tccli-intl-en 3.0.1278.1__py2.py3-none-any.whl → 3.0.1280.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/cynosdb/cynosdb_client.py +858 -169
- tccli/services/cynosdb/v20190107/api.json +11544 -8343
- tccli/services/cynosdb/v20190107/examples.json +104 -0
- tccli/services/monitor/v20180724/api.json +8 -8
- tccli/services/monitor/v20180724/examples.json +112 -4
- tccli/services/teo/teo_client.py +166 -7
- tccli/services/teo/v20220901/api.json +285 -0
- tccli/services/teo/v20220901/examples.json +24 -0
- tccli/services/trtc/v20190722/api.json +6 -6
- tccli/services/trtc/v20190722/examples.json +7 -7
- {tccli_intl_en-3.0.1278.1.dist-info → tccli_intl_en-3.0.1280.1.dist-info}/METADATA +2 -2
- {tccli_intl_en-3.0.1278.1.dist-info → tccli_intl_en-3.0.1280.1.dist-info}/RECORD +17 -17
- {tccli_intl_en-3.0.1278.1.dist-info → tccli_intl_en-3.0.1280.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.0.1278.1.dist-info → tccli_intl_en-3.0.1280.1.dist-info}/WHEEL +0 -0
- {tccli_intl_en-3.0.1278.1.dist-info → tccli_intl_en-3.0.1280.1.dist-info}/entry_points.txt +0 -0
- {tccli_intl_en-3.0.1278.1.dist-info → tccli_intl_en-3.0.1280.1.dist-info}/top_level.txt +0 -0
tccli/services/teo/teo_client.py
CHANGED
|
@@ -1111,6 +1111,58 @@ def doModifyDDoSPolicyHost(args, parsed_globals):
|
|
|
1111
1111
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1112
1112
|
|
|
1113
1113
|
|
|
1114
|
+
def doModifyMultiPathGatewayStatus(args, parsed_globals):
|
|
1115
|
+
g_param = parse_global_arg(parsed_globals)
|
|
1116
|
+
|
|
1117
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1118
|
+
cred = credential.CVMRoleCredential()
|
|
1119
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1120
|
+
cred = credential.STSAssumeRoleCredential(
|
|
1121
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1122
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1123
|
+
)
|
|
1124
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1125
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1126
|
+
else:
|
|
1127
|
+
cred = credential.Credential(
|
|
1128
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1129
|
+
)
|
|
1130
|
+
http_profile = HttpProfile(
|
|
1131
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1132
|
+
reqMethod="POST",
|
|
1133
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1134
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1135
|
+
)
|
|
1136
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1137
|
+
if g_param[OptionsDefine.Language]:
|
|
1138
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
1139
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1140
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1141
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
1142
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1143
|
+
model = models.ModifyMultiPathGatewayStatusRequest()
|
|
1144
|
+
model.from_json_string(json.dumps(args))
|
|
1145
|
+
start_time = time.time()
|
|
1146
|
+
while True:
|
|
1147
|
+
rsp = client.ModifyMultiPathGatewayStatus(model)
|
|
1148
|
+
result = rsp.to_json_string()
|
|
1149
|
+
try:
|
|
1150
|
+
json_obj = json.loads(result)
|
|
1151
|
+
except TypeError as e:
|
|
1152
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1153
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1154
|
+
break
|
|
1155
|
+
cur_time = time.time()
|
|
1156
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1157
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1158
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1159
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1160
|
+
else:
|
|
1161
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1162
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1163
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1164
|
+
|
|
1165
|
+
|
|
1114
1166
|
def doIdentifyZone(args, parsed_globals):
|
|
1115
1167
|
g_param = parse_global_arg(parsed_globals)
|
|
1116
1168
|
|
|
@@ -4751,7 +4803,7 @@ def doDescribeOriginGroup(args, parsed_globals):
|
|
|
4751
4803
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4752
4804
|
|
|
4753
4805
|
|
|
4754
|
-
def
|
|
4806
|
+
def doDescribeTimingL4Data(args, parsed_globals):
|
|
4755
4807
|
g_param = parse_global_arg(parsed_globals)
|
|
4756
4808
|
|
|
4757
4809
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4780,11 +4832,11 @@ def doDescribeTopL7CacheData(args, parsed_globals):
|
|
|
4780
4832
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4781
4833
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4782
4834
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4783
|
-
model = models.
|
|
4835
|
+
model = models.DescribeTimingL4DataRequest()
|
|
4784
4836
|
model.from_json_string(json.dumps(args))
|
|
4785
4837
|
start_time = time.time()
|
|
4786
4838
|
while True:
|
|
4787
|
-
rsp = client.
|
|
4839
|
+
rsp = client.DescribeTimingL4Data(model)
|
|
4788
4840
|
result = rsp.to_json_string()
|
|
4789
4841
|
try:
|
|
4790
4842
|
json_obj = json.loads(result)
|
|
@@ -4803,7 +4855,7 @@ def doDescribeTopL7CacheData(args, parsed_globals):
|
|
|
4803
4855
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4804
4856
|
|
|
4805
4857
|
|
|
4806
|
-
def
|
|
4858
|
+
def doDescribeTopL7CacheData(args, parsed_globals):
|
|
4807
4859
|
g_param = parse_global_arg(parsed_globals)
|
|
4808
4860
|
|
|
4809
4861
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4832,11 +4884,11 @@ def doDescribeTimingL4Data(args, parsed_globals):
|
|
|
4832
4884
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4833
4885
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4834
4886
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4835
|
-
model = models.
|
|
4887
|
+
model = models.DescribeTopL7CacheDataRequest()
|
|
4836
4888
|
model.from_json_string(json.dumps(args))
|
|
4837
4889
|
start_time = time.time()
|
|
4838
4890
|
while True:
|
|
4839
|
-
rsp = client.
|
|
4891
|
+
rsp = client.DescribeTopL7CacheData(model)
|
|
4840
4892
|
result = rsp.to_json_string()
|
|
4841
4893
|
try:
|
|
4842
4894
|
json_obj = json.loads(result)
|
|
@@ -6415,6 +6467,58 @@ def doDescribeDnssec(args, parsed_globals):
|
|
|
6415
6467
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6416
6468
|
|
|
6417
6469
|
|
|
6470
|
+
def doConfirmMultiPathGatewayOriginACL(args, parsed_globals):
|
|
6471
|
+
g_param = parse_global_arg(parsed_globals)
|
|
6472
|
+
|
|
6473
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
6474
|
+
cred = credential.CVMRoleCredential()
|
|
6475
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
6476
|
+
cred = credential.STSAssumeRoleCredential(
|
|
6477
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
6478
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
6479
|
+
)
|
|
6480
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
6481
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
6482
|
+
else:
|
|
6483
|
+
cred = credential.Credential(
|
|
6484
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
6485
|
+
)
|
|
6486
|
+
http_profile = HttpProfile(
|
|
6487
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
6488
|
+
reqMethod="POST",
|
|
6489
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
6490
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
6491
|
+
)
|
|
6492
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
6493
|
+
if g_param[OptionsDefine.Language]:
|
|
6494
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
6495
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
6496
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
6497
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
6498
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
6499
|
+
model = models.ConfirmMultiPathGatewayOriginACLRequest()
|
|
6500
|
+
model.from_json_string(json.dumps(args))
|
|
6501
|
+
start_time = time.time()
|
|
6502
|
+
while True:
|
|
6503
|
+
rsp = client.ConfirmMultiPathGatewayOriginACL(model)
|
|
6504
|
+
result = rsp.to_json_string()
|
|
6505
|
+
try:
|
|
6506
|
+
json_obj = json.loads(result)
|
|
6507
|
+
except TypeError as e:
|
|
6508
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
6509
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
6510
|
+
break
|
|
6511
|
+
cur_time = time.time()
|
|
6512
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
6513
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
6514
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
6515
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
6516
|
+
else:
|
|
6517
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
6518
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
6519
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
6520
|
+
|
|
6521
|
+
|
|
6418
6522
|
def doDescribeSecurityJSInjectionRule(args, parsed_globals):
|
|
6419
6523
|
g_param = parse_global_arg(parsed_globals)
|
|
6420
6524
|
|
|
@@ -9431,6 +9535,58 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
|
9431
9535
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
9432
9536
|
|
|
9433
9537
|
|
|
9538
|
+
def doDescribeMultiPathGatewayOriginACL(args, parsed_globals):
|
|
9539
|
+
g_param = parse_global_arg(parsed_globals)
|
|
9540
|
+
|
|
9541
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
9542
|
+
cred = credential.CVMRoleCredential()
|
|
9543
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
9544
|
+
cred = credential.STSAssumeRoleCredential(
|
|
9545
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9546
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9547
|
+
)
|
|
9548
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9549
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9550
|
+
else:
|
|
9551
|
+
cred = credential.Credential(
|
|
9552
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
9553
|
+
)
|
|
9554
|
+
http_profile = HttpProfile(
|
|
9555
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
9556
|
+
reqMethod="POST",
|
|
9557
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
9558
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
9559
|
+
)
|
|
9560
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
9561
|
+
if g_param[OptionsDefine.Language]:
|
|
9562
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
9563
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
9564
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
9565
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
9566
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
9567
|
+
model = models.DescribeMultiPathGatewayOriginACLRequest()
|
|
9568
|
+
model.from_json_string(json.dumps(args))
|
|
9569
|
+
start_time = time.time()
|
|
9570
|
+
while True:
|
|
9571
|
+
rsp = client.DescribeMultiPathGatewayOriginACL(model)
|
|
9572
|
+
result = rsp.to_json_string()
|
|
9573
|
+
try:
|
|
9574
|
+
json_obj = json.loads(result)
|
|
9575
|
+
except TypeError as e:
|
|
9576
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
9577
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
9578
|
+
break
|
|
9579
|
+
cur_time = time.time()
|
|
9580
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
9581
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
9582
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
9583
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
9584
|
+
else:
|
|
9585
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
9586
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
9587
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
9588
|
+
|
|
9589
|
+
|
|
9434
9590
|
def doDescribeJustInTimeTranscodeTemplates(args, parsed_globals):
|
|
9435
9591
|
g_param = parse_global_arg(parsed_globals)
|
|
9436
9592
|
|
|
@@ -12429,6 +12585,7 @@ ACTION_MAP = {
|
|
|
12429
12585
|
"DeleteFunctionRules": doDeleteFunctionRules,
|
|
12430
12586
|
"CreateLoadBalancing": doCreateLoadBalancing,
|
|
12431
12587
|
"ModifyDDoSPolicyHost": doModifyDDoSPolicyHost,
|
|
12588
|
+
"ModifyMultiPathGatewayStatus": doModifyMultiPathGatewayStatus,
|
|
12432
12589
|
"IdentifyZone": doIdentifyZone,
|
|
12433
12590
|
"DescribeDefaultCertificates": doDescribeDefaultCertificates,
|
|
12434
12591
|
"ModifyL7AccRule": doModifyL7AccRule,
|
|
@@ -12499,8 +12656,8 @@ ACTION_MAP = {
|
|
|
12499
12656
|
"DescribeSecurityIPGroup": doDescribeSecurityIPGroup,
|
|
12500
12657
|
"CreateL4ProxyRules": doCreateL4ProxyRules,
|
|
12501
12658
|
"DescribeOriginGroup": doDescribeOriginGroup,
|
|
12502
|
-
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
|
12503
12659
|
"DescribeTimingL4Data": doDescribeTimingL4Data,
|
|
12660
|
+
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
|
12504
12661
|
"ScanDnsRecords": doScanDnsRecords,
|
|
12505
12662
|
"ModifyRule": doModifyRule,
|
|
12506
12663
|
"DescribeMultiPathGateways": doDescribeMultiPathGateways,
|
|
@@ -12531,6 +12688,7 @@ ACTION_MAP = {
|
|
|
12531
12688
|
"ModifyMultiPathGateway": doModifyMultiPathGateway,
|
|
12532
12689
|
"CreateSharedCNAME": doCreateSharedCNAME,
|
|
12533
12690
|
"DescribeDnssec": doDescribeDnssec,
|
|
12691
|
+
"ConfirmMultiPathGatewayOriginACL": doConfirmMultiPathGatewayOriginACL,
|
|
12534
12692
|
"DescribeSecurityJSInjectionRule": doDescribeSecurityJSInjectionRule,
|
|
12535
12693
|
"CreateRule": doCreateRule,
|
|
12536
12694
|
"CreateConfigGroupVersion": doCreateConfigGroupVersion,
|
|
@@ -12589,6 +12747,7 @@ ACTION_MAP = {
|
|
|
12589
12747
|
"EnableOriginACL": doEnableOriginACL,
|
|
12590
12748
|
"ModifyAliasDomain": doModifyAliasDomain,
|
|
12591
12749
|
"CreateLoadBalancer": doCreateLoadBalancer,
|
|
12750
|
+
"DescribeMultiPathGatewayOriginACL": doDescribeMultiPathGatewayOriginACL,
|
|
12592
12751
|
"DescribeJustInTimeTranscodeTemplates": doDescribeJustInTimeTranscodeTemplates,
|
|
12593
12752
|
"ModifyApplicationProxyRule": doModifyApplicationProxyRule,
|
|
12594
12753
|
"DescribeL7AccSetting": doDescribeL7AccSetting,
|
|
@@ -28,6 +28,13 @@
|
|
|
28
28
|
"output": "CheckCnameStatusResponse",
|
|
29
29
|
"status": "online"
|
|
30
30
|
},
|
|
31
|
+
"ConfirmMultiPathGatewayOriginACL": {
|
|
32
|
+
"document": "This API is used to confirm the latest origin IP range is updated to the origin server firewall when the multi-channel security acceleration gateway's origin IP range changes.",
|
|
33
|
+
"input": "ConfirmMultiPathGatewayOriginACLRequest",
|
|
34
|
+
"name": "Confirm multi-channel SCDN gateway origin IP range update",
|
|
35
|
+
"output": "ConfirmMultiPathGatewayOriginACLResponse",
|
|
36
|
+
"status": "online"
|
|
37
|
+
},
|
|
31
38
|
"ConfirmOriginACLUpdate": {
|
|
32
39
|
"document": "This API is used to confirm that the latest origin ACLs have been updated to the origin server firewall when the origin ACLs change. After confirming the update to the latest version, related change notifications will stop pushing.",
|
|
33
40
|
"input": "ConfirmOriginACLUpdateRequest",
|
|
@@ -693,6 +700,13 @@
|
|
|
693
700
|
"output": "DescribeMultiPathGatewayLineResponse",
|
|
694
701
|
"status": "online"
|
|
695
702
|
},
|
|
703
|
+
"DescribeMultiPathGatewayOriginACL": {
|
|
704
|
+
"document": "This API is used to query the binding relationship between a multi-channel security acceleration gateway instance and the origin server IP range, as well as the IP range details. If the MultiPathGatewayNextOriginACL field has a return value, the latest origin server IP range must be synchronized to the origin server firewall configuration.",
|
|
705
|
+
"input": "DescribeMultiPathGatewayOriginACLRequest",
|
|
706
|
+
"name": "Query multi-channel SCDN gateway origin server protection detail",
|
|
707
|
+
"output": "DescribeMultiPathGatewayOriginACLResponse",
|
|
708
|
+
"status": "online"
|
|
709
|
+
},
|
|
696
710
|
"DescribeMultiPathGatewayRegions": {
|
|
697
711
|
"document": "This API is used to query the list of available regions for user-created multi-channel security acceleration gateways (Cloud Gateway).",
|
|
698
712
|
"input": "DescribeMultiPathGatewayRegionsRequest",
|
|
@@ -1190,6 +1204,13 @@
|
|
|
1190
1204
|
"output": "ModifyMultiPathGatewaySecretKeyResponse",
|
|
1191
1205
|
"status": "online"
|
|
1192
1206
|
},
|
|
1207
|
+
"ModifyMultiPathGatewayStatus": {
|
|
1208
|
+
"document": "This API is used to update the status of a multi-channel security gateway.",
|
|
1209
|
+
"input": "ModifyMultiPathGatewayStatusRequest",
|
|
1210
|
+
"name": "Modify the multi-channel security acceleration gateway status",
|
|
1211
|
+
"output": "ModifyMultiPathGatewayStatusResponse",
|
|
1212
|
+
"status": "online"
|
|
1213
|
+
},
|
|
1193
1214
|
"ModifyOriginACL": {
|
|
1194
1215
|
"document": "This API is used to enable or disable specific origin ACLs for L7 acceleration domain names or L4 proxy instances. A single submission supports up to 200 L7 acceleration domain names or 100 L4 proxy instances. Hybrid submissions of L7 acceleration domain names and L4 proxy instances are supported, with a maximum total number of instances of 200. If changes are needed for exceeding 200 instances, submit them in batches via this API.",
|
|
1195
1216
|
"input": "ModifyOriginACLRequest",
|
|
@@ -5084,6 +5105,51 @@
|
|
|
5084
5105
|
],
|
|
5085
5106
|
"usage": "both"
|
|
5086
5107
|
},
|
|
5108
|
+
"ConfirmMultiPathGatewayOriginACLRequest": {
|
|
5109
|
+
"document": "ConfirmMultiPathGatewayOriginACL request structure.",
|
|
5110
|
+
"members": [
|
|
5111
|
+
{
|
|
5112
|
+
"disabled": false,
|
|
5113
|
+
"document": "Zone ID.",
|
|
5114
|
+
"example": "zone-27q0p0bal192",
|
|
5115
|
+
"member": "string",
|
|
5116
|
+
"name": "ZoneId",
|
|
5117
|
+
"required": true,
|
|
5118
|
+
"type": "string"
|
|
5119
|
+
},
|
|
5120
|
+
{
|
|
5121
|
+
"disabled": false,
|
|
5122
|
+
"document": "Gateway ID.",
|
|
5123
|
+
"example": "mpgw-lbxuhk1oh",
|
|
5124
|
+
"member": "string",
|
|
5125
|
+
"name": "GatewayId",
|
|
5126
|
+
"required": true,
|
|
5127
|
+
"type": "string"
|
|
5128
|
+
},
|
|
5129
|
+
{
|
|
5130
|
+
"disabled": false,
|
|
5131
|
+
"document": "Describes the version number of the origin server IP.",
|
|
5132
|
+
"example": "1",
|
|
5133
|
+
"member": "int64",
|
|
5134
|
+
"name": "OriginACLVersion",
|
|
5135
|
+
"required": true,
|
|
5136
|
+
"type": "int"
|
|
5137
|
+
}
|
|
5138
|
+
],
|
|
5139
|
+
"type": "object"
|
|
5140
|
+
},
|
|
5141
|
+
"ConfirmMultiPathGatewayOriginACLResponse": {
|
|
5142
|
+
"document": "ConfirmMultiPathGatewayOriginACL response structure.",
|
|
5143
|
+
"members": [
|
|
5144
|
+
{
|
|
5145
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
5146
|
+
"member": "string",
|
|
5147
|
+
"name": "RequestId",
|
|
5148
|
+
"type": "string"
|
|
5149
|
+
}
|
|
5150
|
+
],
|
|
5151
|
+
"type": "object"
|
|
5152
|
+
},
|
|
5087
5153
|
"ConfirmOriginACLUpdateRequest": {
|
|
5088
5154
|
"document": "ConfirmOriginACLUpdate request structure.",
|
|
5089
5155
|
"members": [
|
|
@@ -11870,6 +11936,52 @@
|
|
|
11870
11936
|
],
|
|
11871
11937
|
"type": "object"
|
|
11872
11938
|
},
|
|
11939
|
+
"DescribeMultiPathGatewayOriginACLRequest": {
|
|
11940
|
+
"document": "DescribeMultiPathGatewayOriginACL request structure.",
|
|
11941
|
+
"members": [
|
|
11942
|
+
{
|
|
11943
|
+
"disabled": false,
|
|
11944
|
+
"document": "Zone ID.",
|
|
11945
|
+
"example": "\"zone-276zs184g93m\"",
|
|
11946
|
+
"member": "string",
|
|
11947
|
+
"name": "ZoneId",
|
|
11948
|
+
"required": true,
|
|
11949
|
+
"type": "string"
|
|
11950
|
+
},
|
|
11951
|
+
{
|
|
11952
|
+
"disabled": false,
|
|
11953
|
+
"document": "Gateway ID.",
|
|
11954
|
+
"example": "\"mpgw-lbxuhk1oh\"",
|
|
11955
|
+
"member": "string",
|
|
11956
|
+
"name": "GatewayId",
|
|
11957
|
+
"required": true,
|
|
11958
|
+
"type": "string"
|
|
11959
|
+
}
|
|
11960
|
+
],
|
|
11961
|
+
"type": "object"
|
|
11962
|
+
},
|
|
11963
|
+
"DescribeMultiPathGatewayOriginACLResponse": {
|
|
11964
|
+
"document": "DescribeMultiPathGatewayOriginACL response structure.",
|
|
11965
|
+
"members": [
|
|
11966
|
+
{
|
|
11967
|
+
"disabled": false,
|
|
11968
|
+
"document": "Describes the binding relationship between the multi-channel gateway instance and the origin IP ranges.",
|
|
11969
|
+
"example": "无",
|
|
11970
|
+
"member": "MultiPathGatewayOriginACLInfo",
|
|
11971
|
+
"name": "MultiPathGatewayOriginACLInfo",
|
|
11972
|
+
"output_required": false,
|
|
11973
|
+
"type": "object",
|
|
11974
|
+
"value_allowed_null": false
|
|
11975
|
+
},
|
|
11976
|
+
{
|
|
11977
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
11978
|
+
"member": "string",
|
|
11979
|
+
"name": "RequestId",
|
|
11980
|
+
"type": "string"
|
|
11981
|
+
}
|
|
11982
|
+
],
|
|
11983
|
+
"type": "object"
|
|
11984
|
+
},
|
|
11873
11985
|
"DescribeMultiPathGatewayRegionsRequest": {
|
|
11874
11986
|
"document": "DescribeMultiPathGatewayRegions request structure.",
|
|
11875
11987
|
"members": [
|
|
@@ -20418,6 +20530,51 @@
|
|
|
20418
20530
|
],
|
|
20419
20531
|
"type": "object"
|
|
20420
20532
|
},
|
|
20533
|
+
"ModifyMultiPathGatewayStatusRequest": {
|
|
20534
|
+
"document": "ModifyMultiPathGatewayStatus request structure.",
|
|
20535
|
+
"members": [
|
|
20536
|
+
{
|
|
20537
|
+
"disabled": false,
|
|
20538
|
+
"document": "Gateway ID.",
|
|
20539
|
+
"example": "eo-gw-lb-ahk1js",
|
|
20540
|
+
"member": "string",
|
|
20541
|
+
"name": "GatewayId",
|
|
20542
|
+
"required": true,
|
|
20543
|
+
"type": "string"
|
|
20544
|
+
},
|
|
20545
|
+
{
|
|
20546
|
+
"disabled": false,
|
|
20547
|
+
"document": "Zone ID.",
|
|
20548
|
+
"example": "zone-27q0p0bal192",
|
|
20549
|
+
"member": "string",
|
|
20550
|
+
"name": "ZoneId",
|
|
20551
|
+
"required": true,
|
|
20552
|
+
"type": "string"
|
|
20553
|
+
},
|
|
20554
|
+
{
|
|
20555
|
+
"disabled": false,
|
|
20556
|
+
"document": "Modifies the enabled/disabled status of the gateway. valid values: <li> offline: disabled;</li> <li> online: enabled.</li>.",
|
|
20557
|
+
"example": "offline",
|
|
20558
|
+
"member": "string",
|
|
20559
|
+
"name": "GatewayStatus",
|
|
20560
|
+
"required": false,
|
|
20561
|
+
"type": "string"
|
|
20562
|
+
}
|
|
20563
|
+
],
|
|
20564
|
+
"type": "object"
|
|
20565
|
+
},
|
|
20566
|
+
"ModifyMultiPathGatewayStatusResponse": {
|
|
20567
|
+
"document": "ModifyMultiPathGatewayStatus response structure.",
|
|
20568
|
+
"members": [
|
|
20569
|
+
{
|
|
20570
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
20571
|
+
"member": "string",
|
|
20572
|
+
"name": "RequestId",
|
|
20573
|
+
"type": "string"
|
|
20574
|
+
}
|
|
20575
|
+
],
|
|
20576
|
+
"type": "object"
|
|
20577
|
+
},
|
|
20421
20578
|
"ModifyOriginACLRequest": {
|
|
20422
20579
|
"document": "ModifyOriginACL request structure.",
|
|
20423
20580
|
"members": [
|
|
@@ -21612,6 +21769,45 @@
|
|
|
21612
21769
|
],
|
|
21613
21770
|
"usage": "out"
|
|
21614
21771
|
},
|
|
21772
|
+
"MultiPathGatewayCurrentOriginACL": {
|
|
21773
|
+
"document": "Describes the currently effective IP range for origin servers.",
|
|
21774
|
+
"members": [
|
|
21775
|
+
{
|
|
21776
|
+
"disabled": false,
|
|
21777
|
+
"document": "Describes the IP range details for origin servers.",
|
|
21778
|
+
"example": "无",
|
|
21779
|
+
"member": "Addresses",
|
|
21780
|
+
"name": "EntireAddresses",
|
|
21781
|
+
"output_required": false,
|
|
21782
|
+
"required": false,
|
|
21783
|
+
"type": "object",
|
|
21784
|
+
"value_allowed_null": false
|
|
21785
|
+
},
|
|
21786
|
+
{
|
|
21787
|
+
"disabled": false,
|
|
21788
|
+
"document": "Specifies the version number.",
|
|
21789
|
+
"example": "1",
|
|
21790
|
+
"member": "int64",
|
|
21791
|
+
"name": "Version",
|
|
21792
|
+
"output_required": false,
|
|
21793
|
+
"required": false,
|
|
21794
|
+
"type": "int",
|
|
21795
|
+
"value_allowed_null": false
|
|
21796
|
+
},
|
|
21797
|
+
{
|
|
21798
|
+
"disabled": false,
|
|
21799
|
+
"document": "This parameter records whether \"i have updated to the latest origin IP range\" is completed before taking effect. valid values:.\n<li>true: confirms the update to the latest origin IP is completed.</li>.\n<li>false: indicates the update to the latest origin IP is not completed.</li>.\nNote: when false is returned for this parameter, please confirm in time whether your origin server firewall configuration has been updated to the latest IP range to avoid origin-pull failure.",
|
|
21800
|
+
"example": "false",
|
|
21801
|
+
"member": "string",
|
|
21802
|
+
"name": "IsPlaned",
|
|
21803
|
+
"output_required": false,
|
|
21804
|
+
"required": false,
|
|
21805
|
+
"type": "string",
|
|
21806
|
+
"value_allowed_null": false
|
|
21807
|
+
}
|
|
21808
|
+
],
|
|
21809
|
+
"usage": "both"
|
|
21810
|
+
},
|
|
21615
21811
|
"MultiPathGatewayLine": {
|
|
21616
21812
|
"document": "Multi-Channel security gateway line information.",
|
|
21617
21813
|
"members": [
|
|
@@ -21668,6 +21864,95 @@
|
|
|
21668
21864
|
],
|
|
21669
21865
|
"usage": "out"
|
|
21670
21866
|
},
|
|
21867
|
+
"MultiPathGatewayNextOriginACL": {
|
|
21868
|
+
"document": "When the origin IP range is updated, this field will be returned with the next version's effective origin IP range, including a comparison with the currently effective origin IP range.",
|
|
21869
|
+
"members": [
|
|
21870
|
+
{
|
|
21871
|
+
"disabled": false,
|
|
21872
|
+
"document": "Specifies the version number.",
|
|
21873
|
+
"example": "2",
|
|
21874
|
+
"member": "int64",
|
|
21875
|
+
"name": "Version",
|
|
21876
|
+
"output_required": false,
|
|
21877
|
+
"required": false,
|
|
21878
|
+
"type": "int",
|
|
21879
|
+
"value_allowed_null": false
|
|
21880
|
+
},
|
|
21881
|
+
{
|
|
21882
|
+
"disabled": false,
|
|
21883
|
+
"document": "Describes the IP range details for origin servers.",
|
|
21884
|
+
"example": "无",
|
|
21885
|
+
"member": "Addresses",
|
|
21886
|
+
"name": "EntireAddresses",
|
|
21887
|
+
"output_required": false,
|
|
21888
|
+
"required": false,
|
|
21889
|
+
"type": "object",
|
|
21890
|
+
"value_allowed_null": false
|
|
21891
|
+
},
|
|
21892
|
+
{
|
|
21893
|
+
"disabled": false,
|
|
21894
|
+
"document": "The latest origin IP range newly added compared with the origin IP range in MultiPathGatewayCurrentOrginACL.",
|
|
21895
|
+
"example": "无",
|
|
21896
|
+
"member": "Addresses",
|
|
21897
|
+
"name": "AddedAddresses",
|
|
21898
|
+
"output_required": false,
|
|
21899
|
+
"required": false,
|
|
21900
|
+
"type": "object",
|
|
21901
|
+
"value_allowed_null": false
|
|
21902
|
+
},
|
|
21903
|
+
{
|
|
21904
|
+
"disabled": false,
|
|
21905
|
+
"document": "Specifies the latest IP address range removed from the origin IP range in MultiPathGatewayCurrentOrginACL compared with the original.",
|
|
21906
|
+
"example": "无",
|
|
21907
|
+
"member": "Addresses",
|
|
21908
|
+
"name": "RemovedAddresses",
|
|
21909
|
+
"output_required": false,
|
|
21910
|
+
"required": false,
|
|
21911
|
+
"type": "object",
|
|
21912
|
+
"value_allowed_null": false
|
|
21913
|
+
},
|
|
21914
|
+
{
|
|
21915
|
+
"disabled": false,
|
|
21916
|
+
"document": "The latest origin IP range unchanged compared with the origin IP range in MultiPathGatewayCurrentOrginACL.",
|
|
21917
|
+
"example": "无",
|
|
21918
|
+
"member": "Addresses",
|
|
21919
|
+
"name": "NoChangeAddresses",
|
|
21920
|
+
"output_required": false,
|
|
21921
|
+
"required": false,
|
|
21922
|
+
"type": "object",
|
|
21923
|
+
"value_allowed_null": false
|
|
21924
|
+
}
|
|
21925
|
+
],
|
|
21926
|
+
"usage": "both"
|
|
21927
|
+
},
|
|
21928
|
+
"MultiPathGatewayOriginACLInfo": {
|
|
21929
|
+
"document": "Multi-Channel gateway example instance binding relationship with origin IP ranges and origin IP range details.",
|
|
21930
|
+
"members": [
|
|
21931
|
+
{
|
|
21932
|
+
"disabled": false,
|
|
21933
|
+
"document": "Describes the currently effective IP range for origin servers.",
|
|
21934
|
+
"example": "无",
|
|
21935
|
+
"member": "MultiPathGatewayCurrentOriginACL",
|
|
21936
|
+
"name": "MultiPathGatewayCurrentOriginACL",
|
|
21937
|
+
"output_required": false,
|
|
21938
|
+
"required": false,
|
|
21939
|
+
"type": "object",
|
|
21940
|
+
"value_allowed_null": false
|
|
21941
|
+
},
|
|
21942
|
+
{
|
|
21943
|
+
"disabled": false,
|
|
21944
|
+
"document": "When the origin IP range is updated, this field will be returned with the next version's effective origin IP range, including a comparison with the current origin IP range. this field is empty if not updated.",
|
|
21945
|
+
"example": "无",
|
|
21946
|
+
"member": "MultiPathGatewayNextOriginACL",
|
|
21947
|
+
"name": "MultiPathGatewayNextOriginACL",
|
|
21948
|
+
"output_required": false,
|
|
21949
|
+
"required": false,
|
|
21950
|
+
"type": "object",
|
|
21951
|
+
"value_allowed_null": false
|
|
21952
|
+
}
|
|
21953
|
+
],
|
|
21954
|
+
"usage": "both"
|
|
21955
|
+
},
|
|
21671
21956
|
"MutualTLS": {
|
|
21672
21957
|
"document": "HTTPS Mutual authentication.",
|
|
21673
21958
|
"members": [
|
|
@@ -44,6 +44,14 @@
|
|
|
44
44
|
"title": "Querying the CNAME status of a domain name"
|
|
45
45
|
}
|
|
46
46
|
],
|
|
47
|
+
"ConfirmMultiPathGatewayOriginACL": [
|
|
48
|
+
{
|
|
49
|
+
"document": "This example shows you how to confirm the instance with ZoneId 'zone-27q0p0bal192' and GatewayId 'mpgw-lbxuhk1oh' has updated the latest origin server IP range to the origin server firewall.",
|
|
50
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ConfirmOriginACLUpdate\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-27q0p0bal192\",\n \"GatewayId\": \"mpgw-lbxuhk1oh\",\n \"OriginACLVersion\": 1\n}",
|
|
51
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"af0a2b4f-df6d-4d2a-ac39-1706cbf8a868\"\n }\n}",
|
|
52
|
+
"title": "Confirm Updated to the Latest Origin IP Range"
|
|
53
|
+
}
|
|
54
|
+
],
|
|
47
55
|
"ConfirmOriginACLUpdate": [
|
|
48
56
|
{
|
|
49
57
|
"document": "The selected site with ZoneId 'zone-276zs184g93m' confirms the latest origin ACLs have been updated to the origin server firewall.",
|
|
@@ -1026,6 +1034,14 @@
|
|
|
1026
1034
|
"title": "Querying Custom Access Routes for Multi-Channel SCDN Gateways"
|
|
1027
1035
|
}
|
|
1028
1036
|
],
|
|
1037
|
+
"DescribeMultiPathGatewayOriginACL": [
|
|
1038
|
+
{
|
|
1039
|
+
"document": "This example shows you how to query the binding relationship between instances with ZoneId 'zone-27q0p0bal192' and GatewayId 'mpgw-lbxuhk1oh' and the IP address range, as well as the IP range details.",
|
|
1040
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeOriginACL\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-27q0p0bal192\",\n \"GatewayId\": \"mpgw-lbxuhk1oh\"\n}",
|
|
1041
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"de0a2b4f-df6d-4d2a-ac39-1706cbf8a797\",\n \"MultiPathGatewayOriginACLInfo\": {\n \"MultiPathGatewayCurrentOriginACL\": {\n \"EntireAddresses\": {\n \"IPv4\": [\n \"11.11.11.11/24\"\n ],\n \"IPv6\": [\n \"2001:980:7002:6::/64\"\n ]\n },\n \"Version\": 3,\n \"IsPlaned\": \"false\"\n },\n \"MultiPathGatewayNextOriginACL\": {\n \"Version\": 4,\n \"EntireAddresses\": {\n \"IPv4\": [\n \"11.11.11.11/24\",\n \"22.22.22.22/24\"\n ],\n \"IPv6\": [\n \"2001:980:7002:6::/64\"\n ]\n },\n \"AddedAddresses\": {\n \"IPv4\": [\n \"22.22.22.22/24\"\n ],\n \"IPv6\": []\n },\n \"RemovedAddresses\": {\n \"IPv4\": [],\n \"IPv6\": []\n },\n \"NoChangeAddresses\": {\n \"IPv4\": [\n \"11.11.11.11/24\"\n ],\n \"IPv6\": [\n \"2001:980:7002:6::/64\"\n ]\n }\n }\n }\n }\n}",
|
|
1042
|
+
"title": "Querying Multi-Channel SCDN Gateway Origin Server Protection Detail"
|
|
1043
|
+
}
|
|
1044
|
+
],
|
|
1029
1045
|
"DescribeMultiPathGatewayRegions": [
|
|
1030
1046
|
{
|
|
1031
1047
|
"document": "Get the list of available regions of cloud gateways under the site (ZoneId is zone-27q0p0bal192).",
|
|
@@ -1738,6 +1754,14 @@
|
|
|
1738
1754
|
"title": "Modify the Configuration for Connecting Key"
|
|
1739
1755
|
}
|
|
1740
1756
|
],
|
|
1757
|
+
"ModifyMultiPathGatewayStatus": [
|
|
1758
|
+
{
|
|
1759
|
+
"document": "This example shows you how to update the status of a multi-channel security gateway with ZoneId 'zone-27q0p0bal192' and GatewayId 'eo-gw-lb-uhk1oh'.",
|
|
1760
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyMultiPathGatewayStatus\n<Common request parameters>\n\n{\n \"GatewayId\": \"eo-gw-lb-uhk1oh\",\n \"GatewayStatus\": \"offline\",\n \"ZoneId\": \"zone-27q0p0bal192\"\n}",
|
|
1761
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"a03c3e4d-3a8c-4ef1-924c-81b33df6453a\"\n }\n}",
|
|
1762
|
+
"title": "Update Multi-Channel Security Gateway Status"
|
|
1763
|
+
}
|
|
1764
|
+
],
|
|
1741
1765
|
"ModifyOriginACL": [
|
|
1742
1766
|
{
|
|
1743
1767
|
"document": "This example shows you how to add the L7 acceleration domain 'www.qq.com' under site 'zone-276zs184g93m' enabling origin ACLs.",
|