tccli-intl-en 3.1.8.1__py2.py3-none-any.whl → 3.1.11.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
tccli/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = '3.1.8.1'
1
+ __version__ = '3.1.11.1'
@@ -2247,7 +2247,7 @@
2247
2247
  "document": "BindPrometheusManagedGrafana response structure.",
2248
2248
  "members": [
2249
2249
  {
2250
- "document": "The unique request ID, which is returned for each request. RequestId is required for locating a problem.",
2250
+ "document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
2251
2251
  "member": "string",
2252
2252
  "name": "RequestId",
2253
2253
  "type": "string"
@@ -3172,12 +3172,12 @@
3172
3172
  "example": "arule-f2vx2owo",
3173
3173
  "member": "string",
3174
3174
  "name": "RuleId",
3175
- "required": true,
3175
+ "output_required": true,
3176
3176
  "type": "string",
3177
3177
  "value_allowed_null": true
3178
3178
  },
3179
3179
  {
3180
- "document": "The unique request ID, which is returned for each request. RequestId is required for locating a problem.",
3180
+ "document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
3181
3181
  "member": "string",
3182
3182
  "name": "RequestId",
3183
3183
  "type": "string"
@@ -1999,7 +1999,7 @@ def doDownloadL7Logs(args, parsed_globals):
1999
1999
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2000
2000
 
2001
2001
 
2002
- def doDescribeEnvironments(args, parsed_globals):
2002
+ def doCreateContentIdentifier(args, parsed_globals):
2003
2003
  g_param = parse_global_arg(parsed_globals)
2004
2004
 
2005
2005
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2031,11 +2031,11 @@ def doDescribeEnvironments(args, parsed_globals):
2031
2031
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
2032
2032
  client._sdkVersion += ("_CLI_" + __version__)
2033
2033
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2034
- model = models.DescribeEnvironmentsRequest()
2034
+ model = models.CreateContentIdentifierRequest()
2035
2035
  model.from_json_string(json.dumps(args))
2036
2036
  start_time = time.time()
2037
2037
  while True:
2038
- rsp = client.DescribeEnvironments(model)
2038
+ rsp = client.CreateContentIdentifier(model)
2039
2039
  result = rsp.to_json_string()
2040
2040
  try:
2041
2041
  json_obj = json.loads(result)
@@ -4089,6 +4089,61 @@ def doModifyL4Proxy(args, parsed_globals):
4089
4089
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4090
4090
 
4091
4091
 
4092
+ def doCheckFreeCertificateVerification(args, parsed_globals):
4093
+ g_param = parse_global_arg(parsed_globals)
4094
+
4095
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4096
+ cred = credential.CVMRoleCredential()
4097
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4098
+ cred = credential.STSAssumeRoleCredential(
4099
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4100
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4101
+ )
4102
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4104
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4105
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4106
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4107
+ else:
4108
+ cred = credential.Credential(
4109
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4110
+ )
4111
+ http_profile = HttpProfile(
4112
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4113
+ reqMethod="POST",
4114
+ endpoint=g_param[OptionsDefine.Endpoint],
4115
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4116
+ )
4117
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4118
+ if g_param[OptionsDefine.Language]:
4119
+ profile.language = g_param[OptionsDefine.Language]
4120
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4121
+ client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
4122
+ client._sdkVersion += ("_CLI_" + __version__)
4123
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4124
+ model = models.CheckFreeCertificateVerificationRequest()
4125
+ model.from_json_string(json.dumps(args))
4126
+ start_time = time.time()
4127
+ while True:
4128
+ rsp = client.CheckFreeCertificateVerification(model)
4129
+ result = rsp.to_json_string()
4130
+ try:
4131
+ json_obj = json.loads(result)
4132
+ except TypeError as e:
4133
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4134
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4135
+ break
4136
+ cur_time = time.time()
4137
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4138
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4139
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4140
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4141
+ else:
4142
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4143
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4144
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4145
+
4146
+
4092
4147
  def doModifyL4ProxyRules(args, parsed_globals):
4093
4148
  g_param = parse_global_arg(parsed_globals)
4094
4149
 
@@ -11404,7 +11459,7 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
11404
11459
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11405
11460
 
11406
11461
 
11407
- def doCreateContentIdentifier(args, parsed_globals):
11462
+ def doCreateSecurityAPIService(args, parsed_globals):
11408
11463
  g_param = parse_global_arg(parsed_globals)
11409
11464
 
11410
11465
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11436,11 +11491,11 @@ def doCreateContentIdentifier(args, parsed_globals):
11436
11491
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11437
11492
  client._sdkVersion += ("_CLI_" + __version__)
11438
11493
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11439
- model = models.CreateContentIdentifierRequest()
11494
+ model = models.CreateSecurityAPIServiceRequest()
11440
11495
  model.from_json_string(json.dumps(args))
11441
11496
  start_time = time.time()
11442
11497
  while True:
11443
- rsp = client.CreateContentIdentifier(model)
11498
+ rsp = client.CreateSecurityAPIService(model)
11444
11499
  result = rsp.to_json_string()
11445
11500
  try:
11446
11501
  json_obj = json.loads(result)
@@ -11844,6 +11899,61 @@ def doDeleteZone(args, parsed_globals):
11844
11899
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11845
11900
 
11846
11901
 
11902
+ def doApplyFreeCertificate(args, parsed_globals):
11903
+ g_param = parse_global_arg(parsed_globals)
11904
+
11905
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
11906
+ cred = credential.CVMRoleCredential()
11907
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
11908
+ cred = credential.STSAssumeRoleCredential(
11909
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
11910
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
11911
+ )
11912
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
11913
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
11914
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
11915
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
11916
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
11917
+ else:
11918
+ cred = credential.Credential(
11919
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
11920
+ )
11921
+ http_profile = HttpProfile(
11922
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
11923
+ reqMethod="POST",
11924
+ endpoint=g_param[OptionsDefine.Endpoint],
11925
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
11926
+ )
11927
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
11928
+ if g_param[OptionsDefine.Language]:
11929
+ profile.language = g_param[OptionsDefine.Language]
11930
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
11931
+ client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11932
+ client._sdkVersion += ("_CLI_" + __version__)
11933
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
11934
+ model = models.ApplyFreeCertificateRequest()
11935
+ model.from_json_string(json.dumps(args))
11936
+ start_time = time.time()
11937
+ while True:
11938
+ rsp = client.ApplyFreeCertificate(model)
11939
+ result = rsp.to_json_string()
11940
+ try:
11941
+ json_obj = json.loads(result)
11942
+ except TypeError as e:
11943
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
11944
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
11945
+ break
11946
+ cur_time = time.time()
11947
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
11948
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
11949
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
11950
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
11951
+ else:
11952
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
11953
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
11954
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11955
+
11956
+
11847
11957
  def doDescribeDDosAttackEvent(args, parsed_globals):
11848
11958
  g_param = parse_global_arg(parsed_globals)
11849
11959
 
@@ -11899,7 +12009,7 @@ def doDescribeDDosAttackEvent(args, parsed_globals):
11899
12009
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11900
12010
 
11901
12011
 
11902
- def doDescribeSecurityIPGroupInfo(args, parsed_globals):
12012
+ def doDescribeEnvironments(args, parsed_globals):
11903
12013
  g_param = parse_global_arg(parsed_globals)
11904
12014
 
11905
12015
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11931,11 +12041,11 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
11931
12041
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11932
12042
  client._sdkVersion += ("_CLI_" + __version__)
11933
12043
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11934
- model = models.DescribeSecurityIPGroupInfoRequest()
12044
+ model = models.DescribeEnvironmentsRequest()
11935
12045
  model.from_json_string(json.dumps(args))
11936
12046
  start_time = time.time()
11937
12047
  while True:
11938
- rsp = client.DescribeSecurityIPGroupInfo(model)
12048
+ rsp = client.DescribeEnvironments(model)
11939
12049
  result = rsp.to_json_string()
11940
12050
  try:
11941
12051
  json_obj = json.loads(result)
@@ -11954,7 +12064,7 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
11954
12064
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11955
12065
 
11956
12066
 
11957
- def doModifyLoadBalancingStatus(args, parsed_globals):
12067
+ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
11958
12068
  g_param = parse_global_arg(parsed_globals)
11959
12069
 
11960
12070
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11986,11 +12096,11 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
11986
12096
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11987
12097
  client._sdkVersion += ("_CLI_" + __version__)
11988
12098
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11989
- model = models.ModifyLoadBalancingStatusRequest()
12099
+ model = models.DescribeSecurityIPGroupInfoRequest()
11990
12100
  model.from_json_string(json.dumps(args))
11991
12101
  start_time = time.time()
11992
12102
  while True:
11993
- rsp = client.ModifyLoadBalancingStatus(model)
12103
+ rsp = client.DescribeSecurityIPGroupInfo(model)
11994
12104
  result = rsp.to_json_string()
11995
12105
  try:
11996
12106
  json_obj = json.loads(result)
@@ -12009,7 +12119,7 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
12009
12119
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12010
12120
 
12011
12121
 
12012
- def doCreatePlan(args, parsed_globals):
12122
+ def doModifyLoadBalancingStatus(args, parsed_globals):
12013
12123
  g_param = parse_global_arg(parsed_globals)
12014
12124
 
12015
12125
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12041,11 +12151,11 @@ def doCreatePlan(args, parsed_globals):
12041
12151
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12042
12152
  client._sdkVersion += ("_CLI_" + __version__)
12043
12153
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12044
- model = models.CreatePlanRequest()
12154
+ model = models.ModifyLoadBalancingStatusRequest()
12045
12155
  model.from_json_string(json.dumps(args))
12046
12156
  start_time = time.time()
12047
12157
  while True:
12048
- rsp = client.CreatePlan(model)
12158
+ rsp = client.ModifyLoadBalancingStatus(model)
12049
12159
  result = rsp.to_json_string()
12050
12160
  try:
12051
12161
  json_obj = json.loads(result)
@@ -12064,7 +12174,7 @@ def doCreatePlan(args, parsed_globals):
12064
12174
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12065
12175
 
12066
12176
 
12067
- def doDescribeDnsRecords(args, parsed_globals):
12177
+ def doCreatePlan(args, parsed_globals):
12068
12178
  g_param = parse_global_arg(parsed_globals)
12069
12179
 
12070
12180
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12096,11 +12206,11 @@ def doDescribeDnsRecords(args, parsed_globals):
12096
12206
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12097
12207
  client._sdkVersion += ("_CLI_" + __version__)
12098
12208
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12099
- model = models.DescribeDnsRecordsRequest()
12209
+ model = models.CreatePlanRequest()
12100
12210
  model.from_json_string(json.dumps(args))
12101
12211
  start_time = time.time()
12102
12212
  while True:
12103
- rsp = client.DescribeDnsRecords(model)
12213
+ rsp = client.CreatePlan(model)
12104
12214
  result = rsp.to_json_string()
12105
12215
  try:
12106
12216
  json_obj = json.loads(result)
@@ -12119,7 +12229,7 @@ def doDescribeDnsRecords(args, parsed_globals):
12119
12229
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12120
12230
 
12121
12231
 
12122
- def doModifyDDoSProtection(args, parsed_globals):
12232
+ def doDescribeDnsRecords(args, parsed_globals):
12123
12233
  g_param = parse_global_arg(parsed_globals)
12124
12234
 
12125
12235
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12151,11 +12261,11 @@ def doModifyDDoSProtection(args, parsed_globals):
12151
12261
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12152
12262
  client._sdkVersion += ("_CLI_" + __version__)
12153
12263
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12154
- model = models.ModifyDDoSProtectionRequest()
12264
+ model = models.DescribeDnsRecordsRequest()
12155
12265
  model.from_json_string(json.dumps(args))
12156
12266
  start_time = time.time()
12157
12267
  while True:
12158
- rsp = client.ModifyDDoSProtection(model)
12268
+ rsp = client.DescribeDnsRecords(model)
12159
12269
  result = rsp.to_json_string()
12160
12270
  try:
12161
12271
  json_obj = json.loads(result)
@@ -12174,7 +12284,7 @@ def doModifyDDoSProtection(args, parsed_globals):
12174
12284
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12175
12285
 
12176
12286
 
12177
- def doDescribeSecurityAPIService(args, parsed_globals):
12287
+ def doModifyDDoSProtection(args, parsed_globals):
12178
12288
  g_param = parse_global_arg(parsed_globals)
12179
12289
 
12180
12290
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12206,11 +12316,11 @@ def doDescribeSecurityAPIService(args, parsed_globals):
12206
12316
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12207
12317
  client._sdkVersion += ("_CLI_" + __version__)
12208
12318
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12209
- model = models.DescribeSecurityAPIServiceRequest()
12319
+ model = models.ModifyDDoSProtectionRequest()
12210
12320
  model.from_json_string(json.dumps(args))
12211
12321
  start_time = time.time()
12212
12322
  while True:
12213
- rsp = client.DescribeSecurityAPIService(model)
12323
+ rsp = client.ModifyDDoSProtection(model)
12214
12324
  result = rsp.to_json_string()
12215
12325
  try:
12216
12326
  json_obj = json.loads(result)
@@ -12229,7 +12339,7 @@ def doDescribeSecurityAPIService(args, parsed_globals):
12229
12339
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12230
12340
 
12231
12341
 
12232
- def doImportZoneConfig(args, parsed_globals):
12342
+ def doDescribeSecurityAPIService(args, parsed_globals):
12233
12343
  g_param = parse_global_arg(parsed_globals)
12234
12344
 
12235
12345
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12261,11 +12371,11 @@ def doImportZoneConfig(args, parsed_globals):
12261
12371
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12262
12372
  client._sdkVersion += ("_CLI_" + __version__)
12263
12373
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12264
- model = models.ImportZoneConfigRequest()
12374
+ model = models.DescribeSecurityAPIServiceRequest()
12265
12375
  model.from_json_string(json.dumps(args))
12266
12376
  start_time = time.time()
12267
12377
  while True:
12268
- rsp = client.ImportZoneConfig(model)
12378
+ rsp = client.DescribeSecurityAPIService(model)
12269
12379
  result = rsp.to_json_string()
12270
12380
  try:
12271
12381
  json_obj = json.loads(result)
@@ -12284,7 +12394,7 @@ def doImportZoneConfig(args, parsed_globals):
12284
12394
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12285
12395
 
12286
12396
 
12287
- def doDescribeDDosAttackData(args, parsed_globals):
12397
+ def doImportZoneConfig(args, parsed_globals):
12288
12398
  g_param = parse_global_arg(parsed_globals)
12289
12399
 
12290
12400
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12316,11 +12426,11 @@ def doDescribeDDosAttackData(args, parsed_globals):
12316
12426
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12317
12427
  client._sdkVersion += ("_CLI_" + __version__)
12318
12428
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12319
- model = models.DescribeDDosAttackDataRequest()
12429
+ model = models.ImportZoneConfigRequest()
12320
12430
  model.from_json_string(json.dumps(args))
12321
12431
  start_time = time.time()
12322
12432
  while True:
12323
- rsp = client.DescribeDDosAttackData(model)
12433
+ rsp = client.ImportZoneConfig(model)
12324
12434
  result = rsp.to_json_string()
12325
12435
  try:
12326
12436
  json_obj = json.loads(result)
@@ -12339,7 +12449,7 @@ def doDescribeDDosAttackData(args, parsed_globals):
12339
12449
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12340
12450
 
12341
12451
 
12342
- def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12452
+ def doDescribeDDosAttackData(args, parsed_globals):
12343
12453
  g_param = parse_global_arg(parsed_globals)
12344
12454
 
12345
12455
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12371,11 +12481,11 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12371
12481
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12372
12482
  client._sdkVersion += ("_CLI_" + __version__)
12373
12483
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12374
- model = models.CreateMultiPathGatewaySecretKeyRequest()
12484
+ model = models.DescribeDDosAttackDataRequest()
12375
12485
  model.from_json_string(json.dumps(args))
12376
12486
  start_time = time.time()
12377
12487
  while True:
12378
- rsp = client.CreateMultiPathGatewaySecretKey(model)
12488
+ rsp = client.DescribeDDosAttackData(model)
12379
12489
  result = rsp.to_json_string()
12380
12490
  try:
12381
12491
  json_obj = json.loads(result)
@@ -12394,7 +12504,7 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12394
12504
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12395
12505
 
12396
12506
 
12397
- def doModifyCustomErrorPage(args, parsed_globals):
12507
+ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12398
12508
  g_param = parse_global_arg(parsed_globals)
12399
12509
 
12400
12510
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12426,11 +12536,11 @@ def doModifyCustomErrorPage(args, parsed_globals):
12426
12536
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12427
12537
  client._sdkVersion += ("_CLI_" + __version__)
12428
12538
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12429
- model = models.ModifyCustomErrorPageRequest()
12539
+ model = models.CreateMultiPathGatewaySecretKeyRequest()
12430
12540
  model.from_json_string(json.dumps(args))
12431
12541
  start_time = time.time()
12432
12542
  while True:
12433
- rsp = client.ModifyCustomErrorPage(model)
12543
+ rsp = client.CreateMultiPathGatewaySecretKey(model)
12434
12544
  result = rsp.to_json_string()
12435
12545
  try:
12436
12546
  json_obj = json.loads(result)
@@ -12449,7 +12559,7 @@ def doModifyCustomErrorPage(args, parsed_globals):
12449
12559
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12450
12560
 
12451
12561
 
12452
- def doDescribeL4ProxyRules(args, parsed_globals):
12562
+ def doModifyCustomErrorPage(args, parsed_globals):
12453
12563
  g_param = parse_global_arg(parsed_globals)
12454
12564
 
12455
12565
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12481,11 +12591,11 @@ def doDescribeL4ProxyRules(args, parsed_globals):
12481
12591
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12482
12592
  client._sdkVersion += ("_CLI_" + __version__)
12483
12593
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12484
- model = models.DescribeL4ProxyRulesRequest()
12594
+ model = models.ModifyCustomErrorPageRequest()
12485
12595
  model.from_json_string(json.dumps(args))
12486
12596
  start_time = time.time()
12487
12597
  while True:
12488
- rsp = client.DescribeL4ProxyRules(model)
12598
+ rsp = client.ModifyCustomErrorPage(model)
12489
12599
  result = rsp.to_json_string()
12490
12600
  try:
12491
12601
  json_obj = json.loads(result)
@@ -12504,7 +12614,7 @@ def doDescribeL4ProxyRules(args, parsed_globals):
12504
12614
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12505
12615
 
12506
12616
 
12507
- def doDescribeDDoSAttackData(args, parsed_globals):
12617
+ def doDescribeL4ProxyRules(args, parsed_globals):
12508
12618
  g_param = parse_global_arg(parsed_globals)
12509
12619
 
12510
12620
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12536,11 +12646,11 @@ def doDescribeDDoSAttackData(args, parsed_globals):
12536
12646
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12537
12647
  client._sdkVersion += ("_CLI_" + __version__)
12538
12648
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12539
- model = models.DescribeDDoSAttackDataRequest()
12649
+ model = models.DescribeL4ProxyRulesRequest()
12540
12650
  model.from_json_string(json.dumps(args))
12541
12651
  start_time = time.time()
12542
12652
  while True:
12543
- rsp = client.DescribeDDoSAttackData(model)
12653
+ rsp = client.DescribeL4ProxyRules(model)
12544
12654
  result = rsp.to_json_string()
12545
12655
  try:
12546
12656
  json_obj = json.loads(result)
@@ -12559,7 +12669,7 @@ def doDescribeDDoSAttackData(args, parsed_globals):
12559
12669
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12560
12670
 
12561
12671
 
12562
- def doDeleteSharedCNAME(args, parsed_globals):
12672
+ def doDescribeDDoSAttackData(args, parsed_globals):
12563
12673
  g_param = parse_global_arg(parsed_globals)
12564
12674
 
12565
12675
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12591,11 +12701,11 @@ def doDeleteSharedCNAME(args, parsed_globals):
12591
12701
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12592
12702
  client._sdkVersion += ("_CLI_" + __version__)
12593
12703
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12594
- model = models.DeleteSharedCNAMERequest()
12704
+ model = models.DescribeDDoSAttackDataRequest()
12595
12705
  model.from_json_string(json.dumps(args))
12596
12706
  start_time = time.time()
12597
12707
  while True:
12598
- rsp = client.DeleteSharedCNAME(model)
12708
+ rsp = client.DescribeDDoSAttackData(model)
12599
12709
  result = rsp.to_json_string()
12600
12710
  try:
12601
12711
  json_obj = json.loads(result)
@@ -12614,7 +12724,7 @@ def doDeleteSharedCNAME(args, parsed_globals):
12614
12724
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12615
12725
 
12616
12726
 
12617
- def doDescribeWebManagedRulesData(args, parsed_globals):
12727
+ def doDeleteSharedCNAME(args, parsed_globals):
12618
12728
  g_param = parse_global_arg(parsed_globals)
12619
12729
 
12620
12730
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12646,11 +12756,11 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
12646
12756
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12647
12757
  client._sdkVersion += ("_CLI_" + __version__)
12648
12758
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12649
- model = models.DescribeWebManagedRulesDataRequest()
12759
+ model = models.DeleteSharedCNAMERequest()
12650
12760
  model.from_json_string(json.dumps(args))
12651
12761
  start_time = time.time()
12652
12762
  while True:
12653
- rsp = client.DescribeWebManagedRulesData(model)
12763
+ rsp = client.DeleteSharedCNAME(model)
12654
12764
  result = rsp.to_json_string()
12655
12765
  try:
12656
12766
  json_obj = json.loads(result)
@@ -12669,7 +12779,7 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
12669
12779
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12670
12780
 
12671
12781
 
12672
- def doImportDnsRecords(args, parsed_globals):
12782
+ def doDescribeWebManagedRulesData(args, parsed_globals):
12673
12783
  g_param = parse_global_arg(parsed_globals)
12674
12784
 
12675
12785
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12701,11 +12811,11 @@ def doImportDnsRecords(args, parsed_globals):
12701
12811
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12702
12812
  client._sdkVersion += ("_CLI_" + __version__)
12703
12813
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12704
- model = models.ImportDnsRecordsRequest()
12814
+ model = models.DescribeWebManagedRulesDataRequest()
12705
12815
  model.from_json_string(json.dumps(args))
12706
12816
  start_time = time.time()
12707
12817
  while True:
12708
- rsp = client.ImportDnsRecords(model)
12818
+ rsp = client.DescribeWebManagedRulesData(model)
12709
12819
  result = rsp.to_json_string()
12710
12820
  try:
12711
12821
  json_obj = json.loads(result)
@@ -12724,7 +12834,7 @@ def doImportDnsRecords(args, parsed_globals):
12724
12834
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12725
12835
 
12726
12836
 
12727
- def doCreateSecurityAPIService(args, parsed_globals):
12837
+ def doImportDnsRecords(args, parsed_globals):
12728
12838
  g_param = parse_global_arg(parsed_globals)
12729
12839
 
12730
12840
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12756,11 +12866,11 @@ def doCreateSecurityAPIService(args, parsed_globals):
12756
12866
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12757
12867
  client._sdkVersion += ("_CLI_" + __version__)
12758
12868
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12759
- model = models.CreateSecurityAPIServiceRequest()
12869
+ model = models.ImportDnsRecordsRequest()
12760
12870
  model.from_json_string(json.dumps(args))
12761
12871
  start_time = time.time()
12762
12872
  while True:
12763
- rsp = client.CreateSecurityAPIService(model)
12873
+ rsp = client.ImportDnsRecords(model)
12764
12874
  result = rsp.to_json_string()
12765
12875
  try:
12766
12876
  json_obj = json.loads(result)
@@ -13323,7 +13433,7 @@ ACTION_MAP = {
13323
13433
  "DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
13324
13434
  "ModifyL4ProxyStatus": doModifyL4ProxyStatus,
13325
13435
  "DownloadL7Logs": doDownloadL7Logs,
13326
- "DescribeEnvironments": doDescribeEnvironments,
13436
+ "CreateContentIdentifier": doCreateContentIdentifier,
13327
13437
  "DescribeOriginACL": doDescribeOriginACL,
13328
13438
  "DeleteApplicationProxyRule": doDeleteApplicationProxyRule,
13329
13439
  "CheckCnameStatus": doCheckCnameStatus,
@@ -13361,6 +13471,7 @@ ACTION_MAP = {
13361
13471
  "RefreshMultiPathGatewaySecretKey": doRefreshMultiPathGatewaySecretKey,
13362
13472
  "CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
13363
13473
  "ModifyL4Proxy": doModifyL4Proxy,
13474
+ "CheckFreeCertificateVerification": doCheckFreeCertificateVerification,
13364
13475
  "ModifyL4ProxyRules": doModifyL4ProxyRules,
13365
13476
  "DescribeIdentifications": doDescribeIdentifications,
13366
13477
  "DescribeDDosAttackEventDetail": doDescribeDDosAttackEventDetail,
@@ -13494,7 +13605,7 @@ ACTION_MAP = {
13494
13605
  "DescribeZoneSetting": doDescribeZoneSetting,
13495
13606
  "DescribeSecurityAPIResource": doDescribeSecurityAPIResource,
13496
13607
  "DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
13497
- "CreateContentIdentifier": doCreateContentIdentifier,
13608
+ "CreateSecurityAPIService": doCreateSecurityAPIService,
13498
13609
  "DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
13499
13610
  "CreateApplicationProxyRule": doCreateApplicationProxyRule,
13500
13611
  "ModifySecurityJSInjectionRule": doModifySecurityJSInjectionRule,
@@ -13502,7 +13613,9 @@ ACTION_MAP = {
13502
13613
  "DescribeFunctions": doDescribeFunctions,
13503
13614
  "ReclaimZone": doReclaimZone,
13504
13615
  "DeleteZone": doDeleteZone,
13616
+ "ApplyFreeCertificate": doApplyFreeCertificate,
13505
13617
  "DescribeDDosAttackEvent": doDescribeDDosAttackEvent,
13618
+ "DescribeEnvironments": doDescribeEnvironments,
13506
13619
  "DescribeSecurityIPGroupInfo": doDescribeSecurityIPGroupInfo,
13507
13620
  "ModifyLoadBalancingStatus": doModifyLoadBalancingStatus,
13508
13621
  "CreatePlan": doCreatePlan,
@@ -13518,7 +13631,6 @@ ACTION_MAP = {
13518
13631
  "DeleteSharedCNAME": doDeleteSharedCNAME,
13519
13632
  "DescribeWebManagedRulesData": doDescribeWebManagedRulesData,
13520
13633
  "ImportDnsRecords": doImportDnsRecords,
13521
- "CreateSecurityAPIService": doCreateSecurityAPIService,
13522
13634
  "DescribeSecurityPolicyManagedRulesId": doDescribeSecurityPolicyManagedRulesId,
13523
13635
  "DescribeAliasDomains": doDescribeAliasDomains,
13524
13636
  "DescribeOriginGroupDetail": doDescribeOriginGroupDetail,
@@ -1,5 +1,12 @@
1
1
  {
2
2
  "actions": {
3
+ "ApplyFreeCertificate": {
4
+ "document": "This API is used to apply for a free certificate. If you need to proceed with DNS delegated verification or file verification, you can call this API to initiate the certificate application and obtain the corresponding verification content based on the application method. The order for API calls is as follows:.\nStep 1: Call ApplyFreeCertificate, specify the verification method for free certificate application, and obtain the verification content.\nStep 2: Configure the corresponding domain as verification content.\nStep 3: Call CheckFreeCertificateVerification to verify. After verification passes, the free certificate application is completed.\nStep 4: Call ModifyHostsCertificate to issue a domain certificate configured to use the EdgeOne free certificate.\n\nThe application method introduction in the document: [Free Certificate Application Description](https://www.tencentcloud.comom/document/product/1552/90437?from_cn_redirect=1). \ndescription:.\n- Only CNAME access mode can call this API to specify the free certificate application method. NS/DNSPod hosting access modes use automatic validation to apply for free certificates with no need to call this API.\n- If you need to switch the free certificate authentication method, you can call this API again by changing the VerificationMethod field to update it.\n- A domain name can only apply for one free certificate. After calling this API, the backend will trigger the free certificate application task. You need to complete the domain name verification info configuration within 2 days, then finish certificate authentication.",
5
+ "input": "ApplyFreeCertificateRequest",
6
+ "name": "Applies for a free certificate",
7
+ "output": "ApplyFreeCertificateResponse",
8
+ "status": "online"
9
+ },
3
10
  "BindSecurityTemplateToEntity": {
4
11
  "document": "This API is used to bind/unbind a domain name to/from a specific policy template. ",
5
12
  "input": "BindSecurityTemplateToEntityRequest",
@@ -28,6 +35,13 @@
28
35
  "output": "CheckCnameStatusResponse",
29
36
  "status": "online"
30
37
  },
38
+ "CheckFreeCertificateVerification": {
39
+ "document": "This API is used to verify a free certificate and obtain the application result. If verified, you can query the free certificate information for the corresponding domain name application through this API. If failed to apply, this API will return the corresponding verification failure message.\nThis API is used to check the free certificate application result after triggering the [ApplyFreeCertificate](https://www.tencentcloud.comom/document/product/1552/124807?from_cn_redirect=1) . Once the application is successful, you need to configure through the [ModifyHostsCertificate](https://www.tencentcloud.comom/document/product/1552/80764?from_cn_redirect=1) to deploy the free certificate to the acceleration domain.",
40
+ "input": "CheckFreeCertificateVerificationRequest",
41
+ "name": "Check free certificate application result",
42
+ "output": "CheckFreeCertificateVerificationResponse",
43
+ "status": "online"
44
+ },
31
45
  "ConfirmMultiPathGatewayOriginACL": {
32
46
  "document": "This API is used to confirm the latest origin IP range is updated to the origin server firewall when the multi-channel security acceleration gateway's origin IP range changes.",
33
47
  "input": "ConfirmMultiPathGatewayOriginACLRequest",
@@ -2860,6 +2874,71 @@
2860
2874
  ],
2861
2875
  "usage": "both"
2862
2876
  },
2877
+ "ApplyFreeCertificateRequest": {
2878
+ "document": "ApplyFreeCertificate request structure.",
2879
+ "members": [
2880
+ {
2881
+ "disabled": false,
2882
+ "document": "Site ID.",
2883
+ "example": "zone-343vqcswn9zj",
2884
+ "member": "string",
2885
+ "name": "ZoneId",
2886
+ "required": true,
2887
+ "type": "string"
2888
+ },
2889
+ {
2890
+ "disabled": false,
2891
+ "document": "Specifies the target domain name for free certificate application.",
2892
+ "example": "www.test.com",
2893
+ "member": "string",
2894
+ "name": "Domain",
2895
+ "required": true,
2896
+ "type": "string"
2897
+ },
2898
+ {
2899
+ "disabled": false,
2900
+ "document": "Specifies the verification method for applying for a free certificate. for detailed verification methods, refer to the [free certificate application documentation](https://www.tencentcloud.comom/document/product/1552/90437?from_cn_redirect=1). valid values:.\n<li>http_challenge: specifies the file validation mode for http access. verifies by getting file information from the specified URL of the access domain to complete free certificate application.</li>\n<li>dns_challenge: specifies the dns delegation verification method. verifies the free certificate application by adding the designated host record pointing to EdgeOne.</li>\n\nNote: after triggering this api, you need to complete the verification content configuration based on the returned verification information. once configured, you must also verify by calling the <a href = 'https://www.tencentcloud.comom/document/product/1552/124806?from_cn_redirect=1'>check free certificate application result</a> api. after verification passes, the application succeeds. once the application is successful, you can call the <a href = 'https://www.tencentcloud.comom/document/product/1552/80764?from_cn_redirect=1'>configure domain name certificate</a> API to deploy a free certificate for the current domain name.",
2901
+ "example": "http_challenge",
2902
+ "member": "string",
2903
+ "name": "VerificationMethod",
2904
+ "required": true,
2905
+ "type": "string"
2906
+ }
2907
+ ],
2908
+ "type": "object"
2909
+ },
2910
+ "ApplyFreeCertificateResponse": {
2911
+ "document": "ApplyFreeCertificate response structure.",
2912
+ "members": [
2913
+ {
2914
+ "disabled": false,
2915
+ "document": "Specifies the verification information for free certificate application when VerificationMethod is dns_challenge.",
2916
+ "example": "无",
2917
+ "member": "DnsVerification",
2918
+ "name": "DnsVerification",
2919
+ "output_required": false,
2920
+ "type": "object",
2921
+ "value_allowed_null": false
2922
+ },
2923
+ {
2924
+ "disabled": false,
2925
+ "document": "Specifies the verification information related to the free certificate application for the domain name when VerificationMethod is http_challenge.",
2926
+ "example": "无",
2927
+ "member": "FileVerification",
2928
+ "name": "FileVerification",
2929
+ "output_required": false,
2930
+ "type": "object",
2931
+ "value_allowed_null": false
2932
+ },
2933
+ {
2934
+ "document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
2935
+ "member": "string",
2936
+ "name": "RequestId",
2937
+ "type": "string"
2938
+ }
2939
+ ],
2940
+ "type": "object"
2941
+ },
2863
2942
  "AscriptionInfo": {
2864
2943
  "document": "The site ownership information",
2865
2944
  "members": [
@@ -4534,6 +4613,72 @@
4534
4613
  ],
4535
4614
  "type": "object"
4536
4615
  },
4616
+ "CheckFreeCertificateVerificationRequest": {
4617
+ "document": "CheckFreeCertificateVerification request structure.",
4618
+ "members": [
4619
+ {
4620
+ "disabled": false,
4621
+ "document": "Zone ID.",
4622
+ "example": "zone-28v607hq8d3m",
4623
+ "member": "string",
4624
+ "name": "ZoneId",
4625
+ "required": true,
4626
+ "type": "string"
4627
+ },
4628
+ {
4629
+ "disabled": false,
4630
+ "document": "Acceleration domain name, that domain name used when [applying for free certificate](https://www.tencentcloud.comom/document/product/1552/124807?from_cn_redirect=1).",
4631
+ "example": "qq.com",
4632
+ "member": "string",
4633
+ "name": "Domain",
4634
+ "required": true,
4635
+ "type": "string"
4636
+ }
4637
+ ],
4638
+ "type": "object"
4639
+ },
4640
+ "CheckFreeCertificateVerificationResponse": {
4641
+ "document": "CheckFreeCertificateVerification response structure.",
4642
+ "members": [
4643
+ {
4644
+ "disabled": false,
4645
+ "document": "Specifies the domain name to which the certificate is issued when the free certificate application succeeds.\nNote: only one free certificate can be applied for a domain name. if a wildcard certificate has been applied for the domain name, its subdomains will use the wildcard certificate.",
4646
+ "example": "aa.test.com",
4647
+ "member": "string",
4648
+ "name": "CommonName",
4649
+ "output_required": true,
4650
+ "type": "string",
4651
+ "value_allowed_null": false
4652
+ },
4653
+ {
4654
+ "disabled": false,
4655
+ "document": "Specifies the signature algorithm used by the certificate when the free certificate application succeeds. currently only support RSA 2048.",
4656
+ "example": "RSA 2048",
4657
+ "member": "string",
4658
+ "name": "SignatureAlgorithm",
4659
+ "output_required": true,
4660
+ "type": "string",
4661
+ "value_allowed_null": false
4662
+ },
4663
+ {
4664
+ "disabled": false,
4665
+ "document": "Expiration time of the certificate when the free certificate application is successful. the time is in coordinated universal time (UTC), following the ISO 8601 standard date and time format.",
4666
+ "example": "2014-08-03T12:00:00+08:00",
4667
+ "member": "datetime_iso",
4668
+ "name": "ExpireTime",
4669
+ "output_required": true,
4670
+ "type": "string",
4671
+ "value_allowed_null": false
4672
+ },
4673
+ {
4674
+ "document": "The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.",
4675
+ "member": "string",
4676
+ "name": "RequestId",
4677
+ "type": "string"
4678
+ }
4679
+ ],
4680
+ "type": "object"
4681
+ },
4537
4682
  "CheckRegionHealthStatus": {
4538
4683
  "document": "Health status of origin servers in each health check region.",
4539
4684
  "members": [
@@ -14977,7 +15122,7 @@
14977
15122
  "usage": "both"
14978
15123
  },
14979
15124
  "DnsVerification": {
14980
- "document": "",
15125
+ "document": "Information required for DNS resolution verification when applying for a free certificate in CNAME mode integration to verify ownership of a site or domain name.",
14981
15126
  "members": [
14982
15127
  {
14983
15128
  "disabled": false,
@@ -16010,11 +16155,11 @@
16010
16155
  "usage": "out"
16011
16156
  },
16012
16157
  "FileVerification": {
16013
- "document": "Information required for verifying via a file. It's applicable to sites connected via CNAMEs.",
16158
+ "document": "Information required for HTTP access verification file when applying for a free certificate in CNAME mode integration to verify ownership of a site or domain name.",
16014
16159
  "members": [
16015
16160
  {
16016
16161
  "disabled": false,
16017
- "document": "EdgeOne obtains the file verification information in the format of \"Scheme + Host + URL Path\", (e.g. https://www.example.com/.well-known/teo-verification/z12h416twn.txt). This field is the URL path section of the URL you need to create.",
16162
+ "document": "EdgeOne backend server will get file verification information via http://{Host}{URL Path} (for example http://www.example.com/.well-known/teo-verification/z12h416twn.txt). among them, this field specifies the URL Path part you need to create, and Host indicates the current accelerated domain.",
16018
16163
  "example": "/.well-known/teo-verification/z12h416twn.txt",
16019
16164
  "member": "string",
16020
16165
  "name": "Path",
@@ -19905,7 +20050,7 @@
19905
20050
  },
19906
20051
  {
19907
20052
  "disabled": false,
19908
- "document": "Certificate configuration mode. Values:\n<li>`disable`: (Default) Do not configure the certificate</li>\n<li>`eofreecert`: Use a free certificate provided by EdgeOne</li>\n<li>`sslcert`: Configure an SSL certificate.</li>",
20053
+ "document": "Configures the server certificate mode. valid values:.\n\n- disable: without configuring server certificate.\n- eofreecert: specifies to apply for a free certificate through automatic validation and deploy it. for verification methods, see [free certificate application supported verification methods](https://www.tencentcloud.comom/document/product/1552/90437?from_cn_redirect=1).\n - In ns or DNSPod hosting access mode, free certificates can only be applied for via automatic validation.\n - When a free certificate application fails, it can cause deployment failure. you can obtain the failure reason through the <a href = 'https://www.tencentcloud.comom/document/product/1552/124806?from_cn_redirect=1)'>check free certificate application result</a> .\n- eofreecert_manual: specifies the deployment of free certificates applied through DNS delegation verification or file verification. before deploying a free certificate, you need to trigger the [apply for free certificate](https://www.tencentcloud.comom/document/product/1552/124807?from_cn_redirect=1)) api to apply for a free certificate. once the application is successful, you can use this enumeration value to deploy the free certificate.\nNote: when deploying a free certificate, ensure a successful application for a free certificate already exists. you can check whether a successful application for a free certificate already exists through the <a href = 'https://www.tencentcloud.comom/document/product/1552/124806?from_cn_redirect=1)'>check free certificate application result</a> api.\n- sslcert: specifies the configuration of the managed service side certificate.",
19909
20054
  "example": "eofreecert",
19910
20055
  "member": "string",
19911
20056
  "name": "Mode",
@@ -19941,7 +20086,7 @@
19941
20086
  },
19942
20087
  {
19943
20088
  "disabled": false,
19944
- "document": "Configures the certificate presented by the EO node during origin-pull for mutual TLS authentication. Disabled by default; leaving the field blank will retain the current configuration. This feature is currently in beta testing. please [contact us](https://cloud.tencent.com/online-service) to request access.",
20089
+ "document": "Specifies the certificate carried during EO node origin-pull for origin-pull mutual authentication handshake, off by default. leave blank to indicate retaining the original configuration. this configuration is currently in closed beta testing for the allowlist feature. if you need to use it, please contact us (https://www.tencentcloud.comom/online?from_cn_redirect=1-service).",
19945
20090
  "example": "无",
19946
20091
  "member": "UpstreamCertInfo",
19947
20092
  "name": "UpstreamCertInfo",
@@ -1,5 +1,19 @@
1
1
  {
2
2
  "actions": {
3
+ "ApplyFreeCertificate": [
4
+ {
5
+ "document": "This example shows you how to apply for a free certificate using file validation mode with HTTP access for the domain name (abc.test.com) under the site (ZoneId is zone-2fgd17m17xw).",
6
+ "input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ApplyFreeCertificate\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-2fgd17m17xw\",\n \"Domain\": \"abc.test.com\",\n \"VerificationMethod\": \"http_challenge\"\n}",
7
+ "output": "{\n \"Response\": {\n \"RequestId\": \"064a8c04-2d3e-4c9d-9473-39a8f76276ea\",\n \"FileVerification\": {\n \"Content\": \"9i8vhsvt9y8y3sx1s2d\",\n \"Path\": \"/.well-known/teo-verification/yvnu7sesms\"\n }\n }\n}",
8
+ "title": "Applying for Free Certificate Using HTTP Access File Validation Mode"
9
+ },
10
+ {
11
+ "document": "This example shows you how to apply for a free certificate using the DNS delegated verification method for the domain name (qwe.test.com) under the site (ZoneId is zone-2fgd17m17xw).",
12
+ "input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ApplyFreeCertificate\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-2fgd17m17xw\",\n \"Domain\": \"qwe.test.com\",\n \"VerificationMethod\": \"dns_challenge\"\n}",
13
+ "output": "{\n \"Response\": {\n \"RequestId\": \"064a8c04-2d3e-4c9d-9473-39a8f76276ea\",\n \"DnsVerification\": {\n \"RecordType\": \"CNAME\",\n \"RecordValue\": \"_acme-challenge\",\n \"Subdomain\": \"www.example.com.edgeone.com\"\n }\n }\n}",
14
+ "title": "Applying for a Free Certificate Using DNS Delegation Verification Method"
15
+ }
16
+ ],
3
17
  "BindSecurityTemplateToEntity": [
4
18
  {
5
19
  "document": "In this example, we unbind the domain name `a.test.com` from the policy template `temp-cuwg1hki` of the site `zone-2aq0e8rhu6jx`. Only one domain name can be unbound at one time. There are two options: \n1. `unbind-keep-policy`: Unbind the domain name from the specified policy and create a new policy for the domain name with the same configuration as the original one. This takes additional rule quota.\n2. `unbind-use-default`: Unbind the domain name from the specified policy and then bind it with the default policy with default configurations. Custom rules no longer take effect.\n\n \n\nNote: To use `unbind-keep-policy`, make sure your rule quota is enough. If the remaining quota is insufficient, the unbinding fails and the domain name remains bound to the current policy template.",
@@ -44,6 +58,20 @@
44
58
  "title": "Querying the CNAME status of a domain name"
45
59
  }
46
60
  ],
61
+ "CheckFreeCertificateVerification": [
62
+ {
63
+ "document": "This example shows you how to check whether the free certificate application succeeds for the domain name (cc.xzone.cloud) under the site (ZoneId is zone-28v607hq8d3m) after triggering the application.",
64
+ "input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckFreeCertificateVerification\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-28v607hq8d3m\",\n \"Domain\": \"cc.xzone.cloud\"\n}",
65
+ "output": "{\n \"Response\": {\n \"Error\": {\n \"Code\": \"ResourceUnavailable.RecordUnExpected\",\n \"Message\": \"Unable to detect the verification value correctly. Please check whether the current domain name has configured regional resolution or policy interception.\"\n },\n \"RequestId\": \"ed93f3cb-f35e-473f-b9f3-0d451b8b79c6\"\n }\n}",
66
+ "title": "Checking Free Certificate Application Result, Free Certificate Application Failed"
67
+ },
68
+ {
69
+ "document": "This example shows you how to check whether the free certificate application succeeds for the domain name (aa.xzone.cloud) under the site (ZoneId zone-28v607hq8d3m) after triggering the free certificate application.",
70
+ "input": "POST / HTTP/1.1\nHost: teo.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CheckFreeCertificateVerification\n<Common request parameters>\n\n{\n \"ZoneId\": \"zone-28v607hq8d3m\",\n \"Domain\": \"aa.xzone.cloud\"\n}",
71
+ "output": "{\n \"Response\": {\n \"RequestId\": \"dc1ba58b-4e4e-4a71-bed6-2b777c48d17e\",\n \"CommonName\": \"aa.xzone.cloud\",\n \"SignatureAlgorithm\": \"RSA 2048\",\n \"ExpireTime\": \"2025-07-31T07:06:57Z\"\n }\n}",
72
+ "title": "Checking Free Certificate Application Result, Free Certificate Application Succeeds"
73
+ }
74
+ ],
47
75
  "ConfirmMultiPathGatewayOriginACL": [
48
76
  {
49
77
  "document": "This example shows you how to confirm the instance with ZoneId 'zone-27q0p0bal192' and GatewayId 'mpgw-lbxuhk1oh' has updated the latest origin server IP range to the origin server firewall.",
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: tccli-intl-en
3
- Version: 3.1.8.1
3
+ Version: 3.1.11.1
4
4
  Summary: Universal Command Line Environment for Tencent Cloud
5
5
  Home-page: https://github.com/TencentCloud/tencentcloud-cli-intl-en.git
6
6
  Author: Tencent Cloud
@@ -21,7 +21,7 @@ Classifier: Programming Language :: Python :: 3.4
21
21
  Classifier: Programming Language :: Python :: 3.5
22
22
  Classifier: Programming Language :: Python :: 3.6
23
23
  License-File: LICENSE
24
- Requires-Dist: tencentcloud-sdk-python-intl-en >=3.1.8
24
+ Requires-Dist: tencentcloud-sdk-python-intl-en >=3.1.11
25
25
  Requires-Dist: jmespath ==0.10.0
26
26
  Requires-Dist: six ==1.16.0
27
27
 
@@ -1,4 +1,4 @@
1
- tccli/__init__.py,sha256=rPy3TMbQ-8HKhZPR8mwib8eBsMk49NAia2T8KN6NK_o,25
1
+ tccli/__init__.py,sha256=eN6RTaSJL8332b5xFZdSernNHNLz6FJj-c6ygVvOkkQ,26
2
2
  tccli/argparser.py,sha256=WtfpBhj2R6JHSzagy6w6Q4y3YVmyIC_yK80w3tqBPgU,5589
3
3
  tccli/argument.py,sha256=_ictuLaeci9t9bvWGZ1QcpMLMztqKkpVH7UyiUwOc-g,8092
4
4
  tccli/base_command.py,sha256=rFWNAwfS0GA6LLGNOM-iPI0RV81Jag5cZn536ZQN0pw,2859
@@ -378,7 +378,7 @@ tccli/services/mongodb/v20190725/api.json,sha256=h9GajCQsIj8rGF5f9flxRM8z12Rs3i4
378
378
  tccli/services/mongodb/v20190725/examples.json,sha256=PfcdtIinoabcoI4342bksOa_TXCdhT0hu4OB24ILlvY,59498
379
379
  tccli/services/monitor/__init__.py,sha256=Fqyy64XBMByiqJHyjxbaJeQDJAGMyktujsYRmXhosc8,93
380
380
  tccli/services/monitor/monitor_client.py,sha256=gv-7tw8sNNAMJI4YJwov67oMorLsLE8kY6MFkZPWvI4,472842
381
- tccli/services/monitor/v20180724/api.json,sha256=CWwgWH61bCfCZmqGe9SnEbwnVpiB4kgpnmy4MRGGX7U,661687
381
+ tccli/services/monitor/v20180724/api.json,sha256=fzRIuosDX46mer7S5EQrGevOqHds0W_pZ4sGLoMkvgU,661948
382
382
  tccli/services/monitor/v20180724/examples.json,sha256=P0joek--vtFDQQR2M624kTSu6UkSU3RM1AdLbTt4Mjg,254205
383
383
  tccli/services/mps/__init__.py,sha256=4M5o2xc0u3rqtgz_5an9Qxw2QaOqwBq8Fjc3IB64p2o,85
384
384
  tccli/services/mps/mps_client.py,sha256=Q_639yfhsww3hUq4aI0i3WLW8FKeO361_g5uI4bE8tY,334446
@@ -519,11 +519,11 @@ tccli/services/tem/v20201221/examples.json,sha256=DNo6OfxmsQ0vKqh9Mx0Z12PpQkTcrV
519
519
  tccli/services/tem/v20210701/api.json,sha256=yDaO-jvC6yTsayjYVrhODA-wDVKZu4YQxE0fCn5eHF0,259836
520
520
  tccli/services/tem/v20210701/examples.json,sha256=Wa6HgD5hWrDuPd1H0ThqonyQ1hCOIreoCE8TRaTDm0o,78999
521
521
  tccli/services/teo/__init__.py,sha256=nvzcUSkSQuTftWEJ399BUZpUk_0jEq-l97539DwbAwM,85
522
- tccli/services/teo/teo_client.py,sha256=ED6YRGxoLNhsZzqzqpSUKlA1Sv2tPjkDBO-QnjR79yI,757650
522
+ tccli/services/teo/teo_client.py,sha256=7b4WeyxwFPTkGekcmI_TMZLRGT9NDpy__eQJnDiDAwk,763926
523
523
  tccli/services/teo/v20220106/api.json,sha256=pEZJsuPOV4oAO5uxFRxpkBzxdGbhiuDGeDhItZLpBk0,440930
524
524
  tccli/services/teo/v20220106/examples.json,sha256=bzXKxeiSSmtv7lL1wbcb7YaTbgbOFBJbD_uCv1fzQuk,87233
525
- tccli/services/teo/v20220901/api.json,sha256=T2X8Mb95oapn7IgLNnaapUWSTz5rJsWwCPqXQEeuKyc,1177550
526
- tccli/services/teo/v20220901/examples.json,sha256=zOnGM_nHHMioWHwTuZv4qm8zagNK1DTbSPz6xt_PYJE,530003
525
+ tccli/services/teo/v20220901/api.json,sha256=Ndb7wb5sGOq9TI06--gURK_ISmlG-DgUtOjRGEolHLU,1188499
526
+ tccli/services/teo/v20220901/examples.json,sha256=t1czAxgCVF0G0JbTTeiaiIM9vEgGZ0BKYk78WlvQYVQ,533780
527
527
  tccli/services/tione/__init__.py,sha256=hVHB2cJpskiRtSHmEaJj2ZcjQp28c17sepm54VgFH7I,89
528
528
  tccli/services/tione/tione_client.py,sha256=v-JdpUrufgYnhjS3kN-5t92Ned697gxB8xcNr2YMMV8,9275
529
529
  tccli/services/tione/v20211111/api.json,sha256=LdLS6ORNi6pmPi7CfGts0ryuEI4qp9EFIGKOVxql1E8,107248
@@ -600,9 +600,9 @@ tccli/services/yunjing/__init__.py,sha256=8HTKN8_ow1j67tspqAbBMQgeteXAagLvtb9WAf
600
600
  tccli/services/yunjing/yunjing_client.py,sha256=TgW9P5c1WrxNFj8viq_OLbeC5HYRdjHm7qv_hYr-Lqs,227266
601
601
  tccli/services/yunjing/v20180228/api.json,sha256=zYojacZyPgPCi71CLBjuHsQR9mIxcZjCX5JwA9TYr1s,173428
602
602
  tccli/services/yunjing/v20180228/examples.json,sha256=j3GL3TtNTkZpNLlksz0nJNCVDxYGUqfRqOt94Y-P8OE,58723
603
- tccli_intl_en-3.1.8.1.dist-info/LICENSE,sha256=xx0jnfkXJvxRnG63LTGOxlggYnIysveWIZ6H3PNdCrQ,11357
604
- tccli_intl_en-3.1.8.1.dist-info/METADATA,sha256=kXnMvZIVj6TU6ALRvLov1HqTu5R0VVcrt3alaNGakBk,3061
605
- tccli_intl_en-3.1.8.1.dist-info/WHEEL,sha256=Ll72iyqtt6Rbxp-Q7FSafYA1LeRv98X15xcZWRsFEmY,109
606
- tccli_intl_en-3.1.8.1.dist-info/entry_points.txt,sha256=9ZzsXxi7Xj3ZneT7VxRVJpFvnmdEOeysh999_0gWVvo,85
607
- tccli_intl_en-3.1.8.1.dist-info/top_level.txt,sha256=gYFrQRE3IqZ_46Syp-vkVwwvNaYEtKcM4fE_C4Puomk,6
608
- tccli_intl_en-3.1.8.1.dist-info/RECORD,,
603
+ tccli_intl_en-3.1.11.1.dist-info/LICENSE,sha256=xx0jnfkXJvxRnG63LTGOxlggYnIysveWIZ6H3PNdCrQ,11357
604
+ tccli_intl_en-3.1.11.1.dist-info/METADATA,sha256=dxfwjnZzChE5XvmiC2PuOwW1NtAl3DgO9a5nXsaPnTU,3063
605
+ tccli_intl_en-3.1.11.1.dist-info/WHEEL,sha256=Ll72iyqtt6Rbxp-Q7FSafYA1LeRv98X15xcZWRsFEmY,109
606
+ tccli_intl_en-3.1.11.1.dist-info/entry_points.txt,sha256=9ZzsXxi7Xj3ZneT7VxRVJpFvnmdEOeysh999_0gWVvo,85
607
+ tccli_intl_en-3.1.11.1.dist-info/top_level.txt,sha256=gYFrQRE3IqZ_46Syp-vkVwwvNaYEtKcM4fE_C4Puomk,6
608
+ tccli_intl_en-3.1.11.1.dist-info/RECORD,,