oci-cli 3.72.1__py3-none-any.whl → 3.73.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- oci_cli/bin/dif.psm1 +3 -3
- oci_cli/bin/mysql.psm1 +6 -2
- oci_cli/bin/opensearch.psm1 +2 -2
- oci_cli/bin/queue.psm1 +23 -11
- oci_cli/help_text_producer/data_files/text/cmdref/certificates/ca-bundle/get.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/certificates/certificate-authority-bundle/get.txt +5 -5
- oci_cli/help_text_producer/data_files/text/cmdref/certificates/certificate-authority-bundle-version/list.txt +1 -2
- oci_cli/help_text_producer/data_files/text/cmdref/certificates/certificate-bundle/get.txt +6 -5
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/create-root-ca-by-generating-config-details.txt +12 -8
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/create-root-ca-managed-externally.txt +206 -0
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/create-subordinate-ca-issued-by-internal-ca.txt +12 -8
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/create-subordinate-ca-managed-internally-issued-by-external-ca.txt +229 -0
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/list.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/update-root-ca-by-generating-config-details.txt +8 -2
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/update-root-ca-managed-externally.txt +222 -0
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/update-subordinate-ca-issued-by-internal-ca.txt +8 -2
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority/update-subordinate-ca-managed-internally-issued-by-external-ca.txt +233 -0
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt/certificate-authority.txt +8 -0
- oci_cli/help_text_producer/data_files/text/cmdref/certs-mgmt.txt +8 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute/compute-host/apply-host-configuration.txt +0 -26
- oci_cli/help_text_producer/data_files/text/cmdref/compute/compute-host/attach.txt +0 -26
- oci_cli/help_text_producer/data_files/text/cmdref/compute/compute-host/check-host-configuration.txt +0 -26
- oci_cli/help_text_producer/data_files/text/cmdref/compute/dedicated-vm-host/create-dedicated-vm-host-compute-bare-metal-host-placement-constraint-details.txt +12 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute/dedicated-vm-host/create-dedicated-vm-host-host-group-placement-constraint-details.txt +12 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute/dedicated-vm-host/create.txt +12 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute/dedicated-vm-host/list.txt +5 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute/dedicated-vm-host-instance/list.txt +5 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute-management/instance-configuration/launch-compute-instance.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/compute-management/instance-pool/create.txt +5 -4
- oci_cli/help_text_producer/data_files/text/cmdref/db/autonomous-database/restart.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/delegate-access-control/work-request/work-request-error/{list-errors.txt → list.txt} +5 -5
- oci_cli/help_text_producer/data_files/text/cmdref/delegate-access-control/work-request/work-request-error.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/delegate-access-control/work-request/work-request-log/{list-logs.txt → list.txt} +5 -5
- oci_cli/help_text_producer/data_files/text/cmdref/delegate-access-control/work-request/work-request-log.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/delegate-access-control/work-request.txt +2 -2
- oci_cli/help_text_producer/data_files/text/cmdref/delegate-access-control.txt +2 -2
- oci_cli/help_text_producer/data_files/text/cmdref/dif/stack/add.txt +51 -2
- oci_cli/help_text_producer/data_files/text/cmdref/dif/stack/create.txt +50 -2
- oci_cli/help_text_producer/data_files/text/cmdref/dif/stack/deploy-artifacts.txt +36 -4
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/agent-endpoint/create.txt +11 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/agent-endpoint/update.txt +11 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity/change-compartment.txt +136 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity/create.txt +170 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity/delete.txt +134 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity/get.txt +96 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity/list.txt +143 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity/update.txt +184 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/provisioned-capacity.txt +31 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/tool/create-tool-rag-tool-config.txt +37 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/tool/create-tool-sql-tool-config.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/tool/update-tool-rag-tool-config.txt +37 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent/tool/update-tool-sql-tool-config.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/generative-ai-agent.txt +14 -0
- oci_cli/help_text_producer/data_files/text/cmdref/governance-rules-control-plane/work-request/{work-request-log-entry/list-work-request-logs.txt → work-request-log/list.txt} +5 -5
- oci_cli/help_text_producer/data_files/text/cmdref/governance-rules-control-plane/work-request/{work-request-log-entry.txt → work-request-log.txt} +3 -3
- oci_cli/help_text_producer/data_files/text/cmdref/governance-rules-control-plane/work-request.txt +2 -2
- oci_cli/help_text_producer/data_files/text/cmdref/governance-rules-control-plane.txt +2 -2
- oci_cli/help_text_producer/data_files/text/cmdref/kafka/cluster/list-node-shapes.txt +129 -0
- oci_cli/help_text_producer/data_files/text/cmdref/kafka/cluster.txt +2 -0
- oci_cli/help_text_producer/data_files/text/cmdref/kafka.txt +2 -0
- oci_cli/help_text_producer/data_files/text/cmdref/mysql/backup/export.txt +154 -0
- oci_cli/help_text_producer/data_files/text/cmdref/mysql/backup.txt +2 -0
- oci_cli/help_text_producer/data_files/text/cmdref/mysql/work-request/cancel.txt +104 -0
- oci_cli/help_text_producer/data_files/text/cmdref/mysql/work-request.txt +2 -0
- oci_cli/help_text_producer/data_files/text/cmdref/mysql.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/network/vcn/create.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/network/vcn/update.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance/management-appliance/create.txt +205 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance/management-appliance/delete.txt +146 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance/management-appliance/get.txt +108 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance/management-appliance/list.txt +160 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance/management-appliance/update.txt +217 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance/management-appliance.txt +22 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs/management-appliance.txt +25 -0
- oci_cli/help_text_producer/data_files/text/cmdref/ocvs.txt +14 -0
- oci_cli/help_text_producer/data_files/text/cmdref/opensearch/cluster/create.txt +11 -0
- oci_cli/help_text_producer/data_files/text/cmdref/opensearch/cluster/update.txt +11 -0
- oci_cli/help_text_producer/data_files/text/cmdref/organizations/work-request-error/{list-errors.txt → list.txt} +5 -5
- oci_cli/help_text_producer/data_files/text/cmdref/organizations/work-request-error.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/organizations.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/queue/channels/list-channels.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/messages/delete-message.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/messages/delete-messages.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/messages/get-messages.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/messages/get-stats.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/messages/update-message.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/messages/update-messages.txt +4 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group/create.txt +169 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group/delete.txt +135 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group/get.txt +97 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group/update.txt +185 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group-collection/list-consumer-groups.txt +142 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group-collection.txt +15 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/consumer-group.txt +20 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/queue/create.txt +18 -2
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/queue/purge.txt +19 -6
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin/queue/update.txt +16 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue/queue-admin.txt +14 -0
- oci_cli/help_text_producer/data_files/text/cmdref/queue.txt +14 -0
- oci_cli/help_text_producer/data_files/text/cmdref/support/incident/create.txt +6 -6
- oci_cli/help_text_producer/data_files/text/cmdref/support/incident/get.txt +2 -2
- oci_cli/help_text_producer/data_files/text/cmdref/support/incident/list.txt +1 -1
- oci_cli/help_text_producer/data_files/text/cmdref/support/incident/update.txt +4 -4
- oci_cli/help_text_producer/data_files/text/cmdref/support/incident-resource-type/list.txt +3 -3
- oci_cli/help_text_producer/data_files/text/cmdref/support/validation-response/validate-user.txt +1 -1
- oci_cli/version.py +1 -1
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/METADATA +2 -2
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/RECORD +134 -102
- services/certificates/src/oci_cli_certificates/generated/certificates_cli.py +6 -6
- services/certificates_management/src/oci_cli_certificates_management/certificatesmanagement_cli_extended.py +126 -0
- services/certificates_management/src/oci_cli_certificates_management/generated/certificatesmanagement_cli.py +447 -25
- services/core/src/oci_cli_compute/generated/compute_cli.py +126 -174
- services/core/src/oci_cli_compute_management/generated/computemanagement_cli.py +13 -4
- services/core/src/oci_cli_virtual_network/generated/virtualnetwork_cli.py +2 -2
- services/database/src/oci_cli_database/generated/database_cli.py +4 -1
- services/dif/src/oci_cli_stack/generated/stack_cli.py +65 -17
- services/dif/src/oci_cli_stack/stack_cli_extended.py +9 -9
- services/generative_ai_agent/src/oci_cli_generative_ai_agent/generated/generativeaiagent_cli.py +435 -16
- services/managed_kafka/src/oci_cli_kafka_cluster/generated/kafkacluster_cli.py +56 -0
- services/mysql/src/oci_cli_db_backups/generated/dbbackups_cli.py +70 -0
- services/mysql/src/oci_cli_work_requests/generated/workrequests_cli.py +26 -0
- services/ocvp/src/oci_cli_management_appliance/__init__.py +4 -0
- services/ocvp/src/oci_cli_management_appliance/generated/__init__.py +4 -0
- services/ocvp/src/oci_cli_management_appliance/generated/client_mappings.py +14 -0
- services/ocvp/src/oci_cli_management_appliance/generated/managementappliance_cli.py +341 -0
- services/opensearch/src/oci_cli_opensearch_cluster/generated/opensearchcluster_cli.py +16 -8
- services/queue/src/oci_cli_queue/generated/queue_cli.py +28 -7
- services/queue/src/oci_cli_queue_admin/generated/queueadmin_cli.py +343 -10
- services/queue/src/oci_cli_queue_admin/queueadmin_cli_extended.py +54 -7
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/LICENSE.txt +0 -0
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/THIRD_PARTY_LICENSES.txt +0 -0
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/WHEEL +0 -0
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/entry_points.txt +0 -0
- {oci_cli-3.72.1.dist-info → oci_cli-3.73.1.dist-info}/top_level.txt +0 -0
|
@@ -59,7 +59,7 @@ certificates_root_group.add_command(certificate_authority_bundle_version_summary
|
|
|
59
59
|
certificates_root_group.add_command(certificate_bundle_group)
|
|
60
60
|
|
|
61
61
|
|
|
62
|
-
@ca_bundle_group.command(name=cli_util.override('certificates.get_ca_bundle.command_name', 'get'), help=u"""Gets
|
|
62
|
+
@ca_bundle_group.command(name=cli_util.override('certificates.get_ca_bundle.command_name', 'get'), help=u"""Gets the bundle for the specified CA bundle. \n[Command Reference](getCaBundle)""")
|
|
63
63
|
@cli_util.option('--ca-bundle-id', required=True, help=u"""The OCID of the CA bundle.""")
|
|
64
64
|
@json_skeleton_utils.get_cli_json_input_option({})
|
|
65
65
|
@cli_util.help_option
|
|
@@ -81,11 +81,11 @@ def get_ca_bundle(ctx, from_json, ca_bundle_id):
|
|
|
81
81
|
cli_util.render_response(result, ctx)
|
|
82
82
|
|
|
83
83
|
|
|
84
|
-
@certificate_authority_bundle_group.command(name=cli_util.override('certificates.get_certificate_authority_bundle.command_name', 'get'), help=u"""Gets a certificate authority
|
|
84
|
+
@certificate_authority_bundle_group.command(name=cli_util.override('certificates.get_certificate_authority_bundle.command_name', 'get'), help=u"""Gets a bundle for a certificate authority (CA) that matches either the specified `stage`, `name`, or `versionNumber` parameter. If none of these parameters are provided, the bundle for the CA version marked as `CURRENT` is returned. \n[Command Reference](getCertificateAuthorityBundle)""")
|
|
85
85
|
@cli_util.option('--certificate-authority-id', required=True, help=u"""The OCID of the certificate authority (CA).""")
|
|
86
86
|
@cli_util.option('--version-number', type=click.INT, help=u"""The version number of the certificate authority (CA).""")
|
|
87
87
|
@cli_util.option('--certificate-authority-version-name', help=u"""The name of the certificate authority (CA). (This might be referred to as the name of the CA version, as every CA consists of at least one version.) Names are unique across versions of a given CA.""")
|
|
88
|
-
@cli_util.option('--stage', type=custom_types.CliCaseInsensitiveChoice(["CURRENT", "PENDING", "LATEST", "PREVIOUS", "DEPRECATED"]), help=u"""The rotation state of the certificate version.""")
|
|
88
|
+
@cli_util.option('--stage', type=custom_types.CliCaseInsensitiveChoice(["CURRENT", "PENDING", "PENDING_ACTIVATION", "LATEST", "PREVIOUS", "DEPRECATED"]), help=u"""The rotation state of the certificate version.""")
|
|
89
89
|
@json_skeleton_utils.get_cli_json_input_option({})
|
|
90
90
|
@cli_util.help_option
|
|
91
91
|
@click.pass_context
|
|
@@ -112,9 +112,9 @@ def get_certificate_authority_bundle(ctx, from_json, certificate_authority_id, v
|
|
|
112
112
|
cli_util.render_response(result, ctx)
|
|
113
113
|
|
|
114
114
|
|
|
115
|
-
@certificate_bundle_group.command(name=cli_util.override('certificates.get_certificate_bundle.command_name', 'get'), help=u"""Gets a certificate bundle that matches either the specified `stage`, `versionName`, or `versionNumber` parameter. If none of these parameters are provided, the bundle for the certificate version marked as `CURRENT`
|
|
115
|
+
@certificate_bundle_group.command(name=cli_util.override('certificates.get_certificate_bundle.command_name', 'get'), help=u"""Gets a certificate bundle that matches either the specified `stage`, `versionName`, or `versionNumber` parameter. If none of these parameters are provided, the bundle for the certificate version marked as `CURRENT` is returned.
|
|
116
116
|
|
|
117
|
-
By default, the private key is not included in the query result, and
|
|
117
|
+
By default, the private key is not included in the query result, and only the certificate bundle is returned. If you also need the private key, you can use the parameter `CertificateBundleTypeQueryParam` to indicate that you want a certificate bundle along with its private key as a response to your request. \n[Command Reference](getCertificateBundle)""")
|
|
118
118
|
@cli_util.option('--certificate-id', required=True, help=u"""The OCID of the certificate.""")
|
|
119
119
|
@cli_util.option('--version-number', type=click.INT, help=u"""The version number of the certificate. The default value is 0, which means that this query parameter is ignored.""")
|
|
120
120
|
@cli_util.option('--certificate-version-name', help=u"""The name of the certificate. (This might be referred to as the name of the certificate version, as every certificate consists of at least one version.) Names are unique across versions of a given certificate.""")
|
|
@@ -148,7 +148,7 @@ def get_certificate_bundle(ctx, from_json, certificate_id, version_number, certi
|
|
|
148
148
|
cli_util.render_response(result, ctx)
|
|
149
149
|
|
|
150
150
|
|
|
151
|
-
@certificate_authority_bundle_version_summary_group.command(name=cli_util.override('certificates.list_certificate_authority_bundle_versions.command_name', 'list-certificate-authority-bundle-versions'), help=u"""Lists all
|
|
151
|
+
@certificate_authority_bundle_version_summary_group.command(name=cli_util.override('certificates.list_certificate_authority_bundle_versions.command_name', 'list-certificate-authority-bundle-versions'), help=u"""Lists all versions of bundles for a given certificate authority (CA). \n[Command Reference](listCertificateAuthorityBundleVersions)""")
|
|
152
152
|
@cli_util.option('--certificate-authority-id', required=True, help=u"""The OCID of the certificate authority (CA).""")
|
|
153
153
|
@cli_util.option('--sort-by', type=custom_types.CliCaseInsensitiveChoice(["VERSION_NUMBER"]), help=u"""The field to sort by. You can specify only one sort order. The default order for `VERSION_NUMBER` is ascending.""")
|
|
154
154
|
@cli_util.option('--sort-order', type=custom_types.CliCaseInsensitiveChoice(["ASC", "DESC"]), help=u"""The sort order to use, either ascending (`ASC`) or descending (`DESC`).""")
|
|
@@ -637,3 +637,129 @@ def update_certificate_authority_update_subordinate_ca_issued_by_internal_ca_con
|
|
|
637
637
|
def update_certificate_extended(ctx, **kwargs):
|
|
638
638
|
|
|
639
639
|
ctx.invoke(certificatesmanagement_cli.update_certificate, **kwargs)
|
|
640
|
+
|
|
641
|
+
|
|
642
|
+
# oci certs-mgmt certificate-authority create-certificate-authority-create-root-ca-managed-externally-config-details -> oci certs-mgmt certificate-authority create-root-ca-managed-externally
|
|
643
|
+
cli_util.rename_command(certificatesmanagement_cli, certificatesmanagement_cli.certificate_authority_group, certificatesmanagement_cli.create_certificate_authority_create_root_ca_managed_externally_config_details, "create-root-ca-managed-externally")
|
|
644
|
+
|
|
645
|
+
|
|
646
|
+
# oci certs-mgmt certificate-authority create-certificate-authority-create-subordinate-ca-managed-internally-issued-by-external-ca-config-details -> oci certs-mgmt certificate-authority create-subordinate-ca-managed-internally-issued-by-external-ca
|
|
647
|
+
cli_util.rename_command(certificatesmanagement_cli, certificatesmanagement_cli.certificate_authority_group, certificatesmanagement_cli.create_certificate_authority_create_subordinate_ca_managed_internally_issued_by_external_ca_config_details, "create-subordinate-ca-managed-internally-issued-by-external-ca")
|
|
648
|
+
|
|
649
|
+
|
|
650
|
+
# oci certs-mgmt certificate-authority update-certificate-authority-update-root-ca-managed-externally-config-details -> oci certs-mgmt certificate-authority update-root-ca-managed-externally
|
|
651
|
+
cli_util.rename_command(certificatesmanagement_cli, certificatesmanagement_cli.certificate_authority_group, certificatesmanagement_cli.update_certificate_authority_update_root_ca_managed_externally_config_details, "update-root-ca-managed-externally")
|
|
652
|
+
|
|
653
|
+
|
|
654
|
+
# oci certs-mgmt certificate-authority update-certificate-authority-update-subordinate-ca-managed-internally-issued-by-external-ca-config-details -> oci certs-mgmt certificate-authority update-subordinate-ca-managed-internally-issued-by-external-ca
|
|
655
|
+
cli_util.rename_command(certificatesmanagement_cli, certificatesmanagement_cli.certificate_authority_group, certificatesmanagement_cli.update_certificate_authority_update_subordinate_ca_managed_internally_issued_by_external_ca_config_details, "update-subordinate-ca-managed-internally-issued-by-external-ca")
|
|
656
|
+
|
|
657
|
+
|
|
658
|
+
@cli_util.copy_params_from_generated_command(certificatesmanagement_cli.create_certificate_authority_create_root_ca_managed_externally_config_details, params_to_exclude=['certificate_authority_config_version_name', 'certificate_authority_config_certificate_pem'])
|
|
659
|
+
@certificatesmanagement_cli.certificate_authority_group.command(name=certificatesmanagement_cli.create_certificate_authority_create_root_ca_managed_externally_config_details.name, help=certificatesmanagement_cli.create_certificate_authority_create_root_ca_managed_externally_config_details.help)
|
|
660
|
+
@cli_util.option('--version-name', help=u"""The name of the CA version. When the value is not null, a name is unique across versions of a given CA.""")
|
|
661
|
+
@cli_util.option('--certificate-pem', required=True, help=u"""The externally signed certificate (in PEM format) for the imported root CA. [required]""")
|
|
662
|
+
@click.pass_context
|
|
663
|
+
@json_skeleton_utils.json_skeleton_generation_handler(input_params_to_complex_types={'certificate-authority-rules': {'module': 'certificates_management', 'class': 'list[CertificateAuthorityRule]'}, 'certificate-revocation-list-details': {'module': 'certificates_management', 'class': 'CertificateRevocationListDetails'}, 'freeform-tags': {'module': 'certificates_management', 'class': 'dict(str, string)'}, 'defined-tags': {'module': 'certificates_management', 'class': 'dict(str, dict(str, object))'}}, output_type={'module': 'certificates_management', 'class': 'CertificateAuthority'})
|
|
664
|
+
@cli_util.wrap_exceptions
|
|
665
|
+
def create_certificate_authority_create_root_ca_managed_externally_config_details_extended(ctx, **kwargs):
|
|
666
|
+
|
|
667
|
+
if 'version_name' in kwargs:
|
|
668
|
+
kwargs['certificate_authority_config_version_name'] = kwargs['version_name']
|
|
669
|
+
kwargs.pop('version_name')
|
|
670
|
+
|
|
671
|
+
if 'certificate_pem' in kwargs:
|
|
672
|
+
kwargs['certificate_authority_config_certificate_pem'] = kwargs['certificate_pem']
|
|
673
|
+
kwargs.pop('certificate_pem')
|
|
674
|
+
|
|
675
|
+
ctx.invoke(certificatesmanagement_cli.create_certificate_authority_create_root_ca_managed_externally_config_details, **kwargs)
|
|
676
|
+
|
|
677
|
+
|
|
678
|
+
@cli_util.copy_params_from_generated_command(certificatesmanagement_cli.create_certificate_authority_create_subordinate_ca_managed_internally_issued_by_external_ca_config_details, params_to_exclude=['certificate_authority_config_version_name', 'certificate_authority_config_issuer_certificate_authority_id', 'certificate_authority_config_signing_algorithm', 'certificate_authority_config_subject'])
|
|
679
|
+
@certificatesmanagement_cli.certificate_authority_group.command(name=certificatesmanagement_cli.create_certificate_authority_create_subordinate_ca_managed_internally_issued_by_external_ca_config_details.name, help=certificatesmanagement_cli.create_certificate_authority_create_subordinate_ca_managed_internally_issued_by_external_ca_config_details.help)
|
|
680
|
+
@cli_util.option('--version-name', help=u"""The name of the CA version. When the value is not null, a name is unique across versions of a given CA.""")
|
|
681
|
+
@cli_util.option('--issuer-certificate-authority-id', required=True, help=u"""The OCID of the private, external issuer CA. [required]""")
|
|
682
|
+
@cli_util.option('--signing-algorithm', type=custom_types.CliCaseInsensitiveChoice(["SHA256_WITH_RSA", "SHA384_WITH_RSA", "SHA512_WITH_RSA", "SHA256_WITH_ECDSA", "SHA384_WITH_ECDSA", "SHA512_WITH_ECDSA"]), help=u"""The algorithm used to sign public key certificates that the CA issues.""")
|
|
683
|
+
@cli_util.option('--subject', required=True, type=custom_types.CLI_COMPLEX_TYPE, help=u"""This is a complex type whose value must be valid JSON. The value can be provided as a string on the command line or passed in as a file using
|
|
684
|
+
the file://path/to/file syntax.
|
|
685
|
+
|
|
686
|
+
The --generate-param-json-input option can be used to generate an example of the JSON which must be provided. We recommend storing this example
|
|
687
|
+
in a file, modifying it as needed and then passing it back in via the file:// syntax.
|
|
688
|
+
[required]""")
|
|
689
|
+
@click.pass_context
|
|
690
|
+
@json_skeleton_utils.json_skeleton_generation_handler(input_params_to_complex_types={'certificate-authority-rules': {'module': 'certificates_management', 'class': 'list[CertificateAuthorityRule]'}, 'certificate-revocation-list-details': {'module': 'certificates_management', 'class': 'CertificateRevocationListDetails'}, 'freeform-tags': {'module': 'certificates_management', 'class': 'dict(str, string)'}, 'defined-tags': {'module': 'certificates_management', 'class': 'dict(str, dict(str, object))'}, 'subject': {'module': 'certificates_management', 'class': 'CertificateSubject'}}, output_type={'module': 'certificates_management', 'class': 'CertificateAuthority'})
|
|
691
|
+
@cli_util.wrap_exceptions
|
|
692
|
+
def create_certificate_authority_create_subordinate_ca_managed_internally_issued_by_external_ca_config_details_extended(ctx, **kwargs):
|
|
693
|
+
|
|
694
|
+
if 'version_name' in kwargs:
|
|
695
|
+
kwargs['certificate_authority_config_version_name'] = kwargs['version_name']
|
|
696
|
+
kwargs.pop('version_name')
|
|
697
|
+
|
|
698
|
+
if 'issuer_certificate_authority_id' in kwargs:
|
|
699
|
+
kwargs['certificate_authority_config_issuer_certificate_authority_id'] = kwargs['issuer_certificate_authority_id']
|
|
700
|
+
kwargs.pop('issuer_certificate_authority_id')
|
|
701
|
+
|
|
702
|
+
if 'signing_algorithm' in kwargs:
|
|
703
|
+
kwargs['certificate_authority_config_signing_algorithm'] = kwargs['signing_algorithm']
|
|
704
|
+
kwargs.pop('signing_algorithm')
|
|
705
|
+
|
|
706
|
+
if 'subject' in kwargs:
|
|
707
|
+
kwargs['certificate_authority_config_subject'] = kwargs['subject']
|
|
708
|
+
kwargs.pop('subject')
|
|
709
|
+
|
|
710
|
+
ctx.invoke(certificatesmanagement_cli.create_certificate_authority_create_subordinate_ca_managed_internally_issued_by_external_ca_config_details, **kwargs)
|
|
711
|
+
|
|
712
|
+
|
|
713
|
+
@cli_util.copy_params_from_generated_command(certificatesmanagement_cli.update_certificate_authority_update_root_ca_managed_externally_config_details, params_to_exclude=['certificate_authority_config_version_name', 'certificate_authority_config_stage', 'certificate_authority_config_certificate_pem'])
|
|
714
|
+
@certificatesmanagement_cli.certificate_authority_group.command(name=certificatesmanagement_cli.update_certificate_authority_update_root_ca_managed_externally_config_details.name, help=certificatesmanagement_cli.update_certificate_authority_update_root_ca_managed_externally_config_details.help)
|
|
715
|
+
@cli_util.option('--version-name', help=u"""The name of the CA version. When the value is not null, a name is unique across versions of a given CA.""")
|
|
716
|
+
@cli_util.option('--stage', type=custom_types.CliCaseInsensitiveChoice(["CURRENT", "PENDING"]), help=u"""The rotation state of the CA. The default is `PENDING`, meaning that the CA is staged and available for use. A CA version that you mark as `CURRENT` is currently in use, but you don't yet want to rotate it into current, active use. For example, you might create or update a CA and mark its rotation state as `PENDING` if you haven't yet updated the certificate on the target system.""")
|
|
717
|
+
@cli_util.option('--certificate-pem', required=True, help=u"""The externally signed certificate (in PEM format) for the CA. [required]""")
|
|
718
|
+
@click.pass_context
|
|
719
|
+
@json_skeleton_utils.json_skeleton_generation_handler(input_params_to_complex_types={'certificate-revocation-list-details': {'module': 'certificates_management', 'class': 'CertificateRevocationListDetails'}, 'freeform-tags': {'module': 'certificates_management', 'class': 'dict(str, string)'}, 'defined-tags': {'module': 'certificates_management', 'class': 'dict(str, dict(str, object))'}, 'certificate-authority-rules': {'module': 'certificates_management', 'class': 'list[CertificateAuthorityRule]'}}, output_type={'module': 'certificates_management', 'class': 'CertificateAuthority'})
|
|
720
|
+
@cli_util.wrap_exceptions
|
|
721
|
+
def update_certificate_authority_update_root_ca_managed_externally_config_details_extended(ctx, **kwargs):
|
|
722
|
+
|
|
723
|
+
if 'version_name' in kwargs:
|
|
724
|
+
kwargs['certificate_authority_config_version_name'] = kwargs['version_name']
|
|
725
|
+
kwargs.pop('version_name')
|
|
726
|
+
|
|
727
|
+
if 'stage' in kwargs:
|
|
728
|
+
kwargs['certificate_authority_config_stage'] = kwargs['stage']
|
|
729
|
+
kwargs.pop('stage')
|
|
730
|
+
|
|
731
|
+
if 'certificate_pem' in kwargs:
|
|
732
|
+
kwargs['certificate_authority_config_certificate_pem'] = kwargs['certificate_pem']
|
|
733
|
+
kwargs.pop('certificate_pem')
|
|
734
|
+
|
|
735
|
+
ctx.invoke(certificatesmanagement_cli.update_certificate_authority_update_root_ca_managed_externally_config_details, **kwargs)
|
|
736
|
+
|
|
737
|
+
|
|
738
|
+
@cli_util.copy_params_from_generated_command(certificatesmanagement_cli.update_certificate_authority_update_subordinate_ca_managed_internally_issued_by_external_ca_config_details, params_to_exclude=['certificate_authority_config_version_name', 'certificate_authority_config_stage', 'certificate_authority_config_action_details'])
|
|
739
|
+
@certificatesmanagement_cli.certificate_authority_group.command(name=certificatesmanagement_cli.update_certificate_authority_update_subordinate_ca_managed_internally_issued_by_external_ca_config_details.name, help=certificatesmanagement_cli.update_certificate_authority_update_subordinate_ca_managed_internally_issued_by_external_ca_config_details.help)
|
|
740
|
+
@cli_util.option('--version-name', help=u"""The name of the CA version. When the value is not null, a name is unique across versions of a given CA.""")
|
|
741
|
+
@cli_util.option('--stage', type=custom_types.CliCaseInsensitiveChoice(["CURRENT", "PENDING"]), help=u"""The rotation state of the CA. The default is `PENDING`, meaning that the CA is staged and available for use. A CA version that you mark as `CURRENT` is currently in use, but you don't yet want to rotate it into current, active use. For example, you might create or update a CA and mark its rotation state as `PENDING` if you haven't yet updated the certificate on the target system.""")
|
|
742
|
+
@cli_util.option('--action-details', required=True, type=custom_types.CLI_COMPLEX_TYPE, help=u"""This is a complex type whose value must be valid JSON. The value can be provided as a string on the command line or passed in as a file using
|
|
743
|
+
the file://path/to/file syntax.
|
|
744
|
+
|
|
745
|
+
The --generate-param-json-input option can be used to generate an example of the JSON which must be provided. We recommend storing this example
|
|
746
|
+
in a file, modifying it as needed and then passing it back in via the file:// syntax.
|
|
747
|
+
[required]""")
|
|
748
|
+
@click.pass_context
|
|
749
|
+
@json_skeleton_utils.json_skeleton_generation_handler(input_params_to_complex_types={'certificate-revocation-list-details': {'module': 'certificates_management', 'class': 'CertificateRevocationListDetails'}, 'freeform-tags': {'module': 'certificates_management', 'class': 'dict(str, string)'}, 'defined-tags': {'module': 'certificates_management', 'class': 'dict(str, dict(str, object))'}, 'certificate-authority-rules': {'module': 'certificates_management', 'class': 'list[CertificateAuthorityRule]'}, 'action-details': {'module': 'certificates_management', 'class': 'UpdateCertificateAuthorityActionDetails'}}, output_type={'module': 'certificates_management', 'class': 'CertificateAuthority'})
|
|
750
|
+
@cli_util.wrap_exceptions
|
|
751
|
+
def update_certificate_authority_update_subordinate_ca_managed_internally_issued_by_external_ca_config_details_extended(ctx, **kwargs):
|
|
752
|
+
|
|
753
|
+
if 'version_name' in kwargs:
|
|
754
|
+
kwargs['certificate_authority_config_version_name'] = kwargs['version_name']
|
|
755
|
+
kwargs.pop('version_name')
|
|
756
|
+
|
|
757
|
+
if 'stage' in kwargs:
|
|
758
|
+
kwargs['certificate_authority_config_stage'] = kwargs['stage']
|
|
759
|
+
kwargs.pop('stage')
|
|
760
|
+
|
|
761
|
+
if 'action_details' in kwargs:
|
|
762
|
+
kwargs['certificate_authority_config_action_details'] = kwargs['action_details']
|
|
763
|
+
kwargs.pop('action_details')
|
|
764
|
+
|
|
765
|
+
ctx.invoke(certificatesmanagement_cli.update_certificate_authority_update_subordinate_ca_managed_internally_issued_by_external_ca_config_details, **kwargs)
|