tccli-intl-en 3.1.8.1__py2.py3-none-any.whl → 3.1.11.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/monitor/v20180724/api.json +3 -3
- tccli/services/teo/teo_client.py +169 -57
- tccli/services/teo/v20220901/api.json +150 -5
- tccli/services/teo/v20220901/examples.json +28 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/METADATA +2 -2
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/RECORD +11 -11
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/WHEEL +0 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/entry_points.txt +0 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.11.1.dist-info}/top_level.txt +0 -0
tccli/__init__.py
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
__version__ = '3.1.
|
|
1
|
+
__version__ = '3.1.11.1'
|
|
@@ -2247,7 +2247,7 @@
|
|
|
2247
2247
|
"document": "BindPrometheusManagedGrafana response structure.",
|
|
2248
2248
|
"members": [
|
|
2249
2249
|
{
|
|
2250
|
-
"document": "The unique request ID,
|
|
2250
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
2251
2251
|
"member": "string",
|
|
2252
2252
|
"name": "RequestId",
|
|
2253
2253
|
"type": "string"
|
|
@@ -3172,12 +3172,12 @@
|
|
|
3172
3172
|
"example": "arule-f2vx2owo",
|
|
3173
3173
|
"member": "string",
|
|
3174
3174
|
"name": "RuleId",
|
|
3175
|
-
"
|
|
3175
|
+
"output_required": true,
|
|
3176
3176
|
"type": "string",
|
|
3177
3177
|
"value_allowed_null": true
|
|
3178
3178
|
},
|
|
3179
3179
|
{
|
|
3180
|
-
"document": "The unique request ID,
|
|
3180
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
3181
3181
|
"member": "string",
|
|
3182
3182
|
"name": "RequestId",
|
|
3183
3183
|
"type": "string"
|
tccli/services/teo/teo_client.py
CHANGED
|
@@ -1999,7 +1999,7 @@ def doDownloadL7Logs(args, parsed_globals):
|
|
|
1999
1999
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2000
2000
|
|
|
2001
2001
|
|
|
2002
|
-
def
|
|
2002
|
+
def doCreateContentIdentifier(args, parsed_globals):
|
|
2003
2003
|
g_param = parse_global_arg(parsed_globals)
|
|
2004
2004
|
|
|
2005
2005
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2031,11 +2031,11 @@ def doDescribeEnvironments(args, parsed_globals):
|
|
|
2031
2031
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2032
2032
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2033
2033
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2034
|
-
model = models.
|
|
2034
|
+
model = models.CreateContentIdentifierRequest()
|
|
2035
2035
|
model.from_json_string(json.dumps(args))
|
|
2036
2036
|
start_time = time.time()
|
|
2037
2037
|
while True:
|
|
2038
|
-
rsp = client.
|
|
2038
|
+
rsp = client.CreateContentIdentifier(model)
|
|
2039
2039
|
result = rsp.to_json_string()
|
|
2040
2040
|
try:
|
|
2041
2041
|
json_obj = json.loads(result)
|
|
@@ -4089,6 +4089,61 @@ def doModifyL4Proxy(args, parsed_globals):
|
|
|
4089
4089
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4090
4090
|
|
|
4091
4091
|
|
|
4092
|
+
def doCheckFreeCertificateVerification(args, parsed_globals):
|
|
4093
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4094
|
+
|
|
4095
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4096
|
+
cred = credential.CVMRoleCredential()
|
|
4097
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4098
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4099
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4100
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4101
|
+
)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4106
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4107
|
+
else:
|
|
4108
|
+
cred = credential.Credential(
|
|
4109
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4110
|
+
)
|
|
4111
|
+
http_profile = HttpProfile(
|
|
4112
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4113
|
+
reqMethod="POST",
|
|
4114
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4115
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4116
|
+
)
|
|
4117
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4118
|
+
if g_param[OptionsDefine.Language]:
|
|
4119
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4120
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4121
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4122
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4123
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4124
|
+
model = models.CheckFreeCertificateVerificationRequest()
|
|
4125
|
+
model.from_json_string(json.dumps(args))
|
|
4126
|
+
start_time = time.time()
|
|
4127
|
+
while True:
|
|
4128
|
+
rsp = client.CheckFreeCertificateVerification(model)
|
|
4129
|
+
result = rsp.to_json_string()
|
|
4130
|
+
try:
|
|
4131
|
+
json_obj = json.loads(result)
|
|
4132
|
+
except TypeError as e:
|
|
4133
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4134
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4135
|
+
break
|
|
4136
|
+
cur_time = time.time()
|
|
4137
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4138
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4139
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4140
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4141
|
+
else:
|
|
4142
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4143
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4144
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4145
|
+
|
|
4146
|
+
|
|
4092
4147
|
def doModifyL4ProxyRules(args, parsed_globals):
|
|
4093
4148
|
g_param = parse_global_arg(parsed_globals)
|
|
4094
4149
|
|
|
@@ -11404,7 +11459,7 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
|
11404
11459
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11405
11460
|
|
|
11406
11461
|
|
|
11407
|
-
def
|
|
11462
|
+
def doCreateSecurityAPIService(args, parsed_globals):
|
|
11408
11463
|
g_param = parse_global_arg(parsed_globals)
|
|
11409
11464
|
|
|
11410
11465
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11436,11 +11491,11 @@ def doCreateContentIdentifier(args, parsed_globals):
|
|
|
11436
11491
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11437
11492
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11438
11493
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11439
|
-
model = models.
|
|
11494
|
+
model = models.CreateSecurityAPIServiceRequest()
|
|
11440
11495
|
model.from_json_string(json.dumps(args))
|
|
11441
11496
|
start_time = time.time()
|
|
11442
11497
|
while True:
|
|
11443
|
-
rsp = client.
|
|
11498
|
+
rsp = client.CreateSecurityAPIService(model)
|
|
11444
11499
|
result = rsp.to_json_string()
|
|
11445
11500
|
try:
|
|
11446
11501
|
json_obj = json.loads(result)
|
|
@@ -11844,6 +11899,61 @@ def doDeleteZone(args, parsed_globals):
|
|
|
11844
11899
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11845
11900
|
|
|
11846
11901
|
|
|
11902
|
+
def doApplyFreeCertificate(args, parsed_globals):
|
|
11903
|
+
g_param = parse_global_arg(parsed_globals)
|
|
11904
|
+
|
|
11905
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
11906
|
+
cred = credential.CVMRoleCredential()
|
|
11907
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
11908
|
+
cred = credential.STSAssumeRoleCredential(
|
|
11909
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11910
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11911
|
+
)
|
|
11912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11916
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11917
|
+
else:
|
|
11918
|
+
cred = credential.Credential(
|
|
11919
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
11920
|
+
)
|
|
11921
|
+
http_profile = HttpProfile(
|
|
11922
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
11923
|
+
reqMethod="POST",
|
|
11924
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
11925
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
11926
|
+
)
|
|
11927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
11928
|
+
if g_param[OptionsDefine.Language]:
|
|
11929
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
11930
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
11931
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11932
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
11933
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11934
|
+
model = models.ApplyFreeCertificateRequest()
|
|
11935
|
+
model.from_json_string(json.dumps(args))
|
|
11936
|
+
start_time = time.time()
|
|
11937
|
+
while True:
|
|
11938
|
+
rsp = client.ApplyFreeCertificate(model)
|
|
11939
|
+
result = rsp.to_json_string()
|
|
11940
|
+
try:
|
|
11941
|
+
json_obj = json.loads(result)
|
|
11942
|
+
except TypeError as e:
|
|
11943
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
11944
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
11945
|
+
break
|
|
11946
|
+
cur_time = time.time()
|
|
11947
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
11948
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
11949
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
11950
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
11951
|
+
else:
|
|
11952
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
11953
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
11954
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11955
|
+
|
|
11956
|
+
|
|
11847
11957
|
def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
11848
11958
|
g_param = parse_global_arg(parsed_globals)
|
|
11849
11959
|
|
|
@@ -11899,7 +12009,7 @@ def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
|
11899
12009
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11900
12010
|
|
|
11901
12011
|
|
|
11902
|
-
def
|
|
12012
|
+
def doDescribeEnvironments(args, parsed_globals):
|
|
11903
12013
|
g_param = parse_global_arg(parsed_globals)
|
|
11904
12014
|
|
|
11905
12015
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11931,11 +12041,11 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11931
12041
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11932
12042
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11933
12043
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11934
|
-
model = models.
|
|
12044
|
+
model = models.DescribeEnvironmentsRequest()
|
|
11935
12045
|
model.from_json_string(json.dumps(args))
|
|
11936
12046
|
start_time = time.time()
|
|
11937
12047
|
while True:
|
|
11938
|
-
rsp = client.
|
|
12048
|
+
rsp = client.DescribeEnvironments(model)
|
|
11939
12049
|
result = rsp.to_json_string()
|
|
11940
12050
|
try:
|
|
11941
12051
|
json_obj = json.loads(result)
|
|
@@ -11954,7 +12064,7 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11954
12064
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11955
12065
|
|
|
11956
12066
|
|
|
11957
|
-
def
|
|
12067
|
+
def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
11958
12068
|
g_param = parse_global_arg(parsed_globals)
|
|
11959
12069
|
|
|
11960
12070
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11986,11 +12096,11 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
11986
12096
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11987
12097
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11988
12098
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11989
|
-
model = models.
|
|
12099
|
+
model = models.DescribeSecurityIPGroupInfoRequest()
|
|
11990
12100
|
model.from_json_string(json.dumps(args))
|
|
11991
12101
|
start_time = time.time()
|
|
11992
12102
|
while True:
|
|
11993
|
-
rsp = client.
|
|
12103
|
+
rsp = client.DescribeSecurityIPGroupInfo(model)
|
|
11994
12104
|
result = rsp.to_json_string()
|
|
11995
12105
|
try:
|
|
11996
12106
|
json_obj = json.loads(result)
|
|
@@ -12009,7 +12119,7 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
12009
12119
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12010
12120
|
|
|
12011
12121
|
|
|
12012
|
-
def
|
|
12122
|
+
def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
12013
12123
|
g_param = parse_global_arg(parsed_globals)
|
|
12014
12124
|
|
|
12015
12125
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12041,11 +12151,11 @@ def doCreatePlan(args, parsed_globals):
|
|
|
12041
12151
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12042
12152
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12043
12153
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12044
|
-
model = models.
|
|
12154
|
+
model = models.ModifyLoadBalancingStatusRequest()
|
|
12045
12155
|
model.from_json_string(json.dumps(args))
|
|
12046
12156
|
start_time = time.time()
|
|
12047
12157
|
while True:
|
|
12048
|
-
rsp = client.
|
|
12158
|
+
rsp = client.ModifyLoadBalancingStatus(model)
|
|
12049
12159
|
result = rsp.to_json_string()
|
|
12050
12160
|
try:
|
|
12051
12161
|
json_obj = json.loads(result)
|
|
@@ -12064,7 +12174,7 @@ def doCreatePlan(args, parsed_globals):
|
|
|
12064
12174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12065
12175
|
|
|
12066
12176
|
|
|
12067
|
-
def
|
|
12177
|
+
def doCreatePlan(args, parsed_globals):
|
|
12068
12178
|
g_param = parse_global_arg(parsed_globals)
|
|
12069
12179
|
|
|
12070
12180
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12096,11 +12206,11 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
12096
12206
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12097
12207
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12098
12208
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12099
|
-
model = models.
|
|
12209
|
+
model = models.CreatePlanRequest()
|
|
12100
12210
|
model.from_json_string(json.dumps(args))
|
|
12101
12211
|
start_time = time.time()
|
|
12102
12212
|
while True:
|
|
12103
|
-
rsp = client.
|
|
12213
|
+
rsp = client.CreatePlan(model)
|
|
12104
12214
|
result = rsp.to_json_string()
|
|
12105
12215
|
try:
|
|
12106
12216
|
json_obj = json.loads(result)
|
|
@@ -12119,7 +12229,7 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
12119
12229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12120
12230
|
|
|
12121
12231
|
|
|
12122
|
-
def
|
|
12232
|
+
def doDescribeDnsRecords(args, parsed_globals):
|
|
12123
12233
|
g_param = parse_global_arg(parsed_globals)
|
|
12124
12234
|
|
|
12125
12235
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12151,11 +12261,11 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
12151
12261
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12152
12262
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12153
12263
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12154
|
-
model = models.
|
|
12264
|
+
model = models.DescribeDnsRecordsRequest()
|
|
12155
12265
|
model.from_json_string(json.dumps(args))
|
|
12156
12266
|
start_time = time.time()
|
|
12157
12267
|
while True:
|
|
12158
|
-
rsp = client.
|
|
12268
|
+
rsp = client.DescribeDnsRecords(model)
|
|
12159
12269
|
result = rsp.to_json_string()
|
|
12160
12270
|
try:
|
|
12161
12271
|
json_obj = json.loads(result)
|
|
@@ -12174,7 +12284,7 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
12174
12284
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12175
12285
|
|
|
12176
12286
|
|
|
12177
|
-
def
|
|
12287
|
+
def doModifyDDoSProtection(args, parsed_globals):
|
|
12178
12288
|
g_param = parse_global_arg(parsed_globals)
|
|
12179
12289
|
|
|
12180
12290
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12206,11 +12316,11 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
12206
12316
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12207
12317
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12208
12318
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12209
|
-
model = models.
|
|
12319
|
+
model = models.ModifyDDoSProtectionRequest()
|
|
12210
12320
|
model.from_json_string(json.dumps(args))
|
|
12211
12321
|
start_time = time.time()
|
|
12212
12322
|
while True:
|
|
12213
|
-
rsp = client.
|
|
12323
|
+
rsp = client.ModifyDDoSProtection(model)
|
|
12214
12324
|
result = rsp.to_json_string()
|
|
12215
12325
|
try:
|
|
12216
12326
|
json_obj = json.loads(result)
|
|
@@ -12229,7 +12339,7 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
12229
12339
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12230
12340
|
|
|
12231
12341
|
|
|
12232
|
-
def
|
|
12342
|
+
def doDescribeSecurityAPIService(args, parsed_globals):
|
|
12233
12343
|
g_param = parse_global_arg(parsed_globals)
|
|
12234
12344
|
|
|
12235
12345
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12261,11 +12371,11 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
12261
12371
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12262
12372
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12263
12373
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12264
|
-
model = models.
|
|
12374
|
+
model = models.DescribeSecurityAPIServiceRequest()
|
|
12265
12375
|
model.from_json_string(json.dumps(args))
|
|
12266
12376
|
start_time = time.time()
|
|
12267
12377
|
while True:
|
|
12268
|
-
rsp = client.
|
|
12378
|
+
rsp = client.DescribeSecurityAPIService(model)
|
|
12269
12379
|
result = rsp.to_json_string()
|
|
12270
12380
|
try:
|
|
12271
12381
|
json_obj = json.loads(result)
|
|
@@ -12284,7 +12394,7 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
12284
12394
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12285
12395
|
|
|
12286
12396
|
|
|
12287
|
-
def
|
|
12397
|
+
def doImportZoneConfig(args, parsed_globals):
|
|
12288
12398
|
g_param = parse_global_arg(parsed_globals)
|
|
12289
12399
|
|
|
12290
12400
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12316,11 +12426,11 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
12316
12426
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12317
12427
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12318
12428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12319
|
-
model = models.
|
|
12429
|
+
model = models.ImportZoneConfigRequest()
|
|
12320
12430
|
model.from_json_string(json.dumps(args))
|
|
12321
12431
|
start_time = time.time()
|
|
12322
12432
|
while True:
|
|
12323
|
-
rsp = client.
|
|
12433
|
+
rsp = client.ImportZoneConfig(model)
|
|
12324
12434
|
result = rsp.to_json_string()
|
|
12325
12435
|
try:
|
|
12326
12436
|
json_obj = json.loads(result)
|
|
@@ -12339,7 +12449,7 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
12339
12449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12340
12450
|
|
|
12341
12451
|
|
|
12342
|
-
def
|
|
12452
|
+
def doDescribeDDosAttackData(args, parsed_globals):
|
|
12343
12453
|
g_param = parse_global_arg(parsed_globals)
|
|
12344
12454
|
|
|
12345
12455
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12371,11 +12481,11 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
12371
12481
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12372
12482
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12373
12483
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12374
|
-
model = models.
|
|
12484
|
+
model = models.DescribeDDosAttackDataRequest()
|
|
12375
12485
|
model.from_json_string(json.dumps(args))
|
|
12376
12486
|
start_time = time.time()
|
|
12377
12487
|
while True:
|
|
12378
|
-
rsp = client.
|
|
12488
|
+
rsp = client.DescribeDDosAttackData(model)
|
|
12379
12489
|
result = rsp.to_json_string()
|
|
12380
12490
|
try:
|
|
12381
12491
|
json_obj = json.loads(result)
|
|
@@ -12394,7 +12504,7 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
12394
12504
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12395
12505
|
|
|
12396
12506
|
|
|
12397
|
-
def
|
|
12507
|
+
def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
12398
12508
|
g_param = parse_global_arg(parsed_globals)
|
|
12399
12509
|
|
|
12400
12510
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12426,11 +12536,11 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
12426
12536
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12427
12537
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12428
12538
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12429
|
-
model = models.
|
|
12539
|
+
model = models.CreateMultiPathGatewaySecretKeyRequest()
|
|
12430
12540
|
model.from_json_string(json.dumps(args))
|
|
12431
12541
|
start_time = time.time()
|
|
12432
12542
|
while True:
|
|
12433
|
-
rsp = client.
|
|
12543
|
+
rsp = client.CreateMultiPathGatewaySecretKey(model)
|
|
12434
12544
|
result = rsp.to_json_string()
|
|
12435
12545
|
try:
|
|
12436
12546
|
json_obj = json.loads(result)
|
|
@@ -12449,7 +12559,7 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
12449
12559
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12450
12560
|
|
|
12451
12561
|
|
|
12452
|
-
def
|
|
12562
|
+
def doModifyCustomErrorPage(args, parsed_globals):
|
|
12453
12563
|
g_param = parse_global_arg(parsed_globals)
|
|
12454
12564
|
|
|
12455
12565
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12481,11 +12591,11 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
12481
12591
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12482
12592
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12483
12593
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12484
|
-
model = models.
|
|
12594
|
+
model = models.ModifyCustomErrorPageRequest()
|
|
12485
12595
|
model.from_json_string(json.dumps(args))
|
|
12486
12596
|
start_time = time.time()
|
|
12487
12597
|
while True:
|
|
12488
|
-
rsp = client.
|
|
12598
|
+
rsp = client.ModifyCustomErrorPage(model)
|
|
12489
12599
|
result = rsp.to_json_string()
|
|
12490
12600
|
try:
|
|
12491
12601
|
json_obj = json.loads(result)
|
|
@@ -12504,7 +12614,7 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
12504
12614
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12505
12615
|
|
|
12506
12616
|
|
|
12507
|
-
def
|
|
12617
|
+
def doDescribeL4ProxyRules(args, parsed_globals):
|
|
12508
12618
|
g_param = parse_global_arg(parsed_globals)
|
|
12509
12619
|
|
|
12510
12620
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12536,11 +12646,11 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
12536
12646
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12537
12647
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12538
12648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12539
|
-
model = models.
|
|
12649
|
+
model = models.DescribeL4ProxyRulesRequest()
|
|
12540
12650
|
model.from_json_string(json.dumps(args))
|
|
12541
12651
|
start_time = time.time()
|
|
12542
12652
|
while True:
|
|
12543
|
-
rsp = client.
|
|
12653
|
+
rsp = client.DescribeL4ProxyRules(model)
|
|
12544
12654
|
result = rsp.to_json_string()
|
|
12545
12655
|
try:
|
|
12546
12656
|
json_obj = json.loads(result)
|
|
@@ -12559,7 +12669,7 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
12559
12669
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12560
12670
|
|
|
12561
12671
|
|
|
12562
|
-
def
|
|
12672
|
+
def doDescribeDDoSAttackData(args, parsed_globals):
|
|
12563
12673
|
g_param = parse_global_arg(parsed_globals)
|
|
12564
12674
|
|
|
12565
12675
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12591,11 +12701,11 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
12591
12701
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12592
12702
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12593
12703
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12594
|
-
model = models.
|
|
12704
|
+
model = models.DescribeDDoSAttackDataRequest()
|
|
12595
12705
|
model.from_json_string(json.dumps(args))
|
|
12596
12706
|
start_time = time.time()
|
|
12597
12707
|
while True:
|
|
12598
|
-
rsp = client.
|
|
12708
|
+
rsp = client.DescribeDDoSAttackData(model)
|
|
12599
12709
|
result = rsp.to_json_string()
|
|
12600
12710
|
try:
|
|
12601
12711
|
json_obj = json.loads(result)
|
|
@@ -12614,7 +12724,7 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
12614
12724
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12615
12725
|
|
|
12616
12726
|
|
|
12617
|
-
def
|
|
12727
|
+
def doDeleteSharedCNAME(args, parsed_globals):
|
|
12618
12728
|
g_param = parse_global_arg(parsed_globals)
|
|
12619
12729
|
|
|
12620
12730
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12646,11 +12756,11 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
12646
12756
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12647
12757
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12648
12758
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12649
|
-
model = models.
|
|
12759
|
+
model = models.DeleteSharedCNAMERequest()
|
|
12650
12760
|
model.from_json_string(json.dumps(args))
|
|
12651
12761
|
start_time = time.time()
|
|
12652
12762
|
while True:
|
|
12653
|
-
rsp = client.
|
|
12763
|
+
rsp = client.DeleteSharedCNAME(model)
|
|
12654
12764
|
result = rsp.to_json_string()
|
|
12655
12765
|
try:
|
|
12656
12766
|
json_obj = json.loads(result)
|
|
@@ -12669,7 +12779,7 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
12669
12779
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12670
12780
|
|
|
12671
12781
|
|
|
12672
|
-
def
|
|
12782
|
+
def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
12673
12783
|
g_param = parse_global_arg(parsed_globals)
|
|
12674
12784
|
|
|
12675
12785
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12701,11 +12811,11 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
12701
12811
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12702
12812
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12703
12813
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12704
|
-
model = models.
|
|
12814
|
+
model = models.DescribeWebManagedRulesDataRequest()
|
|
12705
12815
|
model.from_json_string(json.dumps(args))
|
|
12706
12816
|
start_time = time.time()
|
|
12707
12817
|
while True:
|
|
12708
|
-
rsp = client.
|
|
12818
|
+
rsp = client.DescribeWebManagedRulesData(model)
|
|
12709
12819
|
result = rsp.to_json_string()
|
|
12710
12820
|
try:
|
|
12711
12821
|
json_obj = json.loads(result)
|
|
@@ -12724,7 +12834,7 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
12724
12834
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12725
12835
|
|
|
12726
12836
|
|
|
12727
|
-
def
|
|
12837
|
+
def doImportDnsRecords(args, parsed_globals):
|
|
12728
12838
|
g_param = parse_global_arg(parsed_globals)
|
|
12729
12839
|
|
|
12730
12840
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12756,11 +12866,11 @@ def doCreateSecurityAPIService(args, parsed_globals):
|
|
|
12756
12866
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12757
12867
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12758
12868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12759
|
-
model = models.
|
|
12869
|
+
model = models.ImportDnsRecordsRequest()
|
|
12760
12870
|
model.from_json_string(json.dumps(args))
|
|
12761
12871
|
start_time = time.time()
|
|
12762
12872
|
while True:
|
|
12763
|
-
rsp = client.
|
|
12873
|
+
rsp = client.ImportDnsRecords(model)
|
|
12764
12874
|
result = rsp.to_json_string()
|
|
12765
12875
|
try:
|
|
12766
12876
|
json_obj = json.loads(result)
|
|
@@ -13323,7 +13433,7 @@ ACTION_MAP = {
|
|
|
13323
13433
|
"DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
|
|
13324
13434
|
"ModifyL4ProxyStatus": doModifyL4ProxyStatus,
|
|
13325
13435
|
"DownloadL7Logs": doDownloadL7Logs,
|
|
13326
|
-
"
|
|
13436
|
+
"CreateContentIdentifier": doCreateContentIdentifier,
|
|
13327
13437
|
"DescribeOriginACL": doDescribeOriginACL,
|
|
13328
13438
|
"DeleteApplicationProxyRule": doDeleteApplicationProxyRule,
|
|
13329
13439
|
"CheckCnameStatus": doCheckCnameStatus,
|
|
@@ -13361,6 +13471,7 @@ ACTION_MAP = {
|
|
|
13361
13471
|
"RefreshMultiPathGatewaySecretKey": doRefreshMultiPathGatewaySecretKey,
|
|
13362
13472
|
"CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
|
|
13363
13473
|
"ModifyL4Proxy": doModifyL4Proxy,
|
|
13474
|
+
"CheckFreeCertificateVerification": doCheckFreeCertificateVerification,
|
|
13364
13475
|
"ModifyL4ProxyRules": doModifyL4ProxyRules,
|
|
13365
13476
|
"DescribeIdentifications": doDescribeIdentifications,
|
|
13366
13477
|
"DescribeDDosAttackEventDetail": doDescribeDDosAttackEventDetail,
|
|
@@ -13494,7 +13605,7 @@ ACTION_MAP = {
|
|
|
13494
13605
|
"DescribeZoneSetting": doDescribeZoneSetting,
|
|
13495
13606
|
"DescribeSecurityAPIResource": doDescribeSecurityAPIResource,
|
|
13496
13607
|
"DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
|
|
13497
|
-
"
|
|
13608
|
+
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
|
13498
13609
|
"DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
|
|
13499
13610
|
"CreateApplicationProxyRule": doCreateApplicationProxyRule,
|
|
13500
13611
|
"ModifySecurityJSInjectionRule": doModifySecurityJSInjectionRule,
|
|
@@ -13502,7 +13613,9 @@ ACTION_MAP = {
|
|
|
13502
13613
|
"DescribeFunctions": doDescribeFunctions,
|
|
13503
13614
|
"ReclaimZone": doReclaimZone,
|
|
13504
13615
|
"DeleteZone": doDeleteZone,
|
|
13616
|
+
"ApplyFreeCertificate": doApplyFreeCertificate,
|
|
13505
13617
|
"DescribeDDosAttackEvent": doDescribeDDosAttackEvent,
|
|
13618
|
+
"DescribeEnvironments": doDescribeEnvironments,
|
|
13506
13619
|
"DescribeSecurityIPGroupInfo": doDescribeSecurityIPGroupInfo,
|
|
13507
13620
|
"ModifyLoadBalancingStatus": doModifyLoadBalancingStatus,
|
|
13508
13621
|
"CreatePlan": doCreatePlan,
|
|
@@ -13518,7 +13631,6 @@ ACTION_MAP = {
|
|
|
13518
13631
|
"DeleteSharedCNAME": doDeleteSharedCNAME,
|
|
13519
13632
|
"DescribeWebManagedRulesData": doDescribeWebManagedRulesData,
|
|
13520
13633
|
"ImportDnsRecords": doImportDnsRecords,
|
|
13521
|
-
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
|
13522
13634
|
"DescribeSecurityPolicyManagedRulesId": doDescribeSecurityPolicyManagedRulesId,
|
|
13523
13635
|
"DescribeAliasDomains": doDescribeAliasDomains,
|
|
13524
13636
|
"DescribeOriginGroupDetail": doDescribeOriginGroupDetail,
|
|
@@ -1,5 +1,12 @@
|
|
|
1
1
|
{
|
|
2
2
|
"actions": {
|
|
3
|
+
"ApplyFreeCertificate": {
|
|
4
|
+
"document": "This API is used to apply for a free certificate. If you need to proceed with DNS delegated verification or file verification, you can call this API to initiate the certificate application and obtain the corresponding verification content based on the application method. The order for API calls is as follows:.\nStep 1: Call ApplyFreeCertificate, specify the verification method for free certificate application, and obtain the verification content.\nStep 2: Configure the corresponding domain as verification content.\nStep 3: Call CheckFreeCertificateVerification to verify. After verification passes, the free certificate application is completed.\nStep 4: Call ModifyHostsCertificate to issue a domain certificate configured to use the EdgeOne free certificate.\n\nThe application method introduction in the document: [Free Certificate Application Description](https://www.tencentcloud.comom/document/product/1552/90437?from_cn_redirect=1). \ndescription:.\n- Only CNAME access mode can call this API to specify the free certificate application method. NS/DNSPod hosting access modes use automatic validation to apply for free certificates with no need to call this API.\n- If you need to switch the free certificate authentication method, you can call this API again by changing the VerificationMethod field to update it.\n- A domain name can only apply for one free certificate. After calling this API, the backend will trigger the free certificate application task. You need to complete the domain name verification info configuration within 2 days, then finish certificate authentication.",
|
|
5
|
+
"input": "ApplyFreeCertificateRequest",
|
|
6
|
+
"name": "Applies for a free certificate",
|
|
7
|
+
"output": "ApplyFreeCertificateResponse",
|
|
8
|
+
"status": "online"
|
|
9
|
+
},
|
|
3
10
|
"BindSecurityTemplateToEntity": {
|
|
4
11
|
"document": "This API is used to bind/unbind a domain name to/from a specific policy template. ",
|
|
5
12
|
"input": "BindSecurityTemplateToEntityRequest",
|
|
@@ -28,6 +35,13 @@
|
|
|
28
35
|
"output": "CheckCnameStatusResponse",
|
|
29
36
|
"status": "online"
|
|
30
37
|
},
|
|
38
|
+
"CheckFreeCertificateVerification": {
|
|
39
|
+
"document": "This API is used to verify a free certificate and obtain the application result. If verified, you can query the free certificate information for the corresponding domain name application through this API. If failed to apply, this API will return the corresponding verification failure message.\nThis API is used to check the free certificate application result after triggering the [ApplyFreeCertificate](https://www.tencentcloud.comom/document/product/1552/124807?from_cn_redirect=1) . Once the application is successful, you need to configure through the [ModifyHostsCertificate](https://www.tencentcloud.comom/document/product/1552/80764?from_cn_redirect=1) to deploy the free certificate to the acceleration domain.",
|
|
40
|
+
"input": "CheckFreeCertificateVerificationRequest",
|
|
41
|
+
"name": "Check free certificate application result",
|
|
42
|
+
"output": "CheckFreeCertificateVerificationResponse",
|
|
43
|
+
"status": "online"
|
|
44
|
+
},
|
|
31
45
|
"ConfirmMultiPathGatewayOriginACL": {
|
|
32
46
|
"document": "This API is used to confirm the latest origin IP range is updated to the origin server firewall when the multi-channel security acceleration gateway's origin IP range changes.",
|
|
33
47
|
"input": "ConfirmMultiPathGatewayOriginACLRequest",
|
|
@@ -2860,6 +2874,71 @@
|
|
|
2860
2874
|
],
|
|
2861
2875
|
"usage": "both"
|
|
2862
2876
|
},
|
|
2877
|
+
"ApplyFreeCertificateRequest": {
|
|
2878
|
+
"document": "ApplyFreeCertificate request structure.",
|
|
2879
|
+
"members": [
|
|
2880
|
+
{
|
|
2881
|
+
"disabled": false,
|
|
2882
|
+
"document": "Site ID.",
|
|
2883
|
+
"example": "zone-343vqcswn9zj",
|
|
2884
|
+
"member": "string",
|
|
2885
|
+
"name": "ZoneId",
|
|
2886
|
+
"required": true,
|
|
2887
|
+
"type": "string"
|
|
2888
|
+
},
|
|
2889
|
+
{
|
|
2890
|
+
"disabled": false,
|
|
2891
|
+
"document": "Specifies the target domain name for free certificate application.",
|
|
2892
|
+
"example": "www.test.com",
|
|
2893
|
+
"member": "string",
|
|
2894
|
+
"name": "Domain",
|
|
2895
|
+
"required": true,
|
|
2896
|
+
"type": "string"
|
|
2897
|
+
},
|
|
2898
|
+
{
|
|
2899
|
+
"disabled": false,
|
|
2900
|
+
"document": "Specifies the verification method for applying for a free certificate. for detailed verification methods, refer to the [free certificate application documentation](https://www.tencentcloud.comom/document/product/1552/90437?from_cn_redirect=1). valid values:.\n<li>http_challenge: specifies the file validation mode for http access. verifies by getting file information from the specified URL of the access domain to complete free certificate application.</li>\n<li>dns_challenge: specifies the dns delegation verification method. verifies the free certificate application by adding the designated host record pointing to EdgeOne.</li>\n\nNote: after triggering this api, you need to complete the verification content configuration based on the returned verification information. once configured, you must also verify by calling the <a href = 'https://www.tencentcloud.comom/document/product/1552/124806?from_cn_redirect=1'>check free certificate application result</a> api. after verification passes, the application succeeds. once the application is successful, you can call the <a href = 'https://www.tencentcloud.comom/document/product/1552/80764?from_cn_redirect=1'>configure domain name certificate</a> API to deploy a free certificate for the current domain name.",
|
|
2901
|
+
"example": "http_challenge",
|
|
2902
|
+
"member": "string",
|
|
2903
|
+
"name": "VerificationMethod",
|
|
2904
|
+
"required": true,
|
|
2905
|
+
"type": "string"
|
|
2906
|
+
}
|
|
2907
|
+
],
|
|
2908
|
+
"type": "object"
|
|
2909
|
+
},
|
|
2910
|
+
"ApplyFreeCertificateResponse": {
|
|
2911
|
+
"document": "ApplyFreeCertificate response structure.",
|
|
2912
|
+
"members": [
|
|
2913
|
+
{
|
|
2914
|
+
"disabled": false,
|
|
2915
|
+
"document": "Specifies the verification information for free certificate application when VerificationMethod is dns_challenge.",
|
|
2916
|
+
"example": "无",
|
|
2917
|
+
"member": "DnsVerification",
|
|
2918
|
+
"name": "DnsVerification",
|
|
2919
|
+
"output_required": false,
|
|
2920
|
+
"type": "object",
|
|
2921
|
+
"value_allowed_null": false
|
|
2922
|
+
},
|
|
2923
|
+
{
|
|
2924
|
+
"disabled": false,
|
|
2925
|
+
"document": "Specifies the verification information related to the free certificate application for the domain name when VerificationMethod is http_challenge.",
|
|
2926
|
+
"example": "无",
|
|
2927
|
+
"member": "FileVerification",
|
|
2928
|
+
"name": "FileVerification",
|
|
2929
|
+
"output_required": false,
|
|
2930
|
+
"type": "object",
|
|
2931
|
+
"value_allowed_null": false
|
|
2932
|
+
},
|
|
2933
|
+
{
|
|
2934
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
2935
|
+
"member": "string",
|
|
2936
|
+
"name": "RequestId",
|
|
2937
|
+
"type": "string"
|
|
2938
|
+
}
|
|
2939
|
+
],
|
|
2940
|
+
"type": "object"
|
|
2941
|
+
},
|
|
2863
2942
|
"AscriptionInfo": {
|
|
2864
2943
|
"document": "The site ownership information",
|
|
2865
2944
|
"members": [
|
|
@@ -4534,6 +4613,72 @@
|
|
|
4534
4613
|
],
|
|
4535
4614
|
"type": "object"
|
|
4536
4615
|
},
|
|
4616
|
+
"CheckFreeCertificateVerificationRequest": {
|
|
4617
|
+
"document": "CheckFreeCertificateVerification request structure.",
|
|
4618
|
+
"members": [
|
|
4619
|
+
{
|
|
4620
|
+
"disabled": false,
|
|
4621
|
+
"document": "Zone ID.",
|
|
4622
|
+
"example": "zone-28v607hq8d3m",
|
|
4623
|
+
"member": "string",
|
|
4624
|
+
"name": "ZoneId",
|
|
4625
|
+
"required": true,
|
|
4626
|
+
"type": "string"
|
|
4627
|
+
},
|
|
4628
|
+
{
|
|
4629
|
+
"disabled": false,
|
|
4630
|
+
"document": "Acceleration domain name, that domain name used when [applying for free certificate](https://www.tencentcloud.comom/document/product/1552/124807?from_cn_redirect=1).",
|
|
4631
|
+
"example": "qq.com",
|
|
4632
|
+
"member": "string",
|
|
4633
|
+
"name": "Domain",
|
|
4634
|
+
"required": true,
|
|
4635
|
+
"type": "string"
|
|
4636
|
+
}
|
|
4637
|
+
],
|
|
4638
|
+
"type": "object"
|
|
4639
|
+
},
|
|
4640
|
+
"CheckFreeCertificateVerificationResponse": {
|
|
4641
|
+
"document": "CheckFreeCertificateVerification response structure.",
|
|
4642
|
+
"members": [
|
|
4643
|
+
{
|
|
4644
|
+
"disabled": false,
|
|
4645
|
+
"document": "Specifies the domain name to which the certificate is issued when the free certificate application succeeds.\nNote: only one free certificate can be applied for a domain name. if a wildcard certificate has been applied for the domain name, its subdomains will use the wildcard certificate.",
|
|
4646
|
+
"example": "aa.test.com",
|
|
4647
|
+
"member": "string",
|
|
4648
|
+
"name": "CommonName",
|
|
4649
|
+
"output_required": true,
|
|
4650
|
+
"type": "string",
|
|
4651
|
+
"value_allowed_null": false
|
|
4652
|
+
},
|
|
4653
|
+
{
|
|
4654
|
+
"disabled": false,
|
|
4655
|
+
"document": "Specifies the signature algorithm used by the certificate when the free certificate application succeeds. currently only support RSA 2048.",
|
|
4656
|
+
"example": "RSA 2048",
|
|
4657
|
+
"member": "string",
|
|
4658
|
+
"name": "SignatureAlgorithm",
|
|
4659
|
+
"output_required": true,
|
|
4660
|
+
"type": "string",
|
|
4661
|
+
"value_allowed_null": false
|
|
4662
|
+
},
|
|
4663
|
+
{
|
|
4664
|
+
"disabled": false,
|
|
4665
|
+
"document": "Expiration time of the certificate when the free certificate application is successful. the time is in coordinated universal time (UTC), following the ISO 8601 standard date and time format.",
|
|
4666
|
+
"example": "2014-08-03T12:00:00+08:00",
|
|
4667
|
+
"member": "datetime_iso",
|
|
4668
|
+
"name": "ExpireTime",
|
|
4669
|
+
"output_required": true,
|
|
4670
|
+
"type": "string",
|
|
4671
|
+
"value_allowed_null": false
|
|
4672
|
+
},
|
|
4673
|
+
{
|
|
4674
|
+
"document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
|
|
4675
|
+
"member": "string",
|
|
4676
|
+
"name": "RequestId",
|
|
4677
|
+
"type": "string"
|
|
4678
|
+
}
|
|
4679
|
+
],
|
|
4680
|
+
"type": "object"
|
|
4681
|
+
},
|
|
4537
4682
|
"CheckRegionHealthStatus": {
|
|
4538
4683
|
"document": "Health status of origin servers in each health check region.",
|
|
4539
4684
|
"members": [
|
|
@@ -14977,7 +15122,7 @@
|
|
|
14977
15122
|
"usage": "both"
|
|
14978
15123
|
},
|
|
14979
15124
|
"DnsVerification": {
|
|
14980
|
-
"document": "",
|
|
15125
|
+
"document": "Information required for DNS resolution verification when applying for a free certificate in CNAME mode integration to verify ownership of a site or domain name.",
|
|
14981
15126
|
"members": [
|
|
14982
15127
|
{
|
|
14983
15128
|
"disabled": false,
|
|
@@ -16010,11 +16155,11 @@
|
|
|
16010
16155
|
"usage": "out"
|
|
16011
16156
|
},
|
|
16012
16157
|
"FileVerification": {
|
|
16013
|
-
"document": "Information required for
|
|
16158
|
+
"document": "Information required for HTTP access verification file when applying for a free certificate in CNAME mode integration to verify ownership of a site or domain name.",
|
|
16014
16159
|
"members": [
|
|
16015
16160
|
{
|
|
16016
16161
|
"disabled": false,
|
|
16017
|
-
"document": "EdgeOne
|
|
16162
|
+
"document": "EdgeOne backend server will get file verification information via http://{Host}{URL Path} (for example http://www.example.com/.well-known/teo-verification/z12h416twn.txt). among them, this field specifies the URL Path part you need to create, and Host indicates the current accelerated domain.",
|
|
16018
16163
|
"example": "/.well-known/teo-verification/z12h416twn.txt",
|
|
16019
16164
|
"member": "string",
|
|
16020
16165
|
"name": "Path",
|
|
@@ -19905,7 +20050,7 @@
|
|
|
19905
20050
|
},
|
|
19906
20051
|
{
|
|
19907
20052
|
"disabled": false,
|
|
19908
|
-
"document": "
|
|
20053
|
+
"document": "Configures the server certificate mode. valid values:.\n\n- disable: without configuring server certificate.\n- eofreecert: specifies to apply for a free certificate through automatic validation and deploy it. for verification methods, see [free certificate application supported verification methods](https://www.tencentcloud.comom/document/product/1552/90437?from_cn_redirect=1).\n - In ns or DNSPod hosting access mode, free certificates can only be applied for via automatic validation.\n - When a free certificate application fails, it can cause deployment failure. you can obtain the failure reason through the <a href = 'https://www.tencentcloud.comom/document/product/1552/124806?from_cn_redirect=1)'>check free certificate application result</a> .\n- eofreecert_manual: specifies the deployment of free certificates applied through DNS delegation verification or file verification. before deploying a free certificate, you need to trigger the [apply for free certificate](https://www.tencentcloud.comom/document/product/1552/124807?from_cn_redirect=1)) api to apply for a free certificate. once the application is successful, you can use this enumeration value to deploy the free certificate.\nNote: when deploying a free certificate, ensure a successful application for a free certificate already exists. you can check whether a successful application for a free certificate already exists through the <a href = 'https://www.tencentcloud.comom/document/product/1552/124806?from_cn_redirect=1)'>check free certificate application result</a> api.\n- sslcert: specifies the configuration of the managed service side certificate.",
|
|
19909
20054
|
"example": "eofreecert",
|
|
19910
20055
|
"member": "string",
|
|
19911
20056
|
"name": "Mode",
|
|
@@ -19941,7 +20086,7 @@
|
|
|
19941
20086
|
},
|
|
19942
20087
|
{
|
|
19943
20088
|
"disabled": false,
|
|
19944
|
-
"document": "
|
|
20089
|
+
"document": "Specifies the certificate carried during EO node origin-pull for origin-pull mutual authentication handshake, off by default. leave blank to indicate retaining the original configuration. this configuration is currently in closed beta testing for the allowlist feature. if you need to use it, please contact us (https://www.tencentcloud.comom/online?from_cn_redirect=1-service).",
|
|
19945
20090
|
"example": "无",
|
|
19946
20091
|
"member": "UpstreamCertInfo",
|
|
19947
20092
|
"name": "UpstreamCertInfo",
|
|
@@ -1,5 +1,19 @@
|
|
|
1
1
|
{
|
|
2
2
|
"actions": {
|
|
3
|
+
"ApplyFreeCertificate": [
|
|
4
|
+
{
|
|
5
|
+
"document": "This example shows you how to apply for a free certificate using file validation mode with HTTP access for the domain name (abc.test.com) under the site (ZoneId is zone-2fgd17m17xw).",
|
|
6
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ApplyFreeCertificate\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-2fgd17m17xw\",\n \"Domain\": \"abc.test.com\",\n \"VerificationMethod\": \"http_challenge\"\n}",
|
|
7
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"064a8c04-2d3e-4c9d-9473-39a8f76276ea\",\n \"FileVerification\": {\n \"Content\": \"9i8vhsvt9y8y3sx1s2d\",\n \"Path\": \"/.well-known/teo-verification/yvnu7sesms\"\n }\n }\n}",
|
|
8
|
+
"title": "Applying for Free Certificate Using HTTP Access File Validation Mode"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"document": "This example shows you how to apply for a free certificate using the DNS delegated verification method for the domain name (qwe.test.com) under the site (ZoneId is zone-2fgd17m17xw).",
|
|
12
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ApplyFreeCertificate\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-2fgd17m17xw\",\n \"Domain\": \"qwe.test.com\",\n \"VerificationMethod\": \"dns_challenge\"\n}",
|
|
13
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"064a8c04-2d3e-4c9d-9473-39a8f76276ea\",\n \"DnsVerification\": {\n \"RecordType\": \"CNAME\",\n \"RecordValue\": \"_acme-challenge\",\n \"Subdomain\": \"www.example.com.edgeone.com\"\n }\n }\n}",
|
|
14
|
+
"title": "Applying for a Free Certificate Using DNS Delegation Verification Method"
|
|
15
|
+
}
|
|
16
|
+
],
|
|
3
17
|
"BindSecurityTemplateToEntity": [
|
|
4
18
|
{
|
|
5
19
|
"document": "In this example, we unbind the domain name `a.test.com` from the policy template `temp-cuwg1hki` of the site `zone-2aq0e8rhu6jx`. Only one domain name can be unbound at one time. There are two options: \n1. `unbind-keep-policy`: Unbind the domain name from the specified policy and create a new policy for the domain name with the same configuration as the original one. This takes additional rule quota.\n2. `unbind-use-default`: Unbind the domain name from the specified policy and then bind it with the default policy with default configurations. Custom rules no longer take effect.\n\n \n\nNote: To use `unbind-keep-policy`, make sure your rule quota is enough. If the remaining quota is insufficient, the unbinding fails and the domain name remains bound to the current policy template.",
|
|
@@ -44,6 +58,20 @@
|
|
|
44
58
|
"title": "Querying the CNAME status of a domain name"
|
|
45
59
|
}
|
|
46
60
|
],
|
|
61
|
+
"CheckFreeCertificateVerification": [
|
|
62
|
+
{
|
|
63
|
+
"document": "This example shows you how to check whether the free certificate application succeeds for the domain name (cc.xzone.cloud) under the site (ZoneId is zone-28v607hq8d3m) after triggering the application.",
|
|
64
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckFreeCertificateVerification\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-28v607hq8d3m\",\n \"Domain\": \"cc.xzone.cloud\"\n}",
|
|
65
|
+
"output": "{\n \"Response\": {\n \"Error\": {\n \"Code\": \"ResourceUnavailable.RecordUnExpected\",\n \"Message\": \"Unable to detect the verification value correctly. Please check whether the current domain name has configured regional resolution or policy interception.\"\n },\n \"RequestId\": \"ed93f3cb-f35e-473f-b9f3-0d451b8b79c6\"\n }\n}",
|
|
66
|
+
"title": "Checking Free Certificate Application Result, Free Certificate Application Failed"
|
|
67
|
+
},
|
|
68
|
+
{
|
|
69
|
+
"document": "This example shows you how to check whether the free certificate application succeeds for the domain name (aa.xzone.cloud) under the site (ZoneId zone-28v607hq8d3m) after triggering the free certificate application.",
|
|
70
|
+
"input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckFreeCertificateVerification\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-28v607hq8d3m\",\n \"Domain\": \"aa.xzone.cloud\"\n}",
|
|
71
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"dc1ba58b-4e4e-4a71-bed6-2b777c48d17e\",\n \"CommonName\": \"aa.xzone.cloud\",\n \"SignatureAlgorithm\": \"RSA 2048\",\n \"ExpireTime\": \"2025-07-31T07:06:57Z\"\n }\n}",
|
|
72
|
+
"title": "Checking Free Certificate Application Result, Free Certificate Application Succeeds"
|
|
73
|
+
}
|
|
74
|
+
],
|
|
47
75
|
"ConfirmMultiPathGatewayOriginACL": [
|
|
48
76
|
{
|
|
49
77
|
"document": "This example shows you how to confirm the instance with ZoneId 'zone-27q0p0bal192' and GatewayId 'mpgw-lbxuhk1oh' has updated the latest origin server IP range to the origin server firewall.",
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: tccli-intl-en
|
|
3
|
-
Version: 3.1.
|
|
3
|
+
Version: 3.1.11.1
|
|
4
4
|
Summary: Universal Command Line Environment for Tencent Cloud
|
|
5
5
|
Home-page: https://github.com/TencentCloud/tencentcloud-cli-intl-en.git
|
|
6
6
|
Author: Tencent Cloud
|
|
@@ -21,7 +21,7 @@ Classifier: Programming Language :: Python :: 3.4
|
|
|
21
21
|
Classifier: Programming Language :: Python :: 3.5
|
|
22
22
|
Classifier: Programming Language :: Python :: 3.6
|
|
23
23
|
License-File: LICENSE
|
|
24
|
-
Requires-Dist: tencentcloud-sdk-python-intl-en >=3.1.
|
|
24
|
+
Requires-Dist: tencentcloud-sdk-python-intl-en >=3.1.11
|
|
25
25
|
Requires-Dist: jmespath ==0.10.0
|
|
26
26
|
Requires-Dist: six ==1.16.0
|
|
27
27
|
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
tccli/__init__.py,sha256=
|
|
1
|
+
tccli/__init__.py,sha256=eN6RTaSJL8332b5xFZdSernNHNLz6FJj-c6ygVvOkkQ,26
|
|
2
2
|
tccli/argparser.py,sha256=WtfpBhj2R6JHSzagy6w6Q4y3YVmyIC_yK80w3tqBPgU,5589
|
|
3
3
|
tccli/argument.py,sha256=_ictuLaeci9t9bvWGZ1QcpMLMztqKkpVH7UyiUwOc-g,8092
|
|
4
4
|
tccli/base_command.py,sha256=rFWNAwfS0GA6LLGNOM-iPI0RV81Jag5cZn536ZQN0pw,2859
|
|
@@ -378,7 +378,7 @@ tccli/services/mongodb/v20190725/api.json,sha256=h9GajCQsIj8rGF5f9flxRM8z12Rs3i4
|
|
|
378
378
|
tccli/services/mongodb/v20190725/examples.json,sha256=PfcdtIinoabcoI4342bksOa_TXCdhT0hu4OB24ILlvY,59498
|
|
379
379
|
tccli/services/monitor/__init__.py,sha256=Fqyy64XBMByiqJHyjxbaJeQDJAGMyktujsYRmXhosc8,93
|
|
380
380
|
tccli/services/monitor/monitor_client.py,sha256=gv-7tw8sNNAMJI4YJwov67oMorLsLE8kY6MFkZPWvI4,472842
|
|
381
|
-
tccli/services/monitor/v20180724/api.json,sha256=
|
|
381
|
+
tccli/services/monitor/v20180724/api.json,sha256=fzRIuosDX46mer7S5EQrGevOqHds0W_pZ4sGLoMkvgU,661948
|
|
382
382
|
tccli/services/monitor/v20180724/examples.json,sha256=P0joek--vtFDQQR2M624kTSu6UkSU3RM1AdLbTt4Mjg,254205
|
|
383
383
|
tccli/services/mps/__init__.py,sha256=4M5o2xc0u3rqtgz_5an9Qxw2QaOqwBq8Fjc3IB64p2o,85
|
|
384
384
|
tccli/services/mps/mps_client.py,sha256=Q_639yfhsww3hUq4aI0i3WLW8FKeO361_g5uI4bE8tY,334446
|
|
@@ -519,11 +519,11 @@ tccli/services/tem/v20201221/examples.json,sha256=DNo6OfxmsQ0vKqh9Mx0Z12PpQkTcrV
|
|
|
519
519
|
tccli/services/tem/v20210701/api.json,sha256=yDaO-jvC6yTsayjYVrhODA-wDVKZu4YQxE0fCn5eHF0,259836
|
|
520
520
|
tccli/services/tem/v20210701/examples.json,sha256=Wa6HgD5hWrDuPd1H0ThqonyQ1hCOIreoCE8TRaTDm0o,78999
|
|
521
521
|
tccli/services/teo/__init__.py,sha256=nvzcUSkSQuTftWEJ399BUZpUk_0jEq-l97539DwbAwM,85
|
|
522
|
-
tccli/services/teo/teo_client.py,sha256=
|
|
522
|
+
tccli/services/teo/teo_client.py,sha256=7b4WeyxwFPTkGekcmI_TMZLRGT9NDpy__eQJnDiDAwk,763926
|
|
523
523
|
tccli/services/teo/v20220106/api.json,sha256=pEZJsuPOV4oAO5uxFRxpkBzxdGbhiuDGeDhItZLpBk0,440930
|
|
524
524
|
tccli/services/teo/v20220106/examples.json,sha256=bzXKxeiSSmtv7lL1wbcb7YaTbgbOFBJbD_uCv1fzQuk,87233
|
|
525
|
-
tccli/services/teo/v20220901/api.json,sha256=
|
|
526
|
-
tccli/services/teo/v20220901/examples.json,sha256=
|
|
525
|
+
tccli/services/teo/v20220901/api.json,sha256=Ndb7wb5sGOq9TI06--gURK_ISmlG-DgUtOjRGEolHLU,1188499
|
|
526
|
+
tccli/services/teo/v20220901/examples.json,sha256=t1czAxgCVF0G0JbTTeiaiIM9vEgGZ0BKYk78WlvQYVQ,533780
|
|
527
527
|
tccli/services/tione/__init__.py,sha256=hVHB2cJpskiRtSHmEaJj2ZcjQp28c17sepm54VgFH7I,89
|
|
528
528
|
tccli/services/tione/tione_client.py,sha256=v-JdpUrufgYnhjS3kN-5t92Ned697gxB8xcNr2YMMV8,9275
|
|
529
529
|
tccli/services/tione/v20211111/api.json,sha256=LdLS6ORNi6pmPi7CfGts0ryuEI4qp9EFIGKOVxql1E8,107248
|
|
@@ -600,9 +600,9 @@ tccli/services/yunjing/__init__.py,sha256=8HTKN8_ow1j67tspqAbBMQgeteXAagLvtb9WAf
|
|
|
600
600
|
tccli/services/yunjing/yunjing_client.py,sha256=TgW9P5c1WrxNFj8viq_OLbeC5HYRdjHm7qv_hYr-Lqs,227266
|
|
601
601
|
tccli/services/yunjing/v20180228/api.json,sha256=zYojacZyPgPCi71CLBjuHsQR9mIxcZjCX5JwA9TYr1s,173428
|
|
602
602
|
tccli/services/yunjing/v20180228/examples.json,sha256=j3GL3TtNTkZpNLlksz0nJNCVDxYGUqfRqOt94Y-P8OE,58723
|
|
603
|
-
tccli_intl_en-3.1.
|
|
604
|
-
tccli_intl_en-3.1.
|
|
605
|
-
tccli_intl_en-3.1.
|
|
606
|
-
tccli_intl_en-3.1.
|
|
607
|
-
tccli_intl_en-3.1.
|
|
608
|
-
tccli_intl_en-3.1.
|
|
603
|
+
tccli_intl_en-3.1.11.1.dist-info/LICENSE,sha256=xx0jnfkXJvxRnG63LTGOxlggYnIysveWIZ6H3PNdCrQ,11357
|
|
604
|
+
tccli_intl_en-3.1.11.1.dist-info/METADATA,sha256=dxfwjnZzChE5XvmiC2PuOwW1NtAl3DgO9a5nXsaPnTU,3063
|
|
605
|
+
tccli_intl_en-3.1.11.1.dist-info/WHEEL,sha256=Ll72iyqtt6Rbxp-Q7FSafYA1LeRv98X15xcZWRsFEmY,109
|
|
606
|
+
tccli_intl_en-3.1.11.1.dist-info/entry_points.txt,sha256=9ZzsXxi7Xj3ZneT7VxRVJpFvnmdEOeysh999_0gWVvo,85
|
|
607
|
+
tccli_intl_en-3.1.11.1.dist-info/top_level.txt,sha256=gYFrQRE3IqZ_46Syp-vkVwwvNaYEtKcM4fE_C4Puomk,6
|
|
608
|
+
tccli_intl_en-3.1.11.1.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|