tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -17,6 +17,61 @@ from tencentcloud.ctem.v20231128 import models as models_v20231128
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
+ def doCreateWechatApplet(args, parsed_globals):
21
+ g_param = parse_global_arg(parsed_globals)
22
+
23
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
24
+ cred = credential.CVMRoleCredential()
25
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
26
+ cred = credential.STSAssumeRoleCredential(
27
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
+ )
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
34
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
35
+ else:
36
+ cred = credential.Credential(
37
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
38
+ )
39
+ http_profile = HttpProfile(
40
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
41
+ reqMethod="POST",
42
+ endpoint=g_param[OptionsDefine.Endpoint],
43
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
44
+ )
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
46
+ if g_param[OptionsDefine.Language]:
47
+ profile.language = g_param[OptionsDefine.Language]
48
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
49
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
50
+ client._sdkVersion += ("_CLI_" + __version__)
51
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
52
+ model = models.CreateWechatAppletRequest()
53
+ model.from_json_string(json.dumps(args))
54
+ start_time = time.time()
55
+ while True:
56
+ rsp = client.CreateWechatApplet(model)
57
+ result = rsp.to_json_string()
58
+ try:
59
+ json_obj = json.loads(result)
60
+ except TypeError as e:
61
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
62
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
63
+ break
64
+ cur_time = time.time()
65
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
66
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
67
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
68
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
69
+ else:
70
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
71
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
72
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
73
+
74
+
20
75
  def doDescribeNetDisks(args, parsed_globals):
21
76
  g_param = parse_global_arg(parsed_globals)
22
77
 
@@ -27,7 +82,1385 @@ def doDescribeNetDisks(args, parsed_globals):
27
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
84
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
89
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
90
+ else:
91
+ cred = credential.Credential(
92
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
93
+ )
94
+ http_profile = HttpProfile(
95
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
96
+ reqMethod="POST",
97
+ endpoint=g_param[OptionsDefine.Endpoint],
98
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
99
+ )
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
101
+ if g_param[OptionsDefine.Language]:
102
+ profile.language = g_param[OptionsDefine.Language]
103
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
104
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
105
+ client._sdkVersion += ("_CLI_" + __version__)
106
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
107
+ model = models.DescribeNetDisksRequest()
108
+ model.from_json_string(json.dumps(args))
109
+ start_time = time.time()
110
+ while True:
111
+ rsp = client.DescribeNetDisks(model)
112
+ result = rsp.to_json_string()
113
+ try:
114
+ json_obj = json.loads(result)
115
+ except TypeError as e:
116
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
117
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
118
+ break
119
+ cur_time = time.time()
120
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
121
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
122
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
123
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
124
+ else:
125
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
126
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
127
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
128
+
129
+
130
+ def doCreateManage(args, parsed_globals):
131
+ g_param = parse_global_arg(parsed_globals)
132
+
133
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
134
+ cred = credential.CVMRoleCredential()
135
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
136
+ cred = credential.STSAssumeRoleCredential(
137
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
138
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
139
+ )
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
144
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
145
+ else:
146
+ cred = credential.Credential(
147
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
148
+ )
149
+ http_profile = HttpProfile(
150
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
151
+ reqMethod="POST",
152
+ endpoint=g_param[OptionsDefine.Endpoint],
153
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
154
+ )
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
156
+ if g_param[OptionsDefine.Language]:
157
+ profile.language = g_param[OptionsDefine.Language]
158
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
159
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
160
+ client._sdkVersion += ("_CLI_" + __version__)
161
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
162
+ model = models.CreateManageRequest()
163
+ model.from_json_string(json.dumps(args))
164
+ start_time = time.time()
165
+ while True:
166
+ rsp = client.CreateManage(model)
167
+ result = rsp.to_json_string()
168
+ try:
169
+ json_obj = json.loads(result)
170
+ except TypeError as e:
171
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
172
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
173
+ break
174
+ cur_time = time.time()
175
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
176
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
177
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
178
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
179
+ else:
180
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
181
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
182
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
183
+
184
+
185
+ def doDescribeManages(args, parsed_globals):
186
+ g_param = parse_global_arg(parsed_globals)
187
+
188
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
189
+ cred = credential.CVMRoleCredential()
190
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
191
+ cred = credential.STSAssumeRoleCredential(
192
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
193
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
194
+ )
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
199
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
200
+ else:
201
+ cred = credential.Credential(
202
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
203
+ )
204
+ http_profile = HttpProfile(
205
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
206
+ reqMethod="POST",
207
+ endpoint=g_param[OptionsDefine.Endpoint],
208
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
209
+ )
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
211
+ if g_param[OptionsDefine.Language]:
212
+ profile.language = g_param[OptionsDefine.Language]
213
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
214
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
215
+ client._sdkVersion += ("_CLI_" + __version__)
216
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
217
+ model = models.DescribeManagesRequest()
218
+ model.from_json_string(json.dumps(args))
219
+ start_time = time.time()
220
+ while True:
221
+ rsp = client.DescribeManages(model)
222
+ result = rsp.to_json_string()
223
+ try:
224
+ json_obj = json.loads(result)
225
+ except TypeError as e:
226
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
227
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
228
+ break
229
+ cur_time = time.time()
230
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
231
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
232
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
233
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
234
+ else:
235
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
236
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
237
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
238
+
239
+
240
+ def doDescribeLeakageDatas(args, parsed_globals):
241
+ g_param = parse_global_arg(parsed_globals)
242
+
243
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
244
+ cred = credential.CVMRoleCredential()
245
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
246
+ cred = credential.STSAssumeRoleCredential(
247
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
248
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
249
+ )
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
254
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
255
+ else:
256
+ cred = credential.Credential(
257
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
258
+ )
259
+ http_profile = HttpProfile(
260
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
261
+ reqMethod="POST",
262
+ endpoint=g_param[OptionsDefine.Endpoint],
263
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
264
+ )
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
266
+ if g_param[OptionsDefine.Language]:
267
+ profile.language = g_param[OptionsDefine.Language]
268
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
269
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
270
+ client._sdkVersion += ("_CLI_" + __version__)
271
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
272
+ model = models.DescribeLeakageDatasRequest()
273
+ model.from_json_string(json.dumps(args))
274
+ start_time = time.time()
275
+ while True:
276
+ rsp = client.DescribeLeakageDatas(model)
277
+ result = rsp.to_json_string()
278
+ try:
279
+ json_obj = json.loads(result)
280
+ except TypeError as e:
281
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
282
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
283
+ break
284
+ cur_time = time.time()
285
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
286
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
287
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
288
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
289
+ else:
290
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
291
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
292
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
293
+
294
+
295
+ def doDeleteApps(args, parsed_globals):
296
+ g_param = parse_global_arg(parsed_globals)
297
+
298
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
299
+ cred = credential.CVMRoleCredential()
300
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
301
+ cred = credential.STSAssumeRoleCredential(
302
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
303
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
304
+ )
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
309
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
310
+ else:
311
+ cred = credential.Credential(
312
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
313
+ )
314
+ http_profile = HttpProfile(
315
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
316
+ reqMethod="POST",
317
+ endpoint=g_param[OptionsDefine.Endpoint],
318
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
319
+ )
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
321
+ if g_param[OptionsDefine.Language]:
322
+ profile.language = g_param[OptionsDefine.Language]
323
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
324
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
325
+ client._sdkVersion += ("_CLI_" + __version__)
326
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
327
+ model = models.DeleteAppsRequest()
328
+ model.from_json_string(json.dumps(args))
329
+ start_time = time.time()
330
+ while True:
331
+ rsp = client.DeleteApps(model)
332
+ result = rsp.to_json_string()
333
+ try:
334
+ json_obj = json.loads(result)
335
+ except TypeError as e:
336
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
337
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
338
+ break
339
+ cur_time = time.time()
340
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
341
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
342
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
343
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
344
+ else:
345
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
346
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
347
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
348
+
349
+
350
+ def doModifyCustomer(args, parsed_globals):
351
+ g_param = parse_global_arg(parsed_globals)
352
+
353
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
354
+ cred = credential.CVMRoleCredential()
355
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
356
+ cred = credential.STSAssumeRoleCredential(
357
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
358
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
359
+ )
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
364
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
365
+ else:
366
+ cred = credential.Credential(
367
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
368
+ )
369
+ http_profile = HttpProfile(
370
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
371
+ reqMethod="POST",
372
+ endpoint=g_param[OptionsDefine.Endpoint],
373
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
374
+ )
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
376
+ if g_param[OptionsDefine.Language]:
377
+ profile.language = g_param[OptionsDefine.Language]
378
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
379
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
380
+ client._sdkVersion += ("_CLI_" + __version__)
381
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
382
+ model = models.ModifyCustomerRequest()
383
+ model.from_json_string(json.dumps(args))
384
+ start_time = time.time()
385
+ while True:
386
+ rsp = client.ModifyCustomer(model)
387
+ result = rsp.to_json_string()
388
+ try:
389
+ json_obj = json.loads(result)
390
+ except TypeError as e:
391
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
392
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
393
+ break
394
+ cur_time = time.time()
395
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
396
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
397
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
398
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
399
+ else:
400
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
401
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
402
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
403
+
404
+
405
+ def doCreateAsset(args, parsed_globals):
406
+ g_param = parse_global_arg(parsed_globals)
407
+
408
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
409
+ cred = credential.CVMRoleCredential()
410
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
411
+ cred = credential.STSAssumeRoleCredential(
412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
413
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
414
+ )
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
419
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
420
+ else:
421
+ cred = credential.Credential(
422
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
423
+ )
424
+ http_profile = HttpProfile(
425
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
426
+ reqMethod="POST",
427
+ endpoint=g_param[OptionsDefine.Endpoint],
428
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
429
+ )
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
431
+ if g_param[OptionsDefine.Language]:
432
+ profile.language = g_param[OptionsDefine.Language]
433
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
434
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
435
+ client._sdkVersion += ("_CLI_" + __version__)
436
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
437
+ model = models.CreateAssetRequest()
438
+ model.from_json_string(json.dumps(args))
439
+ start_time = time.time()
440
+ while True:
441
+ rsp = client.CreateAsset(model)
442
+ result = rsp.to_json_string()
443
+ try:
444
+ json_obj = json.loads(result)
445
+ except TypeError as e:
446
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
447
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
448
+ break
449
+ cur_time = time.time()
450
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
451
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
452
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
453
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
454
+ else:
455
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
456
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
457
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
458
+
459
+
460
+ def doDeleteManages(args, parsed_globals):
461
+ g_param = parse_global_arg(parsed_globals)
462
+
463
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
464
+ cred = credential.CVMRoleCredential()
465
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
466
+ cred = credential.STSAssumeRoleCredential(
467
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
468
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
469
+ )
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
474
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
475
+ else:
476
+ cred = credential.Credential(
477
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
478
+ )
479
+ http_profile = HttpProfile(
480
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
481
+ reqMethod="POST",
482
+ endpoint=g_param[OptionsDefine.Endpoint],
483
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
484
+ )
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
486
+ if g_param[OptionsDefine.Language]:
487
+ profile.language = g_param[OptionsDefine.Language]
488
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
489
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
490
+ client._sdkVersion += ("_CLI_" + __version__)
491
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
492
+ model = models.DeleteManagesRequest()
493
+ model.from_json_string(json.dumps(args))
494
+ start_time = time.time()
495
+ while True:
496
+ rsp = client.DeleteManages(model)
497
+ result = rsp.to_json_string()
498
+ try:
499
+ json_obj = json.loads(result)
500
+ except TypeError as e:
501
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
502
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
503
+ break
504
+ cur_time = time.time()
505
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
506
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
507
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
508
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
509
+ else:
510
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
511
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
512
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
513
+
514
+
515
+ def doDeleteHttps(args, parsed_globals):
516
+ g_param = parse_global_arg(parsed_globals)
517
+
518
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
519
+ cred = credential.CVMRoleCredential()
520
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
521
+ cred = credential.STSAssumeRoleCredential(
522
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
523
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
524
+ )
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
529
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
530
+ else:
531
+ cred = credential.Credential(
532
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
533
+ )
534
+ http_profile = HttpProfile(
535
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
536
+ reqMethod="POST",
537
+ endpoint=g_param[OptionsDefine.Endpoint],
538
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
539
+ )
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
541
+ if g_param[OptionsDefine.Language]:
542
+ profile.language = g_param[OptionsDefine.Language]
543
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
544
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
545
+ client._sdkVersion += ("_CLI_" + __version__)
546
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
547
+ model = models.DeleteHttpsRequest()
548
+ model.from_json_string(json.dumps(args))
549
+ start_time = time.time()
550
+ while True:
551
+ rsp = client.DeleteHttps(model)
552
+ result = rsp.to_json_string()
553
+ try:
554
+ json_obj = json.loads(result)
555
+ except TypeError as e:
556
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
557
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
558
+ break
559
+ cur_time = time.time()
560
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
561
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
562
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
563
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
564
+ else:
565
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
566
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
567
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
568
+
569
+
570
+ def doCreateSuspiciousAsset(args, parsed_globals):
571
+ g_param = parse_global_arg(parsed_globals)
572
+
573
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
574
+ cred = credential.CVMRoleCredential()
575
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
576
+ cred = credential.STSAssumeRoleCredential(
577
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
578
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
579
+ )
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
584
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
585
+ else:
586
+ cred = credential.Credential(
587
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
588
+ )
589
+ http_profile = HttpProfile(
590
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
591
+ reqMethod="POST",
592
+ endpoint=g_param[OptionsDefine.Endpoint],
593
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
594
+ )
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
596
+ if g_param[OptionsDefine.Language]:
597
+ profile.language = g_param[OptionsDefine.Language]
598
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
599
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
600
+ client._sdkVersion += ("_CLI_" + __version__)
601
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
602
+ model = models.CreateSuspiciousAssetRequest()
603
+ model.from_json_string(json.dumps(args))
604
+ start_time = time.time()
605
+ while True:
606
+ rsp = client.CreateSuspiciousAsset(model)
607
+ result = rsp.to_json_string()
608
+ try:
609
+ json_obj = json.loads(result)
610
+ except TypeError as e:
611
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
612
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
613
+ break
614
+ cur_time = time.time()
615
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
616
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
617
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
618
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
619
+ else:
620
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
621
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
622
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
623
+
624
+
625
+ def doCreateSeeds(args, parsed_globals):
626
+ g_param = parse_global_arg(parsed_globals)
627
+
628
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
629
+ cred = credential.CVMRoleCredential()
630
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
631
+ cred = credential.STSAssumeRoleCredential(
632
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
633
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
634
+ )
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
639
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
640
+ else:
641
+ cred = credential.Credential(
642
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
643
+ )
644
+ http_profile = HttpProfile(
645
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
646
+ reqMethod="POST",
647
+ endpoint=g_param[OptionsDefine.Endpoint],
648
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
649
+ )
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
651
+ if g_param[OptionsDefine.Language]:
652
+ profile.language = g_param[OptionsDefine.Language]
653
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
654
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
655
+ client._sdkVersion += ("_CLI_" + __version__)
656
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
657
+ model = models.CreateSeedsRequest()
658
+ model.from_json_string(json.dumps(args))
659
+ start_time = time.time()
660
+ while True:
661
+ rsp = client.CreateSeeds(model)
662
+ result = rsp.to_json_string()
663
+ try:
664
+ json_obj = json.loads(result)
665
+ except TypeError as e:
666
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
667
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
668
+ break
669
+ cur_time = time.time()
670
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
671
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
672
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
673
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
674
+ else:
675
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
676
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
677
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
678
+
679
+
680
+ def doDescribeApiSecs(args, parsed_globals):
681
+ g_param = parse_global_arg(parsed_globals)
682
+
683
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
684
+ cred = credential.CVMRoleCredential()
685
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
686
+ cred = credential.STSAssumeRoleCredential(
687
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
688
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
689
+ )
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
694
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
695
+ else:
696
+ cred = credential.Credential(
697
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
698
+ )
699
+ http_profile = HttpProfile(
700
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
701
+ reqMethod="POST",
702
+ endpoint=g_param[OptionsDefine.Endpoint],
703
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
704
+ )
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
706
+ if g_param[OptionsDefine.Language]:
707
+ profile.language = g_param[OptionsDefine.Language]
708
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
709
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
710
+ client._sdkVersion += ("_CLI_" + __version__)
711
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
712
+ model = models.DescribeApiSecsRequest()
713
+ model.from_json_string(json.dumps(args))
714
+ start_time = time.time()
715
+ while True:
716
+ rsp = client.DescribeApiSecs(model)
717
+ result = rsp.to_json_string()
718
+ try:
719
+ json_obj = json.loads(result)
720
+ except TypeError as e:
721
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
722
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
723
+ break
724
+ cur_time = time.time()
725
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
726
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
727
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
728
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
729
+ else:
730
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
731
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
732
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
733
+
734
+
735
+ def doDescribeDomains(args, parsed_globals):
736
+ g_param = parse_global_arg(parsed_globals)
737
+
738
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
739
+ cred = credential.CVMRoleCredential()
740
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
741
+ cred = credential.STSAssumeRoleCredential(
742
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
743
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
744
+ )
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
749
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
750
+ else:
751
+ cred = credential.Credential(
752
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
753
+ )
754
+ http_profile = HttpProfile(
755
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
756
+ reqMethod="POST",
757
+ endpoint=g_param[OptionsDefine.Endpoint],
758
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
759
+ )
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
761
+ if g_param[OptionsDefine.Language]:
762
+ profile.language = g_param[OptionsDefine.Language]
763
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
764
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
765
+ client._sdkVersion += ("_CLI_" + __version__)
766
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
767
+ model = models.DescribeDomainsRequest()
768
+ model.from_json_string(json.dumps(args))
769
+ start_time = time.time()
770
+ while True:
771
+ rsp = client.DescribeDomains(model)
772
+ result = rsp.to_json_string()
773
+ try:
774
+ json_obj = json.loads(result)
775
+ except TypeError as e:
776
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
777
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
778
+ break
779
+ cur_time = time.time()
780
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
781
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
782
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
783
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
784
+ else:
785
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
786
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
787
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
788
+
789
+
790
+ def doDeleteEnterprises(args, parsed_globals):
791
+ g_param = parse_global_arg(parsed_globals)
792
+
793
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
794
+ cred = credential.CVMRoleCredential()
795
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
796
+ cred = credential.STSAssumeRoleCredential(
797
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
798
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
799
+ )
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
804
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
805
+ else:
806
+ cred = credential.Credential(
807
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
808
+ )
809
+ http_profile = HttpProfile(
810
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
811
+ reqMethod="POST",
812
+ endpoint=g_param[OptionsDefine.Endpoint],
813
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
814
+ )
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
816
+ if g_param[OptionsDefine.Language]:
817
+ profile.language = g_param[OptionsDefine.Language]
818
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
819
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
820
+ client._sdkVersion += ("_CLI_" + __version__)
821
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
822
+ model = models.DeleteEnterprisesRequest()
823
+ model.from_json_string(json.dumps(args))
824
+ start_time = time.time()
825
+ while True:
826
+ rsp = client.DeleteEnterprises(model)
827
+ result = rsp.to_json_string()
828
+ try:
829
+ json_obj = json.loads(result)
830
+ except TypeError as e:
831
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
832
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
833
+ break
834
+ cur_time = time.time()
835
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
836
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
837
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
838
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
839
+ else:
840
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
841
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
842
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
843
+
844
+
845
+ def doDeleteSubDomains(args, parsed_globals):
846
+ g_param = parse_global_arg(parsed_globals)
847
+
848
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
849
+ cred = credential.CVMRoleCredential()
850
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
851
+ cred = credential.STSAssumeRoleCredential(
852
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
853
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
854
+ )
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
859
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
860
+ else:
861
+ cred = credential.Credential(
862
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
863
+ )
864
+ http_profile = HttpProfile(
865
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
866
+ reqMethod="POST",
867
+ endpoint=g_param[OptionsDefine.Endpoint],
868
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
869
+ )
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
871
+ if g_param[OptionsDefine.Language]:
872
+ profile.language = g_param[OptionsDefine.Language]
873
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
874
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
875
+ client._sdkVersion += ("_CLI_" + __version__)
876
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
877
+ model = models.DeleteSubDomainsRequest()
878
+ model.from_json_string(json.dumps(args))
879
+ start_time = time.time()
880
+ while True:
881
+ rsp = client.DeleteSubDomains(model)
882
+ result = rsp.to_json_string()
883
+ try:
884
+ json_obj = json.loads(result)
885
+ except TypeError as e:
886
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
887
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
888
+ break
889
+ cur_time = time.time()
890
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
891
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
892
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
893
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
894
+ else:
895
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
896
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
897
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
898
+
899
+
900
+ def doDescribeVuls(args, parsed_globals):
901
+ g_param = parse_global_arg(parsed_globals)
902
+
903
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
904
+ cred = credential.CVMRoleCredential()
905
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
906
+ cred = credential.STSAssumeRoleCredential(
907
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
908
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
909
+ )
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
914
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
915
+ else:
916
+ cred = credential.Credential(
917
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
918
+ )
919
+ http_profile = HttpProfile(
920
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
921
+ reqMethod="POST",
922
+ endpoint=g_param[OptionsDefine.Endpoint],
923
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
924
+ )
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
926
+ if g_param[OptionsDefine.Language]:
927
+ profile.language = g_param[OptionsDefine.Language]
928
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
929
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
930
+ client._sdkVersion += ("_CLI_" + __version__)
931
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
932
+ model = models.DescribeVulsRequest()
933
+ model.from_json_string(json.dumps(args))
934
+ start_time = time.time()
935
+ while True:
936
+ rsp = client.DescribeVuls(model)
937
+ result = rsp.to_json_string()
938
+ try:
939
+ json_obj = json.loads(result)
940
+ except TypeError as e:
941
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
942
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
943
+ break
944
+ cur_time = time.time()
945
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
946
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
947
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
948
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
949
+ else:
950
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
951
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
952
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
953
+
954
+
955
+ def doDescribeSeeds(args, parsed_globals):
956
+ g_param = parse_global_arg(parsed_globals)
957
+
958
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
959
+ cred = credential.CVMRoleCredential()
960
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
961
+ cred = credential.STSAssumeRoleCredential(
962
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
963
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
964
+ )
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
969
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
970
+ else:
971
+ cred = credential.Credential(
972
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
973
+ )
974
+ http_profile = HttpProfile(
975
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
976
+ reqMethod="POST",
977
+ endpoint=g_param[OptionsDefine.Endpoint],
978
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
979
+ )
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
981
+ if g_param[OptionsDefine.Language]:
982
+ profile.language = g_param[OptionsDefine.Language]
983
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
984
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
985
+ client._sdkVersion += ("_CLI_" + __version__)
986
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
987
+ model = models.DescribeSeedsRequest()
988
+ model.from_json_string(json.dumps(args))
989
+ start_time = time.time()
990
+ while True:
991
+ rsp = client.DescribeSeeds(model)
992
+ result = rsp.to_json_string()
993
+ try:
994
+ json_obj = json.loads(result)
995
+ except TypeError as e:
996
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
997
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
998
+ break
999
+ cur_time = time.time()
1000
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1001
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1002
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1003
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1004
+ else:
1005
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1006
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1007
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1008
+
1009
+
1010
+ def doDescribeConfigs(args, parsed_globals):
1011
+ g_param = parse_global_arg(parsed_globals)
1012
+
1013
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1014
+ cred = credential.CVMRoleCredential()
1015
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1016
+ cred = credential.STSAssumeRoleCredential(
1017
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
+ )
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1024
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1025
+ else:
1026
+ cred = credential.Credential(
1027
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1028
+ )
1029
+ http_profile = HttpProfile(
1030
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1031
+ reqMethod="POST",
1032
+ endpoint=g_param[OptionsDefine.Endpoint],
1033
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1034
+ )
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1036
+ if g_param[OptionsDefine.Language]:
1037
+ profile.language = g_param[OptionsDefine.Language]
1038
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1039
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1040
+ client._sdkVersion += ("_CLI_" + __version__)
1041
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1042
+ model = models.DescribeConfigsRequest()
1043
+ model.from_json_string(json.dumps(args))
1044
+ start_time = time.time()
1045
+ while True:
1046
+ rsp = client.DescribeConfigs(model)
1047
+ result = rsp.to_json_string()
1048
+ try:
1049
+ json_obj = json.loads(result)
1050
+ except TypeError as e:
1051
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1052
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1053
+ break
1054
+ cur_time = time.time()
1055
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1056
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1057
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1058
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1059
+ else:
1060
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1061
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1062
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1063
+
1064
+
1065
+ def doDeleteWechatOfficialAccounts(args, parsed_globals):
1066
+ g_param = parse_global_arg(parsed_globals)
1067
+
1068
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1069
+ cred = credential.CVMRoleCredential()
1070
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1071
+ cred = credential.STSAssumeRoleCredential(
1072
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1073
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1074
+ )
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1079
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1080
+ else:
1081
+ cred = credential.Credential(
1082
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1083
+ )
1084
+ http_profile = HttpProfile(
1085
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1086
+ reqMethod="POST",
1087
+ endpoint=g_param[OptionsDefine.Endpoint],
1088
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1089
+ )
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1091
+ if g_param[OptionsDefine.Language]:
1092
+ profile.language = g_param[OptionsDefine.Language]
1093
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1094
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1095
+ client._sdkVersion += ("_CLI_" + __version__)
1096
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1097
+ model = models.DeleteWechatOfficialAccountsRequest()
1098
+ model.from_json_string(json.dumps(args))
1099
+ start_time = time.time()
1100
+ while True:
1101
+ rsp = client.DeleteWechatOfficialAccounts(model)
1102
+ result = rsp.to_json_string()
1103
+ try:
1104
+ json_obj = json.loads(result)
1105
+ except TypeError as e:
1106
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1107
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1108
+ break
1109
+ cur_time = time.time()
1110
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1111
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1112
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1113
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1114
+ else:
1115
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1116
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1117
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1118
+
1119
+
1120
+ def doDeleteWechatApplets(args, parsed_globals):
1121
+ g_param = parse_global_arg(parsed_globals)
1122
+
1123
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1124
+ cred = credential.CVMRoleCredential()
1125
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1126
+ cred = credential.STSAssumeRoleCredential(
1127
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1128
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1129
+ )
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1134
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1135
+ else:
1136
+ cred = credential.Credential(
1137
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1138
+ )
1139
+ http_profile = HttpProfile(
1140
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1141
+ reqMethod="POST",
1142
+ endpoint=g_param[OptionsDefine.Endpoint],
1143
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1144
+ )
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1146
+ if g_param[OptionsDefine.Language]:
1147
+ profile.language = g_param[OptionsDefine.Language]
1148
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1149
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1150
+ client._sdkVersion += ("_CLI_" + __version__)
1151
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1152
+ model = models.DeleteWechatAppletsRequest()
1153
+ model.from_json_string(json.dumps(args))
1154
+ start_time = time.time()
1155
+ while True:
1156
+ rsp = client.DeleteWechatApplets(model)
1157
+ result = rsp.to_json_string()
1158
+ try:
1159
+ json_obj = json.loads(result)
1160
+ except TypeError as e:
1161
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1162
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1163
+ break
1164
+ cur_time = time.time()
1165
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1166
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1167
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1168
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1169
+ else:
1170
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1171
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1172
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1173
+
1174
+
1175
+ def doDescribeFakeWebsites(args, parsed_globals):
1176
+ g_param = parse_global_arg(parsed_globals)
1177
+
1178
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1179
+ cred = credential.CVMRoleCredential()
1180
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1181
+ cred = credential.STSAssumeRoleCredential(
1182
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1183
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1184
+ )
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1189
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1190
+ else:
1191
+ cred = credential.Credential(
1192
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1193
+ )
1194
+ http_profile = HttpProfile(
1195
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1196
+ reqMethod="POST",
1197
+ endpoint=g_param[OptionsDefine.Endpoint],
1198
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1199
+ )
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1201
+ if g_param[OptionsDefine.Language]:
1202
+ profile.language = g_param[OptionsDefine.Language]
1203
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1204
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1205
+ client._sdkVersion += ("_CLI_" + __version__)
1206
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1207
+ model = models.DescribeFakeWebsitesRequest()
1208
+ model.from_json_string(json.dumps(args))
1209
+ start_time = time.time()
1210
+ while True:
1211
+ rsp = client.DescribeFakeWebsites(model)
1212
+ result = rsp.to_json_string()
1213
+ try:
1214
+ json_obj = json.loads(result)
1215
+ except TypeError as e:
1216
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1217
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1218
+ break
1219
+ cur_time = time.time()
1220
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1221
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1222
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1223
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1224
+ else:
1225
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1226
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1227
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1228
+
1229
+
1230
+ def doIgnoreData(args, parsed_globals):
1231
+ g_param = parse_global_arg(parsed_globals)
1232
+
1233
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1234
+ cred = credential.CVMRoleCredential()
1235
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1236
+ cred = credential.STSAssumeRoleCredential(
1237
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1238
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1239
+ )
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1244
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1245
+ else:
1246
+ cred = credential.Credential(
1247
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1248
+ )
1249
+ http_profile = HttpProfile(
1250
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1251
+ reqMethod="POST",
1252
+ endpoint=g_param[OptionsDefine.Endpoint],
1253
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1254
+ )
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1256
+ if g_param[OptionsDefine.Language]:
1257
+ profile.language = g_param[OptionsDefine.Language]
1258
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1259
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1260
+ client._sdkVersion += ("_CLI_" + __version__)
1261
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1262
+ model = models.IgnoreDataRequest()
1263
+ model.from_json_string(json.dumps(args))
1264
+ start_time = time.time()
1265
+ while True:
1266
+ rsp = client.IgnoreData(model)
1267
+ result = rsp.to_json_string()
1268
+ try:
1269
+ json_obj = json.loads(result)
1270
+ except TypeError as e:
1271
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1272
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1273
+ break
1274
+ cur_time = time.time()
1275
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1276
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1277
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1278
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1279
+ else:
1280
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1281
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1282
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1283
+
1284
+
1285
+ def doDescribeFakeMiniPrograms(args, parsed_globals):
1286
+ g_param = parse_global_arg(parsed_globals)
1287
+
1288
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1289
+ cred = credential.CVMRoleCredential()
1290
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1291
+ cred = credential.STSAssumeRoleCredential(
1292
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1293
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1294
+ )
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1299
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1300
+ else:
1301
+ cred = credential.Credential(
1302
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1303
+ )
1304
+ http_profile = HttpProfile(
1305
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1306
+ reqMethod="POST",
1307
+ endpoint=g_param[OptionsDefine.Endpoint],
1308
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1309
+ )
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1311
+ if g_param[OptionsDefine.Language]:
1312
+ profile.language = g_param[OptionsDefine.Language]
1313
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1314
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1315
+ client._sdkVersion += ("_CLI_" + __version__)
1316
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1317
+ model = models.DescribeFakeMiniProgramsRequest()
1318
+ model.from_json_string(json.dumps(args))
1319
+ start_time = time.time()
1320
+ while True:
1321
+ rsp = client.DescribeFakeMiniPrograms(model)
1322
+ result = rsp.to_json_string()
1323
+ try:
1324
+ json_obj = json.loads(result)
1325
+ except TypeError as e:
1326
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1327
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1328
+ break
1329
+ cur_time = time.time()
1330
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1331
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1332
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1333
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1334
+ else:
1335
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1336
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1337
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1338
+
1339
+
1340
+ def doCreateSubDomain(args, parsed_globals):
1341
+ g_param = parse_global_arg(parsed_globals)
1342
+
1343
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1344
+ cred = credential.CVMRoleCredential()
1345
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1346
+ cred = credential.STSAssumeRoleCredential(
1347
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1348
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1349
+ )
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1354
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1355
+ else:
1356
+ cred = credential.Credential(
1357
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1358
+ )
1359
+ http_profile = HttpProfile(
1360
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1361
+ reqMethod="POST",
1362
+ endpoint=g_param[OptionsDefine.Endpoint],
1363
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1364
+ )
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1366
+ if g_param[OptionsDefine.Language]:
1367
+ profile.language = g_param[OptionsDefine.Language]
1368
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1369
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1370
+ client._sdkVersion += ("_CLI_" + __version__)
1371
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1372
+ model = models.CreateSubDomainRequest()
1373
+ model.from_json_string(json.dumps(args))
1374
+ start_time = time.time()
1375
+ while True:
1376
+ rsp = client.CreateSubDomain(model)
1377
+ result = rsp.to_json_string()
1378
+ try:
1379
+ json_obj = json.loads(result)
1380
+ except TypeError as e:
1381
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1382
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1383
+ break
1384
+ cur_time = time.time()
1385
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1386
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1387
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1388
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1389
+ else:
1390
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1391
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1392
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1393
+
1394
+
1395
+ def doDescribeSensitiveInfos(args, parsed_globals):
1396
+ g_param = parse_global_arg(parsed_globals)
1397
+
1398
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1399
+ cred = credential.CVMRoleCredential()
1400
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1401
+ cred = credential.STSAssumeRoleCredential(
1402
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1403
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1404
+ )
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1409
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1410
+ else:
1411
+ cred = credential.Credential(
1412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1413
+ )
1414
+ http_profile = HttpProfile(
1415
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1416
+ reqMethod="POST",
1417
+ endpoint=g_param[OptionsDefine.Endpoint],
1418
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1419
+ )
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1421
+ if g_param[OptionsDefine.Language]:
1422
+ profile.language = g_param[OptionsDefine.Language]
1423
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1424
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1425
+ client._sdkVersion += ("_CLI_" + __version__)
1426
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1427
+ model = models.DescribeSensitiveInfosRequest()
1428
+ model.from_json_string(json.dumps(args))
1429
+ start_time = time.time()
1430
+ while True:
1431
+ rsp = client.DescribeSensitiveInfos(model)
1432
+ result = rsp.to_json_string()
1433
+ try:
1434
+ json_obj = json.loads(result)
1435
+ except TypeError as e:
1436
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1437
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1438
+ break
1439
+ cur_time = time.time()
1440
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1441
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1442
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1443
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1444
+ else:
1445
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1446
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1447
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1448
+
1449
+
1450
+ def doDescribeSubDomains(args, parsed_globals):
1451
+ g_param = parse_global_arg(parsed_globals)
1452
+
1453
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1454
+ cred = credential.CVMRoleCredential()
1455
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1456
+ cred = credential.STSAssumeRoleCredential(
1457
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1458
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1459
+ )
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
1465
  else:
33
1466
  cred = credential.Credential(
@@ -39,18 +1472,18 @@ def doDescribeNetDisks(args, parsed_globals):
39
1472
  endpoint=g_param[OptionsDefine.Endpoint],
40
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
1474
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
1476
  if g_param[OptionsDefine.Language]:
44
1477
  profile.language = g_param[OptionsDefine.Language]
45
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
46
1479
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
47
1480
  client._sdkVersion += ("_CLI_" + __version__)
48
1481
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
49
- model = models.DescribeNetDisksRequest()
1482
+ model = models.DescribeSubDomainsRequest()
50
1483
  model.from_json_string(json.dumps(args))
51
1484
  start_time = time.time()
52
1485
  while True:
53
- rsp = client.DescribeNetDisks(model)
1486
+ rsp = client.DescribeSubDomains(model)
54
1487
  result = rsp.to_json_string()
55
1488
  try:
56
1489
  json_obj = json.loads(result)
@@ -69,7 +1502,7 @@ def doDescribeNetDisks(args, parsed_globals):
69
1502
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
1503
 
71
1504
 
72
- def doDescribeManages(args, parsed_globals):
1505
+ def doDescribeCustomers(args, parsed_globals):
73
1506
  g_param = parse_global_arg(parsed_globals)
74
1507
 
75
1508
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -79,7 +1512,10 @@ def doDescribeManages(args, parsed_globals):
79
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
1514
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
1520
  else:
85
1521
  cred = credential.Credential(
@@ -91,18 +1527,18 @@ def doDescribeManages(args, parsed_globals):
91
1527
  endpoint=g_param[OptionsDefine.Endpoint],
92
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
1529
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
1531
  if g_param[OptionsDefine.Language]:
96
1532
  profile.language = g_param[OptionsDefine.Language]
97
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
98
1534
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
99
1535
  client._sdkVersion += ("_CLI_" + __version__)
100
1536
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.DescribeManagesRequest()
1537
+ model = models.DescribeCustomersRequest()
102
1538
  model.from_json_string(json.dumps(args))
103
1539
  start_time = time.time()
104
1540
  while True:
105
- rsp = client.DescribeManages(model)
1541
+ rsp = client.DescribeCustomers(model)
106
1542
  result = rsp.to_json_string()
107
1543
  try:
108
1544
  json_obj = json.loads(result)
@@ -121,7 +1557,7 @@ def doDescribeManages(args, parsed_globals):
121
1557
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
122
1558
 
123
1559
 
124
- def doDescribeLeakageDatas(args, parsed_globals):
1560
+ def doDescribeLeakageEmails(args, parsed_globals):
125
1561
  g_param = parse_global_arg(parsed_globals)
126
1562
 
127
1563
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -131,7 +1567,10 @@ def doDescribeLeakageDatas(args, parsed_globals):
131
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
1569
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
1575
  else:
137
1576
  cred = credential.Credential(
@@ -143,18 +1582,18 @@ def doDescribeLeakageDatas(args, parsed_globals):
143
1582
  endpoint=g_param[OptionsDefine.Endpoint],
144
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
1584
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
1586
  if g_param[OptionsDefine.Language]:
148
1587
  profile.language = g_param[OptionsDefine.Language]
149
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
150
1589
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
151
1590
  client._sdkVersion += ("_CLI_" + __version__)
152
1591
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
153
- model = models.DescribeLeakageDatasRequest()
1592
+ model = models.DescribeLeakageEmailsRequest()
154
1593
  model.from_json_string(json.dumps(args))
155
1594
  start_time = time.time()
156
1595
  while True:
157
- rsp = client.DescribeLeakageDatas(model)
1596
+ rsp = client.DescribeLeakageEmails(model)
158
1597
  result = rsp.to_json_string()
159
1598
  try:
160
1599
  json_obj = json.loads(result)
@@ -173,7 +1612,7 @@ def doDescribeLeakageDatas(args, parsed_globals):
173
1612
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
1613
 
175
1614
 
176
- def doModifyCustomer(args, parsed_globals):
1615
+ def doDeletePorts(args, parsed_globals):
177
1616
  g_param = parse_global_arg(parsed_globals)
178
1617
 
179
1618
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -183,7 +1622,10 @@ def doModifyCustomer(args, parsed_globals):
183
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
1624
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
1630
  else:
189
1631
  cred = credential.Credential(
@@ -195,18 +1637,18 @@ def doModifyCustomer(args, parsed_globals):
195
1637
  endpoint=g_param[OptionsDefine.Endpoint],
196
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
1639
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
1641
  if g_param[OptionsDefine.Language]:
200
1642
  profile.language = g_param[OptionsDefine.Language]
201
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
202
1644
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
203
1645
  client._sdkVersion += ("_CLI_" + __version__)
204
1646
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
- model = models.ModifyCustomerRequest()
1647
+ model = models.DeletePortsRequest()
206
1648
  model.from_json_string(json.dumps(args))
207
1649
  start_time = time.time()
208
1650
  while True:
209
- rsp = client.ModifyCustomer(model)
1651
+ rsp = client.DeletePorts(model)
210
1652
  result = rsp.to_json_string()
211
1653
  try:
212
1654
  json_obj = json.loads(result)
@@ -225,7 +1667,7 @@ def doModifyCustomer(args, parsed_globals):
225
1667
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
1668
 
227
1669
 
228
- def doDescribeDomains(args, parsed_globals):
1670
+ def doCreatePort(args, parsed_globals):
229
1671
  g_param = parse_global_arg(parsed_globals)
230
1672
 
231
1673
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -235,7 +1677,10 @@ def doDescribeDomains(args, parsed_globals):
235
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
1679
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
1685
  else:
241
1686
  cred = credential.Credential(
@@ -247,18 +1692,18 @@ def doDescribeDomains(args, parsed_globals):
247
1692
  endpoint=g_param[OptionsDefine.Endpoint],
248
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
1694
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
1696
  if g_param[OptionsDefine.Language]:
252
1697
  profile.language = g_param[OptionsDefine.Language]
253
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
254
1699
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
255
1700
  client._sdkVersion += ("_CLI_" + __version__)
256
1701
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.DescribeDomainsRequest()
1702
+ model = models.CreatePortRequest()
258
1703
  model.from_json_string(json.dumps(args))
259
1704
  start_time = time.time()
260
1705
  while True:
261
- rsp = client.DescribeDomains(model)
1706
+ rsp = client.CreatePort(model)
262
1707
  result = rsp.to_json_string()
263
1708
  try:
264
1709
  json_obj = json.loads(result)
@@ -277,7 +1722,7 @@ def doDescribeDomains(args, parsed_globals):
277
1722
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
278
1723
 
279
1724
 
280
- def doDescribeFakeWechatOfficials(args, parsed_globals):
1725
+ def doDescribeFakeApps(args, parsed_globals):
281
1726
  g_param = parse_global_arg(parsed_globals)
282
1727
 
283
1728
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -287,7 +1732,10 @@ def doDescribeFakeWechatOfficials(args, parsed_globals):
287
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
1734
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
1740
  else:
293
1741
  cred = credential.Credential(
@@ -299,18 +1747,18 @@ def doDescribeFakeWechatOfficials(args, parsed_globals):
299
1747
  endpoint=g_param[OptionsDefine.Endpoint],
300
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
1749
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
1751
  if g_param[OptionsDefine.Language]:
304
1752
  profile.language = g_param[OptionsDefine.Language]
305
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
306
1754
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
307
1755
  client._sdkVersion += ("_CLI_" + __version__)
308
1756
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.DescribeFakeWechatOfficialsRequest()
1757
+ model = models.DescribeFakeAppsRequest()
310
1758
  model.from_json_string(json.dumps(args))
311
1759
  start_time = time.time()
312
1760
  while True:
313
- rsp = client.DescribeFakeWechatOfficials(model)
1761
+ rsp = client.DescribeFakeApps(model)
314
1762
  result = rsp.to_json_string()
315
1763
  try:
316
1764
  json_obj = json.loads(result)
@@ -329,7 +1777,7 @@ def doDescribeFakeWechatOfficials(args, parsed_globals):
329
1777
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
1778
 
331
1779
 
332
- def doDescribeVuls(args, parsed_globals):
1780
+ def doDescribeApps(args, parsed_globals):
333
1781
  g_param = parse_global_arg(parsed_globals)
334
1782
 
335
1783
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -339,7 +1787,10 @@ def doDescribeVuls(args, parsed_globals):
339
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
1789
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
1795
  else:
345
1796
  cred = credential.Credential(
@@ -351,18 +1802,18 @@ def doDescribeVuls(args, parsed_globals):
351
1802
  endpoint=g_param[OptionsDefine.Endpoint],
352
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
1804
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
1806
  if g_param[OptionsDefine.Language]:
356
1807
  profile.language = g_param[OptionsDefine.Language]
357
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
1809
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
359
1810
  client._sdkVersion += ("_CLI_" + __version__)
360
1811
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.DescribeVulsRequest()
1812
+ model = models.DescribeAppsRequest()
362
1813
  model.from_json_string(json.dumps(args))
363
1814
  start_time = time.time()
364
1815
  while True:
365
- rsp = client.DescribeVuls(model)
1816
+ rsp = client.DescribeApps(model)
366
1817
  result = rsp.to_json_string()
367
1818
  try:
368
1819
  json_obj = json.loads(result)
@@ -381,7 +1832,7 @@ def doDescribeVuls(args, parsed_globals):
381
1832
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
1833
 
383
1834
 
384
- def doDescribeConfigs(args, parsed_globals):
1835
+ def doCreateWechatOfficialAccount(args, parsed_globals):
385
1836
  g_param = parse_global_arg(parsed_globals)
386
1837
 
387
1838
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -391,7 +1842,10 @@ def doDescribeConfigs(args, parsed_globals):
391
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
1844
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
1850
  else:
397
1851
  cred = credential.Credential(
@@ -403,18 +1857,18 @@ def doDescribeConfigs(args, parsed_globals):
403
1857
  endpoint=g_param[OptionsDefine.Endpoint],
404
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
1859
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
1861
  if g_param[OptionsDefine.Language]:
408
1862
  profile.language = g_param[OptionsDefine.Language]
409
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
1864
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
411
1865
  client._sdkVersion += ("_CLI_" + __version__)
412
1866
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.DescribeConfigsRequest()
1867
+ model = models.CreateWechatOfficialAccountRequest()
414
1868
  model.from_json_string(json.dumps(args))
415
1869
  start_time = time.time()
416
1870
  while True:
417
- rsp = client.DescribeConfigs(model)
1871
+ rsp = client.CreateWechatOfficialAccount(model)
418
1872
  result = rsp.to_json_string()
419
1873
  try:
420
1874
  json_obj = json.loads(result)
@@ -433,7 +1887,7 @@ def doDescribeConfigs(args, parsed_globals):
433
1887
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
1888
 
435
1889
 
436
- def doDescribeWechatApplets(args, parsed_globals):
1890
+ def doModifyLabel(args, parsed_globals):
437
1891
  g_param = parse_global_arg(parsed_globals)
438
1892
 
439
1893
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -443,7 +1897,10 @@ def doDescribeWechatApplets(args, parsed_globals):
443
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
1899
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
1905
  else:
449
1906
  cred = credential.Credential(
@@ -455,18 +1912,18 @@ def doDescribeWechatApplets(args, parsed_globals):
455
1912
  endpoint=g_param[OptionsDefine.Endpoint],
456
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
1914
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
1916
  if g_param[OptionsDefine.Language]:
460
1917
  profile.language = g_param[OptionsDefine.Language]
461
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
462
1919
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
463
1920
  client._sdkVersion += ("_CLI_" + __version__)
464
1921
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.DescribeWechatAppletsRequest()
1922
+ model = models.ModifyLabelRequest()
466
1923
  model.from_json_string(json.dumps(args))
467
1924
  start_time = time.time()
468
1925
  while True:
469
- rsp = client.DescribeWechatApplets(model)
1926
+ rsp = client.ModifyLabel(model)
470
1927
  result = rsp.to_json_string()
471
1928
  try:
472
1929
  json_obj = json.loads(result)
@@ -485,7 +1942,7 @@ def doDescribeWechatApplets(args, parsed_globals):
485
1942
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
1943
 
487
1944
 
488
- def doDescribeFakeWebsites(args, parsed_globals):
1945
+ def doDescribeJobRecordDetails(args, parsed_globals):
489
1946
  g_param = parse_global_arg(parsed_globals)
490
1947
 
491
1948
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -495,7 +1952,10 @@ def doDescribeFakeWebsites(args, parsed_globals):
495
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
1954
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
1960
  else:
501
1961
  cred = credential.Credential(
@@ -507,18 +1967,18 @@ def doDescribeFakeWebsites(args, parsed_globals):
507
1967
  endpoint=g_param[OptionsDefine.Endpoint],
508
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
1969
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
1971
  if g_param[OptionsDefine.Language]:
512
1972
  profile.language = g_param[OptionsDefine.Language]
513
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
514
1974
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
515
1975
  client._sdkVersion += ("_CLI_" + __version__)
516
1976
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.DescribeFakeWebsitesRequest()
1977
+ model = models.DescribeJobRecordDetailsRequest()
518
1978
  model.from_json_string(json.dumps(args))
519
1979
  start_time = time.time()
520
1980
  while True:
521
- rsp = client.DescribeFakeWebsites(model)
1981
+ rsp = client.DescribeJobRecordDetails(model)
522
1982
  result = rsp.to_json_string()
523
1983
  try:
524
1984
  json_obj = json.loads(result)
@@ -537,7 +1997,7 @@ def doDescribeFakeWebsites(args, parsed_globals):
537
1997
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
1998
 
539
1999
 
540
- def doDescribeSensitiveInfos(args, parsed_globals):
2000
+ def doDescribeFakeWechatOfficials(args, parsed_globals):
541
2001
  g_param = parse_global_arg(parsed_globals)
542
2002
 
543
2003
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -547,7 +2007,10 @@ def doDescribeSensitiveInfos(args, parsed_globals):
547
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
2009
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
2015
  else:
553
2016
  cred = credential.Credential(
@@ -559,18 +2022,18 @@ def doDescribeSensitiveInfos(args, parsed_globals):
559
2022
  endpoint=g_param[OptionsDefine.Endpoint],
560
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
2024
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
2026
  if g_param[OptionsDefine.Language]:
564
2027
  profile.language = g_param[OptionsDefine.Language]
565
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
566
2029
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
567
2030
  client._sdkVersion += ("_CLI_" + __version__)
568
2031
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.DescribeSensitiveInfosRequest()
2032
+ model = models.DescribeFakeWechatOfficialsRequest()
570
2033
  model.from_json_string(json.dumps(args))
571
2034
  start_time = time.time()
572
2035
  while True:
573
- rsp = client.DescribeSensitiveInfos(model)
2036
+ rsp = client.DescribeFakeWechatOfficials(model)
574
2037
  result = rsp.to_json_string()
575
2038
  try:
576
2039
  json_obj = json.loads(result)
@@ -589,7 +2052,7 @@ def doDescribeSensitiveInfos(args, parsed_globals):
589
2052
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
2053
 
591
2054
 
592
- def doDescribeFakeMiniPrograms(args, parsed_globals):
2055
+ def doDescribeGithubs(args, parsed_globals):
593
2056
  g_param = parse_global_arg(parsed_globals)
594
2057
 
595
2058
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -599,7 +2062,10 @@ def doDescribeFakeMiniPrograms(args, parsed_globals):
599
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
2064
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
2070
  else:
605
2071
  cred = credential.Credential(
@@ -611,18 +2077,18 @@ def doDescribeFakeMiniPrograms(args, parsed_globals):
611
2077
  endpoint=g_param[OptionsDefine.Endpoint],
612
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
2079
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
2081
  if g_param[OptionsDefine.Language]:
616
2082
  profile.language = g_param[OptionsDefine.Language]
617
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
618
2084
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
619
2085
  client._sdkVersion += ("_CLI_" + __version__)
620
2086
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.DescribeFakeMiniProgramsRequest()
2087
+ model = models.DescribeGithubsRequest()
622
2088
  model.from_json_string(json.dumps(args))
623
2089
  start_time = time.time()
624
2090
  while True:
625
- rsp = client.DescribeFakeMiniPrograms(model)
2091
+ rsp = client.DescribeGithubs(model)
626
2092
  result = rsp.to_json_string()
627
2093
  try:
628
2094
  json_obj = json.loads(result)
@@ -641,7 +2107,7 @@ def doDescribeFakeMiniPrograms(args, parsed_globals):
641
2107
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
2108
 
643
2109
 
644
- def doDescribeSubDomains(args, parsed_globals):
2110
+ def doDescribePorts(args, parsed_globals):
645
2111
  g_param = parse_global_arg(parsed_globals)
646
2112
 
647
2113
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -651,7 +2117,10 @@ def doDescribeSubDomains(args, parsed_globals):
651
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
2119
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
2125
  else:
657
2126
  cred = credential.Credential(
@@ -663,18 +2132,18 @@ def doDescribeSubDomains(args, parsed_globals):
663
2132
  endpoint=g_param[OptionsDefine.Endpoint],
664
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
2134
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
2136
  if g_param[OptionsDefine.Language]:
668
2137
  profile.language = g_param[OptionsDefine.Language]
669
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
670
2139
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
671
2140
  client._sdkVersion += ("_CLI_" + __version__)
672
2141
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.DescribeSubDomainsRequest()
2142
+ model = models.DescribePortsRequest()
674
2143
  model.from_json_string(json.dumps(args))
675
2144
  start_time = time.time()
676
2145
  while True:
677
- rsp = client.DescribeSubDomains(model)
2146
+ rsp = client.DescribePorts(model)
678
2147
  result = rsp.to_json_string()
679
2148
  try:
680
2149
  json_obj = json.loads(result)
@@ -693,7 +2162,7 @@ def doDescribeSubDomains(args, parsed_globals):
693
2162
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
2163
 
695
2164
 
696
- def doDescribeCustomers(args, parsed_globals):
2165
+ def doCreateJobRecord(args, parsed_globals):
697
2166
  g_param = parse_global_arg(parsed_globals)
698
2167
 
699
2168
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -703,7 +2172,10 @@ def doDescribeCustomers(args, parsed_globals):
703
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
2174
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
2180
  else:
709
2181
  cred = credential.Credential(
@@ -715,18 +2187,18 @@ def doDescribeCustomers(args, parsed_globals):
715
2187
  endpoint=g_param[OptionsDefine.Endpoint],
716
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
2189
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
2191
  if g_param[OptionsDefine.Language]:
720
2192
  profile.language = g_param[OptionsDefine.Language]
721
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
722
2194
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
723
2195
  client._sdkVersion += ("_CLI_" + __version__)
724
2196
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.DescribeCustomersRequest()
2197
+ model = models.CreateJobRecordRequest()
726
2198
  model.from_json_string(json.dumps(args))
727
2199
  start_time = time.time()
728
2200
  while True:
729
- rsp = client.DescribeCustomers(model)
2201
+ rsp = client.CreateJobRecord(model)
730
2202
  result = rsp.to_json_string()
731
2203
  try:
732
2204
  json_obj = json.loads(result)
@@ -745,7 +2217,7 @@ def doDescribeCustomers(args, parsed_globals):
745
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
2218
 
747
2219
 
748
- def doDescribeLeakageEmails(args, parsed_globals):
2220
+ def doCreateHttp(args, parsed_globals):
749
2221
  g_param = parse_global_arg(parsed_globals)
750
2222
 
751
2223
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -755,7 +2227,10 @@ def doDescribeLeakageEmails(args, parsed_globals):
755
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
2229
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
2235
  else:
761
2236
  cred = credential.Credential(
@@ -767,18 +2242,18 @@ def doDescribeLeakageEmails(args, parsed_globals):
767
2242
  endpoint=g_param[OptionsDefine.Endpoint],
768
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
2244
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
2246
  if g_param[OptionsDefine.Language]:
772
2247
  profile.language = g_param[OptionsDefine.Language]
773
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
774
2249
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
775
2250
  client._sdkVersion += ("_CLI_" + __version__)
776
2251
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.DescribeLeakageEmailsRequest()
2252
+ model = models.CreateHttpRequest()
778
2253
  model.from_json_string(json.dumps(args))
779
2254
  start_time = time.time()
780
2255
  while True:
781
- rsp = client.DescribeLeakageEmails(model)
2256
+ rsp = client.CreateHttp(model)
782
2257
  result = rsp.to_json_string()
783
2258
  try:
784
2259
  json_obj = json.loads(result)
@@ -797,7 +2272,7 @@ def doDescribeLeakageEmails(args, parsed_globals):
797
2272
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
2273
 
799
2274
 
800
- def doDescribeFakeApps(args, parsed_globals):
2275
+ def doDescribeHttps(args, parsed_globals):
801
2276
  g_param = parse_global_arg(parsed_globals)
802
2277
 
803
2278
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -807,7 +2282,10 @@ def doDescribeFakeApps(args, parsed_globals):
807
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
2284
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
2290
  else:
813
2291
  cred = credential.Credential(
@@ -819,18 +2297,18 @@ def doDescribeFakeApps(args, parsed_globals):
819
2297
  endpoint=g_param[OptionsDefine.Endpoint],
820
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
2299
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
2301
  if g_param[OptionsDefine.Language]:
824
2302
  profile.language = g_param[OptionsDefine.Language]
825
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
826
2304
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
827
2305
  client._sdkVersion += ("_CLI_" + __version__)
828
2306
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.DescribeFakeAppsRequest()
2307
+ model = models.DescribeHttpsRequest()
830
2308
  model.from_json_string(json.dumps(args))
831
2309
  start_time = time.time()
832
2310
  while True:
833
- rsp = client.DescribeFakeApps(model)
2311
+ rsp = client.DescribeHttps(model)
834
2312
  result = rsp.to_json_string()
835
2313
  try:
836
2314
  json_obj = json.loads(result)
@@ -849,7 +2327,7 @@ def doDescribeFakeApps(args, parsed_globals):
849
2327
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
2328
 
851
2329
 
852
- def doDescribeApps(args, parsed_globals):
2330
+ def doDeleteSuspiciousAssets(args, parsed_globals):
853
2331
  g_param = parse_global_arg(parsed_globals)
854
2332
 
855
2333
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -859,7 +2337,10 @@ def doDescribeApps(args, parsed_globals):
859
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
2339
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
2345
  else:
865
2346
  cred = credential.Credential(
@@ -871,18 +2352,18 @@ def doDescribeApps(args, parsed_globals):
871
2352
  endpoint=g_param[OptionsDefine.Endpoint],
872
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
2354
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
2356
  if g_param[OptionsDefine.Language]:
876
2357
  profile.language = g_param[OptionsDefine.Language]
877
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
878
2359
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
879
2360
  client._sdkVersion += ("_CLI_" + __version__)
880
2361
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.DescribeAppsRequest()
2362
+ model = models.DeleteSuspiciousAssetsRequest()
882
2363
  model.from_json_string(json.dumps(args))
883
2364
  start_time = time.time()
884
2365
  while True:
885
- rsp = client.DescribeApps(model)
2366
+ rsp = client.DeleteSuspiciousAssets(model)
886
2367
  result = rsp.to_json_string()
887
2368
  try:
888
2369
  json_obj = json.loads(result)
@@ -901,7 +2382,7 @@ def doDescribeApps(args, parsed_globals):
901
2382
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
2383
 
903
2384
 
904
- def doModifyLabel(args, parsed_globals):
2385
+ def doDescribeAssets(args, parsed_globals):
905
2386
  g_param = parse_global_arg(parsed_globals)
906
2387
 
907
2388
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -911,7 +2392,10 @@ def doModifyLabel(args, parsed_globals):
911
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
2394
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
2400
  else:
917
2401
  cred = credential.Credential(
@@ -923,18 +2407,18 @@ def doModifyLabel(args, parsed_globals):
923
2407
  endpoint=g_param[OptionsDefine.Endpoint],
924
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
2409
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
2411
  if g_param[OptionsDefine.Language]:
928
2412
  profile.language = g_param[OptionsDefine.Language]
929
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
930
2414
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
931
2415
  client._sdkVersion += ("_CLI_" + __version__)
932
2416
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.ModifyLabelRequest()
2417
+ model = models.DescribeAssetsRequest()
934
2418
  model.from_json_string(json.dumps(args))
935
2419
  start_time = time.time()
936
2420
  while True:
937
- rsp = client.ModifyLabel(model)
2421
+ rsp = client.DescribeAssets(model)
938
2422
  result = rsp.to_json_string()
939
2423
  try:
940
2424
  json_obj = json.loads(result)
@@ -953,7 +2437,7 @@ def doModifyLabel(args, parsed_globals):
953
2437
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
2438
 
955
2439
 
956
- def doDescribeJobRecordDetails(args, parsed_globals):
2440
+ def doModifySeedStatus(args, parsed_globals):
957
2441
  g_param = parse_global_arg(parsed_globals)
958
2442
 
959
2443
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -963,7 +2447,10 @@ def doDescribeJobRecordDetails(args, parsed_globals):
963
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
2449
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
2455
  else:
969
2456
  cred = credential.Credential(
@@ -975,18 +2462,18 @@ def doDescribeJobRecordDetails(args, parsed_globals):
975
2462
  endpoint=g_param[OptionsDefine.Endpoint],
976
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
2464
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
2466
  if g_param[OptionsDefine.Language]:
980
2467
  profile.language = g_param[OptionsDefine.Language]
981
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
982
2469
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
983
2470
  client._sdkVersion += ("_CLI_" + __version__)
984
2471
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
985
- model = models.DescribeJobRecordDetailsRequest()
2472
+ model = models.ModifySeedStatusRequest()
986
2473
  model.from_json_string(json.dumps(args))
987
2474
  start_time = time.time()
988
2475
  while True:
989
- rsp = client.DescribeJobRecordDetails(model)
2476
+ rsp = client.ModifySeedStatus(model)
990
2477
  result = rsp.to_json_string()
991
2478
  try:
992
2479
  json_obj = json.loads(result)
@@ -1005,7 +2492,7 @@ def doDescribeJobRecordDetails(args, parsed_globals):
1005
2492
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
2493
 
1007
2494
 
1008
- def doDescribeSuspiciousAssets(args, parsed_globals):
2495
+ def doDeleteDomains(args, parsed_globals):
1009
2496
  g_param = parse_global_arg(parsed_globals)
1010
2497
 
1011
2498
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1015,7 +2502,10 @@ def doDescribeSuspiciousAssets(args, parsed_globals):
1015
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
2504
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
2510
  else:
1021
2511
  cred = credential.Credential(
@@ -1027,18 +2517,18 @@ def doDescribeSuspiciousAssets(args, parsed_globals):
1027
2517
  endpoint=g_param[OptionsDefine.Endpoint],
1028
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
2519
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
2521
  if g_param[OptionsDefine.Language]:
1032
2522
  profile.language = g_param[OptionsDefine.Language]
1033
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1034
2524
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1035
2525
  client._sdkVersion += ("_CLI_" + __version__)
1036
2526
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.DescribeSuspiciousAssetsRequest()
2527
+ model = models.DeleteDomainsRequest()
1038
2528
  model.from_json_string(json.dumps(args))
1039
2529
  start_time = time.time()
1040
2530
  while True:
1041
- rsp = client.DescribeSuspiciousAssets(model)
2531
+ rsp = client.DeleteDomains(model)
1042
2532
  result = rsp.to_json_string()
1043
2533
  try:
1044
2534
  json_obj = json.loads(result)
@@ -1057,7 +2547,7 @@ def doDescribeSuspiciousAssets(args, parsed_globals):
1057
2547
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
2548
 
1059
2549
 
1060
- def doDescribeGithubs(args, parsed_globals):
2550
+ def doDeleteAssets(args, parsed_globals):
1061
2551
  g_param = parse_global_arg(parsed_globals)
1062
2552
 
1063
2553
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1067,7 +2557,10 @@ def doDescribeGithubs(args, parsed_globals):
1067
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
2559
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
2565
  else:
1073
2566
  cred = credential.Credential(
@@ -1079,18 +2572,18 @@ def doDescribeGithubs(args, parsed_globals):
1079
2572
  endpoint=g_param[OptionsDefine.Endpoint],
1080
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
2574
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
2576
  if g_param[OptionsDefine.Language]:
1084
2577
  profile.language = g_param[OptionsDefine.Language]
1085
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
2579
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1087
2580
  client._sdkVersion += ("_CLI_" + __version__)
1088
2581
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.DescribeGithubsRequest()
2582
+ model = models.DeleteAssetsRequest()
1090
2583
  model.from_json_string(json.dumps(args))
1091
2584
  start_time = time.time()
1092
2585
  while True:
1093
- rsp = client.DescribeGithubs(model)
2586
+ rsp = client.DeleteAssets(model)
1094
2587
  result = rsp.to_json_string()
1095
2588
  try:
1096
2589
  json_obj = json.loads(result)
@@ -1109,7 +2602,7 @@ def doDescribeGithubs(args, parsed_globals):
1109
2602
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
2603
 
1111
2604
 
1112
- def doDescribePorts(args, parsed_globals):
2605
+ def doCreateApp(args, parsed_globals):
1113
2606
  g_param = parse_global_arg(parsed_globals)
1114
2607
 
1115
2608
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1119,7 +2612,10 @@ def doDescribePorts(args, parsed_globals):
1119
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
2614
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
2620
  else:
1125
2621
  cred = credential.Credential(
@@ -1131,18 +2627,18 @@ def doDescribePorts(args, parsed_globals):
1131
2627
  endpoint=g_param[OptionsDefine.Endpoint],
1132
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
2629
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
2631
  if g_param[OptionsDefine.Language]:
1136
2632
  profile.language = g_param[OptionsDefine.Language]
1137
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1138
2634
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1139
2635
  client._sdkVersion += ("_CLI_" + __version__)
1140
2636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1141
- model = models.DescribePortsRequest()
2637
+ model = models.CreateAppRequest()
1142
2638
  model.from_json_string(json.dumps(args))
1143
2639
  start_time = time.time()
1144
2640
  while True:
1145
- rsp = client.DescribePorts(model)
2641
+ rsp = client.CreateApp(model)
1146
2642
  result = rsp.to_json_string()
1147
2643
  try:
1148
2644
  json_obj = json.loads(result)
@@ -1161,7 +2657,7 @@ def doDescribePorts(args, parsed_globals):
1161
2657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
2658
 
1163
2659
 
1164
- def doCreateJobRecord(args, parsed_globals):
2660
+ def doDescribeDarkWebs(args, parsed_globals):
1165
2661
  g_param = parse_global_arg(parsed_globals)
1166
2662
 
1167
2663
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1171,7 +2667,10 @@ def doCreateJobRecord(args, parsed_globals):
1171
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
2669
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
2675
  else:
1177
2676
  cred = credential.Credential(
@@ -1183,18 +2682,18 @@ def doCreateJobRecord(args, parsed_globals):
1183
2682
  endpoint=g_param[OptionsDefine.Endpoint],
1184
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
2684
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
2686
  if g_param[OptionsDefine.Language]:
1188
2687
  profile.language = g_param[OptionsDefine.Language]
1189
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1190
2689
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1191
2690
  client._sdkVersion += ("_CLI_" + __version__)
1192
2691
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1193
- model = models.CreateJobRecordRequest()
2692
+ model = models.DescribeDarkWebsRequest()
1194
2693
  model.from_json_string(json.dumps(args))
1195
2694
  start_time = time.time()
1196
2695
  while True:
1197
- rsp = client.CreateJobRecord(model)
2696
+ rsp = client.DescribeDarkWebs(model)
1198
2697
  result = rsp.to_json_string()
1199
2698
  try:
1200
2699
  json_obj = json.loads(result)
@@ -1213,7 +2712,7 @@ def doCreateJobRecord(args, parsed_globals):
1213
2712
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
2713
 
1215
2714
 
1216
- def doDescribeHttps(args, parsed_globals):
2715
+ def doDescribeSuspiciousAssets(args, parsed_globals):
1217
2716
  g_param = parse_global_arg(parsed_globals)
1218
2717
 
1219
2718
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1223,7 +2722,10 @@ def doDescribeHttps(args, parsed_globals):
1223
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
2724
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
2730
  else:
1229
2731
  cred = credential.Credential(
@@ -1235,18 +2737,18 @@ def doDescribeHttps(args, parsed_globals):
1235
2737
  endpoint=g_param[OptionsDefine.Endpoint],
1236
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
2739
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
2741
  if g_param[OptionsDefine.Language]:
1240
2742
  profile.language = g_param[OptionsDefine.Language]
1241
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1242
2744
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1243
2745
  client._sdkVersion += ("_CLI_" + __version__)
1244
2746
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1245
- model = models.DescribeHttpsRequest()
2747
+ model = models.DescribeSuspiciousAssetsRequest()
1246
2748
  model.from_json_string(json.dumps(args))
1247
2749
  start_time = time.time()
1248
2750
  while True:
1249
- rsp = client.DescribeHttps(model)
2751
+ rsp = client.DescribeSuspiciousAssets(model)
1250
2752
  result = rsp.to_json_string()
1251
2753
  try:
1252
2754
  json_obj = json.loads(result)
@@ -1265,7 +2767,7 @@ def doDescribeHttps(args, parsed_globals):
1265
2767
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
2768
 
1267
2769
 
1268
- def doDescribeAssets(args, parsed_globals):
2770
+ def doCreateDomain(args, parsed_globals):
1269
2771
  g_param = parse_global_arg(parsed_globals)
1270
2772
 
1271
2773
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1275,7 +2777,10 @@ def doDescribeAssets(args, parsed_globals):
1275
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
2779
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
2785
  else:
1281
2786
  cred = credential.Credential(
@@ -1287,18 +2792,18 @@ def doDescribeAssets(args, parsed_globals):
1287
2792
  endpoint=g_param[OptionsDefine.Endpoint],
1288
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
2794
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
2796
  if g_param[OptionsDefine.Language]:
1292
2797
  profile.language = g_param[OptionsDefine.Language]
1293
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1294
2799
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1295
2800
  client._sdkVersion += ("_CLI_" + __version__)
1296
2801
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
- model = models.DescribeAssetsRequest()
2802
+ model = models.CreateDomainRequest()
1298
2803
  model.from_json_string(json.dumps(args))
1299
2804
  start_time = time.time()
1300
2805
  while True:
1301
- rsp = client.DescribeAssets(model)
2806
+ rsp = client.CreateDomain(model)
1302
2807
  result = rsp.to_json_string()
1303
2808
  try:
1304
2809
  json_obj = json.loads(result)
@@ -1317,7 +2822,7 @@ def doDescribeAssets(args, parsed_globals):
1317
2822
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
2823
 
1319
2824
 
1320
- def doDescribeDarkWebs(args, parsed_globals):
2825
+ def doDescribeLeakageCodes(args, parsed_globals):
1321
2826
  g_param = parse_global_arg(parsed_globals)
1322
2827
 
1323
2828
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1327,7 +2832,10 @@ def doDescribeDarkWebs(args, parsed_globals):
1327
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
2834
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
2840
  else:
1333
2841
  cred = credential.Credential(
@@ -1339,18 +2847,18 @@ def doDescribeDarkWebs(args, parsed_globals):
1339
2847
  endpoint=g_param[OptionsDefine.Endpoint],
1340
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
2849
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
2851
  if g_param[OptionsDefine.Language]:
1344
2852
  profile.language = g_param[OptionsDefine.Language]
1345
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1346
2854
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1347
2855
  client._sdkVersion += ("_CLI_" + __version__)
1348
2856
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.DescribeDarkWebsRequest()
2857
+ model = models.DescribeLeakageCodesRequest()
1350
2858
  model.from_json_string(json.dumps(args))
1351
2859
  start_time = time.time()
1352
2860
  while True:
1353
- rsp = client.DescribeDarkWebs(model)
2861
+ rsp = client.DescribeLeakageCodes(model)
1354
2862
  result = rsp.to_json_string()
1355
2863
  try:
1356
2864
  json_obj = json.loads(result)
@@ -1369,7 +2877,7 @@ def doDescribeDarkWebs(args, parsed_globals):
1369
2877
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
2878
 
1371
2879
 
1372
- def doDescribeLeakageCodes(args, parsed_globals):
2880
+ def doDescribeWechatOfficialAccounts(args, parsed_globals):
1373
2881
  g_param = parse_global_arg(parsed_globals)
1374
2882
 
1375
2883
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1379,7 +2887,10 @@ def doDescribeLeakageCodes(args, parsed_globals):
1379
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
2889
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
2895
  else:
1385
2896
  cred = credential.Credential(
@@ -1391,18 +2902,18 @@ def doDescribeLeakageCodes(args, parsed_globals):
1391
2902
  endpoint=g_param[OptionsDefine.Endpoint],
1392
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
2904
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
2906
  if g_param[OptionsDefine.Language]:
1396
2907
  profile.language = g_param[OptionsDefine.Language]
1397
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1398
2909
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1399
2910
  client._sdkVersion += ("_CLI_" + __version__)
1400
2911
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.DescribeLeakageCodesRequest()
2912
+ model = models.DescribeWechatOfficialAccountsRequest()
1402
2913
  model.from_json_string(json.dumps(args))
1403
2914
  start_time = time.time()
1404
2915
  while True:
1405
- rsp = client.DescribeLeakageCodes(model)
2916
+ rsp = client.DescribeWechatOfficialAccounts(model)
1406
2917
  result = rsp.to_json_string()
1407
2918
  try:
1408
2919
  json_obj = json.loads(result)
@@ -1421,7 +2932,7 @@ def doDescribeLeakageCodes(args, parsed_globals):
1421
2932
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
2933
 
1423
2934
 
1424
- def doDescribeWechatOfficialAccounts(args, parsed_globals):
2935
+ def doDescribeEnterprises(args, parsed_globals):
1425
2936
  g_param = parse_global_arg(parsed_globals)
1426
2937
 
1427
2938
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1431,7 +2942,10 @@ def doDescribeWechatOfficialAccounts(args, parsed_globals):
1431
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
2944
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
2950
  else:
1437
2951
  cred = credential.Credential(
@@ -1443,18 +2957,18 @@ def doDescribeWechatOfficialAccounts(args, parsed_globals):
1443
2957
  endpoint=g_param[OptionsDefine.Endpoint],
1444
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
2959
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
2961
  if g_param[OptionsDefine.Language]:
1448
2962
  profile.language = g_param[OptionsDefine.Language]
1449
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1450
2964
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1451
2965
  client._sdkVersion += ("_CLI_" + __version__)
1452
2966
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.DescribeWechatOfficialAccountsRequest()
2967
+ model = models.DescribeEnterprisesRequest()
1454
2968
  model.from_json_string(json.dumps(args))
1455
2969
  start_time = time.time()
1456
2970
  while True:
1457
- rsp = client.DescribeWechatOfficialAccounts(model)
2971
+ rsp = client.DescribeEnterprises(model)
1458
2972
  result = rsp.to_json_string()
1459
2973
  try:
1460
2974
  json_obj = json.loads(result)
@@ -1473,7 +2987,7 @@ def doDescribeWechatOfficialAccounts(args, parsed_globals):
1473
2987
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1474
2988
 
1475
2989
 
1476
- def doDescribeEnterprises(args, parsed_globals):
2990
+ def doCreateEnterprise(args, parsed_globals):
1477
2991
  g_param = parse_global_arg(parsed_globals)
1478
2992
 
1479
2993
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1483,7 +2997,10 @@ def doDescribeEnterprises(args, parsed_globals):
1483
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
2999
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
3005
  else:
1489
3006
  cred = credential.Credential(
@@ -1495,18 +3012,18 @@ def doDescribeEnterprises(args, parsed_globals):
1495
3012
  endpoint=g_param[OptionsDefine.Endpoint],
1496
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
3014
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
3016
  if g_param[OptionsDefine.Language]:
1500
3017
  profile.language = g_param[OptionsDefine.Language]
1501
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1502
3019
  client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
1503
3020
  client._sdkVersion += ("_CLI_" + __version__)
1504
3021
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1505
- model = models.DescribeEnterprisesRequest()
3022
+ model = models.CreateEnterpriseRequest()
1506
3023
  model.from_json_string(json.dumps(args))
1507
3024
  start_time = time.time()
1508
3025
  while True:
1509
- rsp = client.DescribeEnterprises(model)
3026
+ rsp = client.CreateEnterprise(model)
1510
3027
  result = rsp.to_json_string()
1511
3028
  try:
1512
3029
  json_obj = json.loads(result)
@@ -1535,7 +3052,10 @@ def doCreateCustomer(args, parsed_globals):
1535
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
3054
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
3060
  else:
1541
3061
  cred = credential.Credential(
@@ -1547,7 +3067,7 @@ def doCreateCustomer(args, parsed_globals):
1547
3067
  endpoint=g_param[OptionsDefine.Endpoint],
1548
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
3069
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
3071
  if g_param[OptionsDefine.Language]:
1552
3072
  profile.language = g_param[OptionsDefine.Language]
1553
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +3107,10 @@ def doStopJobRecord(args, parsed_globals):
1587
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
3109
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
3115
  else:
1593
3116
  cred = credential.Credential(
@@ -1599,7 +3122,7 @@ def doStopJobRecord(args, parsed_globals):
1599
3122
  endpoint=g_param[OptionsDefine.Endpoint],
1600
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
3124
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
3126
  if g_param[OptionsDefine.Language]:
1604
3127
  profile.language = g_param[OptionsDefine.Language]
1605
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +3162,10 @@ def doDescribeJobRecords(args, parsed_globals):
1639
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
3164
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
3170
  else:
1645
3171
  cred = credential.Credential(
@@ -1651,7 +3177,7 @@ def doDescribeJobRecords(args, parsed_globals):
1651
3177
  endpoint=g_param[OptionsDefine.Endpoint],
1652
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
3179
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
3181
  if g_param[OptionsDefine.Language]:
1656
3182
  profile.language = g_param[OptionsDefine.Language]
1657
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +3217,10 @@ def doDescribeWeakPasswords(args, parsed_globals):
1691
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
3219
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
3225
  else:
1697
3226
  cred = credential.Credential(
@@ -1703,7 +3232,7 @@ def doDescribeWeakPasswords(args, parsed_globals):
1703
3232
  endpoint=g_param[OptionsDefine.Endpoint],
1704
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
3234
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
3236
  if g_param[OptionsDefine.Language]:
1708
3237
  profile.language = g_param[OptionsDefine.Language]
1709
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1733,6 +3262,116 @@ def doDescribeWeakPasswords(args, parsed_globals):
1733
3262
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1734
3263
 
1735
3264
 
3265
+ def doDescribeWechatApplets(args, parsed_globals):
3266
+ g_param = parse_global_arg(parsed_globals)
3267
+
3268
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3269
+ cred = credential.CVMRoleCredential()
3270
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3271
+ cred = credential.STSAssumeRoleCredential(
3272
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3273
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3274
+ )
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3279
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3280
+ else:
3281
+ cred = credential.Credential(
3282
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3283
+ )
3284
+ http_profile = HttpProfile(
3285
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3286
+ reqMethod="POST",
3287
+ endpoint=g_param[OptionsDefine.Endpoint],
3288
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3289
+ )
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3291
+ if g_param[OptionsDefine.Language]:
3292
+ profile.language = g_param[OptionsDefine.Language]
3293
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3294
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
3295
+ client._sdkVersion += ("_CLI_" + __version__)
3296
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3297
+ model = models.DescribeWechatAppletsRequest()
3298
+ model.from_json_string(json.dumps(args))
3299
+ start_time = time.time()
3300
+ while True:
3301
+ rsp = client.DescribeWechatApplets(model)
3302
+ result = rsp.to_json_string()
3303
+ try:
3304
+ json_obj = json.loads(result)
3305
+ except TypeError as e:
3306
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3307
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3308
+ break
3309
+ cur_time = time.time()
3310
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3311
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3312
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3313
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3314
+ else:
3315
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3316
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3317
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3318
+
3319
+
3320
+ def doDeleteSeeds(args, parsed_globals):
3321
+ g_param = parse_global_arg(parsed_globals)
3322
+
3323
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3324
+ cred = credential.CVMRoleCredential()
3325
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3326
+ cred = credential.STSAssumeRoleCredential(
3327
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3328
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3329
+ )
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3334
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3335
+ else:
3336
+ cred = credential.Credential(
3337
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3338
+ )
3339
+ http_profile = HttpProfile(
3340
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3341
+ reqMethod="POST",
3342
+ endpoint=g_param[OptionsDefine.Endpoint],
3343
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3344
+ )
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3346
+ if g_param[OptionsDefine.Language]:
3347
+ profile.language = g_param[OptionsDefine.Language]
3348
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3349
+ client = mod.CtemClient(cred, g_param[OptionsDefine.Region], profile)
3350
+ client._sdkVersion += ("_CLI_" + __version__)
3351
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3352
+ model = models.DeleteSeedsRequest()
3353
+ model.from_json_string(json.dumps(args))
3354
+ start_time = time.time()
3355
+ while True:
3356
+ rsp = client.DeleteSeeds(model)
3357
+ result = rsp.to_json_string()
3358
+ try:
3359
+ json_obj = json.loads(result)
3360
+ except TypeError as e:
3361
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3362
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3363
+ break
3364
+ cur_time = time.time()
3365
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3366
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3367
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3368
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3369
+ else:
3370
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3371
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3372
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3373
+
3374
+
1736
3375
  CLIENT_MAP = {
1737
3376
  "v20231128": ctem_client_v20231128,
1738
3377
 
@@ -1744,39 +3383,67 @@ MODELS_MAP = {
1744
3383
  }
1745
3384
 
1746
3385
  ACTION_MAP = {
3386
+ "CreateWechatApplet": doCreateWechatApplet,
1747
3387
  "DescribeNetDisks": doDescribeNetDisks,
3388
+ "CreateManage": doCreateManage,
1748
3389
  "DescribeManages": doDescribeManages,
1749
3390
  "DescribeLeakageDatas": doDescribeLeakageDatas,
3391
+ "DeleteApps": doDeleteApps,
1750
3392
  "ModifyCustomer": doModifyCustomer,
3393
+ "CreateAsset": doCreateAsset,
3394
+ "DeleteManages": doDeleteManages,
3395
+ "DeleteHttps": doDeleteHttps,
3396
+ "CreateSuspiciousAsset": doCreateSuspiciousAsset,
3397
+ "CreateSeeds": doCreateSeeds,
3398
+ "DescribeApiSecs": doDescribeApiSecs,
1751
3399
  "DescribeDomains": doDescribeDomains,
1752
- "DescribeFakeWechatOfficials": doDescribeFakeWechatOfficials,
3400
+ "DeleteEnterprises": doDeleteEnterprises,
3401
+ "DeleteSubDomains": doDeleteSubDomains,
1753
3402
  "DescribeVuls": doDescribeVuls,
3403
+ "DescribeSeeds": doDescribeSeeds,
1754
3404
  "DescribeConfigs": doDescribeConfigs,
1755
- "DescribeWechatApplets": doDescribeWechatApplets,
3405
+ "DeleteWechatOfficialAccounts": doDeleteWechatOfficialAccounts,
3406
+ "DeleteWechatApplets": doDeleteWechatApplets,
1756
3407
  "DescribeFakeWebsites": doDescribeFakeWebsites,
1757
- "DescribeSensitiveInfos": doDescribeSensitiveInfos,
3408
+ "IgnoreData": doIgnoreData,
1758
3409
  "DescribeFakeMiniPrograms": doDescribeFakeMiniPrograms,
3410
+ "CreateSubDomain": doCreateSubDomain,
3411
+ "DescribeSensitiveInfos": doDescribeSensitiveInfos,
1759
3412
  "DescribeSubDomains": doDescribeSubDomains,
1760
3413
  "DescribeCustomers": doDescribeCustomers,
1761
3414
  "DescribeLeakageEmails": doDescribeLeakageEmails,
3415
+ "DeletePorts": doDeletePorts,
3416
+ "CreatePort": doCreatePort,
1762
3417
  "DescribeFakeApps": doDescribeFakeApps,
1763
3418
  "DescribeApps": doDescribeApps,
3419
+ "CreateWechatOfficialAccount": doCreateWechatOfficialAccount,
1764
3420
  "ModifyLabel": doModifyLabel,
1765
3421
  "DescribeJobRecordDetails": doDescribeJobRecordDetails,
1766
- "DescribeSuspiciousAssets": doDescribeSuspiciousAssets,
3422
+ "DescribeFakeWechatOfficials": doDescribeFakeWechatOfficials,
1767
3423
  "DescribeGithubs": doDescribeGithubs,
1768
3424
  "DescribePorts": doDescribePorts,
1769
3425
  "CreateJobRecord": doCreateJobRecord,
3426
+ "CreateHttp": doCreateHttp,
1770
3427
  "DescribeHttps": doDescribeHttps,
3428
+ "DeleteSuspiciousAssets": doDeleteSuspiciousAssets,
1771
3429
  "DescribeAssets": doDescribeAssets,
3430
+ "ModifySeedStatus": doModifySeedStatus,
3431
+ "DeleteDomains": doDeleteDomains,
3432
+ "DeleteAssets": doDeleteAssets,
3433
+ "CreateApp": doCreateApp,
1772
3434
  "DescribeDarkWebs": doDescribeDarkWebs,
3435
+ "DescribeSuspiciousAssets": doDescribeSuspiciousAssets,
3436
+ "CreateDomain": doCreateDomain,
1773
3437
  "DescribeLeakageCodes": doDescribeLeakageCodes,
1774
3438
  "DescribeWechatOfficialAccounts": doDescribeWechatOfficialAccounts,
1775
3439
  "DescribeEnterprises": doDescribeEnterprises,
3440
+ "CreateEnterprise": doCreateEnterprise,
1776
3441
  "CreateCustomer": doCreateCustomer,
1777
3442
  "StopJobRecord": doStopJobRecord,
1778
3443
  "DescribeJobRecords": doDescribeJobRecords,
1779
3444
  "DescribeWeakPasswords": doDescribeWeakPasswords,
3445
+ "DescribeWechatApplets": doDescribeWechatApplets,
3446
+ "DeleteSeeds": doDeleteSeeds,
1780
3447
 
1781
3448
  }
1782
3449