tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -27,7 +27,10 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doDescribeGroupInfo(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doDescribeCvmInfo(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doDescribeCvmInfo(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -121,6 +127,61 @@ def doDescribeCvmInfo(args, parsed_globals):
|
|
|
121
127
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
122
128
|
|
|
123
129
|
|
|
130
|
+
def doDescribeRegion(args, parsed_globals):
|
|
131
|
+
g_param = parse_global_arg(parsed_globals)
|
|
132
|
+
|
|
133
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
134
|
+
cred = credential.CVMRoleCredential()
|
|
135
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
136
|
+
cred = credential.STSAssumeRoleCredential(
|
|
137
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
138
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
139
|
+
)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
144
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
145
|
+
else:
|
|
146
|
+
cred = credential.Credential(
|
|
147
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
148
|
+
)
|
|
149
|
+
http_profile = HttpProfile(
|
|
150
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
151
|
+
reqMethod="POST",
|
|
152
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
153
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
154
|
+
)
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
156
|
+
if g_param[OptionsDefine.Language]:
|
|
157
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
158
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
159
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
160
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
161
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
162
|
+
model = models.DescribeRegionRequest()
|
|
163
|
+
model.from_json_string(json.dumps(args))
|
|
164
|
+
start_time = time.time()
|
|
165
|
+
while True:
|
|
166
|
+
rsp = client.DescribeRegion(model)
|
|
167
|
+
result = rsp.to_json_string()
|
|
168
|
+
try:
|
|
169
|
+
json_obj = json.loads(result)
|
|
170
|
+
except TypeError as e:
|
|
171
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
172
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
173
|
+
break
|
|
174
|
+
cur_time = time.time()
|
|
175
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
176
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
177
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
178
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
179
|
+
else:
|
|
180
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
181
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
182
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
183
|
+
|
|
184
|
+
|
|
124
185
|
def doModifyInstancePre(args, parsed_globals):
|
|
125
186
|
g_param = parse_global_arg(parsed_globals)
|
|
126
187
|
|
|
@@ -131,7 +192,10 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
131
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
194
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
200
|
else:
|
|
137
201
|
cred = credential.Credential(
|
|
@@ -143,7 +207,7 @@ def doModifyInstancePre(args, parsed_globals):
|
|
|
143
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
209
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
211
|
if g_param[OptionsDefine.Language]:
|
|
148
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +247,10 @@ def doSendMessage(args, parsed_globals):
|
|
|
183
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
249
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
255
|
else:
|
|
189
256
|
cred = credential.Credential(
|
|
@@ -195,7 +262,7 @@ def doSendMessage(args, parsed_globals):
|
|
|
195
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
264
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
266
|
if g_param[OptionsDefine.Language]:
|
|
200
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +302,10 @@ def doDeleteConnectResource(args, parsed_globals):
|
|
|
235
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
304
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
310
|
else:
|
|
241
311
|
cred = credential.Credential(
|
|
@@ -247,7 +317,7 @@ def doDeleteConnectResource(args, parsed_globals):
|
|
|
247
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
319
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
321
|
if g_param[OptionsDefine.Language]:
|
|
252
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -277,6 +347,61 @@ def doDeleteConnectResource(args, parsed_globals):
|
|
|
277
347
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
278
348
|
|
|
279
349
|
|
|
350
|
+
def doDeleteGroupSubscribeTopic(args, parsed_globals):
|
|
351
|
+
g_param = parse_global_arg(parsed_globals)
|
|
352
|
+
|
|
353
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
354
|
+
cred = credential.CVMRoleCredential()
|
|
355
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
356
|
+
cred = credential.STSAssumeRoleCredential(
|
|
357
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
358
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
359
|
+
)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
364
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
365
|
+
else:
|
|
366
|
+
cred = credential.Credential(
|
|
367
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
368
|
+
)
|
|
369
|
+
http_profile = HttpProfile(
|
|
370
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
371
|
+
reqMethod="POST",
|
|
372
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
373
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
374
|
+
)
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
376
|
+
if g_param[OptionsDefine.Language]:
|
|
377
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
378
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
379
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
380
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
381
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
382
|
+
model = models.DeleteGroupSubscribeTopicRequest()
|
|
383
|
+
model.from_json_string(json.dumps(args))
|
|
384
|
+
start_time = time.time()
|
|
385
|
+
while True:
|
|
386
|
+
rsp = client.DeleteGroupSubscribeTopic(model)
|
|
387
|
+
result = rsp.to_json_string()
|
|
388
|
+
try:
|
|
389
|
+
json_obj = json.loads(result)
|
|
390
|
+
except TypeError as e:
|
|
391
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
392
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
393
|
+
break
|
|
394
|
+
cur_time = time.time()
|
|
395
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
396
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
397
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
398
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
399
|
+
else:
|
|
400
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
401
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
402
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
403
|
+
|
|
404
|
+
|
|
280
405
|
def doDescribeUser(args, parsed_globals):
|
|
281
406
|
g_param = parse_global_arg(parsed_globals)
|
|
282
407
|
|
|
@@ -287,7 +412,10 @@ def doDescribeUser(args, parsed_globals):
|
|
|
287
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
414
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
420
|
else:
|
|
293
421
|
cred = credential.Credential(
|
|
@@ -299,7 +427,7 @@ def doDescribeUser(args, parsed_globals):
|
|
|
299
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
429
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
431
|
if g_param[OptionsDefine.Language]:
|
|
304
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +467,10 @@ def doDescribeDatahubGroupOffsets(args, parsed_globals):
|
|
|
339
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
469
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
475
|
else:
|
|
345
476
|
cred = credential.Credential(
|
|
@@ -351,7 +482,7 @@ def doDescribeDatahubGroupOffsets(args, parsed_globals):
|
|
|
351
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
484
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
486
|
if g_param[OptionsDefine.Language]:
|
|
356
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +522,10 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
391
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
524
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
530
|
else:
|
|
397
531
|
cred = credential.Credential(
|
|
@@ -403,7 +537,7 @@ def doDescribeConsumerGroup(args, parsed_globals):
|
|
|
403
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
539
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
541
|
if g_param[OptionsDefine.Language]:
|
|
408
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +577,10 @@ def doCreateTopic(args, parsed_globals):
|
|
|
443
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
579
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
585
|
else:
|
|
449
586
|
cred = credential.Credential(
|
|
@@ -455,7 +592,7 @@ def doCreateTopic(args, parsed_globals):
|
|
|
455
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
594
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
596
|
if g_param[OptionsDefine.Language]:
|
|
460
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -495,7 +632,10 @@ def doDescribeDatahubTask(args, parsed_globals):
|
|
|
495
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
634
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
640
|
else:
|
|
501
641
|
cred = credential.Credential(
|
|
@@ -507,7 +647,7 @@ def doDescribeDatahubTask(args, parsed_globals):
|
|
|
507
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
649
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
651
|
if g_param[OptionsDefine.Language]:
|
|
512
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -547,7 +687,10 @@ def doCheckCdcCluster(args, parsed_globals):
|
|
|
547
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
689
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
695
|
else:
|
|
553
696
|
cred = credential.Credential(
|
|
@@ -559,7 +702,7 @@ def doCheckCdcCluster(args, parsed_globals):
|
|
|
559
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
704
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
706
|
if g_param[OptionsDefine.Language]:
|
|
564
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +742,10 @@ def doDescribeTopicFlowRanking(args, parsed_globals):
|
|
|
599
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
744
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
750
|
else:
|
|
605
751
|
cred = credential.Credential(
|
|
@@ -611,7 +757,7 @@ def doDescribeTopicFlowRanking(args, parsed_globals):
|
|
|
611
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
759
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
761
|
if g_param[OptionsDefine.Language]:
|
|
616
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +797,10 @@ def doCreatePartition(args, parsed_globals):
|
|
|
651
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
799
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
805
|
else:
|
|
657
806
|
cred = credential.Credential(
|
|
@@ -663,7 +812,7 @@ def doCreatePartition(args, parsed_globals):
|
|
|
663
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
814
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
816
|
if g_param[OptionsDefine.Language]:
|
|
668
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -703,7 +852,10 @@ def doFetchLatestDatahubMessageList(args, parsed_globals):
|
|
|
703
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
854
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
860
|
else:
|
|
709
861
|
cred = credential.Credential(
|
|
@@ -715,7 +867,7 @@ def doFetchLatestDatahubMessageList(args, parsed_globals):
|
|
|
715
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
869
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
871
|
if g_param[OptionsDefine.Language]:
|
|
720
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -755,7 +907,10 @@ def doCreateToken(args, parsed_globals):
|
|
|
755
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
909
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
915
|
else:
|
|
761
916
|
cred = credential.Credential(
|
|
@@ -767,7 +922,7 @@ def doCreateToken(args, parsed_globals):
|
|
|
767
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
924
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
926
|
if g_param[OptionsDefine.Language]:
|
|
772
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -807,7 +962,10 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
807
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
964
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
970
|
else:
|
|
813
971
|
cred = credential.Credential(
|
|
@@ -819,7 +977,7 @@ def doDeleteInstancePre(args, parsed_globals):
|
|
|
819
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
979
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
981
|
if g_param[OptionsDefine.Language]:
|
|
824
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -859,7 +1017,10 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
859
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
1019
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
1025
|
else:
|
|
865
1026
|
cred = credential.Credential(
|
|
@@ -871,7 +1032,7 @@ def doDescribeInstancesDetail(args, parsed_globals):
|
|
|
871
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
1034
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
1036
|
if g_param[OptionsDefine.Language]:
|
|
876
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -911,7 +1072,10 @@ def doInstanceScalingDown(args, parsed_globals):
|
|
|
911
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
1074
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
1080
|
else:
|
|
917
1081
|
cred = credential.Credential(
|
|
@@ -923,7 +1087,7 @@ def doInstanceScalingDown(args, parsed_globals):
|
|
|
923
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
1089
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
1091
|
if g_param[OptionsDefine.Language]:
|
|
928
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -963,7 +1127,10 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
963
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1129
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1135
|
else:
|
|
969
1136
|
cred = credential.Credential(
|
|
@@ -975,7 +1142,7 @@ def doDescribeTopicAttributes(args, parsed_globals):
|
|
|
975
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1144
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1146
|
if g_param[OptionsDefine.Language]:
|
|
980
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1015,7 +1182,10 @@ def doFetchMessageListByTimestamp(args, parsed_globals):
|
|
|
1015
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1184
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1190
|
else:
|
|
1021
1191
|
cred = credential.Credential(
|
|
@@ -1027,7 +1197,7 @@ def doFetchMessageListByTimestamp(args, parsed_globals):
|
|
|
1027
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1199
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1201
|
if g_param[OptionsDefine.Language]:
|
|
1032
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1067,7 +1237,10 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
1067
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1239
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1245
|
else:
|
|
1073
1246
|
cred = credential.Credential(
|
|
@@ -1079,7 +1252,7 @@ def doCreateAclRule(args, parsed_globals):
|
|
|
1079
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1254
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1256
|
if g_param[OptionsDefine.Language]:
|
|
1084
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1119,7 +1292,10 @@ def doCreateUser(args, parsed_globals):
|
|
|
1119
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1294
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1300
|
else:
|
|
1125
1301
|
cred = credential.Credential(
|
|
@@ -1131,7 +1307,7 @@ def doCreateUser(args, parsed_globals):
|
|
|
1131
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1309
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1311
|
if g_param[OptionsDefine.Language]:
|
|
1136
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1347,10 @@ def doRenewCkafkaInstance(args, parsed_globals):
|
|
|
1171
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1349
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1355
|
else:
|
|
1177
1356
|
cred = credential.Credential(
|
|
@@ -1183,7 +1362,7 @@ def doRenewCkafkaInstance(args, parsed_globals):
|
|
|
1183
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1364
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1366
|
if g_param[OptionsDefine.Language]:
|
|
1188
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1402,10 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
1223
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1404
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1410
|
else:
|
|
1229
1411
|
cred = credential.Credential(
|
|
@@ -1235,7 +1417,7 @@ def doDescribeAclRule(args, parsed_globals):
|
|
|
1235
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1419
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1421
|
if g_param[OptionsDefine.Language]:
|
|
1240
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1457,10 @@ def doDescribePrometheus(args, parsed_globals):
|
|
|
1275
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1459
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1465
|
else:
|
|
1281
1466
|
cred = credential.Credential(
|
|
@@ -1287,7 +1472,7 @@ def doDescribePrometheus(args, parsed_globals):
|
|
|
1287
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1474
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1476
|
if g_param[OptionsDefine.Language]:
|
|
1292
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1317,6 +1502,61 @@ def doDescribePrometheus(args, parsed_globals):
|
|
|
1317
1502
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1318
1503
|
|
|
1319
1504
|
|
|
1505
|
+
def doUpgradeBrokerVersion(args, parsed_globals):
|
|
1506
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1507
|
+
|
|
1508
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1509
|
+
cred = credential.CVMRoleCredential()
|
|
1510
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1511
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1512
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1513
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1514
|
+
)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1519
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1520
|
+
else:
|
|
1521
|
+
cred = credential.Credential(
|
|
1522
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1523
|
+
)
|
|
1524
|
+
http_profile = HttpProfile(
|
|
1525
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1526
|
+
reqMethod="POST",
|
|
1527
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1528
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1529
|
+
)
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1531
|
+
if g_param[OptionsDefine.Language]:
|
|
1532
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1533
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1534
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1535
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1536
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1537
|
+
model = models.UpgradeBrokerVersionRequest()
|
|
1538
|
+
model.from_json_string(json.dumps(args))
|
|
1539
|
+
start_time = time.time()
|
|
1540
|
+
while True:
|
|
1541
|
+
rsp = client.UpgradeBrokerVersion(model)
|
|
1542
|
+
result = rsp.to_json_string()
|
|
1543
|
+
try:
|
|
1544
|
+
json_obj = json.loads(result)
|
|
1545
|
+
except TypeError as e:
|
|
1546
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1547
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1548
|
+
break
|
|
1549
|
+
cur_time = time.time()
|
|
1550
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1551
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1552
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1553
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1554
|
+
else:
|
|
1555
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1556
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1557
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1558
|
+
|
|
1559
|
+
|
|
1320
1560
|
def doDescribeDatahubTasks(args, parsed_globals):
|
|
1321
1561
|
g_param = parse_global_arg(parsed_globals)
|
|
1322
1562
|
|
|
@@ -1327,7 +1567,10 @@ def doDescribeDatahubTasks(args, parsed_globals):
|
|
|
1327
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1569
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1575
|
else:
|
|
1333
1576
|
cred = credential.Credential(
|
|
@@ -1339,7 +1582,7 @@ def doDescribeDatahubTasks(args, parsed_globals):
|
|
|
1339
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1584
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1586
|
if g_param[OptionsDefine.Language]:
|
|
1344
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1622,10 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
1379
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1624
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1630
|
else:
|
|
1385
1631
|
cred = credential.Credential(
|
|
@@ -1391,7 +1637,7 @@ def doModifyDatahubTopic(args, parsed_globals):
|
|
|
1391
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1639
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1641
|
if g_param[OptionsDefine.Language]:
|
|
1396
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1677,10 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
1431
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1679
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1685
|
else:
|
|
1437
1686
|
cred = credential.Credential(
|
|
@@ -1443,7 +1692,7 @@ def doFetchMessageListByOffset(args, parsed_globals):
|
|
|
1443
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1694
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1696
|
if g_param[OptionsDefine.Language]:
|
|
1448
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1732,10 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1483
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1734
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1740
|
else:
|
|
1489
1741
|
cred = credential.Credential(
|
|
@@ -1495,7 +1747,7 @@ def doCreateDatahubTopic(args, parsed_globals):
|
|
|
1495
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1749
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1751
|
if g_param[OptionsDefine.Language]:
|
|
1500
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1787,10 @@ def doCancelAuthorizationToken(args, parsed_globals):
|
|
|
1535
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1789
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1795
|
else:
|
|
1541
1796
|
cred = credential.Credential(
|
|
@@ -1547,7 +1802,7 @@ def doCancelAuthorizationToken(args, parsed_globals):
|
|
|
1547
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1804
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1806
|
if g_param[OptionsDefine.Language]:
|
|
1552
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1842,10 @@ def doDeleteDatahubTopic(args, parsed_globals):
|
|
|
1587
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1844
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1850
|
else:
|
|
1593
1851
|
cred = credential.Credential(
|
|
@@ -1599,7 +1857,7 @@ def doDeleteDatahubTopic(args, parsed_globals):
|
|
|
1599
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1859
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1861
|
if g_param[OptionsDefine.Language]:
|
|
1604
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1897,10 @@ def doCreateConnectResource(args, parsed_globals):
|
|
|
1639
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1899
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1905
|
else:
|
|
1645
1906
|
cred = credential.Credential(
|
|
@@ -1651,7 +1912,7 @@ def doCreateConnectResource(args, parsed_globals):
|
|
|
1651
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1914
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1916
|
if g_param[OptionsDefine.Language]:
|
|
1656
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1952,10 @@ def doFetchDatahubMessageByOffset(args, parsed_globals):
|
|
|
1691
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1954
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1960
|
else:
|
|
1697
1961
|
cred = credential.Credential(
|
|
@@ -1703,7 +1967,7 @@ def doFetchDatahubMessageByOffset(args, parsed_globals):
|
|
|
1703
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1969
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1971
|
if g_param[OptionsDefine.Language]:
|
|
1708
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +2007,10 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1743
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
2009
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
2015
|
else:
|
|
1749
2016
|
cred = credential.Credential(
|
|
@@ -1755,7 +2022,7 @@ def doDeleteAcl(args, parsed_globals):
|
|
|
1755
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
2024
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
2026
|
if g_param[OptionsDefine.Language]:
|
|
1760
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +2062,10 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1795
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
2064
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
2070
|
else:
|
|
1801
2071
|
cred = credential.Credential(
|
|
@@ -1807,7 +2077,7 @@ def doDescribeInstanceAttributes(args, parsed_globals):
|
|
|
1807
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
2079
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
2081
|
if g_param[OptionsDefine.Language]:
|
|
1812
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +2117,10 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
1847
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
2119
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
2125
|
else:
|
|
1853
2126
|
cred = credential.Credential(
|
|
@@ -1859,7 +2132,7 @@ def doCreatePostPaidInstance(args, parsed_globals):
|
|
|
1859
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
2134
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
2136
|
if g_param[OptionsDefine.Language]:
|
|
1864
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1899,7 +2172,10 @@ def doAuthorizeToken(args, parsed_globals):
|
|
|
1899
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
2174
|
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
2180
|
else:
|
|
1905
2181
|
cred = credential.Credential(
|
|
@@ -1911,7 +2187,7 @@ def doAuthorizeToken(args, parsed_globals):
|
|
|
1911
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
2189
|
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1915
2191
|
if g_param[OptionsDefine.Language]:
|
|
1916
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
1917
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1941,7 +2217,7 @@ def doAuthorizeToken(args, parsed_globals):
|
|
|
1941
2217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
2218
|
|
|
1943
2219
|
|
|
1944
|
-
def
|
|
2220
|
+
def doPauseDatahubTask(args, parsed_globals):
|
|
1945
2221
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2222
|
|
|
1947
2223
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1951,7 +2227,10 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
1951
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2229
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2235
|
else:
|
|
1957
2236
|
cred = credential.Credential(
|
|
@@ -1963,18 +2242,18 @@ def doDescribeDatahubTopic(args, parsed_globals):
|
|
|
1963
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2244
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2246
|
if g_param[OptionsDefine.Language]:
|
|
1968
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1970
2249
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1971
2250
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1972
2251
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1973
|
-
model = models.
|
|
2252
|
+
model = models.PauseDatahubTaskRequest()
|
|
1974
2253
|
model.from_json_string(json.dumps(args))
|
|
1975
2254
|
start_time = time.time()
|
|
1976
2255
|
while True:
|
|
1977
|
-
rsp = client.
|
|
2256
|
+
rsp = client.PauseDatahubTask(model)
|
|
1978
2257
|
result = rsp.to_json_string()
|
|
1979
2258
|
try:
|
|
1980
2259
|
json_obj = json.loads(result)
|
|
@@ -2003,7 +2282,10 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2003
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2284
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2290
|
else:
|
|
2009
2291
|
cred = credential.Credential(
|
|
@@ -2015,7 +2297,7 @@ def doDescribeCkafkaZone(args, parsed_globals):
|
|
|
2015
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2299
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2301
|
if g_param[OptionsDefine.Language]:
|
|
2020
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2337,10 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
2055
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2339
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2345
|
else:
|
|
2061
2346
|
cred = credential.Credential(
|
|
@@ -2067,7 +2352,7 @@ def doDescribeRoute(args, parsed_globals):
|
|
|
2067
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2354
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2356
|
if g_param[OptionsDefine.Language]:
|
|
2072
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2392,10 @@ def doModifyDatahubTask(args, parsed_globals):
|
|
|
2107
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2394
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2400
|
else:
|
|
2113
2401
|
cred = credential.Credential(
|
|
@@ -2119,7 +2407,7 @@ def doModifyDatahubTask(args, parsed_globals):
|
|
|
2119
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2409
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2411
|
if g_param[OptionsDefine.Language]:
|
|
2124
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2447,10 @@ def doDescribeConnectResource(args, parsed_globals):
|
|
|
2159
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2449
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2455
|
else:
|
|
2165
2456
|
cred = credential.Credential(
|
|
@@ -2171,7 +2462,7 @@ def doDescribeConnectResource(args, parsed_globals):
|
|
|
2171
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2464
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2466
|
if g_param[OptionsDefine.Language]:
|
|
2176
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2502,10 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
2211
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2504
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2510
|
else:
|
|
2217
2511
|
cred = credential.Credential(
|
|
@@ -2223,7 +2517,7 @@ def doBatchModifyTopicAttributes(args, parsed_globals):
|
|
|
2223
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2519
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2521
|
if g_param[OptionsDefine.Language]:
|
|
2228
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2263,7 +2557,10 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
2263
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
2559
|
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
2565
|
else:
|
|
2269
2566
|
cred = credential.Credential(
|
|
@@ -2275,7 +2572,7 @@ def doDeleteRoute(args, parsed_globals):
|
|
|
2275
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
2574
|
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2279
2576
|
if g_param[OptionsDefine.Language]:
|
|
2280
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2281
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2315,7 +2612,10 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2315
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
2614
|
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
2620
|
else:
|
|
2321
2621
|
cred = credential.Credential(
|
|
@@ -2327,7 +2627,7 @@ def doModifyTopicAttributes(args, parsed_globals):
|
|
|
2327
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
2629
|
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2331
2631
|
if g_param[OptionsDefine.Language]:
|
|
2332
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2333
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2367,7 +2667,10 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
2367
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2669
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2675
|
else:
|
|
2373
2676
|
cred = credential.Credential(
|
|
@@ -2379,7 +2682,7 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
2379
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2684
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2686
|
if g_param[OptionsDefine.Language]:
|
|
2384
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2409,6 +2712,61 @@ def doCreateTopicIpWhiteList(args, parsed_globals):
|
|
|
2409
2712
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2410
2713
|
|
|
2411
2714
|
|
|
2715
|
+
def doDescribeCkafkaVersion(args, parsed_globals):
|
|
2716
|
+
g_param = parse_global_arg(parsed_globals)
|
|
2717
|
+
|
|
2718
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2719
|
+
cred = credential.CVMRoleCredential()
|
|
2720
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2721
|
+
cred = credential.STSAssumeRoleCredential(
|
|
2722
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2723
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2724
|
+
)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2729
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2730
|
+
else:
|
|
2731
|
+
cred = credential.Credential(
|
|
2732
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2733
|
+
)
|
|
2734
|
+
http_profile = HttpProfile(
|
|
2735
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2736
|
+
reqMethod="POST",
|
|
2737
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2738
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2739
|
+
)
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2741
|
+
if g_param[OptionsDefine.Language]:
|
|
2742
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
2743
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2744
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2745
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
2746
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2747
|
+
model = models.DescribeCkafkaVersionRequest()
|
|
2748
|
+
model.from_json_string(json.dumps(args))
|
|
2749
|
+
start_time = time.time()
|
|
2750
|
+
while True:
|
|
2751
|
+
rsp = client.DescribeCkafkaVersion(model)
|
|
2752
|
+
result = rsp.to_json_string()
|
|
2753
|
+
try:
|
|
2754
|
+
json_obj = json.loads(result)
|
|
2755
|
+
except TypeError as e:
|
|
2756
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2757
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2758
|
+
break
|
|
2759
|
+
cur_time = time.time()
|
|
2760
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2761
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2762
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2763
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2764
|
+
else:
|
|
2765
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2766
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2767
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2768
|
+
|
|
2769
|
+
|
|
2412
2770
|
def doModifyGroupOffsets(args, parsed_globals):
|
|
2413
2771
|
g_param = parse_global_arg(parsed_globals)
|
|
2414
2772
|
|
|
@@ -2419,7 +2777,10 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
2419
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2779
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2785
|
else:
|
|
2425
2786
|
cred = credential.Credential(
|
|
@@ -2431,7 +2792,7 @@ def doModifyGroupOffsets(args, parsed_globals):
|
|
|
2431
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2794
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2796
|
if g_param[OptionsDefine.Language]:
|
|
2436
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2832,10 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
2471
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2834
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2840
|
else:
|
|
2477
2841
|
cred = credential.Credential(
|
|
@@ -2483,7 +2847,7 @@ def doModifyInstanceAttributes(args, parsed_globals):
|
|
|
2483
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2849
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2851
|
if g_param[OptionsDefine.Language]:
|
|
2488
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2887,10 @@ def doDeleteGroup(args, parsed_globals):
|
|
|
2523
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2889
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2895
|
else:
|
|
2529
2896
|
cred = credential.Credential(
|
|
@@ -2535,7 +2902,7 @@ def doDeleteGroup(args, parsed_globals):
|
|
|
2535
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2904
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2906
|
if g_param[OptionsDefine.Language]:
|
|
2540
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2565,7 +2932,7 @@ def doDeleteGroup(args, parsed_globals):
|
|
|
2565
2932
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2566
2933
|
|
|
2567
2934
|
|
|
2568
|
-
def
|
|
2935
|
+
def doResumeDatahubTask(args, parsed_globals):
|
|
2569
2936
|
g_param = parse_global_arg(parsed_globals)
|
|
2570
2937
|
|
|
2571
2938
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2575,7 +2942,10 @@ def doDeleteInstancePost(args, parsed_globals):
|
|
|
2575
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2944
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2950
|
else:
|
|
2581
2951
|
cred = credential.Credential(
|
|
@@ -2587,18 +2957,18 @@ def doDeleteInstancePost(args, parsed_globals):
|
|
|
2587
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2959
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2961
|
if g_param[OptionsDefine.Language]:
|
|
2592
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2594
2964
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2595
2965
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2596
2966
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2597
|
-
model = models.
|
|
2967
|
+
model = models.ResumeDatahubTaskRequest()
|
|
2598
2968
|
model.from_json_string(json.dumps(args))
|
|
2599
2969
|
start_time = time.time()
|
|
2600
2970
|
while True:
|
|
2601
|
-
rsp = client.
|
|
2971
|
+
rsp = client.ResumeDatahubTask(model)
|
|
2602
2972
|
result = rsp.to_json_string()
|
|
2603
2973
|
try:
|
|
2604
2974
|
json_obj = json.loads(result)
|
|
@@ -2627,7 +2997,10 @@ def doDescribeACL(args, parsed_globals):
|
|
|
2627
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2999
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
3005
|
else:
|
|
2633
3006
|
cred = credential.Credential(
|
|
@@ -2639,7 +3012,7 @@ def doDescribeACL(args, parsed_globals):
|
|
|
2639
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
3014
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
3016
|
if g_param[OptionsDefine.Language]:
|
|
2644
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2669,7 +3042,7 @@ def doDescribeACL(args, parsed_globals):
|
|
|
2669
3042
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2670
3043
|
|
|
2671
3044
|
|
|
2672
|
-
def
|
|
3045
|
+
def doDeleteInstancePost(args, parsed_globals):
|
|
2673
3046
|
g_param = parse_global_arg(parsed_globals)
|
|
2674
3047
|
|
|
2675
3048
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2679,7 +3052,10 @@ def doCreateInstancePre(args, parsed_globals):
|
|
|
2679
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
3054
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
3060
|
else:
|
|
2685
3061
|
cred = credential.Credential(
|
|
@@ -2691,18 +3067,18 @@ def doCreateInstancePre(args, parsed_globals):
|
|
|
2691
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
3069
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
3071
|
if g_param[OptionsDefine.Language]:
|
|
2696
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2698
3074
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2699
3075
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2700
3076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2701
|
-
model = models.
|
|
3077
|
+
model = models.DeleteInstancePostRequest()
|
|
2702
3078
|
model.from_json_string(json.dumps(args))
|
|
2703
3079
|
start_time = time.time()
|
|
2704
3080
|
while True:
|
|
2705
|
-
rsp = client.
|
|
3081
|
+
rsp = client.DeleteInstancePost(model)
|
|
2706
3082
|
result = rsp.to_json_string()
|
|
2707
3083
|
try:
|
|
2708
3084
|
json_obj = json.loads(result)
|
|
@@ -2721,7 +3097,7 @@ def doCreateInstancePre(args, parsed_globals):
|
|
|
2721
3097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2722
3098
|
|
|
2723
3099
|
|
|
2724
|
-
def
|
|
3100
|
+
def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
2725
3101
|
g_param = parse_global_arg(parsed_globals)
|
|
2726
3102
|
|
|
2727
3103
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2731,7 +3107,10 @@ def doModifyConnectResource(args, parsed_globals):
|
|
|
2731
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
3109
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
3115
|
else:
|
|
2737
3116
|
cred = credential.Credential(
|
|
@@ -2743,18 +3122,18 @@ def doModifyConnectResource(args, parsed_globals):
|
|
|
2743
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
3124
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
3126
|
if g_param[OptionsDefine.Language]:
|
|
2748
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2750
3129
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2751
3130
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2752
3131
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2753
|
-
model = models.
|
|
3132
|
+
model = models.DeleteTopicIpWhiteListRequest()
|
|
2754
3133
|
model.from_json_string(json.dumps(args))
|
|
2755
3134
|
start_time = time.time()
|
|
2756
3135
|
while True:
|
|
2757
|
-
rsp = client.
|
|
3136
|
+
rsp = client.DeleteTopicIpWhiteList(model)
|
|
2758
3137
|
result = rsp.to_json_string()
|
|
2759
3138
|
try:
|
|
2760
3139
|
json_obj = json.loads(result)
|
|
@@ -2773,7 +3152,7 @@ def doModifyConnectResource(args, parsed_globals):
|
|
|
2773
3152
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2774
3153
|
|
|
2775
3154
|
|
|
2776
|
-
def
|
|
3155
|
+
def doDescribeTaskStatus(args, parsed_globals):
|
|
2777
3156
|
g_param = parse_global_arg(parsed_globals)
|
|
2778
3157
|
|
|
2779
3158
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2783,7 +3162,10 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
2783
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
3164
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
3170
|
else:
|
|
2789
3171
|
cred = credential.Credential(
|
|
@@ -2795,18 +3177,18 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
2795
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
3179
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
3181
|
if g_param[OptionsDefine.Language]:
|
|
2800
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2802
3184
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2803
3185
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2804
3186
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2805
|
-
model = models.
|
|
3187
|
+
model = models.DescribeTaskStatusRequest()
|
|
2806
3188
|
model.from_json_string(json.dumps(args))
|
|
2807
3189
|
start_time = time.time()
|
|
2808
3190
|
while True:
|
|
2809
|
-
rsp = client.
|
|
3191
|
+
rsp = client.DescribeTaskStatus(model)
|
|
2810
3192
|
result = rsp.to_json_string()
|
|
2811
3193
|
try:
|
|
2812
3194
|
json_obj = json.loads(result)
|
|
@@ -2825,7 +3207,7 @@ def doDeleteTopicIpWhiteList(args, parsed_globals):
|
|
|
2825
3207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2826
3208
|
|
|
2827
3209
|
|
|
2828
|
-
def
|
|
3210
|
+
def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
2829
3211
|
g_param = parse_global_arg(parsed_globals)
|
|
2830
3212
|
|
|
2831
3213
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2835,7 +3217,10 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
2835
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
3219
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
3225
|
else:
|
|
2841
3226
|
cred = credential.Credential(
|
|
@@ -2847,18 +3232,18 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
2847
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
3234
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
3236
|
if g_param[OptionsDefine.Language]:
|
|
2852
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2854
3239
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2855
3240
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2856
3241
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2857
|
-
model = models.
|
|
3242
|
+
model = models.DescribeTopicSyncReplicaRequest()
|
|
2858
3243
|
model.from_json_string(json.dumps(args))
|
|
2859
3244
|
start_time = time.time()
|
|
2860
3245
|
while True:
|
|
2861
|
-
rsp = client.
|
|
3246
|
+
rsp = client.DescribeTopicSyncReplica(model)
|
|
2862
3247
|
result = rsp.to_json_string()
|
|
2863
3248
|
try:
|
|
2864
3249
|
json_obj = json.loads(result)
|
|
@@ -2877,7 +3262,7 @@ def doDescribeTaskStatus(args, parsed_globals):
|
|
|
2877
3262
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2878
3263
|
|
|
2879
3264
|
|
|
2880
|
-
def
|
|
3265
|
+
def doCreateInstancePre(args, parsed_globals):
|
|
2881
3266
|
g_param = parse_global_arg(parsed_globals)
|
|
2882
3267
|
|
|
2883
3268
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2887,7 +3272,10 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2887
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
3274
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
3280
|
else:
|
|
2893
3281
|
cred = credential.Credential(
|
|
@@ -2899,18 +3287,18 @@ def doDescribeTopicSyncReplica(args, parsed_globals):
|
|
|
2899
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
3289
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
3291
|
if g_param[OptionsDefine.Language]:
|
|
2904
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2906
3294
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2907
3295
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2908
3296
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2909
|
-
model = models.
|
|
3297
|
+
model = models.CreateInstancePreRequest()
|
|
2910
3298
|
model.from_json_string(json.dumps(args))
|
|
2911
3299
|
start_time = time.time()
|
|
2912
3300
|
while True:
|
|
2913
|
-
rsp = client.
|
|
3301
|
+
rsp = client.CreateInstancePre(model)
|
|
2914
3302
|
result = rsp.to_json_string()
|
|
2915
3303
|
try:
|
|
2916
3304
|
json_obj = json.loads(result)
|
|
@@ -2939,7 +3327,10 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2939
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
3329
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
3335
|
else:
|
|
2945
3336
|
cred = credential.Credential(
|
|
@@ -2951,7 +3342,7 @@ def doBatchCreateAcl(args, parsed_globals):
|
|
|
2951
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
3344
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
3346
|
if g_param[OptionsDefine.Language]:
|
|
2956
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +3382,10 @@ def doCreateDatahubTask(args, parsed_globals):
|
|
|
2991
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
3384
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3390
|
else:
|
|
2997
3391
|
cred = credential.Credential(
|
|
@@ -3003,7 +3397,7 @@ def doCreateDatahubTask(args, parsed_globals):
|
|
|
3003
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3399
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3401
|
if g_param[OptionsDefine.Language]:
|
|
3008
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3437,10 @@ def doDeleteAclRule(args, parsed_globals):
|
|
|
3043
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3439
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3445
|
else:
|
|
3049
3446
|
cred = credential.Credential(
|
|
@@ -3055,7 +3452,7 @@ def doDeleteAclRule(args, parsed_globals):
|
|
|
3055
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3454
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3456
|
if g_param[OptionsDefine.Language]:
|
|
3060
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3492,10 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
3095
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3494
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3500
|
else:
|
|
3101
3501
|
cred = credential.Credential(
|
|
@@ -3107,7 +3507,7 @@ def doModifyAclRule(args, parsed_globals):
|
|
|
3107
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3509
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3511
|
if g_param[OptionsDefine.Language]:
|
|
3112
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3547,10 @@ def doDeleteUser(args, parsed_globals):
|
|
|
3147
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3549
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3555
|
else:
|
|
3153
3556
|
cred = credential.Credential(
|
|
@@ -3159,7 +3562,7 @@ def doDeleteUser(args, parsed_globals):
|
|
|
3159
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3564
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3566
|
if g_param[OptionsDefine.Language]:
|
|
3164
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3199,7 +3602,10 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
3199
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3604
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3610
|
else:
|
|
3205
3611
|
cred = credential.Credential(
|
|
@@ -3211,7 +3617,7 @@ def doDescribeTopicProduceConnection(args, parsed_globals):
|
|
|
3211
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3619
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3621
|
if g_param[OptionsDefine.Language]:
|
|
3216
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3251,7 +3657,10 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
3251
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3659
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3665
|
else:
|
|
3257
3666
|
cred = credential.Credential(
|
|
@@ -3263,7 +3672,7 @@ def doDescribeTopic(args, parsed_globals):
|
|
|
3263
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3674
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3676
|
if g_param[OptionsDefine.Language]:
|
|
3268
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3712,10 @@ def doDescribeConnectResources(args, parsed_globals):
|
|
|
3303
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3714
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3720
|
else:
|
|
3309
3721
|
cred = credential.Credential(
|
|
@@ -3315,7 +3727,7 @@ def doDescribeConnectResources(args, parsed_globals):
|
|
|
3315
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3729
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3731
|
if g_param[OptionsDefine.Language]:
|
|
3320
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3345,6 +3757,116 @@ def doDescribeConnectResources(args, parsed_globals):
|
|
|
3345
3757
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3346
3758
|
|
|
3347
3759
|
|
|
3760
|
+
def doDescribeModifyType(args, parsed_globals):
|
|
3761
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3762
|
+
|
|
3763
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3764
|
+
cred = credential.CVMRoleCredential()
|
|
3765
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3766
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3767
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3768
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3769
|
+
)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3774
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3775
|
+
else:
|
|
3776
|
+
cred = credential.Credential(
|
|
3777
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3778
|
+
)
|
|
3779
|
+
http_profile = HttpProfile(
|
|
3780
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3781
|
+
reqMethod="POST",
|
|
3782
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3783
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3784
|
+
)
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3786
|
+
if g_param[OptionsDefine.Language]:
|
|
3787
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3788
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3789
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3790
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3791
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3792
|
+
model = models.DescribeModifyTypeRequest()
|
|
3793
|
+
model.from_json_string(json.dumps(args))
|
|
3794
|
+
start_time = time.time()
|
|
3795
|
+
while True:
|
|
3796
|
+
rsp = client.DescribeModifyType(model)
|
|
3797
|
+
result = rsp.to_json_string()
|
|
3798
|
+
try:
|
|
3799
|
+
json_obj = json.loads(result)
|
|
3800
|
+
except TypeError as e:
|
|
3801
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3802
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3803
|
+
break
|
|
3804
|
+
cur_time = time.time()
|
|
3805
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3806
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3807
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3808
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3809
|
+
else:
|
|
3810
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3811
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3812
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3813
|
+
|
|
3814
|
+
|
|
3815
|
+
def doRestartDatahubTask(args, parsed_globals):
|
|
3816
|
+
g_param = parse_global_arg(parsed_globals)
|
|
3817
|
+
|
|
3818
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3819
|
+
cred = credential.CVMRoleCredential()
|
|
3820
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3821
|
+
cred = credential.STSAssumeRoleCredential(
|
|
3822
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3823
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3824
|
+
)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3829
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3830
|
+
else:
|
|
3831
|
+
cred = credential.Credential(
|
|
3832
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3833
|
+
)
|
|
3834
|
+
http_profile = HttpProfile(
|
|
3835
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3836
|
+
reqMethod="POST",
|
|
3837
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3838
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3839
|
+
)
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3841
|
+
if g_param[OptionsDefine.Language]:
|
|
3842
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
3843
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3844
|
+
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3845
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
3846
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3847
|
+
model = models.RestartDatahubTaskRequest()
|
|
3848
|
+
model.from_json_string(json.dumps(args))
|
|
3849
|
+
start_time = time.time()
|
|
3850
|
+
while True:
|
|
3851
|
+
rsp = client.RestartDatahubTask(model)
|
|
3852
|
+
result = rsp.to_json_string()
|
|
3853
|
+
try:
|
|
3854
|
+
json_obj = json.loads(result)
|
|
3855
|
+
except TypeError as e:
|
|
3856
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
3857
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
3858
|
+
break
|
|
3859
|
+
cur_time = time.time()
|
|
3860
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
3861
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
3862
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
3863
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
3864
|
+
else:
|
|
3865
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
3866
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
3867
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3868
|
+
|
|
3869
|
+
|
|
3348
3870
|
def doCreateConsumer(args, parsed_globals):
|
|
3349
3871
|
g_param = parse_global_arg(parsed_globals)
|
|
3350
3872
|
|
|
@@ -3355,7 +3877,10 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
3355
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3879
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3885
|
else:
|
|
3361
3886
|
cred = credential.Credential(
|
|
@@ -3367,7 +3892,7 @@ def doCreateConsumer(args, parsed_globals):
|
|
|
3367
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3894
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3896
|
if g_param[OptionsDefine.Language]:
|
|
3372
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3932,10 @@ def doDescribeTypeInstances(args, parsed_globals):
|
|
|
3407
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3934
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3940
|
else:
|
|
3413
3941
|
cred = credential.Credential(
|
|
@@ -3419,7 +3947,7 @@ def doDescribeTypeInstances(args, parsed_globals):
|
|
|
3419
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3949
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3951
|
if g_param[OptionsDefine.Language]:
|
|
3424
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3987,10 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
3459
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3989
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3995
|
else:
|
|
3465
3996
|
cred = credential.Credential(
|
|
@@ -3471,7 +4002,7 @@ def doDescribeDatahubTopics(args, parsed_globals):
|
|
|
3471
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
4004
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
4006
|
if g_param[OptionsDefine.Language]:
|
|
3476
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +4042,10 @@ def doDescribeSecurityGroupRoutes(args, parsed_globals):
|
|
|
3511
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
4044
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
4050
|
else:
|
|
3517
4051
|
cred = credential.Credential(
|
|
@@ -3523,7 +4057,7 @@ def doDescribeSecurityGroupRoutes(args, parsed_globals):
|
|
|
3523
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
4059
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
4061
|
if g_param[OptionsDefine.Language]:
|
|
3528
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +4097,10 @@ def doDeleteDatahubTask(args, parsed_globals):
|
|
|
3563
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
4099
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
4105
|
else:
|
|
3569
4106
|
cred = credential.Credential(
|
|
@@ -3575,7 +4112,7 @@ def doDeleteDatahubTask(args, parsed_globals):
|
|
|
3575
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
4114
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
4116
|
if g_param[OptionsDefine.Language]:
|
|
3580
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +4152,10 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
3615
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
4154
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
4160
|
else:
|
|
3621
4161
|
cred = credential.Credential(
|
|
@@ -3627,7 +4167,7 @@ def doDescribeGroup(args, parsed_globals):
|
|
|
3627
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
4169
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
4171
|
if g_param[OptionsDefine.Language]:
|
|
3632
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +4207,10 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
3667
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
4209
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
4215
|
else:
|
|
3673
4216
|
cred = credential.Credential(
|
|
@@ -3679,7 +4222,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
3679
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
4224
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
4226
|
if g_param[OptionsDefine.Language]:
|
|
3684
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3709,7 +4252,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
|
3709
4252
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3710
4253
|
|
|
3711
4254
|
|
|
3712
|
-
def
|
|
4255
|
+
def doDescribeDatahubTopic(args, parsed_globals):
|
|
3713
4256
|
g_param = parse_global_arg(parsed_globals)
|
|
3714
4257
|
|
|
3715
4258
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3719,7 +4262,10 @@ def doCreateRoute(args, parsed_globals):
|
|
|
3719
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
4264
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
4270
|
else:
|
|
3725
4271
|
cred = credential.Credential(
|
|
@@ -3731,18 +4277,18 @@ def doCreateRoute(args, parsed_globals):
|
|
|
3731
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
4279
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
4281
|
if g_param[OptionsDefine.Language]:
|
|
3736
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3738
4284
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3739
4285
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3740
4286
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3741
|
-
model = models.
|
|
4287
|
+
model = models.DescribeDatahubTopicRequest()
|
|
3742
4288
|
model.from_json_string(json.dumps(args))
|
|
3743
4289
|
start_time = time.time()
|
|
3744
4290
|
while True:
|
|
3745
|
-
rsp = client.
|
|
4291
|
+
rsp = client.DescribeDatahubTopic(model)
|
|
3746
4292
|
result = rsp.to_json_string()
|
|
3747
4293
|
try:
|
|
3748
4294
|
json_obj = json.loads(result)
|
|
@@ -3761,7 +4307,7 @@ def doCreateRoute(args, parsed_globals):
|
|
|
3761
4307
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3762
4308
|
|
|
3763
4309
|
|
|
3764
|
-
def
|
|
4310
|
+
def doCreateRoute(args, parsed_globals):
|
|
3765
4311
|
g_param = parse_global_arg(parsed_globals)
|
|
3766
4312
|
|
|
3767
4313
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3771,7 +4317,10 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
3771
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
4319
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
4325
|
else:
|
|
3777
4326
|
cred = credential.Credential(
|
|
@@ -3783,18 +4332,18 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
3783
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
4334
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
4336
|
if g_param[OptionsDefine.Language]:
|
|
3788
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3790
4339
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3791
4340
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3792
4341
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3793
|
-
model = models.
|
|
4342
|
+
model = models.CreateRouteRequest()
|
|
3794
4343
|
model.from_json_string(json.dumps(args))
|
|
3795
4344
|
start_time = time.time()
|
|
3796
4345
|
while True:
|
|
3797
|
-
rsp = client.
|
|
4346
|
+
rsp = client.CreateRoute(model)
|
|
3798
4347
|
result = rsp.to_json_string()
|
|
3799
4348
|
try:
|
|
3800
4349
|
json_obj = json.loads(result)
|
|
@@ -3813,7 +4362,7 @@ def doDescribeTopicDetail(args, parsed_globals):
|
|
|
3813
4362
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3814
4363
|
|
|
3815
4364
|
|
|
3816
|
-
def
|
|
4365
|
+
def doDescribeTopicDetail(args, parsed_globals):
|
|
3817
4366
|
g_param = parse_global_arg(parsed_globals)
|
|
3818
4367
|
|
|
3819
4368
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3823,7 +4372,10 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
3823
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
4374
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
4380
|
else:
|
|
3829
4381
|
cred = credential.Credential(
|
|
@@ -3835,18 +4387,18 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
3835
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
4389
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
4391
|
if g_param[OptionsDefine.Language]:
|
|
3840
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3842
4394
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3843
4395
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3844
4396
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3845
|
-
model = models.
|
|
4397
|
+
model = models.DescribeTopicDetailRequest()
|
|
3846
4398
|
model.from_json_string(json.dumps(args))
|
|
3847
4399
|
start_time = time.time()
|
|
3848
4400
|
while True:
|
|
3849
|
-
rsp = client.
|
|
4401
|
+
rsp = client.DescribeTopicDetail(model)
|
|
3850
4402
|
result = rsp.to_json_string()
|
|
3851
4403
|
try:
|
|
3852
4404
|
json_obj = json.loads(result)
|
|
@@ -3865,7 +4417,7 @@ def doFetchMessageByOffset(args, parsed_globals):
|
|
|
3865
4417
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3866
4418
|
|
|
3867
4419
|
|
|
3868
|
-
def
|
|
4420
|
+
def doFetchMessageByOffset(args, parsed_globals):
|
|
3869
4421
|
g_param = parse_global_arg(parsed_globals)
|
|
3870
4422
|
|
|
3871
4423
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3875,7 +4427,10 @@ def doModifyPassword(args, parsed_globals):
|
|
|
3875
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
4429
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
4435
|
else:
|
|
3881
4436
|
cred = credential.Credential(
|
|
@@ -3887,18 +4442,18 @@ def doModifyPassword(args, parsed_globals):
|
|
|
3887
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
4444
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
4446
|
if g_param[OptionsDefine.Language]:
|
|
3892
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3894
4449
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3895
4450
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3896
4451
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3897
|
-
model = models.
|
|
4452
|
+
model = models.FetchMessageByOffsetRequest()
|
|
3898
4453
|
model.from_json_string(json.dumps(args))
|
|
3899
4454
|
start_time = time.time()
|
|
3900
4455
|
while True:
|
|
3901
|
-
rsp = client.
|
|
4456
|
+
rsp = client.FetchMessageByOffset(model)
|
|
3902
4457
|
result = rsp.to_json_string()
|
|
3903
4458
|
try:
|
|
3904
4459
|
json_obj = json.loads(result)
|
|
@@ -3917,7 +4472,7 @@ def doModifyPassword(args, parsed_globals):
|
|
|
3917
4472
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3918
4473
|
|
|
3919
4474
|
|
|
3920
|
-
def
|
|
4475
|
+
def doModifyPassword(args, parsed_globals):
|
|
3921
4476
|
g_param = parse_global_arg(parsed_globals)
|
|
3922
4477
|
|
|
3923
4478
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3927,7 +4482,10 @@ def doCreateAcl(args, parsed_globals):
|
|
|
3927
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
4484
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
4490
|
else:
|
|
3933
4491
|
cred = credential.Credential(
|
|
@@ -3939,18 +4497,18 @@ def doCreateAcl(args, parsed_globals):
|
|
|
3939
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4499
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4501
|
if g_param[OptionsDefine.Language]:
|
|
3944
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3946
4504
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3947
4505
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3948
4506
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3949
|
-
model = models.
|
|
4507
|
+
model = models.ModifyPasswordRequest()
|
|
3950
4508
|
model.from_json_string(json.dumps(args))
|
|
3951
4509
|
start_time = time.time()
|
|
3952
4510
|
while True:
|
|
3953
|
-
rsp = client.
|
|
4511
|
+
rsp = client.ModifyPassword(model)
|
|
3954
4512
|
result = rsp.to_json_string()
|
|
3955
4513
|
try:
|
|
3956
4514
|
json_obj = json.loads(result)
|
|
@@ -3969,7 +4527,7 @@ def doCreateAcl(args, parsed_globals):
|
|
|
3969
4527
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3970
4528
|
|
|
3971
4529
|
|
|
3972
|
-
def
|
|
4530
|
+
def doCreateAcl(args, parsed_globals):
|
|
3973
4531
|
g_param = parse_global_arg(parsed_globals)
|
|
3974
4532
|
|
|
3975
4533
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3979,7 +4537,10 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
3979
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
4539
|
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
4545
|
else:
|
|
3985
4546
|
cred = credential.Credential(
|
|
@@ -3991,18 +4552,18 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
3991
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
4554
|
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3995
4556
|
if g_param[OptionsDefine.Language]:
|
|
3996
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
3997
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3998
4559
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3999
4560
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4000
4561
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4001
|
-
model = models.
|
|
4562
|
+
model = models.CreateAclRequest()
|
|
4002
4563
|
model.from_json_string(json.dumps(args))
|
|
4003
4564
|
start_time = time.time()
|
|
4004
4565
|
while True:
|
|
4005
|
-
rsp = client.
|
|
4566
|
+
rsp = client.CreateAcl(model)
|
|
4006
4567
|
result = rsp.to_json_string()
|
|
4007
4568
|
try:
|
|
4008
4569
|
json_obj = json.loads(result)
|
|
@@ -4021,7 +4582,7 @@ def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
|
4021
4582
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4022
4583
|
|
|
4023
4584
|
|
|
4024
|
-
def
|
|
4585
|
+
def doDescribeTopicSubscribeGroup(args, parsed_globals):
|
|
4025
4586
|
g_param = parse_global_arg(parsed_globals)
|
|
4026
4587
|
|
|
4027
4588
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4031,7 +4592,10 @@ def doModifyRoutineMaintenanceTask(args, parsed_globals):
|
|
|
4031
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4594
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4600
|
else:
|
|
4037
4601
|
cred = credential.Credential(
|
|
@@ -4043,18 +4607,18 @@ def doModifyRoutineMaintenanceTask(args, parsed_globals):
|
|
|
4043
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4609
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4611
|
if g_param[OptionsDefine.Language]:
|
|
4048
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4050
4614
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4051
4615
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4052
4616
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4053
|
-
model = models.
|
|
4617
|
+
model = models.DescribeTopicSubscribeGroupRequest()
|
|
4054
4618
|
model.from_json_string(json.dumps(args))
|
|
4055
4619
|
start_time = time.time()
|
|
4056
4620
|
while True:
|
|
4057
|
-
rsp = client.
|
|
4621
|
+
rsp = client.DescribeTopicSubscribeGroup(model)
|
|
4058
4622
|
result = rsp.to_json_string()
|
|
4059
4623
|
try:
|
|
4060
4624
|
json_obj = json.loads(result)
|
|
@@ -4073,7 +4637,7 @@ def doModifyRoutineMaintenanceTask(args, parsed_globals):
|
|
|
4073
4637
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4074
4638
|
|
|
4075
4639
|
|
|
4076
|
-
def
|
|
4640
|
+
def doModifyRoutineMaintenanceTask(args, parsed_globals):
|
|
4077
4641
|
g_param = parse_global_arg(parsed_globals)
|
|
4078
4642
|
|
|
4079
4643
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4083,7 +4647,10 @@ def doCreatePrometheus(args, parsed_globals):
|
|
|
4083
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4649
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4655
|
else:
|
|
4089
4656
|
cred = credential.Credential(
|
|
@@ -4095,18 +4662,18 @@ def doCreatePrometheus(args, parsed_globals):
|
|
|
4095
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4664
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4666
|
if g_param[OptionsDefine.Language]:
|
|
4100
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4102
4669
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4103
4670
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4104
4671
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4105
|
-
model = models.
|
|
4672
|
+
model = models.ModifyRoutineMaintenanceTaskRequest()
|
|
4106
4673
|
model.from_json_string(json.dumps(args))
|
|
4107
4674
|
start_time = time.time()
|
|
4108
4675
|
while True:
|
|
4109
|
-
rsp = client.
|
|
4676
|
+
rsp = client.ModifyRoutineMaintenanceTask(model)
|
|
4110
4677
|
result = rsp.to_json_string()
|
|
4111
4678
|
try:
|
|
4112
4679
|
json_obj = json.loads(result)
|
|
@@ -4125,7 +4692,7 @@ def doCreatePrometheus(args, parsed_globals):
|
|
|
4125
4692
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4126
4693
|
|
|
4127
4694
|
|
|
4128
|
-
def
|
|
4695
|
+
def doCreatePrometheus(args, parsed_globals):
|
|
4129
4696
|
g_param = parse_global_arg(parsed_globals)
|
|
4130
4697
|
|
|
4131
4698
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4135,7 +4702,10 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
4135
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4704
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4710
|
else:
|
|
4141
4711
|
cred = credential.Credential(
|
|
@@ -4147,18 +4717,18 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
4147
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4719
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4721
|
if g_param[OptionsDefine.Language]:
|
|
4152
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4154
4724
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4155
4725
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4156
4726
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4157
|
-
model = models.
|
|
4727
|
+
model = models.CreatePrometheusRequest()
|
|
4158
4728
|
model.from_json_string(json.dumps(args))
|
|
4159
4729
|
start_time = time.time()
|
|
4160
4730
|
while True:
|
|
4161
|
-
rsp = client.
|
|
4731
|
+
rsp = client.CreatePrometheus(model)
|
|
4162
4732
|
result = rsp.to_json_string()
|
|
4163
4733
|
try:
|
|
4164
4734
|
json_obj = json.loads(result)
|
|
@@ -4177,7 +4747,7 @@ def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
|
4177
4747
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4178
4748
|
|
|
4179
4749
|
|
|
4180
|
-
def
|
|
4750
|
+
def doDeleteRouteTriggerTime(args, parsed_globals):
|
|
4181
4751
|
g_param = parse_global_arg(parsed_globals)
|
|
4182
4752
|
|
|
4183
4753
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4187,7 +4757,10 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
4187
4757
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4758
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4759
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4760
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4761
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4762
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4763
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4764
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4765
|
else:
|
|
4193
4766
|
cred = credential.Credential(
|
|
@@ -4199,18 +4772,18 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
4199
4772
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4773
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4774
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4775
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4776
|
if g_param[OptionsDefine.Language]:
|
|
4204
4777
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4778
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4206
4779
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4207
4780
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4208
4781
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4209
|
-
model = models.
|
|
4782
|
+
model = models.DeleteRouteTriggerTimeRequest()
|
|
4210
4783
|
model.from_json_string(json.dumps(args))
|
|
4211
4784
|
start_time = time.time()
|
|
4212
4785
|
while True:
|
|
4213
|
-
rsp = client.
|
|
4786
|
+
rsp = client.DeleteRouteTriggerTime(model)
|
|
4214
4787
|
result = rsp.to_json_string()
|
|
4215
4788
|
try:
|
|
4216
4789
|
json_obj = json.loads(result)
|
|
@@ -4229,7 +4802,7 @@ def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
|
4229
4802
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4230
4803
|
|
|
4231
4804
|
|
|
4232
|
-
def
|
|
4805
|
+
def doBatchModifyGroupOffsets(args, parsed_globals):
|
|
4233
4806
|
g_param = parse_global_arg(parsed_globals)
|
|
4234
4807
|
|
|
4235
4808
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4239,7 +4812,10 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
4239
4812
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4813
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4814
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4815
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4816
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4817
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4818
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4819
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4820
|
else:
|
|
4245
4821
|
cred = credential.Credential(
|
|
@@ -4251,18 +4827,18 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
4251
4827
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4828
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4829
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4830
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4831
|
if g_param[OptionsDefine.Language]:
|
|
4256
4832
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4833
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4258
4834
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4259
4835
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4260
4836
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4261
|
-
model = models.
|
|
4837
|
+
model = models.BatchModifyGroupOffsetsRequest()
|
|
4262
4838
|
model.from_json_string(json.dumps(args))
|
|
4263
4839
|
start_time = time.time()
|
|
4264
4840
|
while True:
|
|
4265
|
-
rsp = client.
|
|
4841
|
+
rsp = client.BatchModifyGroupOffsets(model)
|
|
4266
4842
|
result = rsp.to_json_string()
|
|
4267
4843
|
try:
|
|
4268
4844
|
json_obj = json.loads(result)
|
|
@@ -4281,7 +4857,7 @@ def doDescribeGroupOffsets(args, parsed_globals):
|
|
|
4281
4857
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4282
4858
|
|
|
4283
4859
|
|
|
4284
|
-
def
|
|
4860
|
+
def doDescribeGroupOffsets(args, parsed_globals):
|
|
4285
4861
|
g_param = parse_global_arg(parsed_globals)
|
|
4286
4862
|
|
|
4287
4863
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4291,7 +4867,10 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
4291
4867
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4868
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4869
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4870
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4871
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4872
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4873
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4874
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4875
|
else:
|
|
4297
4876
|
cred = credential.Credential(
|
|
@@ -4303,18 +4882,18 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
4303
4882
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4883
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4884
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4885
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4886
|
if g_param[OptionsDefine.Language]:
|
|
4308
4887
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4888
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4310
4889
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4311
4890
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4312
4891
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4313
|
-
model = models.
|
|
4892
|
+
model = models.DescribeGroupOffsetsRequest()
|
|
4314
4893
|
model.from_json_string(json.dumps(args))
|
|
4315
4894
|
start_time = time.time()
|
|
4316
4895
|
while True:
|
|
4317
|
-
rsp = client.
|
|
4896
|
+
rsp = client.DescribeGroupOffsets(model)
|
|
4318
4897
|
result = rsp.to_json_string()
|
|
4319
4898
|
try:
|
|
4320
4899
|
json_obj = json.loads(result)
|
|
@@ -4333,7 +4912,7 @@ def doDescribeAppInfo(args, parsed_globals):
|
|
|
4333
4912
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4334
4913
|
|
|
4335
4914
|
|
|
4336
|
-
def
|
|
4915
|
+
def doModifyConnectResource(args, parsed_globals):
|
|
4337
4916
|
g_param = parse_global_arg(parsed_globals)
|
|
4338
4917
|
|
|
4339
4918
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4343,7 +4922,10 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
4343
4922
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4923
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4924
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4925
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4926
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4927
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4928
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4929
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4930
|
else:
|
|
4349
4931
|
cred = credential.Credential(
|
|
@@ -4355,18 +4937,18 @@ def doDescribeRegion(args, parsed_globals):
|
|
|
4355
4937
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4938
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4939
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4940
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4941
|
if g_param[OptionsDefine.Language]:
|
|
4360
4942
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4943
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4362
4944
|
client = mod.CkafkaClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4363
4945
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4364
4946
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4365
|
-
model = models.
|
|
4947
|
+
model = models.ModifyConnectResourceRequest()
|
|
4366
4948
|
model.from_json_string(json.dumps(args))
|
|
4367
4949
|
start_time = time.time()
|
|
4368
4950
|
while True:
|
|
4369
|
-
rsp = client.
|
|
4951
|
+
rsp = client.ModifyConnectResource(model)
|
|
4370
4952
|
result = rsp.to_json_string()
|
|
4371
4953
|
try:
|
|
4372
4954
|
json_obj = json.loads(result)
|
|
@@ -4395,7 +4977,10 @@ def doCreateCdcCluster(args, parsed_globals):
|
|
|
4395
4977
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4978
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4979
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4980
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4981
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4982
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4983
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4984
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4985
|
else:
|
|
4401
4986
|
cred = credential.Credential(
|
|
@@ -4407,7 +4992,7 @@ def doCreateCdcCluster(args, parsed_globals):
|
|
|
4407
4992
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4993
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4994
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4995
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4996
|
if g_param[OptionsDefine.Language]:
|
|
4412
4997
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4998
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +5032,10 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
4447
5032
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
5033
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
5034
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5035
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5036
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5037
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5038
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
5039
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
5040
|
else:
|
|
4453
5041
|
cred = credential.Credential(
|
|
@@ -4459,7 +5047,7 @@ def doDeleteTopic(args, parsed_globals):
|
|
|
4459
5047
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
5048
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
5049
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
5051
|
if g_param[OptionsDefine.Language]:
|
|
4464
5052
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
5053
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +5087,10 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
4499
5087
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
5088
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
5089
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
5090
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
5091
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
5092
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
5093
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
5094
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
5095
|
else:
|
|
4505
5096
|
cred = credential.Credential(
|
|
@@ -4511,7 +5102,7 @@ def doInquireCkafkaPrice(args, parsed_globals):
|
|
|
4511
5102
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
5103
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
5104
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
5105
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
5106
|
if g_param[OptionsDefine.Language]:
|
|
4516
5107
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
5108
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4554,9 +5145,11 @@ MODELS_MAP = {
|
|
|
4554
5145
|
ACTION_MAP = {
|
|
4555
5146
|
"DescribeGroupInfo": doDescribeGroupInfo,
|
|
4556
5147
|
"DescribeCvmInfo": doDescribeCvmInfo,
|
|
5148
|
+
"DescribeRegion": doDescribeRegion,
|
|
4557
5149
|
"ModifyInstancePre": doModifyInstancePre,
|
|
4558
5150
|
"SendMessage": doSendMessage,
|
|
4559
5151
|
"DeleteConnectResource": doDeleteConnectResource,
|
|
5152
|
+
"DeleteGroupSubscribeTopic": doDeleteGroupSubscribeTopic,
|
|
4560
5153
|
"DescribeUser": doDescribeUser,
|
|
4561
5154
|
"DescribeDatahubGroupOffsets": doDescribeDatahubGroupOffsets,
|
|
4562
5155
|
"DescribeConsumerGroup": doDescribeConsumerGroup,
|
|
@@ -4577,6 +5170,7 @@ ACTION_MAP = {
|
|
|
4577
5170
|
"RenewCkafkaInstance": doRenewCkafkaInstance,
|
|
4578
5171
|
"DescribeAclRule": doDescribeAclRule,
|
|
4579
5172
|
"DescribePrometheus": doDescribePrometheus,
|
|
5173
|
+
"UpgradeBrokerVersion": doUpgradeBrokerVersion,
|
|
4580
5174
|
"DescribeDatahubTasks": doDescribeDatahubTasks,
|
|
4581
5175
|
"ModifyDatahubTopic": doModifyDatahubTopic,
|
|
4582
5176
|
"FetchMessageListByOffset": doFetchMessageListByOffset,
|
|
@@ -4589,7 +5183,7 @@ ACTION_MAP = {
|
|
|
4589
5183
|
"DescribeInstanceAttributes": doDescribeInstanceAttributes,
|
|
4590
5184
|
"CreatePostPaidInstance": doCreatePostPaidInstance,
|
|
4591
5185
|
"AuthorizeToken": doAuthorizeToken,
|
|
4592
|
-
"
|
|
5186
|
+
"PauseDatahubTask": doPauseDatahubTask,
|
|
4593
5187
|
"DescribeCkafkaZone": doDescribeCkafkaZone,
|
|
4594
5188
|
"DescribeRoute": doDescribeRoute,
|
|
4595
5189
|
"ModifyDatahubTask": doModifyDatahubTask,
|
|
@@ -4598,16 +5192,17 @@ ACTION_MAP = {
|
|
|
4598
5192
|
"DeleteRoute": doDeleteRoute,
|
|
4599
5193
|
"ModifyTopicAttributes": doModifyTopicAttributes,
|
|
4600
5194
|
"CreateTopicIpWhiteList": doCreateTopicIpWhiteList,
|
|
5195
|
+
"DescribeCkafkaVersion": doDescribeCkafkaVersion,
|
|
4601
5196
|
"ModifyGroupOffsets": doModifyGroupOffsets,
|
|
4602
5197
|
"ModifyInstanceAttributes": doModifyInstanceAttributes,
|
|
4603
5198
|
"DeleteGroup": doDeleteGroup,
|
|
4604
|
-
"
|
|
5199
|
+
"ResumeDatahubTask": doResumeDatahubTask,
|
|
4605
5200
|
"DescribeACL": doDescribeACL,
|
|
4606
|
-
"
|
|
4607
|
-
"ModifyConnectResource": doModifyConnectResource,
|
|
5201
|
+
"DeleteInstancePost": doDeleteInstancePost,
|
|
4608
5202
|
"DeleteTopicIpWhiteList": doDeleteTopicIpWhiteList,
|
|
4609
5203
|
"DescribeTaskStatus": doDescribeTaskStatus,
|
|
4610
5204
|
"DescribeTopicSyncReplica": doDescribeTopicSyncReplica,
|
|
5205
|
+
"CreateInstancePre": doCreateInstancePre,
|
|
4611
5206
|
"BatchCreateAcl": doBatchCreateAcl,
|
|
4612
5207
|
"CreateDatahubTask": doCreateDatahubTask,
|
|
4613
5208
|
"DeleteAclRule": doDeleteAclRule,
|
|
@@ -4616,6 +5211,8 @@ ACTION_MAP = {
|
|
|
4616
5211
|
"DescribeTopicProduceConnection": doDescribeTopicProduceConnection,
|
|
4617
5212
|
"DescribeTopic": doDescribeTopic,
|
|
4618
5213
|
"DescribeConnectResources": doDescribeConnectResources,
|
|
5214
|
+
"DescribeModifyType": doDescribeModifyType,
|
|
5215
|
+
"RestartDatahubTask": doRestartDatahubTask,
|
|
4619
5216
|
"CreateConsumer": doCreateConsumer,
|
|
4620
5217
|
"DescribeTypeInstances": doDescribeTypeInstances,
|
|
4621
5218
|
"DescribeDatahubTopics": doDescribeDatahubTopics,
|
|
@@ -4623,6 +5220,7 @@ ACTION_MAP = {
|
|
|
4623
5220
|
"DeleteDatahubTask": doDeleteDatahubTask,
|
|
4624
5221
|
"DescribeGroup": doDescribeGroup,
|
|
4625
5222
|
"DescribeInstances": doDescribeInstances,
|
|
5223
|
+
"DescribeDatahubTopic": doDescribeDatahubTopic,
|
|
4626
5224
|
"CreateRoute": doCreateRoute,
|
|
4627
5225
|
"DescribeTopicDetail": doDescribeTopicDetail,
|
|
4628
5226
|
"FetchMessageByOffset": doFetchMessageByOffset,
|
|
@@ -4634,8 +5232,7 @@ ACTION_MAP = {
|
|
|
4634
5232
|
"DeleteRouteTriggerTime": doDeleteRouteTriggerTime,
|
|
4635
5233
|
"BatchModifyGroupOffsets": doBatchModifyGroupOffsets,
|
|
4636
5234
|
"DescribeGroupOffsets": doDescribeGroupOffsets,
|
|
4637
|
-
"
|
|
4638
|
-
"DescribeRegion": doDescribeRegion,
|
|
5235
|
+
"ModifyConnectResource": doModifyConnectResource,
|
|
4639
5236
|
"CreateCdcCluster": doCreateCdcCluster,
|
|
4640
5237
|
"DeleteTopic": doDeleteTopic,
|
|
4641
5238
|
"InquireCkafkaPrice": doInquireCkafkaPrice,
|