globals):
247
317
  endpoint=g_param[OptionsDefine.Endpoint],
248
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
319
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
321
  if g_param[OptionsDefine.Language]:
252
322
  profile.language = g_param[OptionsDefine.Language]
253
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -277,6 +347,61 @@ def doDeleteConnectResource(args, parsed_globals):
277
347
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
278
348
 
279
349
 
350
+ def doDeleteGroupSubscribeTopic(args, parsed_globals):
351
+ g_param = parse_global_arg(parsed_globals)
352
+
353
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
354
+ cred = credential.CVMRoleCredential()
355
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
356
+ cred = credential.STSAssumeRoleCredential(
357
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
358
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
359
+ )
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
364
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
365
+ else:
366
+ cred = credential.Credential(
367
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
368
+ )
369
+ http_profile = HttpProfile(
370
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
371
+ reqMethod="POST",
372
+ endpoint=g_param[OptionsDefine.Endpoint],
373
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
374
+ )
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
376
+ if g_param[OptionsDefine.Language]:
377
+ profile.language = g_param[OptionsDefine.Language]
378
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
379
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
380
+ client._sdkVersion += ("_CLI_" + __version__)
381
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
382
+ model = models.DeleteGroupSubscribeTopicRequest()
383
+ model.from_json_string(json.dumps(args))
384
+ start_time = time.time()
385
+ while True:
386
+ rsp = client.DeleteGroupSubscribeTopic(model)
387
+ result = rsp.to_json_string()
388
+ try:
389
+ json_obj = json.loads(result)
390
+ except TypeError as e:
391
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
392
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
393
+ break
394
+ cur_time = time.time()
395
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
396
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
397
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
398
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
399
+ else:
400
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
401
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
402
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
403
+
404
+
280
405
  def doDescribeUser(args, parsed_globals):
281
406
  g_param = parse_global_arg(parsed_globals)
282
407
 
@@ -287,7 +412,10 @@ def doDescribeUser(args, parsed_globals):
287
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
414
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
420
  else:
293
421
  cred = credential.Credential(
@@ -299,7 +427,7 @@ def doDescribeUser(args, parsed_globals):
299
427
  endpoint=g_param[OptionsDefine.Endpoint],
300
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
429
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
431
  if g_param[OptionsDefine.Language]:
304
432
  profile.language = g_param[OptionsDefine.Language]
305
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +467,10 @@ def doDescribeDatahubGroupOffsets(args, parsed_globals):
339
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
469
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
475
  else:
345
476
  cred = credential.Credential(
@@ -351,7 +482,7 @@ def doDescribeDatahubGroupOffsets(args, parsed_globals):
351
482
  endpoint=g_param[OptionsDefine.Endpoint],
352
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
484
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
486
  if g_param[OptionsDefine.Language]:
356
487
  profile.language = g_param[OptionsDefine.Language]
357
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +522,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
391
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
524
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
530
  else:
397
531
  cred = credential.Credential(
@@ -403,7 +537,7 @@ def doDescribeConsumerGroup(args, parsed_globals):
403
537
  endpoint=g_param[OptionsDefine.Endpoint],
404
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
539
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
541
  if g_param[OptionsDefine.Language]:
408
542
  profile.language = g_param[OptionsDefine.Language]
409
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +577,10 @@ def doCreateTopic(args, parsed_globals):
443
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
579
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
585
  else:
449
586
  cred = credential.Credential(
@@ -455,7 +592,7 @@ def doCreateTopic(args, parsed_globals):
455
592
  endpoint=g_param[OptionsDefine.Endpoint],
456
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
594
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
596
  if g_param[OptionsDefine.Language]:
460
597
  profile.language = g_param[OptionsDefine.Language]
461
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +632,10 @@ def doDescribeDatahubTask(args, parsed_globals):
495
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
634
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
640
  else:
501
641
  cred = credential.Credential(
@@ -507,7 +647,7 @@ def doDescribeDatahubTask(args, parsed_globals):
507
647
  endpoint=g_param[OptionsDefine.Endpoint],
508
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
649
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
651
  if g_param[OptionsDefine.Language]:
512
652
  profile.language = g_param[OptionsDefine.Language]
513
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +687,10 @@ def doCheckCdcCluster(args, parsed_globals):
547
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
689
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
695
  else:
553
696
  cred = credential.Credential(
@@ -559,7 +702,7 @@ def doCheckCdcCluster(args, parsed_globals):
559
702
  endpoint=g_param[OptionsDefine.Endpoint],
560
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
704
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
706
  if g_param[OptionsDefine.Language]:
564
707
  profile.language = g_param[OptionsDefine.Language]
565
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +742,10 @@ def doDescribeTopicFlowRanking(args, parsed_globals):
599
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
744
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
750
  else:
605
751
  cred = credential.Credential(
@@ -611,7 +757,7 @@ def doDescribeTopicFlowRanking(args, parsed_globals):
611
757
  endpoint=g_param[OptionsDefine.Endpoint],
612
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
759
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
761
  if g_param[OptionsDefine.Language]:
616
762
  profile.language = g_param[OptionsDefine.Language]
617
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +797,10 @@ def doCreatePartition(args, parsed_globals):
651
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
799
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
805
  else:
657
806
  cred = credential.Credential(
@@ -663,7 +812,7 @@ def doCreatePartition(args, parsed_globals):
663
812
  endpoint=g_param[OptionsDefine.Endpoint],
664
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
814
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
816
  if g_param[OptionsDefine.Language]:
668
817
  profile.language = g_param[OptionsDefine.Language]
669
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +852,10 @@ def doFetchLatestDatahubMessageList(args, parsed_globals):
703
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
854
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
860
  else:
709
861
  cred = credential.Credential(
@@ -715,7 +867,7 @@ def doFetchLatestDatahubMessageList(args, parsed_globals):
715
867
  endpoint=g_param[OptionsDefine.Endpoint],
716
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
869
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
871
  if g_param[OptionsDefine.Language]:
720
872
  profile.language = g_param[OptionsDefine.Language]
721
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +907,10 @@ def doCreateToken(args, parsed_globals):
755
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
909
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
915
  else:
761
916
  cred = credential.Credential(
@@ -767,7 +922,7 @@ def doCreateToken(args, parsed_globals):
767
922
  endpoint=g_param[OptionsDefine.Endpoint],
768
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
924
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
926
  if g_param[OptionsDefine.Language]:
772
927
  profile.language = g_param[OptionsDefine.Language]
773
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +962,10 @@ def doDeleteInstancePre(args, parsed_globals):
807
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
964
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
970
  else:
813
971
  cred = credential.Credential(
@@ -819,7 +977,7 @@ def doDeleteInstancePre(args, parsed_globals):
819
977
  endpoint=g_param[OptionsDefine.Endpoint],
820
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
979
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
981
  if g_param[OptionsDefine.Language]:
824
982
  profile.language = g_param[OptionsDefine.Language]
825
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +1017,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
859
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1019
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1025
  else:
865
1026
  cred = credential.Credential(
@@ -871,7 +1032,7 @@ def doDescribeInstancesDetail(args, parsed_globals):
871
1032
  endpoint=g_param[OptionsDefine.Endpoint],
872
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
1034
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
1036
  if g_param[OptionsDefine.Language]:
876
1037
  profile.language = g_param[OptionsDefine.Language]
877
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +1072,10 @@ def doInstanceScalingDown(args, parsed_globals):
911
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1074
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1080
  else:
917
1081
  cred = credential.Credential(
@@ -923,7 +1087,7 @@ def doInstanceScalingDown(args, parsed_globals):
923
1087
  endpoint=g_param[OptionsDefine.Endpoint],
924
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1089
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1091
  if g_param[OptionsDefine.Language]:
928
1092
  profile.language = g_param[OptionsDefine.Language]
929
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -963,7 +1127,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
963
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1129
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1135
  else:
969
1136
  cred = credential.Credential(
@@ -975,7 +1142,7 @@ def doDescribeTopicAttributes(args, parsed_globals):
975
1142
  endpoint=g_param[OptionsDefine.Endpoint],
976
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1144
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1146
  if g_param[OptionsDefine.Language]:
980
1147
  profile.language = g_param[OptionsDefine.Language]
981
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1182,10 @@ def doFetchMessageListByTimestamp(args, parsed_globals):
1015
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1184
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1190
  else:
1021
1191
  cred = credential.Credential(
@@ -1027,7 +1197,7 @@ def doFetchMessageListByTimestamp(args, parsed_globals):
1027
1197
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1199
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1201
  if g_param[OptionsDefine.Language]:
1032
1202
  profile.language = g_param[OptionsDefine.Language]
1033
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1067,7 +1237,10 @@ def doCreateAclRule(args, parsed_globals):
1067
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1239
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1245
  else:
1073
1246
  cred = credential.Credential(
@@ -1079,7 +1252,7 @@ def doCreateAclRule(args, parsed_globals):
1079
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1254
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1256
  if g_param[OptionsDefine.Language]:
1084
1257
  profile.language = g_param[OptionsDefine.Language]
1085
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1119,7 +1292,10 @@ def doCreateUser(args, parsed_globals):
1119
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1294
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1300
  else:
1125
1301
  cred = credential.Credential(
@@ -1131,7 +1307,7 @@ def doCreateUser(args, parsed_globals):
1131
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1309
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1311
  if g_param[OptionsDefine.Language]:
1136
1312
  profile.language = g_param[OptionsDefine.Language]
1137
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1347,10 @@ def doRenewCkafkaInstance(args, parsed_globals):
1171
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1349
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1355
  else:
1177
1356
  cred = credential.Credential(
@@ -1183,7 +1362,7 @@ def doRenewCkafkaInstance(args, parsed_globals):
1183
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1364
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1366
  if g_param[OptionsDefine.Language]:
1188
1367
  profile.language = g_param[OptionsDefine.Language]
1189
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1402,10 @@ def doDescribeAclRule(args, parsed_globals):
1223
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1404
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1410
  else:
1229
1411
  cred = credential.Credential(
@@ -1235,7 +1417,7 @@ def doDescribeAclRule(args, parsed_globals):
1235
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1419
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1421
  if g_param[OptionsDefine.Language]:
1240
1422
  profile.language = g_param[OptionsDefine.Language]
1241
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1457,10 @@ def doDescribePrometheus(args, parsed_globals):
1275
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1459
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1465
  else:
1281
1466
  cred = credential.Credential(
@@ -1287,7 +1472,7 @@ def doDescribePrometheus(args, parsed_globals):
1287
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1474
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1476
  if g_param[OptionsDefine.Language]:
1292
1477
  profile.language = g_param[OptionsDefine.Language]
1293
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1317,6 +1502,61 @@ def doDescribePrometheus(args, parsed_globals):
1317
1502
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1503
 
1319
1504
 
1505
+ def doUpgradeBrokerVersion(args, parsed_globals):
1506
+ g_param = parse_global_arg(parsed_globals)
1507
+
1508
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1509
+ cred = credential.CVMRoleCredential()
1510
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1511
+ cred = credential.STSAssumeRoleCredential(
1512
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1513
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1514
+ )
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1519
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1520
+ else:
1521
+ cred = credential.Credential(
1522
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1523
+ )
1524
+ http_profile = HttpProfile(
1525
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1526
+ reqMethod="POST",
1527
+ endpoint=g_param[OptionsDefine.Endpoint],
1528
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1529
+ )
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1531
+ if g_param[OptionsDefine.Language]:
1532
+ profile.language = g_param[OptionsDefine.Language]
1533
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1534
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1535
+ client._sdkVersion += ("_CLI_" + __version__)
1536
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1537
+ model = models.UpgradeBrokerVersionRequest()
1538
+ model.from_json_string(json.dumps(args))
1539
+ start_time = time.time()
1540
+ while True:
1541
+ rsp = client.UpgradeBrokerVersion(model)
1542
+ result = rsp.to_json_string()
1543
+ try:
1544
+ json_obj = json.loads(result)
1545
+ except TypeError as e:
1546
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1547
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1548
+ break
1549
+ cur_time = time.time()
1550
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1551
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1552
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1553
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1554
+ else:
1555
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1556
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1557
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1558
+
1559
+
1320
1560
  def doDescribeDatahubTasks(args, parsed_globals):
1321
1561
  g_param = parse_global_arg(parsed_globals)
1322
1562
 
@@ -1327,7 +1567,10 @@ def doDescribeDatahubTasks(args, parsed_globals):
1327
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1569
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1575
  else:
1333
1576
  cred = credential.Credential(
@@ -1339,7 +1582,7 @@ def doDescribeDatahubTasks(args, parsed_globals):
1339
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1584
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1586
  if g_param[OptionsDefine.Language]:
1344
1587
  profile.language = g_param[OptionsDefine.Language]
1345
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1622,10 @@ def doModifyDatahubTopic(args, parsed_globals):
1379
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1624
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1630
  else:
1385
1631
  cred = credential.Credential(
@@ -1391,7 +1637,7 @@ def doModifyDatahubTopic(args, parsed_globals):
1391
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1639
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1641
  if g_param[OptionsDefine.Language]:
1396
1642
  profile.language = g_param[OptionsDefine.Language]
1397
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1677,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
1431
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1679
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1685
  else:
1437
1686
  cred = credential.Credential(
@@ -1443,7 +1692,7 @@ def doFetchMessageListByOffset(args, parsed_globals):
1443
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1694
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1696
  if g_param[OptionsDefine.Language]:
1448
1697
  profile.language = g_param[OptionsDefine.Language]
1449
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1732,10 @@ def doCreateDatahubTopic(args, parsed_globals):
1483
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1734
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1740
  else:
1489
1741
  cred = credential.Credential(
@@ -1495,7 +1747,7 @@ def doCreateDatahubTopic(args, parsed_globals):
1495
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1749
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1751
  if g_param[OptionsDefine.Language]:
1500
1752
  profile.language = g_param[OptionsDefine.Language]
1501
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1787,10 @@ def doCancelAuthorizationToken(args, parsed_globals):
1535
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1789
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1795
  else:
1541
1796
  cred = credential.Credential(
@@ -1547,7 +1802,7 @@ def doCancelAuthorizationToken(args, parsed_globals):
1547
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1804
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1806
  if g_param[OptionsDefine.Language]:
1552
1807
  profile.language = g_param[OptionsDefine.Language]
1553
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +1842,10 @@ def doDeleteDatahubTopic(args, parsed_globals):
1587
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1844
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1850
  else:
1593
1851
  cred = credential.Credential(
@@ -1599,7 +1857,7 @@ def doDeleteDatahubTopic(args, parsed_globals):
1599
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1859
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1861
  if g_param[OptionsDefine.Language]:
1604
1862
  profile.language = g_param[OptionsDefine.Language]
1605
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1897,10 @@ def doCreateConnectResource(args, parsed_globals):
1639
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1899
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1905
  else:
1645
1906
  cred = credential.Credential(
@@ -1651,7 +1912,7 @@ def doCreateConnectResource(args, parsed_globals):
1651
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1914
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1916
  if g_param[OptionsDefine.Language]:
1656
1917
  profile.language = g_param[OptionsDefine.Language]
1657
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +1952,10 @@ def doFetchDatahubMessageByOffset(args, parsed_globals):
1691
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1954
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1960
  else:
1697
1961
  cred = credential.Credential(
@@ -1703,7 +1967,7 @@ def doFetchDatahubMessageByOffset(args, parsed_globals):
1703
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1969
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1971
  if g_param[OptionsDefine.Language]:
1708
1972
  profile.language = g_param[OptionsDefine.Language]
1709
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +2007,10 @@ def doDeleteAcl(args, parsed_globals):
1743
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2009
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2015
  else:
1749
2016
  cred = credential.Credential(
@@ -1755,7 +2022,7 @@ def doDeleteAcl(args, parsed_globals):
1755
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1756
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
2024
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
2026
  if g_param[OptionsDefine.Language]:
1760
2027
  profile.language = g_param[OptionsDefine.Language]
1761
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1795,7 +2062,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1795
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
2064
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
2070
  else:
1801
2071
  cred = credential.Credential(
@@ -1807,7 +2077,7 @@ def doDescribeInstanceAttributes(args, parsed_globals):
1807
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1808
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
2079
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
2081
  if g_param[OptionsDefine.Language]:
1812
2082
  profile.language = g_param[OptionsDefine.Language]
1813
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +2117,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
1847
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2119
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2125
  else:
1853
2126
  cred = credential.Credential(
@@ -1859,7 +2132,7 @@ def doCreatePostPaidInstance(args, parsed_globals):
1859
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2134
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2136
  if g_param[OptionsDefine.Language]:
1864
2137
  profile.language = g_param[OptionsDefine.Language]
1865
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1899,7 +2172,10 @@ def doAuthorizeToken(args, parsed_globals):
1899
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2174
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2180
  else:
1905
2181
  cred = credential.Credential(
@@ -1911,7 +2187,7 @@ def doAuthorizeToken(args, parsed_globals):
1911
2187
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2189
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2191
  if g_param[OptionsDefine.Language]:
1916
2192
  profile.language = g_param[OptionsDefine.Language]
1917
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1941,7 +2217,7 @@ def doAuthorizeToken(args, parsed_globals):
1941
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
2218
 
1943
2219
 
1944
- def doDescribeDatahubTopic(args, parsed_globals):
2220
+ def doPauseDatahubTask(args, parsed_globals):
1945
2221
  g_param = parse_global_arg(parsed_globals)
1946
2222
 
1947
2223
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1951,7 +2227,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
1951
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2229
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2235
  else:
1957
2236
  cred = credential.Credential(
@@ -1963,18 +2242,18 @@ def doDescribeDatahubTopic(args, parsed_globals):
1963
2242
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2244
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2246
  if g_param[OptionsDefine.Language]:
1968
2247
  profile.language = g_param[OptionsDefine.Language]
1969
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1970
2249
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
1971
2250
  client._sdkVersion += ("_CLI_" + __version__)
1972
2251
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1973
- model = models.DescribeDatahubTopicRequest()
2252
+ model = models.PauseDatahubTaskRequest()
1974
2253
  model.from_json_string(json.dumps(args))
1975
2254
  start_time = time.time()
1976
2255
  while True:
1977
- rsp = client.DescribeDatahubTopic(model)
2256
+ rsp = client.PauseDatahubTask(model)
1978
2257
  result = rsp.to_json_string()
1979
2258
  try:
1980
2259
  json_obj = json.loads(result)
@@ -2003,7 +2282,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
2003
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2284
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2290
  else:
2009
2291
  cred = credential.Credential(
@@ -2015,7 +2297,7 @@ def doDescribeCkafkaZone(args, parsed_globals):
2015
2297
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2299
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2301
  if g_param[OptionsDefine.Language]:
2020
2302
  profile.language = g_param[OptionsDefine.Language]
2021
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2055,7 +2337,10 @@ def doDescribeRoute(args, parsed_globals):
2055
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2339
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2345
  else:
2061
2346
  cred = credential.Credential(
@@ -2067,7 +2352,7 @@ def doDescribeRoute(args, parsed_globals):
2067
2352
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2354
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2356
  if g_param[OptionsDefine.Language]:
2072
2357
  profile.language = g_param[OptionsDefine.Language]
2073
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2107,7 +2392,10 @@ def doModifyDatahubTask(args, parsed_globals):
2107
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2394
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2400
  else:
2113
2401
  cred = credential.Credential(
@@ -2119,7 +2407,7 @@ def doModifyDatahubTask(args, parsed_globals):
2119
2407
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2409
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2411
  if g_param[OptionsDefine.Language]:
2124
2412
  profile.language = g_param[OptionsDefine.Language]
2125
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2159,7 +2447,10 @@ def doDescribeConnectResource(args, parsed_globals):
2159
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2449
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2455
  else:
2165
2456
  cred = credential.Credential(
@@ -2171,7 +2462,7 @@ def doDescribeConnectResource(args, parsed_globals):
2171
2462
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2464
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2466
  if g_param[OptionsDefine.Language]:
2176
2467
  profile.language = g_param[OptionsDefine.Language]
2177
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2211,7 +2502,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
2211
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2504
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2510
  else:
2217
2511
  cred = credential.Credential(
@@ -2223,7 +2517,7 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
2223
2517
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2519
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2521
  if g_param[OptionsDefine.Language]:
2228
2522
  profile.language = g_param[OptionsDefine.Language]
2229
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2263,7 +2557,10 @@ def doDeleteRoute(args, parsed_globals):
2263
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
2559
  )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
2565
  else:
2269
2566
  cred = credential.Credential(
@@ -2275,7 +2572,7 @@ def doDeleteRoute(args, parsed_globals):
2275
2572
  endpoint=g_param[OptionsDefine.Endpoint],
2276
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
2574
  )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2279
2576
  if g_param[OptionsDefine.Language]:
2280
2577
  profile.language = g_param[OptionsDefine.Language]
2281
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2315,7 +2612,10 @@ def doModifyTopicAttributes(args, parsed_globals):
2315
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
2614
  )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
2620
  else:
2321
2621
  cred = credential.Credential(
@@ -2327,7 +2627,7 @@ def doModifyTopicAttributes(args, parsed_globals):
2327
2627
  endpoint=g_param[OptionsDefine.Endpoint],
2328
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
2629
  )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2331
2631
  if g_param[OptionsDefine.Language]:
2332
2632
  profile.language = g_param[OptionsDefine.Language]
2333
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2367,7 +2667,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
2367
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2669
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2675
  else:
2373
2676
  cred = credential.Credential(
@@ -2379,7 +2682,7 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
2379
2682
  endpoint=g_param[OptionsDefine.Endpoint],
2380
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
2684
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
2686
  if g_param[OptionsDefine.Language]:
2384
2687
  profile.language = g_param[OptionsDefine.Language]
2385
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2409,6 +2712,61 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
2409
2712
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
2713
 
2411
2714
 
2715
+ def doDescribeCkafkaVersion(args, parsed_globals):
2716
+ g_param = parse_global_arg(parsed_globals)
2717
+
2718
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2719
+ cred = credential.CVMRoleCredential()
2720
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2721
+ cred = credential.STSAssumeRoleCredential(
2722
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2723
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2724
+ )
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2729
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2730
+ else:
2731
+ cred = credential.Credential(
2732
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2733
+ )
2734
+ http_profile = HttpProfile(
2735
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2736
+ reqMethod="POST",
2737
+ endpoint=g_param[OptionsDefine.Endpoint],
2738
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2739
+ )
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2741
+ if g_param[OptionsDefine.Language]:
2742
+ profile.language = g_param[OptionsDefine.Language]
2743
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2744
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2745
+ client._sdkVersion += ("_CLI_" + __version__)
2746
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2747
+ model = models.DescribeCkafkaVersionRequest()
2748
+ model.from_json_string(json.dumps(args))
2749
+ start_time = time.time()
2750
+ while True:
2751
+ rsp = client.DescribeCkafkaVersion(model)
2752
+ result = rsp.to_json_string()
2753
+ try:
2754
+ json_obj = json.loads(result)
2755
+ except TypeError as e:
2756
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2757
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2758
+ break
2759
+ cur_time = time.time()
2760
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2761
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2762
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2763
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2764
+ else:
2765
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2766
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2767
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2768
+
2769
+
2412
2770
  def doModifyGroupOffsets(args, parsed_globals):
2413
2771
  g_param = parse_global_arg(parsed_globals)
2414
2772
 
@@ -2419,7 +2777,10 @@ def doModifyGroupOffsets(args, parsed_globals):
2419
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2779
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2785
  else:
2425
2786
  cred = credential.Credential(
@@ -2431,7 +2792,7 @@ def doModifyGroupOffsets(args, parsed_globals):
2431
2792
  endpoint=g_param[OptionsDefine.Endpoint],
2432
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
2794
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
2796
  if g_param[OptionsDefine.Language]:
2436
2797
  profile.language = g_param[OptionsDefine.Language]
2437
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2471,7 +2832,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
2471
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2834
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2840
  else:
2477
2841
  cred = credential.Credential(
@@ -2483,7 +2847,7 @@ def doModifyInstanceAttributes(args, parsed_globals):
2483
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2484
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
2849
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
2851
  if g_param[OptionsDefine.Language]:
2488
2852
  profile.language = g_param[OptionsDefine.Language]
2489
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2523,7 +2887,10 @@ def doDeleteGroup(args, parsed_globals):
2523
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2889
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2895
  else:
2529
2896
  cred = credential.Credential(
@@ -2535,7 +2902,7 @@ def doDeleteGroup(args, parsed_globals):
2535
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2536
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
2904
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
2906
  if g_param[OptionsDefine.Language]:
2540
2907
  profile.language = g_param[OptionsDefine.Language]
2541
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2565,7 +2932,7 @@ def doDeleteGroup(args, parsed_globals):
2565
2932
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
2933
 
2567
2934
 
2568
- def doDeleteInstancePost(args, parsed_globals):
2935
+ def doResumeDatahubTask(args, parsed_globals):
2569
2936
  g_param = parse_global_arg(parsed_globals)
2570
2937
 
2571
2938
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2575,7 +2942,10 @@ def doDeleteInstancePost(args, parsed_globals):
2575
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2944
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2950
  else:
2581
2951
  cred = credential.Credential(
@@ -2587,18 +2957,18 @@ def doDeleteInstancePost(args, parsed_globals):
2587
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2588
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
2959
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
2961
  if g_param[OptionsDefine.Language]:
2592
2962
  profile.language = g_param[OptionsDefine.Language]
2593
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2594
2964
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2595
2965
  client._sdkVersion += ("_CLI_" + __version__)
2596
2966
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2597
- model = models.DeleteInstancePostRequest()
2967
+ model = models.ResumeDatahubTaskRequest()
2598
2968
  model.from_json_string(json.dumps(args))
2599
2969
  start_time = time.time()
2600
2970
  while True:
2601
- rsp = client.DeleteInstancePost(model)
2971
+ rsp = client.ResumeDatahubTask(model)
2602
2972
  result = rsp.to_json_string()
2603
2973
  try:
2604
2974
  json_obj = json.loads(result)
@@ -2627,7 +2997,10 @@ def doDescribeACL(args, parsed_globals):
2627
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2999
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
3005
  else:
2633
3006
  cred = credential.Credential(
@@ -2639,7 +3012,7 @@ def doDescribeACL(args, parsed_globals):
2639
3012
  endpoint=g_param[OptionsDefine.Endpoint],
2640
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
3014
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
3016
  if g_param[OptionsDefine.Language]:
2644
3017
  profile.language = g_param[OptionsDefine.Language]
2645
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2669,7 +3042,7 @@ def doDescribeACL(args, parsed_globals):
2669
3042
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2670
3043
 
2671
3044
 
2672
- def doCreateInstancePre(args, parsed_globals):
3045
+ def doDeleteInstancePost(args, parsed_globals):
2673
3046
  g_param = parse_global_arg(parsed_globals)
2674
3047
 
2675
3048
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2679,7 +3052,10 @@ def doCreateInstancePre(args, parsed_globals):
2679
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
3054
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
3060
  else:
2685
3061
  cred = credential.Credential(
@@ -2691,18 +3067,18 @@ def doCreateInstancePre(args, parsed_globals):
2691
3067
  endpoint=g_param[OptionsDefine.Endpoint],
2692
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
3069
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
3071
  if g_param[OptionsDefine.Language]:
2696
3072
  profile.language = g_param[OptionsDefine.Language]
2697
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2698
3074
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2699
3075
  client._sdkVersion += ("_CLI_" + __version__)
2700
3076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2701
- model = models.CreateInstancePreRequest()
3077
+ model = models.DeleteInstancePostRequest()
2702
3078
  model.from_json_string(json.dumps(args))
2703
3079
  start_time = time.time()
2704
3080
  while True:
2705
- rsp = client.CreateInstancePre(model)
3081
+ rsp = client.DeleteInstancePost(model)
2706
3082
  result = rsp.to_json_string()
2707
3083
  try:
2708
3084
  json_obj = json.loads(result)
@@ -2721,7 +3097,7 @@ def doCreateInstancePre(args, parsed_globals):
2721
3097
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2722
3098
 
2723
3099
 
2724
- def doModifyConnectResource(args, parsed_globals):
3100
+ def doDeleteTopicIpWhiteList(args, parsed_globals):
2725
3101
  g_param = parse_global_arg(parsed_globals)
2726
3102
 
2727
3103
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2731,7 +3107,10 @@ def doModifyConnectResource(args, parsed_globals):
2731
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
3109
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
3115
  else:
2737
3116
  cred = credential.Credential(
@@ -2743,18 +3122,18 @@ def doModifyConnectResource(args, parsed_globals):
2743
3122
  endpoint=g_param[OptionsDefine.Endpoint],
2744
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
3124
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
3126
  if g_param[OptionsDefine.Language]:
2748
3127
  profile.language = g_param[OptionsDefine.Language]
2749
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2750
3129
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2751
3130
  client._sdkVersion += ("_CLI_" + __version__)
2752
3131
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2753
- model = models.ModifyConnectResourceRequest()
3132
+ model = models.DeleteTopicIpWhiteListRequest()
2754
3133
  model.from_json_string(json.dumps(args))
2755
3134
  start_time = time.time()
2756
3135
  while True:
2757
- rsp = client.ModifyConnectResource(model)
3136
+ rsp = client.DeleteTopicIpWhiteList(model)
2758
3137
  result = rsp.to_json_string()
2759
3138
  try:
2760
3139
  json_obj = json.loads(result)
@@ -2773,7 +3152,7 @@ def doModifyConnectResource(args, parsed_globals):
2773
3152
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2774
3153
 
2775
3154
 
2776
- def doDeleteTopicIpWhiteList(args, parsed_globals):
3155
+ def doDescribeTaskStatus(args, parsed_globals):
2777
3156
  g_param = parse_global_arg(parsed_globals)
2778
3157
 
2779
3158
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2783,7 +3162,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
2783
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
3164
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
3170
  else:
2789
3171
  cred = credential.Credential(
@@ -2795,18 +3177,18 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
2795
3177
  endpoint=g_param[OptionsDefine.Endpoint],
2796
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
3179
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
3181
  if g_param[OptionsDefine.Language]:
2800
3182
  profile.language = g_param[OptionsDefine.Language]
2801
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2802
3184
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2803
3185
  client._sdkVersion += ("_CLI_" + __version__)
2804
3186
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2805
- model = models.DeleteTopicIpWhiteListRequest()
3187
+ model = models.DescribeTaskStatusRequest()
2806
3188
  model.from_json_string(json.dumps(args))
2807
3189
  start_time = time.time()
2808
3190
  while True:
2809
- rsp = client.DeleteTopicIpWhiteList(model)
3191
+ rsp = client.DescribeTaskStatus(model)
2810
3192
  result = rsp.to_json_string()
2811
3193
  try:
2812
3194
  json_obj = json.loads(result)
@@ -2825,7 +3207,7 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
2825
3207
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2826
3208
 
2827
3209
 
2828
- def doDescribeTaskStatus(args, parsed_globals):
3210
+ def doDescribeTopicSyncReplica(args, parsed_globals):
2829
3211
  g_param = parse_global_arg(parsed_globals)
2830
3212
 
2831
3213
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2835,7 +3217,10 @@ def doDescribeTaskStatus(args, parsed_globals):
2835
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
3219
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
3225
  else:
2841
3226
  cred = credential.Credential(
@@ -2847,18 +3232,18 @@ def doDescribeTaskStatus(args, parsed_globals):
2847
3232
  endpoint=g_param[OptionsDefine.Endpoint],
2848
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
3234
  )
2850
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
3236
  if g_param[OptionsDefine.Language]:
2852
3237
  profile.language = g_param[OptionsDefine.Language]
2853
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2854
3239
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2855
3240
  client._sdkVersion += ("_CLI_" + __version__)
2856
3241
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2857
- model = models.DescribeTaskStatusRequest()
3242
+ model = models.DescribeTopicSyncReplicaRequest()
2858
3243
  model.from_json_string(json.dumps(args))
2859
3244
  start_time = time.time()
2860
3245
  while True:
2861
- rsp = client.DescribeTaskStatus(model)
3246
+ rsp = client.DescribeTopicSyncReplica(model)
2862
3247
  result = rsp.to_json_string()
2863
3248
  try:
2864
3249
  json_obj = json.loads(result)
@@ -2877,7 +3262,7 @@ def doDescribeTaskStatus(args, parsed_globals):
2877
3262
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2878
3263
 
2879
3264
 
2880
- def doDescribeTopicSyncReplica(args, parsed_globals):
3265
+ def doCreateInstancePre(args, parsed_globals):
2881
3266
  g_param = parse_global_arg(parsed_globals)
2882
3267
 
2883
3268
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2887,7 +3272,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2887
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
3274
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
3280
  else:
2893
3281
  cred = credential.Credential(
@@ -2899,18 +3287,18 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
2899
3287
  endpoint=g_param[OptionsDefine.Endpoint],
2900
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2901
3289
  )
2902
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2903
3291
  if g_param[OptionsDefine.Language]:
2904
3292
  profile.language = g_param[OptionsDefine.Language]
2905
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2906
3294
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
2907
3295
  client._sdkVersion += ("_CLI_" + __version__)
2908
3296
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2909
- model = models.DescribeTopicSyncReplicaRequest()
3297
+ model = models.CreateInstancePreRequest()
2910
3298
  model.from_json_string(json.dumps(args))
2911
3299
  start_time = time.time()
2912
3300
  while True:
2913
- rsp = client.DescribeTopicSyncReplica(model)
3301
+ rsp = client.CreateInstancePre(model)
2914
3302
  result = rsp.to_json_string()
2915
3303
  try:
2916
3304
  json_obj = json.loads(result)
@@ -2939,7 +3327,10 @@ def doBatchCreateAcl(args, parsed_globals):
2939
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
3329
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
3335
  else:
2945
3336
  cred = credential.Credential(
@@ -2951,7 +3342,7 @@ def doBatchCreateAcl(args, parsed_globals):
2951
3342
  endpoint=g_param[OptionsDefine.Endpoint],
2952
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2953
3344
  )
2954
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2955
3346
  if g_param[OptionsDefine.Language]:
2956
3347
  profile.language = g_param[OptionsDefine.Language]
2957
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2991,7 +3382,10 @@ def doCreateDatahubTask(args, parsed_globals):
2991
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
3384
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3390
  else:
2997
3391
  cred = credential.Credential(
@@ -3003,7 +3397,7 @@ def doCreateDatahubTask(args, parsed_globals):
3003
3397
  endpoint=g_param[OptionsDefine.Endpoint],
3004
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3005
3399
  )
3006
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3007
3401
  if g_param[OptionsDefine.Language]:
3008
3402
  profile.language = g_param[OptionsDefine.Language]
3009
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3043,7 +3437,10 @@ def doDeleteAclRule(args, parsed_globals):
3043
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3439
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3445
  else:
3049
3446
  cred = credential.Credential(
@@ -3055,7 +3452,7 @@ def doDeleteAclRule(args, parsed_globals):
3055
3452
  endpoint=g_param[OptionsDefine.Endpoint],
3056
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3057
3454
  )
3058
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3059
3456
  if g_param[OptionsDefine.Language]:
3060
3457
  profile.language = g_param[OptionsDefine.Language]
3061
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3095,7 +3492,10 @@ def doModifyAclRule(args, parsed_globals):
3095
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3494
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3500
  else:
3101
3501
  cred = credential.Credential(
@@ -3107,7 +3507,7 @@ def doModifyAclRule(args, parsed_globals):
3107
3507
  endpoint=g_param[OptionsDefine.Endpoint],
3108
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
3509
  )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3111
3511
  if g_param[OptionsDefine.Language]:
3112
3512
  profile.language = g_param[OptionsDefine.Language]
3113
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3147,7 +3547,10 @@ def doDeleteUser(args, parsed_globals):
3147
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3549
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3555
  else:
3153
3556
  cred = credential.Credential(
@@ -3159,7 +3562,7 @@ def doDeleteUser(args, parsed_globals):
3159
3562
  endpoint=g_param[OptionsDefine.Endpoint],
3160
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3161
3564
  )
3162
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3163
3566
  if g_param[OptionsDefine.Language]:
3164
3567
  profile.language = g_param[OptionsDefine.Language]
3165
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3199,7 +3602,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
3199
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3604
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3610
  else:
3205
3611
  cred = credential.Credential(
@@ -3211,7 +3617,7 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
3211
3617
  endpoint=g_param[OptionsDefine.Endpoint],
3212
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3213
3619
  )
3214
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3215
3621
  if g_param[OptionsDefine.Language]:
3216
3622
  profile.language = g_param[OptionsDefine.Language]
3217
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3251,7 +3657,10 @@ def doDescribeTopic(args, parsed_globals):
3251
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3659
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3665
  else:
3257
3666
  cred = credential.Credential(
@@ -3263,7 +3672,7 @@ def doDescribeTopic(args, parsed_globals):
3263
3672
  endpoint=g_param[OptionsDefine.Endpoint],
3264
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
3674
  )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3267
3676
  if g_param[OptionsDefine.Language]:
3268
3677
  profile.language = g_param[OptionsDefine.Language]
3269
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3303,7 +3712,10 @@ def doDescribeConnectResources(args, parsed_globals):
3303
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3714
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3720
  else:
3309
3721
  cred = credential.Credential(
@@ -3315,7 +3727,7 @@ def doDescribeConnectResources(args, parsed_globals):
3315
3727
  endpoint=g_param[OptionsDefine.Endpoint],
3316
3728
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3317
3729
  )
3318
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3730
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3319
3731
  if g_param[OptionsDefine.Language]:
3320
3732
  profile.language = g_param[OptionsDefine.Language]
3321
3733
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3345,6 +3757,116 @@ def doDescribeConnectResources(args, parsed_globals):
3345
3757
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3346
3758
 
3347
3759
 
3760
+ def doDescribeModifyType(args, parsed_globals):
3761
+ g_param = parse_global_arg(parsed_globals)
3762
+
3763
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3764
+ cred = credential.CVMRoleCredential()
3765
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3766
+ cred = credential.STSAssumeRoleCredential(
3767
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3768
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3769
+ )
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3774
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3775
+ else:
3776
+ cred = credential.Credential(
3777
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3778
+ )
3779
+ http_profile = HttpProfile(
3780
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3781
+ reqMethod="POST",
3782
+ endpoint=g_param[OptionsDefine.Endpoint],
3783
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3784
+ )
3785
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3786
+ if g_param[OptionsDefine.Language]:
3787
+ profile.language = g_param[OptionsDefine.Language]
3788
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3789
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3790
+ client._sdkVersion += ("_CLI_" + __version__)
3791
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3792
+ model = models.DescribeModifyTypeRequest()
3793
+ model.from_json_string(json.dumps(args))
3794
+ start_time = time.time()
3795
+ while True:
3796
+ rsp = client.DescribeModifyType(model)
3797
+ result = rsp.to_json_string()
3798
+ try:
3799
+ json_obj = json.loads(result)
3800
+ except TypeError as e:
3801
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3802
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3803
+ break
3804
+ cur_time = time.time()
3805
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3806
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3807
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3808
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3809
+ else:
3810
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3811
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3812
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3813
+
3814
+
3815
+ def doRestartDatahubTask(args, parsed_globals):
3816
+ g_param = parse_global_arg(parsed_globals)
3817
+
3818
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3819
+ cred = credential.CVMRoleCredential()
3820
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3821
+ cred = credential.STSAssumeRoleCredential(
3822
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3823
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3824
+ )
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3829
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3830
+ else:
3831
+ cred = credential.Credential(
3832
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3833
+ )
3834
+ http_profile = HttpProfile(
3835
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3836
+ reqMethod="POST",
3837
+ endpoint=g_param[OptionsDefine.Endpoint],
3838
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3839
+ )
3840
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3841
+ if g_param[OptionsDefine.Language]:
3842
+ profile.language = g_param[OptionsDefine.Language]
3843
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3844
+ client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3845
+ client._sdkVersion += ("_CLI_" + __version__)
3846
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3847
+ model = models.RestartDatahubTaskRequest()
3848
+ model.from_json_string(json.dumps(args))
3849
+ start_time = time.time()
3850
+ while True:
3851
+ rsp = client.RestartDatahubTask(model)
3852
+ result = rsp.to_json_string()
3853
+ try:
3854
+ json_obj = json.loads(result)
3855
+ except TypeError as e:
3856
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3857
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3858
+ break
3859
+ cur_time = time.time()
3860
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3861
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3862
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3863
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3864
+ else:
3865
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3866
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3867
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3868
+
3869
+
3348
3870
  def doCreateConsumer(args, parsed_globals):
3349
3871
  g_param = parse_global_arg(parsed_globals)
3350
3872
 
@@ -3355,7 +3877,10 @@ def doCreateConsumer(args, parsed_globals):
3355
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3879
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3885
  else:
3361
3886
  cred = credential.Credential(
@@ -3367,7 +3892,7 @@ def doCreateConsumer(args, parsed_globals):
3367
3892
  endpoint=g_param[OptionsDefine.Endpoint],
3368
3893
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3369
3894
  )
3370
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3895
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3371
3896
  if g_param[OptionsDefine.Language]:
3372
3897
  profile.language = g_param[OptionsDefine.Language]
3373
3898
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3407,7 +3932,10 @@ def doDescribeTypeInstances(args, parsed_globals):
3407
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3934
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3940
  else:
3413
3941
  cred = credential.Credential(
@@ -3419,7 +3947,7 @@ def doDescribeTypeInstances(args, parsed_globals):
3419
3947
  endpoint=g_param[OptionsDefine.Endpoint],
3420
3948
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3421
3949
  )
3422
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3950
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3423
3951
  if g_param[OptionsDefine.Language]:
3424
3952
  profile.language = g_param[OptionsDefine.Language]
3425
3953
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3459,7 +3987,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
3459
3987
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3988
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3989
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3994
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3995
  else:
3465
3996
  cred = credential.Credential(
@@ -3471,7 +4002,7 @@ def doDescribeDatahubTopics(args, parsed_globals):
3471
4002
  endpoint=g_param[OptionsDefine.Endpoint],
3472
4003
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3473
4004
  )
3474
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4005
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3475
4006
  if g_param[OptionsDefine.Language]:
3476
4007
  profile.language = g_param[OptionsDefine.Language]
3477
4008
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3511,7 +4042,10 @@ def doDescribeSecurityGroupRoutes(args, parsed_globals):
3511
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
4044
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
4050
  else:
3517
4051
  cred = credential.Credential(
@@ -3523,7 +4057,7 @@ def doDescribeSecurityGroupRoutes(args, parsed_globals):
3523
4057
  endpoint=g_param[OptionsDefine.Endpoint],
3524
4058
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3525
4059
  )
3526
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4060
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3527
4061
  if g_param[OptionsDefine.Language]:
3528
4062
  profile.language = g_param[OptionsDefine.Language]
3529
4063
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3563,7 +4097,10 @@ def doDeleteDatahubTask(args, parsed_globals):
3563
4097
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
4098
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
4099
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
4104
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
4105
  else:
3569
4106
  cred = credential.Credential(
@@ -3575,7 +4112,7 @@ def doDeleteDatahubTask(args, parsed_globals):
3575
4112
  endpoint=g_param[OptionsDefine.Endpoint],
3576
4113
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3577
4114
  )
3578
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4115
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3579
4116
  if g_param[OptionsDefine.Language]:
3580
4117
  profile.language = g_param[OptionsDefine.Language]
3581
4118
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3615,7 +4152,10 @@ def doDescribeGroup(args, parsed_globals):
3615
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
4154
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
4160
  else:
3621
4161
  cred = credential.Credential(
@@ -3627,7 +4167,7 @@ def doDescribeGroup(args, parsed_globals):
3627
4167
  endpoint=g_param[OptionsDefine.Endpoint],
3628
4168
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3629
4169
  )
3630
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4170
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3631
4171
  if g_param[OptionsDefine.Language]:
3632
4172
  profile.language = g_param[OptionsDefine.Language]
3633
4173
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3667,7 +4207,10 @@ def doDescribeInstances(args, parsed_globals):
3667
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
4209
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
4215
  else:
3673
4216
  cred = credential.Credential(
@@ -3679,7 +4222,7 @@ def doDescribeInstances(args, parsed_globals):
3679
4222
  endpoint=g_param[OptionsDefine.Endpoint],
3680
4223
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
4224
  )
3682
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4225
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3683
4226
  if g_param[OptionsDefine.Language]:
3684
4227
  profile.language = g_param[OptionsDefine.Language]
3685
4228
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3709,7 +4252,7 @@ def doDescribeInstances(args, parsed_globals):
3709
4252
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
4253
 
3711
4254
 
3712
- def doCreateRoute(args, parsed_globals):
4255
+ def doDescribeDatahubTopic(args, parsed_globals):
3713
4256
  g_param = parse_global_arg(parsed_globals)
3714
4257
 
3715
4258
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3719,7 +4262,10 @@ def doCreateRoute(args, parsed_globals):
3719
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
4264
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
4270
  else:
3725
4271
  cred = credential.Credential(
@@ -3731,18 +4277,18 @@ def doCreateRoute(args, parsed_globals):
3731
4277
  endpoint=g_param[OptionsDefine.Endpoint],
3732
4278
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3733
4279
  )
3734
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4280
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3735
4281
  if g_param[OptionsDefine.Language]:
3736
4282
  profile.language = g_param[OptionsDefine.Language]
3737
4283
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3738
4284
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3739
4285
  client._sdkVersion += ("_CLI_" + __version__)
3740
4286
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3741
- model = models.CreateRouteRequest()
4287
+ model = models.DescribeDatahubTopicRequest()
3742
4288
  model.from_json_string(json.dumps(args))
3743
4289
  start_time = time.time()
3744
4290
  while True:
3745
- rsp = client.CreateRoute(model)
4291
+ rsp = client.DescribeDatahubTopic(model)
3746
4292
  result = rsp.to_json_string()
3747
4293
  try:
3748
4294
  json_obj = json.loads(result)
@@ -3761,7 +4307,7 @@ def doCreateRoute(args, parsed_globals):
3761
4307
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3762
4308
 
3763
4309
 
3764
- def doDescribeTopicDetail(args, parsed_globals):
4310
+ def doCreateRoute(args, parsed_globals):
3765
4311
  g_param = parse_global_arg(parsed_globals)
3766
4312
 
3767
4313
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3771,7 +4317,10 @@ def doDescribeTopicDetail(args, parsed_globals):
3771
4317
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
4318
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
4319
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
4324
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
4325
  else:
3777
4326
  cred = credential.Credential(
@@ -3783,18 +4332,18 @@ def doDescribeTopicDetail(args, parsed_globals):
3783
4332
  endpoint=g_param[OptionsDefine.Endpoint],
3784
4333
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3785
4334
  )
3786
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4335
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3787
4336
  if g_param[OptionsDefine.Language]:
3788
4337
  profile.language = g_param[OptionsDefine.Language]
3789
4338
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3790
4339
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3791
4340
  client._sdkVersion += ("_CLI_" + __version__)
3792
4341
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3793
- model = models.DescribeTopicDetailRequest()
4342
+ model = models.CreateRouteRequest()
3794
4343
  model.from_json_string(json.dumps(args))
3795
4344
  start_time = time.time()
3796
4345
  while True:
3797
- rsp = client.DescribeTopicDetail(model)
4346
+ rsp = client.CreateRoute(model)
3798
4347
  result = rsp.to_json_string()
3799
4348
  try:
3800
4349
  json_obj = json.loads(result)
@@ -3813,7 +4362,7 @@ def doDescribeTopicDetail(args, parsed_globals):
3813
4362
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3814
4363
 
3815
4364
 
3816
- def doFetchMessageByOffset(args, parsed_globals):
4365
+ def doDescribeTopicDetail(args, parsed_globals):
3817
4366
  g_param = parse_global_arg(parsed_globals)
3818
4367
 
3819
4368
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3823,7 +4372,10 @@ def doFetchMessageByOffset(args, parsed_globals):
3823
4372
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
4373
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
4374
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
4379
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
4380
  else:
3829
4381
  cred = credential.Credential(
@@ -3835,18 +4387,18 @@ def doFetchMessageByOffset(args, parsed_globals):
3835
4387
  endpoint=g_param[OptionsDefine.Endpoint],
3836
4388
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
4389
  )
3838
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4390
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3839
4391
  if g_param[OptionsDefine.Language]:
3840
4392
  profile.language = g_param[OptionsDefine.Language]
3841
4393
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3842
4394
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3843
4395
  client._sdkVersion += ("_CLI_" + __version__)
3844
4396
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3845
- model = models.FetchMessageByOffsetRequest()
4397
+ model = models.DescribeTopicDetailRequest()
3846
4398
  model.from_json_string(json.dumps(args))
3847
4399
  start_time = time.time()
3848
4400
  while True:
3849
- rsp = client.FetchMessageByOffset(model)
4401
+ rsp = client.DescribeTopicDetail(model)
3850
4402
  result = rsp.to_json_string()
3851
4403
  try:
3852
4404
  json_obj = json.loads(result)
@@ -3865,7 +4417,7 @@ def doFetchMessageByOffset(args, parsed_globals):
3865
4417
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
4418
 
3867
4419
 
3868
- def doModifyPassword(args, parsed_globals):
4420
+ def doFetchMessageByOffset(args, parsed_globals):
3869
4421
  g_param = parse_global_arg(parsed_globals)
3870
4422
 
3871
4423
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3875,7 +4427,10 @@ def doModifyPassword(args, parsed_globals):
3875
4427
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3876
4428
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3877
4429
  )
3878
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4430
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4431
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4432
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3879
4434
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3880
4435
  else:
3881
4436
  cred = credential.Credential(
@@ -3887,18 +4442,18 @@ def doModifyPassword(args, parsed_globals):
3887
4442
  endpoint=g_param[OptionsDefine.Endpoint],
3888
4443
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3889
4444
  )
3890
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4445
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3891
4446
  if g_param[OptionsDefine.Language]:
3892
4447
  profile.language = g_param[OptionsDefine.Language]
3893
4448
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3894
4449
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3895
4450
  client._sdkVersion += ("_CLI_" + __version__)
3896
4451
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3897
- model = models.ModifyPasswordRequest()
4452
+ model = models.FetchMessageByOffsetRequest()
3898
4453
  model.from_json_string(json.dumps(args))
3899
4454
  start_time = time.time()
3900
4455
  while True:
3901
- rsp = client.ModifyPassword(model)
4456
+ rsp = client.FetchMessageByOffset(model)
3902
4457
  result = rsp.to_json_string()
3903
4458
  try:
3904
4459
  json_obj = json.loads(result)
@@ -3917,7 +4472,7 @@ def doModifyPassword(args, parsed_globals):
3917
4472
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3918
4473
 
3919
4474
 
3920
- def doCreateAcl(args, parsed_globals):
4475
+ def doModifyPassword(args, parsed_globals):
3921
4476
  g_param = parse_global_arg(parsed_globals)
3922
4477
 
3923
4478
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3927,7 +4482,10 @@ def doCreateAcl(args, parsed_globals):
3927
4482
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3928
4483
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3929
4484
  )
3930
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4485
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4486
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4487
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3931
4489
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3932
4490
  else:
3933
4491
  cred = credential.Credential(
@@ -3939,18 +4497,18 @@ def doCreateAcl(args, parsed_globals):
3939
4497
  endpoint=g_param[OptionsDefine.Endpoint],
3940
4498
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3941
4499
  )
3942
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4500
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3943
4501
  if g_param[OptionsDefine.Language]:
3944
4502
  profile.language = g_param[OptionsDefine.Language]
3945
4503
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3946
4504
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3947
4505
  client._sdkVersion += ("_CLI_" + __version__)
3948
4506
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3949
- model = models.CreateAclRequest()
4507
+ model = models.ModifyPasswordRequest()
3950
4508
  model.from_json_string(json.dumps(args))
3951
4509
  start_time = time.time()
3952
4510
  while True:
3953
- rsp = client.CreateAcl(model)
4511
+ rsp = client.ModifyPassword(model)
3954
4512
  result = rsp.to_json_string()
3955
4513
  try:
3956
4514
  json_obj = json.loads(result)
@@ -3969,7 +4527,7 @@ def doCreateAcl(args, parsed_globals):
3969
4527
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3970
4528
 
3971
4529
 
3972
- def doDescribeTopicSubscribeGroup(args, parsed_globals):
4530
+ def doCreateAcl(args, parsed_globals):
3973
4531
  g_param = parse_global_arg(parsed_globals)
3974
4532
 
3975
4533
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3979,7 +4537,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
3979
4537
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3980
4538
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3981
4539
  )
3982
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4540
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4541
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4542
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3983
4544
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3984
4545
  else:
3985
4546
  cred = credential.Credential(
@@ -3991,18 +4552,18 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
3991
4552
  endpoint=g_param[OptionsDefine.Endpoint],
3992
4553
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3993
4554
  )
3994
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4555
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3995
4556
  if g_param[OptionsDefine.Language]:
3996
4557
  profile.language = g_param[OptionsDefine.Language]
3997
4558
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3998
4559
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
3999
4560
  client._sdkVersion += ("_CLI_" + __version__)
4000
4561
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4001
- model = models.DescribeTopicSubscribeGroupRequest()
4562
+ model = models.CreateAclRequest()
4002
4563
  model.from_json_string(json.dumps(args))
4003
4564
  start_time = time.time()
4004
4565
  while True:
4005
- rsp = client.DescribeTopicSubscribeGroup(model)
4566
+ rsp = client.CreateAcl(model)
4006
4567
  result = rsp.to_json_string()
4007
4568
  try:
4008
4569
  json_obj = json.loads(result)
@@ -4021,7 +4582,7 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
4021
4582
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4022
4583
 
4023
4584
 
4024
- def doModifyRoutineMaintenanceTask(args, parsed_globals):
4585
+ def doDescribeTopicSubscribeGroup(args, parsed_globals):
4025
4586
  g_param = parse_global_arg(parsed_globals)
4026
4587
 
4027
4588
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4031,7 +4592,10 @@ def doModifyRoutineMaintenanceTask(args, parsed_globals):
4031
4592
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
4593
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
4594
  )
4034
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4595
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4596
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4597
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
4599
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
4600
  else:
4037
4601
  cred = credential.Credential(
@@ -4043,18 +4607,18 @@ def doModifyRoutineMaintenanceTask(args, parsed_globals):
4043
4607
  endpoint=g_param[OptionsDefine.Endpoint],
4044
4608
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4045
4609
  )
4046
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4610
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4047
4611
  if g_param[OptionsDefine.Language]:
4048
4612
  profile.language = g_param[OptionsDefine.Language]
4049
4613
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4050
4614
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4051
4615
  client._sdkVersion += ("_CLI_" + __version__)
4052
4616
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4053
- model = models.ModifyRoutineMaintenanceTaskRequest()
4617
+ model = models.DescribeTopicSubscribeGroupRequest()
4054
4618
  model.from_json_string(json.dumps(args))
4055
4619
  start_time = time.time()
4056
4620
  while True:
4057
- rsp = client.ModifyRoutineMaintenanceTask(model)
4621
+ rsp = client.DescribeTopicSubscribeGroup(model)
4058
4622
  result = rsp.to_json_string()
4059
4623
  try:
4060
4624
  json_obj = json.loads(result)
@@ -4073,7 +4637,7 @@ def doModifyRoutineMaintenanceTask(args, parsed_globals):
4073
4637
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4074
4638
 
4075
4639
 
4076
- def doCreatePrometheus(args, parsed_globals):
4640
+ def doModifyRoutineMaintenanceTask(args, parsed_globals):
4077
4641
  g_param = parse_global_arg(parsed_globals)
4078
4642
 
4079
4643
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4083,7 +4647,10 @@ def doCreatePrometheus(args, parsed_globals):
4083
4647
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4084
4648
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4085
4649
  )
4086
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4650
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4651
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4652
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4087
4654
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4088
4655
  else:
4089
4656
  cred = credential.Credential(
@@ -4095,18 +4662,18 @@ def doCreatePrometheus(args, parsed_globals):
4095
4662
  endpoint=g_param[OptionsDefine.Endpoint],
4096
4663
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4097
4664
  )
4098
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4665
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4099
4666
  if g_param[OptionsDefine.Language]:
4100
4667
  profile.language = g_param[OptionsDefine.Language]
4101
4668
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4102
4669
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4103
4670
  client._sdkVersion += ("_CLI_" + __version__)
4104
4671
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4105
- model = models.CreatePrometheusRequest()
4672
+ model = models.ModifyRoutineMaintenanceTaskRequest()
4106
4673
  model.from_json_string(json.dumps(args))
4107
4674
  start_time = time.time()
4108
4675
  while True:
4109
- rsp = client.CreatePrometheus(model)
4676
+ rsp = client.ModifyRoutineMaintenanceTask(model)
4110
4677
  result = rsp.to_json_string()
4111
4678
  try:
4112
4679
  json_obj = json.loads(result)
@@ -4125,7 +4692,7 @@ def doCreatePrometheus(args, parsed_globals):
4125
4692
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4126
4693
 
4127
4694
 
4128
- def doDeleteRouteTriggerTime(args, parsed_globals):
4695
+ def doCreatePrometheus(args, parsed_globals):
4129
4696
  g_param = parse_global_arg(parsed_globals)
4130
4697
 
4131
4698
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4135,7 +4702,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
4135
4702
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4136
4703
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4137
4704
  )
4138
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4705
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4706
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4707
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4139
4709
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4140
4710
  else:
4141
4711
  cred = credential.Credential(
@@ -4147,18 +4717,18 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
4147
4717
  endpoint=g_param[OptionsDefine.Endpoint],
4148
4718
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4149
4719
  )
4150
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4720
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4151
4721
  if g_param[OptionsDefine.Language]:
4152
4722
  profile.language = g_param[OptionsDefine.Language]
4153
4723
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4154
4724
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4155
4725
  client._sdkVersion += ("_CLI_" + __version__)
4156
4726
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4157
- model = models.DeleteRouteTriggerTimeRequest()
4727
+ model = models.CreatePrometheusRequest()
4158
4728
  model.from_json_string(json.dumps(args))
4159
4729
  start_time = time.time()
4160
4730
  while True:
4161
- rsp = client.DeleteRouteTriggerTime(model)
4731
+ rsp = client.CreatePrometheus(model)
4162
4732
  result = rsp.to_json_string()
4163
4733
  try:
4164
4734
  json_obj = json.loads(result)
@@ -4177,7 +4747,7 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
4177
4747
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4178
4748
 
4179
4749
 
4180
- def doBatchModifyGroupOffsets(args, parsed_globals):
4750
+ def doDeleteRouteTriggerTime(args, parsed_globals):
4181
4751
  g_param = parse_global_arg(parsed_globals)
4182
4752
 
4183
4753
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4187,7 +4757,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
4187
4757
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4188
4758
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4189
4759
  )
4190
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4760
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4761
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4762
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4763
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4191
4764
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4192
4765
  else:
4193
4766
  cred = credential.Credential(
@@ -4199,18 +4772,18 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
4199
4772
  endpoint=g_param[OptionsDefine.Endpoint],
4200
4773
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4201
4774
  )
4202
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4775
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4203
4776
  if g_param[OptionsDefine.Language]:
4204
4777
  profile.language = g_param[OptionsDefine.Language]
4205
4778
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4206
4779
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4207
4780
  client._sdkVersion += ("_CLI_" + __version__)
4208
4781
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4209
- model = models.BatchModifyGroupOffsetsRequest()
4782
+ model = models.DeleteRouteTriggerTimeRequest()
4210
4783
  model.from_json_string(json.dumps(args))
4211
4784
  start_time = time.time()
4212
4785
  while True:
4213
- rsp = client.BatchModifyGroupOffsets(model)
4786
+ rsp = client.DeleteRouteTriggerTime(model)
4214
4787
  result = rsp.to_json_string()
4215
4788
  try:
4216
4789
  json_obj = json.loads(result)
@@ -4229,7 +4802,7 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
4229
4802
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4230
4803
 
4231
4804
 
4232
- def doDescribeGroupOffsets(args, parsed_globals):
4805
+ def doBatchModifyGroupOffsets(args, parsed_globals):
4233
4806
  g_param = parse_global_arg(parsed_globals)
4234
4807
 
4235
4808
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4239,7 +4812,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
4239
4812
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4240
4813
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4241
4814
  )
4242
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4816
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4817
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4818
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4243
4819
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4244
4820
  else:
4245
4821
  cred = credential.Credential(
@@ -4251,18 +4827,18 @@ def doDescribeGroupOffsets(args, parsed_globals):
4251
4827
  endpoint=g_param[OptionsDefine.Endpoint],
4252
4828
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4253
4829
  )
4254
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4830
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4255
4831
  if g_param[OptionsDefine.Language]:
4256
4832
  profile.language = g_param[OptionsDefine.Language]
4257
4833
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4258
4834
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4259
4835
  client._sdkVersion += ("_CLI_" + __version__)
4260
4836
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4261
- model = models.DescribeGroupOffsetsRequest()
4837
+ model = models.BatchModifyGroupOffsetsRequest()
4262
4838
  model.from_json_string(json.dumps(args))
4263
4839
  start_time = time.time()
4264
4840
  while True:
4265
- rsp = client.DescribeGroupOffsets(model)
4841
+ rsp = client.BatchModifyGroupOffsets(model)
4266
4842
  result = rsp.to_json_string()
4267
4843
  try:
4268
4844
  json_obj = json.loads(result)
@@ -4281,7 +4857,7 @@ def doDescribeGroupOffsets(args, parsed_globals):
4281
4857
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4282
4858
 
4283
4859
 
4284
- def doDescribeAppInfo(args, parsed_globals):
4860
+ def doDescribeGroupOffsets(args, parsed_globals):
4285
4861
  g_param = parse_global_arg(parsed_globals)
4286
4862
 
4287
4863
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4291,7 +4867,10 @@ def doDescribeAppInfo(args, parsed_globals):
4291
4867
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4292
4868
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4293
4869
  )
4294
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4870
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4871
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4872
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4873
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4295
4874
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4296
4875
  else:
4297
4876
  cred = credential.Credential(
@@ -4303,18 +4882,18 @@ def doDescribeAppInfo(args, parsed_globals):
4303
4882
  endpoint=g_param[OptionsDefine.Endpoint],
4304
4883
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4305
4884
  )
4306
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4885
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4307
4886
  if g_param[OptionsDefine.Language]:
4308
4887
  profile.language = g_param[OptionsDefine.Language]
4309
4888
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4310
4889
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4311
4890
  client._sdkVersion += ("_CLI_" + __version__)
4312
4891
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4313
- model = models.DescribeAppInfoRequest()
4892
+ model = models.DescribeGroupOffsetsRequest()
4314
4893
  model.from_json_string(json.dumps(args))
4315
4894
  start_time = time.time()
4316
4895
  while True:
4317
- rsp = client.DescribeAppInfo(model)
4896
+ rsp = client.DescribeGroupOffsets(model)
4318
4897
  result = rsp.to_json_string()
4319
4898
  try:
4320
4899
  json_obj = json.loads(result)
@@ -4333,7 +4912,7 @@ def doDescribeAppInfo(args, parsed_globals):
4333
4912
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4334
4913
 
4335
4914
 
4336
- def doDescribeRegion(args, parsed_globals):
4915
+ def doModifyConnectResource(args, parsed_globals):
4337
4916
  g_param = parse_global_arg(parsed_globals)
4338
4917
 
4339
4918
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4343,7 +4922,10 @@ def doDescribeRegion(args, parsed_globals):
4343
4922
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4344
4923
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4345
4924
  )
4346
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4925
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4926
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4927
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4928
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4347
4929
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4348
4930
  else:
4349
4931
  cred = credential.Credential(
@@ -4355,18 +4937,18 @@ def doDescribeRegion(args, parsed_globals):
4355
4937
  endpoint=g_param[OptionsDefine.Endpoint],
4356
4938
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4357
4939
  )
4358
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4940
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4359
4941
  if g_param[OptionsDefine.Language]:
4360
4942
  profile.language = g_param[OptionsDefine.Language]
4361
4943
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4362
4944
  client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
4363
4945
  client._sdkVersion += ("_CLI_" + __version__)
4364
4946
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4365
- model = models.DescribeRegionRequest()
4947
+ model = models.ModifyConnectResourceRequest()
4366
4948
  model.from_json_string(json.dumps(args))
4367
4949
  start_time = time.time()
4368
4950
  while True:
4369
- rsp = client.DescribeRegion(model)
4951
+ rsp = client.ModifyConnectResource(model)
4370
4952
  result = rsp.to_json_string()
4371
4953
  try:
4372
4954
  json_obj = json.loads(result)
@@ -4395,7 +4977,10 @@ def doCreateCdcCluster(args, parsed_globals):
4395
4977
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
4978
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4397
4979
  )
4398
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4980
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4981
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4982
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4983
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
4984
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
4985
  else:
4401
4986
  cred = credential.Credential(
@@ -4407,7 +4992,7 @@ def doCreateCdcCluster(args, parsed_globals):
4407
4992
  endpoint=g_param[OptionsDefine.Endpoint],
4408
4993
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4409
4994
  )
4410
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4995
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4411
4996
  if g_param[OptionsDefine.Language]:
4412
4997
  profile.language = g_param[OptionsDefine.Language]
4413
4998
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4447,7 +5032,10 @@ def doDeleteTopic(args, parsed_globals):
4447
5032
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4448
5033
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4449
5034
  )
4450
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5035
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5036
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5037
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5038
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4451
5039
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4452
5040
  else:
4453
5041
  cred = credential.Credential(
@@ -4459,7 +5047,7 @@ def doDeleteTopic(args, parsed_globals):
4459
5047
  endpoint=g_param[OptionsDefine.Endpoint],
4460
5048
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4461
5049
  )
4462
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5050
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4463
5051
  if g_param[OptionsDefine.Language]:
4464
5052
  profile.language = g_param[OptionsDefine.Language]
4465
5053
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4499,7 +5087,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
4499
5087
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4500
5088
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4501
5089
  )
4502
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5090
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
5091
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
5092
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
5093
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4503
5094
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4504
5095
  else:
4505
5096
  cred = credential.Credential(
@@ -4511,7 +5102,7 @@ def doInquireCkafkaPrice(args, parsed_globals):
4511
5102
  endpoint=g_param[OptionsDefine.Endpoint],
4512
5103
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4513
5104
  )
4514
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5105
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4515
5106
  if g_param[OptionsDefine.Language]:
4516
5107
  profile.language = g_param[OptionsDefine.Language]
4517
5108
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4554,9 +5145,11 @@ MODELS_MAP = {
4554
5145
  ACTION_MAP = {
4555
5146
  "DescribeGroupInfo": doDescribeGroupInfo,
4556
5147
  "DescribeCvmInfo": doDescribeCvmInfo,
5148
+ "DescribeRegion": doDescribeRegion,
4557
5149
  "ModifyInstancePre": doModifyInstancePre,
4558
5150
  "SendMessage": doSendMessage,
4559
5151
  "DeleteConnectResource": doDeleteConnectResource,
5152
+ "DeleteGroupSubscribeTopic": doDeleteGroupSubscribeTopic,
4560
5153
  "DescribeUser": doDescribeUser,
4561
5154
  "DescribeDatahubGroupOffsets": doDescribeDatahubGroupOffsets,
4562
5155
  "DescribeConsumerGroup": doDescribeConsumerGroup,
@@ -4577,6 +5170,7 @@ ACTION_MAP = {
4577
5170
  "RenewCkafkaInstance": doRenewCkafkaInstance,
4578
5171
  "DescribeAclRule": doDescribeAclRule,
4579
5172
  "DescribePrometheus": doDescribePrometheus,
5173
+ "UpgradeBrokerVersion": doUpgradeBrokerVersion,
4580
5174
  "DescribeDatahubTasks": doDescribeDatahubTasks,
4581
5175
  "ModifyDatahubTopic": doModifyDatahubTopic,
4582
5176
  "FetchMessageListByOffset": doFetchMessageListByOffset,
@@ -4589,7 +5183,7 @@ ACTION_MAP = {
4589
5183
  "DescribeInstanceAttributes": doDescribeInstanceAttributes,
4590
5184
  "CreatePostPaidInstance": doCreatePostPaidInstance,
4591
5185
  "AuthorizeToken": doAuthorizeToken,
4592
- "DescribeDatahubTopic": doDescribeDatahubTopic,
5186
+ "PauseDatahubTask": doPauseDatahubTask,
4593
5187
  "DescribeCkafkaZone": doDescribeCkafkaZone,
4594
5188
  "DescribeRoute": doDescribeRoute,
4595
5189
  "ModifyDatahubTask": doModifyDatahubTask,
@@ -4598,16 +5192,17 @@ ACTION_MAP = {
4598
5192
  "DeleteRoute": doDeleteRoute,
4599
5193
  "ModifyTopicAttributes": doModifyTopicAttributes,
4600
5194
  "CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
5195
+ "DescribeCkafkaVersion": doDescribeCkafkaVersion,
4601
5196
  "ModifyGroupOffsets": doModifyGroupOffsets,
4602
5197
  "ModifyInstanceAttributes": doModifyInstanceAttributes,
4603
5198
  "DeleteGroup": doDeleteGroup,
4604
- "DeleteInstancePost": doDeleteInstancePost,
5199
+ "ResumeDatahubTask": doResumeDatahubTask,
4605
5200
  "DescribeACL": doDescribeACL,
4606
- "CreateInstancePre": doCreateInstancePre,
4607
- "ModifyConnectResource": doModifyConnectResource,
5201
+ "DeleteInstancePost": doDeleteInstancePost,
4608
5202
  "DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
4609
5203
  "DescribeTaskStatus": doDescribeTaskStatus,
4610
5204
  "DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
5205
+ "CreateInstancePre": doCreateInstancePre,
4611
5206
  "BatchCreateAcl": doBatchCreateAcl,
4612
5207
  "CreateDatahubTask": doCreateDatahubTask,
4613
5208
  "DeleteAclRule": doDeleteAclRule,
@@ -4616,6 +5211,8 @@ ACTION_MAP = {
4616
5211
  "DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
4617
5212
  "DescribeTopic": doDescribeTopic,
4618
5213
  "DescribeConnectResources": doDescribeConnectResources,
5214
+ "DescribeModifyType": doDescribeModifyType,
5215
+ "RestartDatahubTask": doRestartDatahubTask,
4619
5216
  "CreateConsumer": doCreateConsumer,
4620
5217
  "DescribeTypeInstances": doDescribeTypeInstances,
4621
5218
  "DescribeDatahubTopics": doDescribeDatahubTopics,
@@ -4623,6 +5220,7 @@ ACTION_MAP = {
4623
5220
  "DeleteDatahubTask": doDeleteDatahubTask,
4624
5221
  "DescribeGroup": doDescribeGroup,
4625
5222
  "DescribeInstances": doDescribeInstances,
5223
+ "DescribeDatahubTopic": doDescribeDatahubTopic,
4626
5224
  "CreateRoute": doCreateRoute,
4627
5225
  "DescribeTopicDetail": doDescribeTopicDetail,
4628
5226
  "FetchMessageByOffset": doFetchMessageByOffset,
@@ -4634,8 +5232,7 @@ ACTION_MAP = {
4634
5232
  "DeleteRouteTriggerTime": doDeleteRouteTriggerTime,
4635
5233
  "BatchModifyGroupOffsets": doBatchModifyGroupOffsets,
4636
5234
  "DescribeGroupOffsets": doDescribeGroupOffsets,
4637
- "DescribeAppInfo": doDescribeAppInfo,
4638
- "DescribeRegion": doDescribeRegion,
5235
+ "ModifyConnectResource": doModifyConnectResource,
4639
5236
  "CreateCdcCluster": doCreateCdcCluster,
4640
5237
  "DeleteTopic": doDeleteTopic,
4641
5238
  "InquireCkafkaPrice": doInquireCkafkaPrice,