ai_v/venv/Lib/site-packages/alibabacloud_credentials/models.py

312 lines
12 KiB
Python
Raw Normal View History

feat(api): 实现图像生成及后台同步功能 - 新增图像生成接口,支持试用、积分和自定义API Key模式 - 实现生成图片结果异步上传至MinIO存储,带重试机制 - 优化积分预扣除和异常退还逻辑,保障用户积分准确 - 添加获取生成历史记录接口,支持时间范围和分页 - 提供本地字典配置接口,支持模型、比例、提示模板和尺寸 - 实现图片批量上传接口,支持S3兼容对象存储 feat(admin): 增加管理员角色管理与权限分配接口 - 实现角色列表查询、角色创建、更新及删除功能 - 增加权限列表查询接口 - 实现用户角色分配接口,便于统一管理用户权限 - 增加系统字典增删查改接口,支持分类过滤和排序 - 权限控制全面覆盖管理接口,保证安全访问 feat(auth): 完善用户登录注册及权限相关接口与页面 - 实现手机号验证码发送及校验功能,保障注册安全 - 支持手机号注册、登录及退出接口,集成日志记录 - 增加修改密码功能,验证原密码后更新 - 提供动态导航菜单接口,基于权限展示不同菜单 - 实现管理界面路由及日志、角色、字典管理页面访问权限控制 - 添加系统日志查询接口,支持关键词和等级筛选 feat(app): 初始化Flask应用并配置蓝图与数据库 - 创建应用程序工厂,加载配置,初始化数据库和Redis客户端 - 注册认证、API及管理员蓝图,整合路由 - 根路由渲染主页模板 - 应用上下文中自动创建数据库表,保证运行环境准备完毕 feat(database): 提供数据库创建与迁移支持脚本 - 新增数据库创建脚本,支持自动检测是否已存在 - 添加数据库表初始化脚本,支持创建和删除所有表 - 实现RBAC权限初始化,包含基础权限和角色创建 - 新增字段手动修复脚本,添加用户API Key和积分字段 - 强制迁移脚本支持清理连接和修复表结构,初始化默认数据及角色分配 feat(config): 新增系统配置参数 - 配置数据库、Redis、Session和MinIO相关参数 - 添加AI接口地址及试用Key配置 - 集成阿里云短信服务配置及开发模式相关参数 feat(extensions): 初始化数据库、Redis和MinIO客户端 - 创建全局SQLAlchemy数据库实例和Redis客户端 - 配置基于boto3的MinIO兼容S3客户端 chore(logs): 添加示例系统日志文件 - 记录用户请求、验证码发送成功与失败的日志信息
2026-01-12 00:53:31 +08:00
# -*- coding: utf-8 -*-
# This file is auto-generated, don't edit it. Thanks.
from Tea.model import TeaModel
class Config(TeaModel):
"""
Model for initializing credential
"""
def __init__(
self,
*,
type: str = None,
access_key_id: str = None,
access_key_secret: str = None,
security_token: str = None,
bearer_token: str = None,
duration_seconds: int = None,
role_arn: str = None,
oidc_provider_arn: str = None,
oidc_token_file_path: str = None,
role_session_name: str = None,
role_session_expiration: int = None,
policy: str = None,
external_id: str = None,
sts_endpoint: str = None,
public_key_id: str = None,
private_key_file: str = None,
role_name: str = None,
enable_imds_v2: bool = None,
disable_imds_v1: bool = None,
metadata_token_duration: int = None,
credentials_uri: str = None,
host: str = None,
timeout: int = None,
connect_timeout: int = None,
proxy: str = None,
):
"""
Initialize the credential object.
### Parameters
#### General Parameters
- `type` (str): Credential type, including `access_key`, `sts`, `bearer`, `ecs_ram_role`, `ram_role_arn`, `rsa_key_pair`, `oidc_role_arn`, `credentials_uri`.
#### Access Key Type
- `access_key_id` (str): Access Key ID.
- `access_key_secret` (str): Access Key Secret.
- `security_token` (str, optional): Security token.
#### Bearer Token Type
- `bearer_token` (str): Bearer token.
#### RAM Role ARN and OIDC Role ARN Types
- `role_arn` (str): Role ARN.
- `oidc_provider_arn` (str, for `oidc_role_arn` only): OIDC provider ARN.
- `oidc_token_file_path` (str, for `oidc_role_arn` only): Path to the OIDC token file.
- `role_session_name` (str): Role session name.
- `role_session_expiration` (int, optional): Role session expiration time in seconds.
- `policy` (str, optional): Policy.
- `external_id` (str, optional): External ID.
- `sts_endpoint` (str, optional): STS endpoint.
- `duration_seconds`: deprecated
#### RSA Key Pair Type
- `public_key_id` (str): Public key ID.
- `private_key_file` (str): Path to the private key file.
#### ECS RAM Role Type
- `role_name` (str): Role name.
- `disable_imds_v1` (bool, optional): Whether to disable IMDS v1. Default is `False`.
#### Credentials URI Type
- `credentials_uri` (str): Credentials URI.
#### HTTP Options
- `host` (str, optional): Host address.
- `timeout` (int, optional): Read timeout in milliseconds. Default values:
- `ecs_ram_role`: 1000ms
- `ram_role_arn`: 5000ms
- `oidc_role_arn`: 5000ms
- `connect_timeout` (int, optional): Connection timeout in milliseconds. Default values:
- `ecs_ram_role`: 1000ms
- `ram_role_arn`: 10000ms
- `oidc_role_arn`: 10000ms
- `proxy` (str, optional): HTTP or HTTPS proxy.
#### Other Parameters
- `duration_seconds` (int, optional): Duration in seconds, mainly used for `sts` type credentials.
Note: Some parameters are only valid for specific credential types. Please use them according to your actual needs.
"""
self.type = type
self.access_key_id = access_key_id
self.access_key_secret = access_key_secret
self.security_token = security_token
self.bearer_token = bearer_token
self.duration_seconds = duration_seconds
self.role_arn = role_arn
self.oidc_provider_arn = oidc_provider_arn
self.oidc_token_file_path = oidc_token_file_path
self.role_session_name = role_session_name
self.role_session_expiration = role_session_expiration
self.policy = policy
self.external_id = external_id
self.sts_endpoint = sts_endpoint
self.public_key_id = public_key_id
self.private_key_file = private_key_file
self.role_name = role_name
self.disable_imds_v1 = disable_imds_v1
self.enable_imds_v2 = enable_imds_v2
self.metadata_token_duration = metadata_token_duration
self.credentials_uri = credentials_uri
self.host = host
self.timeout = timeout
self.connect_timeout = connect_timeout
self.proxy = proxy
def validate(self):
pass
def to_map(self):
result = dict()
if self.type is not None:
result['type'] = self.type
if self.access_key_id is not None:
result['accessKeyId'] = self.access_key_id
if self.access_key_secret is not None:
result['accessKeySecret'] = self.access_key_secret
if self.security_token is not None:
result['securityToken'] = self.security_token
if self.bearer_token is not None:
result['bearerToken'] = self.bearer_token
if self.duration_seconds is not None:
result['durationSeconds'] = self.duration_seconds
if self.role_arn is not None:
result['roleArn'] = self.role_arn
if self.oidc_provider_arn is not None:
result['oidcProviderArn'] = self.oidc_provider_arn
if self.oidc_token_file_path is not None:
result['oidcTokenFilePath'] = self.oidc_token_file_path
if self.role_session_name is not None:
result['roleSessionName'] = self.role_session_name
if self.role_session_expiration is not None:
result['roleSessionExpiration'] = self.role_session_expiration
if self.policy is not None:
result['policy'] = self.policy
if self.external_id is not None:
result['externalId'] = self.external_id
if self.sts_endpoint is not None:
result['stsEndpoint'] = self.sts_endpoint
if self.public_key_id is not None:
result['publicKeyId'] = self.public_key_id
if self.private_key_file is not None:
result['privateKeyFile'] = self.private_key_file
if self.role_name is not None:
result['roleName'] = self.role_name
if self.disable_imds_v1 is not None:
result['disableIMDSv1'] = self.disable_imds_v1
if self.enable_imds_v2 is not None:
result['enableIMDSv2'] = self.enable_imds_v2
if self.metadata_token_duration is not None:
result['metadataTokenDuration'] = self.metadata_token_duration
if self.credentials_uri is not None:
result['credentialsUri'] = self.credentials_uri
if self.host is not None:
result['host'] = self.host
if self.timeout is not None:
result['timeout'] = self.timeout
if self.connect_timeout is not None:
result['connectTimeout'] = self.connect_timeout
if self.proxy is not None:
result['proxy'] = self.proxy
return result
def from_map(self, m: dict = None):
m = m or dict()
if m.get('type') is not None:
self.type = m.get('type')
if m.get('accessKeyId') is not None:
self.access_key_id = m.get('accessKeyId')
if m.get('accessKeySecret') is not None:
self.access_key_secret = m.get('accessKeySecret')
if m.get('securityToken') is not None:
self.security_token = m.get('securityToken')
if m.get('bearerToken') is not None:
self.bearer_token = m.get('bearerToken')
if m.get('durationSeconds') is not None:
self.duration_seconds = m.get('durationSeconds')
if m.get('roleArn') is not None:
self.role_arn = m.get('roleArn')
if m.get('oidcProviderArn') is not None:
self.oidc_provider_arn = m.get('oidcProviderArn')
if m.get('oidcTokenFilePath') is not None:
self.oidc_token_file_path = m.get('oidcTokenFilePath')
if m.get('roleSessionName') is not None:
self.role_session_name = m.get('roleSessionName')
if m.get('roleSessionExpiration') is not None:
self.role_session_expiration = m.get('roleSessionExpiration')
if m.get('policy') is not None:
self.policy = m.get('policy')
if m.get('externalId') is not None:
self.external_id = m.get('externalId')
if m.get('stsEndpoint') is not None:
self.sts_endpoint = m.get('stsEndpoint')
if m.get('publicKeyId') is not None:
self.public_key_id = m.get('publicKeyId')
if m.get('privateKeyFile') is not None:
self.private_key_file = m.get('privateKeyFile')
if m.get('roleName') is not None:
self.role_name = m.get('roleName')
if m.get('disableIMDSv1') is not None:
self.disable_imds_v1 = m.get('disableIMDSv1')
if m.get('enableIMDSv2') is not None:
self.enable_imds_v2 = m.get('enableIMDSv2')
if m.get('metadataTokenDuration') is not None:
self.metadata_token_duration = m.get('metadataTokenDuration')
if m.get('credentialsUri') is not None:
self.credentials_uri = m.get('credentialsUri')
if m.get('host') is not None:
self.host = m.get('host')
if m.get('timeout') is not None:
self.timeout = m.get('timeout')
if m.get('connectTimeout') is not None:
self.connect_timeout = m.get('connectTimeout')
if m.get('proxy') is not None:
self.proxy = m.get('proxy')
return self
class CredentialModel(TeaModel):
def __init__(
self,
access_key_id: str = None,
access_key_secret: str = None,
security_token: str = None,
bearer_token: str = None,
type: str = None,
provider_name: str = None,
):
# accesskey id
self.access_key_id = access_key_id
# accesskey secret
self.access_key_secret = access_key_secret
# security token
self.security_token = security_token
# bearer token
self.bearer_token = bearer_token
# type
self.type = type
# provider name
self.provider_name = provider_name
def validate(self):
pass
def to_map(self) -> dict:
_map = super().to_map()
if _map is not None:
return _map
result = dict()
if self.access_key_id is not None:
result['accessKeyId'] = self.access_key_id
if self.access_key_secret is not None:
result['accessKeySecret'] = self.access_key_secret
if self.security_token is not None:
result['securityToken'] = self.security_token
if self.bearer_token is not None:
result['bearerToken'] = self.bearer_token
if self.type is not None:
result['type'] = self.type
if self.provider_name is not None:
result['providerName'] = self.provider_name
return result
def from_map(self, m: dict = None):
m = m or dict()
if m.get('accessKeyId') is not None:
self.access_key_id = m.get('accessKeyId')
if m.get('accessKeySecret') is not None:
self.access_key_secret = m.get('accessKeySecret')
if m.get('securityToken') is not None:
self.security_token = m.get('securityToken')
if m.get('bearerToken') is not None:
self.bearer_token = m.get('bearerToken')
if m.get('type') is not None:
self.type = m.get('type')
if m.get('providerName') is not None:
self.provider_name = m.get('providerName')
return self
def get_access_key_id(self) -> str:
return self.access_key_id
def get_access_key_secret(self) -> str:
return self.access_key_secret
def get_security_token(self) -> str:
return self.security_token
def get_bearer_token(self) -> str:
return self.bearer_token
def get_type(self) -> str:
return self.type
def get_provider_name(self) -> str:
return self.provider_name