tccli-intl-en 3.1.1.1__py2.py3-none-any.whl → 3.1.11.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +6 -0
- tccli/services/autoscaling/v20180419/api.json +36 -14
- tccli/services/ckafka/ckafka_client.py +288 -8
- tccli/services/ckafka/v20190819/api.json +494 -76
- tccli/services/ckafka/v20190819/examples.json +45 -5
- tccli/services/clb/clb_client.py +636 -300
- tccli/services/clb/v20180317/api.json +1245 -367
- tccli/services/clb/v20180317/examples.json +172 -112
- tccli/services/controlcenter/controlcenter_client.py +224 -0
- tccli/services/controlcenter/v20230110/api.json +528 -5
- tccli/services/controlcenter/v20230110/examples.json +32 -0
- tccli/services/cvm/v20170312/examples.json +1 -1
- tccli/services/faceid/v20180301/api.json +31 -3
- tccli/services/kms/v20190118/api.json +80 -3
- tccli/services/kms/v20190118/examples.json +3 -3
- tccli/services/mdl/v20200326/api.json +165 -5
- tccli/services/mongodb/mongodb_client.py +1048 -96
- tccli/services/mongodb/v20190725/api.json +1765 -108
- tccli/services/mongodb/v20190725/examples.json +136 -0
- tccli/services/monitor/v20180724/api.json +3 -3
- tccli/services/mps/mps_client.py +713 -209
- tccli/services/mps/v20190612/api.json +1009 -67
- tccli/services/mps/v20190612/examples.json +100 -52
- tccli/services/ocr/ocr_client.py +112 -0
- tccli/services/ocr/v20181119/api.json +514 -0
- tccli/services/ocr/v20181119/examples.json +22 -0
- tccli/services/smh/__init__.py +4 -0
- tccli/services/smh/smh_client.py +714 -0
- tccli/services/smh/v20210712/api.json +1287 -0
- tccli/services/smh/v20210712/examples.json +85 -0
- tccli/services/tdmq/tdmq_client.py +2406 -278
- tccli/services/tdmq/v20200217/api.json +11607 -3958
- tccli/services/tdmq/v20200217/examples.json +562 -264
- tccli/services/teo/teo_client.py +169 -57
- tccli/services/teo/v20220901/api.json +218 -9
- tccli/services/teo/v20220901/examples.json +56 -22
- tccli/services/trocket/__init__.py +4 -0
- tccli/services/trocket/trocket_client.py +2450 -0
- tccli/services/trocket/v20230308/api.json +6062 -0
- tccli/services/trocket/v20230308/examples.json +339 -0
- tccli/services/vpc/v20170312/api.json +19 -16
- tccli/services/vpc/v20170312/examples.json +4 -4
- {tccli_intl_en-3.1.1.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/METADATA +2 -2
- {tccli_intl_en-3.1.1.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/RECORD +49 -41
- {tccli_intl_en-3.1.1.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.1.1.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/WHEEL +0 -0
- {tccli_intl_en-3.1.1.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/entry_points.txt +0 -0
- {tccli_intl_en-3.1.1.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/top_level.txt +0 -0
tccli/services/teo/teo_client.py
CHANGED
|
@@ -1999,7 +1999,7 @@ def doDownloadL7Logs(args, parsed_globals):
|
|
|
1999
1999
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2000
2000
|
|
|
2001
2001
|
|
|
2002
|
-
def
|
|
2002
|
+
def doCreateContentIdentifier(args, parsed_globals):
|
|
2003
2003
|
g_param = parse_global_arg(parsed_globals)
|
|
2004
2004
|
|
|
2005
2005
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2031,11 +2031,11 @@ def doDescribeEnvironments(args, parsed_globals):
|
|
|
2031
2031
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2032
2032
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2033
2033
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2034
|
-
model = models.
|
|
2034
|
+
model = models.CreateContentIdentifierRequest()
|
|
2035
2035
|
model.from_json_string(json.dumps(args))
|
|
2036
2036
|
start_time = time.time()
|
|
2037
2037
|
while True:
|
|
2038
|
-
rsp = client.
|
|
2038
|
+
rsp = client.CreateContentIdentifier(model)
|
|
2039
2039
|
result = rsp.to_json_string()
|
|
2040
2040
|
try:
|
|
2041
2041
|
json_obj = json.loads(result)
|
|
@@ -4089,6 +4089,61 @@ def doModifyL4Proxy(args, parsed_globals):
|
|
|
4089
4089
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4090
4090
|
|
|
4091
4091
|
|
|
4092
|
+
def doCheckFreeCertificateVerification(args, parsed_globals):
|
|
4093
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4094
|
+
|
|
4095
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4096
|
+
cred = credential.CVMRoleCredential()
|
|
4097
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4098
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4099
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4100
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4101
|
+
)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4106
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4107
|
+
else:
|
|
4108
|
+
cred = credential.Credential(
|
|
4109
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4110
|
+
)
|
|
4111
|
+
http_profile = HttpProfile(
|
|
4112
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4113
|
+
reqMethod="POST",
|
|
4114
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4115
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4116
|
+
)
|
|
4117
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4118
|
+
if g_param[OptionsDefine.Language]:
|
|
4119
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4120
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4121
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4122
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4123
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4124
|
+
model = models.CheckFreeCertificateVerificationRequest()
|
|
4125
|
+
model.from_json_string(json.dumps(args))
|
|
4126
|
+
start_time = time.time()
|
|
4127
|
+
while True:
|
|
4128
|
+
rsp = client.CheckFreeCertificateVerification(model)
|
|
4129
|
+
result = rsp.to_json_string()
|
|
4130
|
+
try:
|
|
4131
|
+
json_obj = json.loads(result)
|
|
4132
|
+
except TypeError as e:
|
|
4133
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4134
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4135
|
+
break
|
|
4136
|
+
cur_time = time.time()
|
|
4137
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4138
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4139
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4140
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4141
|
+
else:
|
|
4142
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4143
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4144
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4145
|
+
|
|
4146
|
+
|
|
4092
4147
|
def doModifyL4ProxyRules(args, parsed_globals):
|
|
4093
4148
|
g_param = parse_global_arg(parsed_globals)
|
|
4094
4149
|
|
|
@@ -11404,7 +11459,7 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
|
11404
11459
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11405
11460
|
|
|
11406
11461
|
|
|
11407
|
-
def
|
|
11462
|
+
def doCreateSecurityAPIService(args, parsed_globals):
|
|
11408
11463
|
g_param = parse_global_arg(parsed_globals)
|
|
11409
11464
|
|
|
11410
11465
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11436,11 +11491,11 @@ def doCreateContentIdentifier(args, parsed_globals):
|
|
|
11436
11491
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11437
11492
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11438
11493
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11439
|
-
model = models.
|
|
11494
|
+
model = models.CreateSecurityAPIServiceRequest()
|
|
11440
11495
|
model.from_json_string(json.dumps(args))
|
|
11441
11496
|
start_time = time.time()
|
|
11442
11497
|
while True:
|
|
11443
|
-
rsp = client.
|
|
11498
|
+
rsp = client.CreateSecurityAPIService(model)
|
|
11444
11499
|
result = rsp.to_json_string()
|
|
11445
11500
|
try:
|
|
11446
11501
|
json_obj = json.loads(result)
|
|
@@ -11844,6 +11899,61 @@ def doDeleteZone(args, parsed_globals):
|
|
|
11844
11899
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11845
11900
|
|
|
11846
11901
|
|
|
11902
|
+
def doApplyFreeCertificate(args, parsed_globals):
|
|
11903
|
+
g_param = parse_global_arg(parsed_globals)
|
|
11904
|
+
|
|
11905
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
11906
|
+
cred = credential.CVMRoleCredential()
|
|
11907
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
11908
|
+
cred = credential.STSAssumeRoleCredential(
|
|
11909
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11910
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11911
|
+
)
|
|
11912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11916
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11917
|
+
else:
|
|
11918
|
+
cred = credential.Credential(
|
|
11919
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
11920
|
+
)
|
|
11921
|
+
http_profile = HttpProfile(
|
|
11922
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
11923
|
+
reqMethod="POST",
|
|
11924
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
11925
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
11926
|
+
)
|
|
11927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
11928
|
+
if g_param[OptionsDefine.Language]:
|
|
11929
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
11930
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
11931
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11932
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
11933
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11934
|
+
model = models.ApplyFreeCertificateRequest()
|
|
11935
|
+
model.from_json_string(json.dumps(args))
|
|
11936
|
+
start_time = time.time()
|
|
11937
|
+
while True:
|
|
11938
|
+
rsp = client.ApplyFreeCertificate(model)
|
|
11939
|
+
result = rsp.to_json_string()
|
|
11940
|
+
try:
|
|
11941
|
+
json_obj = json.loads(result)
|
|
11942
|
+
except TypeError as e:
|
|
11943
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
11944
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
11945
|
+
break
|
|
11946
|
+
cur_time = time.time()
|
|
11947
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
11948
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
11949
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
11950
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
11951
|
+
else:
|
|
11952
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
11953
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
11954
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11955
|
+
|
|
11956
|
+
|
|
11847
11957
|
def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
11848
11958
|
g_param = parse_global_arg(parsed_globals)
|
|
11849
11959
|
|
|
@@ -11899,7 +12009,7 @@ def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
|
11899
12009
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11900
12010
|
|
|
11901
12011
|
|
|
11902
|
-
def
|
|
12012
|
+
def doDescribeEnvironments(args, parsed_globals):
|
|
11903
12013
|
g_param = parse_global_arg(parsed_globals)
|
|
11904
12014
|
|
|
11905
12015
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11931,11 +12041,11 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11931
12041
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11932
12042
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11933
12043
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11934
|
-
model = models.
|
|
12044
|
+
model = models.DescribeEnvironmentsRequest()
|
|
11935
12045
|
model.from_json_string(json.dumps(args))
|
|
11936
12046
|
start_time = time.time()
|
|
11937
12047
|
while True:
|
|
11938
|
-
rsp = client.
|
|
12048
|
+
rsp = client.DescribeEnvironments(model)
|
|
11939
12049
|
result = rsp.to_json_string()
|
|
11940
12050
|
try:
|
|
11941
12051
|
json_obj = json.loads(result)
|
|
@@ -11954,7 +12064,7 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11954
12064
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11955
12065
|
|
|
11956
12066
|
|
|
11957
|
-
def
|
|
12067
|
+
def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
11958
12068
|
g_param = parse_global_arg(parsed_globals)
|
|
11959
12069
|
|
|
11960
12070
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11986,11 +12096,11 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
11986
12096
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11987
12097
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11988
12098
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11989
|
-
model = models.
|
|
12099
|
+
model = models.DescribeSecurityIPGroupInfoRequest()
|
|
11990
12100
|
model.from_json_string(json.dumps(args))
|
|
11991
12101
|
start_time = time.time()
|
|
11992
12102
|
while True:
|
|
11993
|
-
rsp = client.
|
|
12103
|
+
rsp = client.DescribeSecurityIPGroupInfo(model)
|
|
11994
12104
|
result = rsp.to_json_string()
|
|
11995
12105
|
try:
|
|
11996
12106
|
json_obj = json.loads(result)
|
|
@@ -12009,7 +12119,7 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
12009
12119
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12010
12120
|
|
|
12011
12121
|
|
|
12012
|
-
def
|
|
12122
|
+
def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
12013
12123
|
g_param = parse_global_arg(parsed_globals)
|
|
12014
12124
|
|
|
12015
12125
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12041,11 +12151,11 @@ def doCreatePlan(args, parsed_globals):
|
|
|
12041
12151
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12042
12152
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12043
12153
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12044
|
-
model = models.
|
|
12154
|
+
model = models.ModifyLoadBalancingStatusRequest()
|
|
12045
12155
|
model.from_json_string(json.dumps(args))
|
|
12046
12156
|
start_time = time.time()
|
|
12047
12157
|
while True:
|
|
12048
|
-
rsp = client.
|
|
12158
|
+
rsp = client.ModifyLoadBalancingStatus(model)
|
|
12049
12159
|
result = rsp.to_json_string()
|
|
12050
12160
|
try:
|
|
12051
12161
|
json_obj = json.loads(result)
|
|
@@ -12064,7 +12174,7 @@ def doCreatePlan(args, parsed_globals):
|
|
|
12064
12174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12065
12175
|
|
|
12066
12176
|
|
|
12067
|
-
def
|
|
12177
|
+
def doCreatePlan(args, parsed_globals):
|
|
12068
12178
|
g_param = parse_global_arg(parsed_globals)
|
|
12069
12179
|
|
|
12070
12180
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12096,11 +12206,11 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
12096
12206
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12097
12207
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12098
12208
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12099
|
-
model = models.
|
|
12209
|
+
model = models.CreatePlanRequest()
|
|
12100
12210
|
model.from_json_string(json.dumps(args))
|
|
12101
12211
|
start_time = time.time()
|
|
12102
12212
|
while True:
|
|
12103
|
-
rsp = client.
|
|
12213
|
+
rsp = client.CreatePlan(model)
|
|
12104
12214
|
result = rsp.to_json_string()
|
|
12105
12215
|
try:
|
|
12106
12216
|
json_obj = json.loads(result)
|
|
@@ -12119,7 +12229,7 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
12119
12229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12120
12230
|
|
|
12121
12231
|
|
|
12122
|
-
def
|
|
12232
|
+
def doDescribeDnsRecords(args, parsed_globals):
|
|
12123
12233
|
g_param = parse_global_arg(parsed_globals)
|
|
12124
12234
|
|
|
12125
12235
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12151,11 +12261,11 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
12151
12261
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12152
12262
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12153
12263
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12154
|
-
model = models.
|
|
12264
|
+
model = models.DescribeDnsRecordsRequest()
|
|
12155
12265
|
model.from_json_string(json.dumps(args))
|
|
12156
12266
|
start_time = time.time()
|
|
12157
12267
|
while True:
|
|
12158
|
-
rsp = client.
|
|
12268
|
+
rsp = client.DescribeDnsRecords(model)
|
|
12159
12269
|
result = rsp.to_json_string()
|
|
12160
12270
|
try:
|
|
12161
12271
|
json_obj = json.loads(result)
|
|
@@ -12174,7 +12284,7 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
12174
12284
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12175
12285
|
|
|
12176
12286
|
|
|
12177
|
-
def
|
|
12287
|
+
def doModifyDDoSProtection(args, parsed_globals):
|
|
12178
12288
|
g_param = parse_global_arg(parsed_globals)
|
|
12179
12289
|
|
|
12180
12290
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12206,11 +12316,11 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
12206
12316
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12207
12317
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12208
12318
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12209
|
-
model = models.
|
|
12319
|
+
model = models.ModifyDDoSProtectionRequest()
|
|
12210
12320
|
model.from_json_string(json.dumps(args))
|
|
12211
12321
|
start_time = time.time()
|
|
12212
12322
|
while True:
|
|
12213
|
-
rsp = client.
|
|
12323
|
+
rsp = client.ModifyDDoSProtection(model)
|
|
12214
12324
|
result = rsp.to_json_string()
|
|
12215
12325
|
try:
|
|
12216
12326
|
json_obj = json.loads(result)
|
|
@@ -12229,7 +12339,7 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
12229
12339
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12230
12340
|
|
|
12231
12341
|
|
|
12232
|
-
def
|
|
12342
|
+
def doDescribeSecurityAPIService(args, parsed_globals):
|
|
12233
12343
|
g_param = parse_global_arg(parsed_globals)
|
|
12234
12344
|
|
|
12235
12345
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12261,11 +12371,11 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
12261
12371
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12262
12372
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12263
12373
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12264
|
-
model = models.
|
|
12374
|
+
model = models.DescribeSecurityAPIServiceRequest()
|
|
12265
12375
|
model.from_json_string(json.dumps(args))
|
|
12266
12376
|
start_time = time.time()
|
|
12267
12377
|
while True:
|
|
12268
|
-
rsp = client.
|
|
12378
|
+
rsp = client.DescribeSecurityAPIService(model)
|
|
12269
12379
|
result = rsp.to_json_string()
|
|
12270
12380
|
try:
|
|
12271
12381
|
json_obj = json.loads(result)
|
|
@@ -12284,7 +12394,7 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
12284
12394
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12285
12395
|
|
|
12286
12396
|
|
|
12287
|
-
def
|
|
12397
|
+
def doImportZoneConfig(args, parsed_globals):
|
|
12288
12398
|
g_param = parse_global_arg(parsed_globals)
|
|
12289
12399
|
|
|
12290
12400
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12316,11 +12426,11 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
12316
12426
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12317
12427
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12318
12428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12319
|
-
model = models.
|
|
12429
|
+
model = models.ImportZoneConfigRequest()
|
|
12320
12430
|
model.from_json_string(json.dumps(args))
|
|
12321
12431
|
start_time = time.time()
|
|
12322
12432
|
while True:
|
|
12323
|
-
rsp = client.
|
|
12433
|
+
rsp = client.ImportZoneConfig(model)
|
|
12324
12434
|
result = rsp.to_json_string()
|
|
12325
12435
|
try:
|
|
12326
12436
|
json_obj = json.loads(result)
|
|
@@ -12339,7 +12449,7 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
12339
12449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12340
12450
|
|
|
12341
12451
|
|
|
12342
|
-
def
|
|
12452
|
+
def doDescribeDDosAttackData(args, parsed_globals):
|
|
12343
12453
|
g_param = parse_global_arg(parsed_globals)
|
|
12344
12454
|
|
|
12345
12455
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12371,11 +12481,11 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
12371
12481
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12372
12482
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12373
12483
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12374
|
-
model = models.
|
|
12484
|
+
model = models.DescribeDDosAttackDataRequest()
|
|
12375
12485
|
model.from_json_string(json.dumps(args))
|
|
12376
12486
|
start_time = time.time()
|
|
12377
12487
|
while True:
|
|
12378
|
-
rsp = client.
|
|
12488
|
+
rsp = client.DescribeDDosAttackData(model)
|
|
12379
12489
|
result = rsp.to_json_string()
|
|
12380
12490
|
try:
|
|
12381
12491
|
json_obj = json.loads(result)
|
|
@@ -12394,7 +12504,7 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
12394
12504
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12395
12505
|
|
|
12396
12506
|
|
|
12397
|
-
def
|
|
12507
|
+
def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
12398
12508
|
g_param = parse_global_arg(parsed_globals)
|
|
12399
12509
|
|
|
12400
12510
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12426,11 +12536,11 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
12426
12536
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12427
12537
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12428
12538
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12429
|
-
model = models.
|
|
12539
|
+
model = models.CreateMultiPathGatewaySecretKeyRequest()
|
|
12430
12540
|
model.from_json_string(json.dumps(args))
|
|
12431
12541
|
start_time = time.time()
|
|
12432
12542
|
while True:
|
|
12433
|
-
rsp = client.
|
|
12543
|
+
rsp = client.CreateMultiPathGatewaySecretKey(model)
|
|
12434
12544
|
result = rsp.to_json_string()
|
|
12435
12545
|
try:
|
|
12436
12546
|
json_obj = json.loads(result)
|
|
@@ -12449,7 +12559,7 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
12449
12559
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12450
12560
|
|
|
12451
12561
|
|
|
12452
|
-
def
|
|
12562
|
+
def doModifyCustomErrorPage(args, parsed_globals):
|
|
12453
12563
|
g_param = parse_global_arg(parsed_globals)
|
|
12454
12564
|
|
|
12455
12565
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12481,11 +12591,11 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
12481
12591
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12482
12592
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12483
12593
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12484
|
-
model = models.
|
|
12594
|
+
model = models.ModifyCustomErrorPageRequest()
|
|
12485
12595
|
model.from_json_string(json.dumps(args))
|
|
12486
12596
|
start_time = time.time()
|
|
12487
12597
|
while True:
|
|
12488
|
-
rsp = client.
|
|
12598
|
+
rsp = client.ModifyCustomErrorPage(model)
|
|
12489
12599
|
result = rsp.to_json_string()
|
|
12490
12600
|
try:
|
|
12491
12601
|
json_obj = json.loads(result)
|
|
@@ -12504,7 +12614,7 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
12504
12614
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12505
12615
|
|
|
12506
12616
|
|
|
12507
|
-
def
|
|
12617
|
+
def doDescribeL4ProxyRules(args, parsed_globals):
|
|
12508
12618
|
g_param = parse_global_arg(parsed_globals)
|
|
12509
12619
|
|
|
12510
12620
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12536,11 +12646,11 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
12536
12646
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12537
12647
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12538
12648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12539
|
-
model = models.
|
|
12649
|
+
model = models.DescribeL4ProxyRulesRequest()
|
|
12540
12650
|
model.from_json_string(json.dumps(args))
|
|
12541
12651
|
start_time = time.time()
|
|
12542
12652
|
while True:
|
|
12543
|
-
rsp = client.
|
|
12653
|
+
rsp = client.DescribeL4ProxyRules(model)
|
|
12544
12654
|
result = rsp.to_json_string()
|
|
12545
12655
|
try:
|
|
12546
12656
|
json_obj = json.loads(result)
|
|
@@ -12559,7 +12669,7 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
12559
12669
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12560
12670
|
|
|
12561
12671
|
|
|
12562
|
-
def
|
|
12672
|
+
def doDescribeDDoSAttackData(args, parsed_globals):
|
|
12563
12673
|
g_param = parse_global_arg(parsed_globals)
|
|
12564
12674
|
|
|
12565
12675
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12591,11 +12701,11 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
12591
12701
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12592
12702
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12593
12703
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12594
|
-
model = models.
|
|
12704
|
+
model = models.DescribeDDoSAttackDataRequest()
|
|
12595
12705
|
model.from_json_string(json.dumps(args))
|
|
12596
12706
|
start_time = time.time()
|
|
12597
12707
|
while True:
|
|
12598
|
-
rsp = client.
|
|
12708
|
+
rsp = client.DescribeDDoSAttackData(model)
|
|
12599
12709
|
result = rsp.to_json_string()
|
|
12600
12710
|
try:
|
|
12601
12711
|
json_obj = json.loads(result)
|
|
@@ -12614,7 +12724,7 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
12614
12724
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12615
12725
|
|
|
12616
12726
|
|
|
12617
|
-
def
|
|
12727
|
+
def doDeleteSharedCNAME(args, parsed_globals):
|
|
12618
12728
|
g_param = parse_global_arg(parsed_globals)
|
|
12619
12729
|
|
|
12620
12730
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12646,11 +12756,11 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
12646
12756
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12647
12757
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12648
12758
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12649
|
-
model = models.
|
|
12759
|
+
model = models.DeleteSharedCNAMERequest()
|
|
12650
12760
|
model.from_json_string(json.dumps(args))
|
|
12651
12761
|
start_time = time.time()
|
|
12652
12762
|
while True:
|
|
12653
|
-
rsp = client.
|
|
12763
|
+
rsp = client.DeleteSharedCNAME(model)
|
|
12654
12764
|
result = rsp.to_json_string()
|
|
12655
12765
|
try:
|
|
12656
12766
|
json_obj = json.loads(result)
|
|
@@ -12669,7 +12779,7 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
12669
12779
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12670
12780
|
|
|
12671
12781
|
|
|
12672
|
-
def
|
|
12782
|
+
def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
12673
12783
|
g_param = parse_global_arg(parsed_globals)
|
|
12674
12784
|
|
|
12675
12785
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12701,11 +12811,11 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
12701
12811
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12702
12812
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12703
12813
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12704
|
-
model = models.
|
|
12814
|
+
model = models.DescribeWebManagedRulesDataRequest()
|
|
12705
12815
|
model.from_json_string(json.dumps(args))
|
|
12706
12816
|
start_time = time.time()
|
|
12707
12817
|
while True:
|
|
12708
|
-
rsp = client.
|
|
12818
|
+
rsp = client.DescribeWebManagedRulesData(model)
|
|
12709
12819
|
result = rsp.to_json_string()
|
|
12710
12820
|
try:
|
|
12711
12821
|
json_obj = json.loads(result)
|
|
@@ -12724,7 +12834,7 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
12724
12834
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12725
12835
|
|
|
12726
12836
|
|
|
12727
|
-
def
|
|
12837
|
+
def doImportDnsRecords(args, parsed_globals):
|
|
12728
12838
|
g_param = parse_global_arg(parsed_globals)
|
|
12729
12839
|
|
|
12730
12840
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12756,11 +12866,11 @@ def doCreateSecurityAPIService(args, parsed_globals):
|
|
|
12756
12866
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12757
12867
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12758
12868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12759
|
-
model = models.
|
|
12869
|
+
model = models.ImportDnsRecordsRequest()
|
|
12760
12870
|
model.from_json_string(json.dumps(args))
|
|
12761
12871
|
start_time = time.time()
|
|
12762
12872
|
while True:
|
|
12763
|
-
rsp = client.
|
|
12873
|
+
rsp = client.ImportDnsRecords(model)
|
|
12764
12874
|
result = rsp.to_json_string()
|
|
12765
12875
|
try:
|
|
12766
12876
|
json_obj = json.loads(result)
|
|
@@ -13323,7 +13433,7 @@ ACTION_MAP = {
|
|
|
13323
13433
|
"DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
|
|
13324
13434
|
"ModifyL4ProxyStatus": doModifyL4ProxyStatus,
|
|
13325
13435
|
"DownloadL7Logs": doDownloadL7Logs,
|
|
13326
|
-
"
|
|
13436
|
+
"CreateContentIdentifier": doCreateContentIdentifier,
|
|
13327
13437
|
"DescribeOriginACL": doDescribeOriginACL,
|
|
13328
13438
|
"DeleteApplicationProxyRule": doDeleteApplicationProxyRule,
|
|
13329
13439
|
"CheckCnameStatus": doCheckCnameStatus,
|
|
@@ -13361,6 +13471,7 @@ ACTION_MAP = {
|
|
|
13361
13471
|
"RefreshMultiPathGatewaySecretKey": doRefreshMultiPathGatewaySecretKey,
|
|
13362
13472
|
"CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
|
|
13363
13473
|
"ModifyL4Proxy": doModifyL4Proxy,
|
|
13474
|
+
"CheckFreeCertificateVerification": doCheckFreeCertificateVerification,
|
|
13364
13475
|
"ModifyL4ProxyRules": doModifyL4ProxyRules,
|
|
13365
13476
|
"DescribeIdentifications": doDescribeIdentifications,
|
|
13366
13477
|
"DescribeDDosAttackEventDetail": doDescribeDDosAttackEventDetail,
|
|
@@ -13494,7 +13605,7 @@ ACTION_MAP = {
|
|
|
13494
13605
|
"DescribeZoneSetting": doDescribeZoneSetting,
|
|
13495
13606
|
"DescribeSecurityAPIResource": doDescribeSecurityAPIResource,
|
|
13496
13607
|
"DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
|
|
13497
|
-
"
|
|
13608
|
+
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
|
13498
13609
|
"DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
|
|
13499
13610
|
"CreateApplicationProxyRule": doCreateApplicationProxyRule,
|
|
13500
13611
|
"ModifySecurityJSInjectionRule": doModifySecurityJSInjectionRule,
|
|
@@ -13502,7 +13613,9 @@ ACTION_MAP = {
|
|
|
13502
13613
|
"DescribeFunctions": doDescribeFunctions,
|
|
13503
13614
|
"ReclaimZone": doReclaimZone,
|
|
13504
13615
|
"DeleteZone": doDeleteZone,
|
|
13616
|
+
"ApplyFreeCertificate": doApplyFreeCertificate,
|
|
13505
13617
|
"DescribeDDosAttackEvent": doDescribeDDosAttackEvent,
|
|
13618
|
+
"DescribeEnvironments": doDescribeEnvironments,
|
|
13506
13619
|
"DescribeSecurityIPGroupInfo": doDescribeSecurityIPGroupInfo,
|
|
13507
13620
|
"ModifyLoadBalancingStatus": doModifyLoadBalancingStatus,
|
|
13508
13621
|
"CreatePlan": doCreatePlan,
|
|
@@ -13518,7 +13631,6 @@ ACTION_MAP = {
|
|
|
13518
13631
|
"DeleteSharedCNAME": doDeleteSharedCNAME,
|
|
13519
13632
|
"DescribeWebManagedRulesData": doDescribeWebManagedRulesData,
|
|
13520
13633
|
"ImportDnsRecords": doImportDnsRecords,
|
|
13521
|
-
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
|
13522
13634
|
"DescribeSecurityPolicyManagedRulesId": doDescribeSecurityPolicyManagedRulesId,
|
|
13523
13635
|
"DescribeAliasDomains": doDescribeAliasDomains,
|
|
13524
13636
|
"DescribeOriginGroupDetail": doDescribeOriginGroupDetail,
|