tccli-intl-en 3.1.8.1__py2.py3-none-any.whl → 3.1.13.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/__init__.py +6 -0
  3. tccli/services/ai3d/__init__.py +4 -0
  4. tccli/services/ai3d/ai3d_client.py +266 -0
  5. tccli/services/ai3d/v20250513/api.json +264 -0
  6. tccli/services/ai3d/v20250513/examples.json +20 -0
  7. tccli/services/cvm/v20170312/api.json +3 -3
  8. tccli/services/cvm/v20170312/examples.json +31 -31
  9. tccli/services/faceid/v20180301/api.json +2 -2
  10. tccli/services/hunyuan/__init__.py +4 -0
  11. tccli/services/hunyuan/hunyuan_client.py +266 -0
  12. tccli/services/hunyuan/v20230901/api.json +270 -0
  13. tccli/services/hunyuan/v20230901/examples.json +20 -0
  14. tccli/services/mdl/mdl_client.py +192 -24
  15. tccli/services/mdl/v20200326/api.json +418 -5
  16. tccli/services/mdl/v20200326/examples.json +24 -0
  17. tccli/services/monitor/v20180724/api.json +3 -3
  18. tccli/services/mps/mps_client.py +56 -0
  19. tccli/services/mps/v20190612/api.json +208 -9
  20. tccli/services/mps/v20190612/examples.json +36 -22
  21. tccli/services/teo/teo_client.py +225 -57
  22. tccli/services/teo/v20220901/api.json +251 -7
  23. tccli/services/teo/v20220901/examples.json +36 -0
  24. {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/METADATA +2 -2
  25. {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/RECORD +29 -21
  26. {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/LICENSE +0 -0
  27. {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/WHEEL +0 -0
  28. {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/entry_points.txt +0 -0
  29. {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/top_level.txt +0 -0
@@ -1999,7 +1999,7 @@ def doDownloadL7Logs(args, parsed_globals):
1999
1999
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2000
2000
 
2001
2001
 
2002
- def doDescribeEnvironments(args, parsed_globals):
2002
+ def doCreateContentIdentifier(args, parsed_globals):
2003
2003
  g_param = parse_global_arg(parsed_globals)
2004
2004
 
2005
2005
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2031,11 +2031,11 @@ def doDescribeEnvironments(args, parsed_globals):
2031
2031
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
2032
2032
  client._sdkVersion += ("_CLI_" + __version__)
2033
2033
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2034
- model = models.DescribeEnvironmentsRequest()
2034
+ model = models.CreateContentIdentifierRequest()
2035
2035
  model.from_json_string(json.dumps(args))
2036
2036
  start_time = time.time()
2037
2037
  while True:
2038
- rsp = client.DescribeEnvironments(model)
2038
+ rsp = client.CreateContentIdentifier(model)
2039
2039
  result = rsp.to_json_string()
2040
2040
  try:
2041
2041
  json_obj = json.loads(result)
@@ -4089,6 +4089,61 @@ def doModifyL4Proxy(args, parsed_globals):
4089
4089
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4090
4090
 
4091
4091
 
4092
+ def doCheckFreeCertificateVerification(args, parsed_globals):
4093
+ g_param = parse_global_arg(parsed_globals)
4094
+
4095
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4096
+ cred = credential.CVMRoleCredential()
4097
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4098
+ cred = credential.STSAssumeRoleCredential(
4099
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4100
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4101
+ )
4102
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4104
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4105
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4106
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4107
+ else:
4108
+ cred = credential.Credential(
4109
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4110
+ )
4111
+ http_profile = HttpProfile(
4112
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4113
+ reqMethod="POST",
4114
+ endpoint=g_param[OptionsDefine.Endpoint],
4115
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4116
+ )
4117
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4118
+ if g_param[OptionsDefine.Language]:
4119
+ profile.language = g_param[OptionsDefine.Language]
4120
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4121
+ client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
4122
+ client._sdkVersion += ("_CLI_" + __version__)
4123
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4124
+ model = models.CheckFreeCertificateVerificationRequest()
4125
+ model.from_json_string(json.dumps(args))
4126
+ start_time = time.time()
4127
+ while True:
4128
+ rsp = client.CheckFreeCertificateVerification(model)
4129
+ result = rsp.to_json_string()
4130
+ try:
4131
+ json_obj = json.loads(result)
4132
+ except TypeError as e:
4133
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4134
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4135
+ break
4136
+ cur_time = time.time()
4137
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4138
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4139
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4140
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4141
+ else:
4142
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4143
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4144
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4145
+
4146
+
4092
4147
  def doModifyL4ProxyRules(args, parsed_globals):
4093
4148
  g_param = parse_global_arg(parsed_globals)
4094
4149
 
@@ -11404,7 +11459,7 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
11404
11459
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11405
11460
 
11406
11461
 
11407
- def doCreateContentIdentifier(args, parsed_globals):
11462
+ def doCreateSecurityAPIService(args, parsed_globals):
11408
11463
  g_param = parse_global_arg(parsed_globals)
11409
11464
 
11410
11465
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11436,11 +11491,11 @@ def doCreateContentIdentifier(args, parsed_globals):
11436
11491
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11437
11492
  client._sdkVersion += ("_CLI_" + __version__)
11438
11493
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11439
- model = models.CreateContentIdentifierRequest()
11494
+ model = models.CreateSecurityAPIServiceRequest()
11440
11495
  model.from_json_string(json.dumps(args))
11441
11496
  start_time = time.time()
11442
11497
  while True:
11443
- rsp = client.CreateContentIdentifier(model)
11498
+ rsp = client.CreateSecurityAPIService(model)
11444
11499
  result = rsp.to_json_string()
11445
11500
  try:
11446
11501
  json_obj = json.loads(result)
@@ -11844,6 +11899,116 @@ def doDeleteZone(args, parsed_globals):
11844
11899
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11845
11900
 
11846
11901
 
11902
+ def doDescribeTimingL7OriginPullData(args, parsed_globals):
11903
+ g_param = parse_global_arg(parsed_globals)
11904
+
11905
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
11906
+ cred = credential.CVMRoleCredential()
11907
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
11908
+ cred = credential.STSAssumeRoleCredential(
11909
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
11910
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
11911
+ )
11912
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
11913
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
11914
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
11915
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
11916
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
11917
+ else:
11918
+ cred = credential.Credential(
11919
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
11920
+ )
11921
+ http_profile = HttpProfile(
11922
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
11923
+ reqMethod="POST",
11924
+ endpoint=g_param[OptionsDefine.Endpoint],
11925
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
11926
+ )
11927
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
11928
+ if g_param[OptionsDefine.Language]:
11929
+ profile.language = g_param[OptionsDefine.Language]
11930
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
11931
+ client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11932
+ client._sdkVersion += ("_CLI_" + __version__)
11933
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
11934
+ model = models.DescribeTimingL7OriginPullDataRequest()
11935
+ model.from_json_string(json.dumps(args))
11936
+ start_time = time.time()
11937
+ while True:
11938
+ rsp = client.DescribeTimingL7OriginPullData(model)
11939
+ result = rsp.to_json_string()
11940
+ try:
11941
+ json_obj = json.loads(result)
11942
+ except TypeError as e:
11943
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
11944
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
11945
+ break
11946
+ cur_time = time.time()
11947
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
11948
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
11949
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
11950
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
11951
+ else:
11952
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
11953
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
11954
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11955
+
11956
+
11957
+ def doApplyFreeCertificate(args, parsed_globals):
11958
+ g_param = parse_global_arg(parsed_globals)
11959
+
11960
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
11961
+ cred = credential.CVMRoleCredential()
11962
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
11963
+ cred = credential.STSAssumeRoleCredential(
11964
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
11965
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
11966
+ )
11967
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
11968
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
11969
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
11970
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
11971
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
11972
+ else:
11973
+ cred = credential.Credential(
11974
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
11975
+ )
11976
+ http_profile = HttpProfile(
11977
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
11978
+ reqMethod="POST",
11979
+ endpoint=g_param[OptionsDefine.Endpoint],
11980
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
11981
+ )
11982
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
11983
+ if g_param[OptionsDefine.Language]:
11984
+ profile.language = g_param[OptionsDefine.Language]
11985
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
11986
+ client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11987
+ client._sdkVersion += ("_CLI_" + __version__)
11988
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
11989
+ model = models.ApplyFreeCertificateRequest()
11990
+ model.from_json_string(json.dumps(args))
11991
+ start_time = time.time()
11992
+ while True:
11993
+ rsp = client.ApplyFreeCertificate(model)
11994
+ result = rsp.to_json_string()
11995
+ try:
11996
+ json_obj = json.loads(result)
11997
+ except TypeError as e:
11998
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
11999
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
12000
+ break
12001
+ cur_time = time.time()
12002
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
12003
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
12004
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
12005
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
12006
+ else:
12007
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
12008
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
12009
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12010
+
12011
+
11847
12012
  def doDescribeDDosAttackEvent(args, parsed_globals):
11848
12013
  g_param = parse_global_arg(parsed_globals)
11849
12014
 
@@ -11899,7 +12064,7 @@ def doDescribeDDosAttackEvent(args, parsed_globals):
11899
12064
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11900
12065
 
11901
12066
 
11902
- def doDescribeSecurityIPGroupInfo(args, parsed_globals):
12067
+ def doDescribeEnvironments(args, parsed_globals):
11903
12068
  g_param = parse_global_arg(parsed_globals)
11904
12069
 
11905
12070
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11931,11 +12096,11 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
11931
12096
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11932
12097
  client._sdkVersion += ("_CLI_" + __version__)
11933
12098
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11934
- model = models.DescribeSecurityIPGroupInfoRequest()
12099
+ model = models.DescribeEnvironmentsRequest()
11935
12100
  model.from_json_string(json.dumps(args))
11936
12101
  start_time = time.time()
11937
12102
  while True:
11938
- rsp = client.DescribeSecurityIPGroupInfo(model)
12103
+ rsp = client.DescribeEnvironments(model)
11939
12104
  result = rsp.to_json_string()
11940
12105
  try:
11941
12106
  json_obj = json.loads(result)
@@ -11954,7 +12119,7 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
11954
12119
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11955
12120
 
11956
12121
 
11957
- def doModifyLoadBalancingStatus(args, parsed_globals):
12122
+ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
11958
12123
  g_param = parse_global_arg(parsed_globals)
11959
12124
 
11960
12125
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11986,11 +12151,11 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
11986
12151
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
11987
12152
  client._sdkVersion += ("_CLI_" + __version__)
11988
12153
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11989
- model = models.ModifyLoadBalancingStatusRequest()
12154
+ model = models.DescribeSecurityIPGroupInfoRequest()
11990
12155
  model.from_json_string(json.dumps(args))
11991
12156
  start_time = time.time()
11992
12157
  while True:
11993
- rsp = client.ModifyLoadBalancingStatus(model)
12158
+ rsp = client.DescribeSecurityIPGroupInfo(model)
11994
12159
  result = rsp.to_json_string()
11995
12160
  try:
11996
12161
  json_obj = json.loads(result)
@@ -12009,7 +12174,7 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
12009
12174
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12010
12175
 
12011
12176
 
12012
- def doCreatePlan(args, parsed_globals):
12177
+ def doModifyLoadBalancingStatus(args, parsed_globals):
12013
12178
  g_param = parse_global_arg(parsed_globals)
12014
12179
 
12015
12180
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12041,11 +12206,11 @@ def doCreatePlan(args, parsed_globals):
12041
12206
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12042
12207
  client._sdkVersion += ("_CLI_" + __version__)
12043
12208
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12044
- model = models.CreatePlanRequest()
12209
+ model = models.ModifyLoadBalancingStatusRequest()
12045
12210
  model.from_json_string(json.dumps(args))
12046
12211
  start_time = time.time()
12047
12212
  while True:
12048
- rsp = client.CreatePlan(model)
12213
+ rsp = client.ModifyLoadBalancingStatus(model)
12049
12214
  result = rsp.to_json_string()
12050
12215
  try:
12051
12216
  json_obj = json.loads(result)
@@ -12064,7 +12229,7 @@ def doCreatePlan(args, parsed_globals):
12064
12229
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12065
12230
 
12066
12231
 
12067
- def doDescribeDnsRecords(args, parsed_globals):
12232
+ def doCreatePlan(args, parsed_globals):
12068
12233
  g_param = parse_global_arg(parsed_globals)
12069
12234
 
12070
12235
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12096,11 +12261,11 @@ def doDescribeDnsRecords(args, parsed_globals):
12096
12261
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12097
12262
  client._sdkVersion += ("_CLI_" + __version__)
12098
12263
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12099
- model = models.DescribeDnsRecordsRequest()
12264
+ model = models.CreatePlanRequest()
12100
12265
  model.from_json_string(json.dumps(args))
12101
12266
  start_time = time.time()
12102
12267
  while True:
12103
- rsp = client.DescribeDnsRecords(model)
12268
+ rsp = client.CreatePlan(model)
12104
12269
  result = rsp.to_json_string()
12105
12270
  try:
12106
12271
  json_obj = json.loads(result)
@@ -12119,7 +12284,7 @@ def doDescribeDnsRecords(args, parsed_globals):
12119
12284
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12120
12285
 
12121
12286
 
12122
- def doModifyDDoSProtection(args, parsed_globals):
12287
+ def doDescribeDnsRecords(args, parsed_globals):
12123
12288
  g_param = parse_global_arg(parsed_globals)
12124
12289
 
12125
12290
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12151,11 +12316,11 @@ def doModifyDDoSProtection(args, parsed_globals):
12151
12316
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12152
12317
  client._sdkVersion += ("_CLI_" + __version__)
12153
12318
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12154
- model = models.ModifyDDoSProtectionRequest()
12319
+ model = models.DescribeDnsRecordsRequest()
12155
12320
  model.from_json_string(json.dumps(args))
12156
12321
  start_time = time.time()
12157
12322
  while True:
12158
- rsp = client.ModifyDDoSProtection(model)
12323
+ rsp = client.DescribeDnsRecords(model)
12159
12324
  result = rsp.to_json_string()
12160
12325
  try:
12161
12326
  json_obj = json.loads(result)
@@ -12174,7 +12339,7 @@ def doModifyDDoSProtection(args, parsed_globals):
12174
12339
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12175
12340
 
12176
12341
 
12177
- def doDescribeSecurityAPIService(args, parsed_globals):
12342
+ def doModifyDDoSProtection(args, parsed_globals):
12178
12343
  g_param = parse_global_arg(parsed_globals)
12179
12344
 
12180
12345
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12206,11 +12371,11 @@ def doDescribeSecurityAPIService(args, parsed_globals):
12206
12371
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12207
12372
  client._sdkVersion += ("_CLI_" + __version__)
12208
12373
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12209
- model = models.DescribeSecurityAPIServiceRequest()
12374
+ model = models.ModifyDDoSProtectionRequest()
12210
12375
  model.from_json_string(json.dumps(args))
12211
12376
  start_time = time.time()
12212
12377
  while True:
12213
- rsp = client.DescribeSecurityAPIService(model)
12378
+ rsp = client.ModifyDDoSProtection(model)
12214
12379
  result = rsp.to_json_string()
12215
12380
  try:
12216
12381
  json_obj = json.loads(result)
@@ -12229,7 +12394,7 @@ def doDescribeSecurityAPIService(args, parsed_globals):
12229
12394
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12230
12395
 
12231
12396
 
12232
- def doImportZoneConfig(args, parsed_globals):
12397
+ def doDescribeSecurityAPIService(args, parsed_globals):
12233
12398
  g_param = parse_global_arg(parsed_globals)
12234
12399
 
12235
12400
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12261,11 +12426,11 @@ def doImportZoneConfig(args, parsed_globals):
12261
12426
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12262
12427
  client._sdkVersion += ("_CLI_" + __version__)
12263
12428
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12264
- model = models.ImportZoneConfigRequest()
12429
+ model = models.DescribeSecurityAPIServiceRequest()
12265
12430
  model.from_json_string(json.dumps(args))
12266
12431
  start_time = time.time()
12267
12432
  while True:
12268
- rsp = client.ImportZoneConfig(model)
12433
+ rsp = client.DescribeSecurityAPIService(model)
12269
12434
  result = rsp.to_json_string()
12270
12435
  try:
12271
12436
  json_obj = json.loads(result)
@@ -12284,7 +12449,7 @@ def doImportZoneConfig(args, parsed_globals):
12284
12449
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12285
12450
 
12286
12451
 
12287
- def doDescribeDDosAttackData(args, parsed_globals):
12452
+ def doImportZoneConfig(args, parsed_globals):
12288
12453
  g_param = parse_global_arg(parsed_globals)
12289
12454
 
12290
12455
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12316,11 +12481,11 @@ def doDescribeDDosAttackData(args, parsed_globals):
12316
12481
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12317
12482
  client._sdkVersion += ("_CLI_" + __version__)
12318
12483
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12319
- model = models.DescribeDDosAttackDataRequest()
12484
+ model = models.ImportZoneConfigRequest()
12320
12485
  model.from_json_string(json.dumps(args))
12321
12486
  start_time = time.time()
12322
12487
  while True:
12323
- rsp = client.DescribeDDosAttackData(model)
12488
+ rsp = client.ImportZoneConfig(model)
12324
12489
  result = rsp.to_json_string()
12325
12490
  try:
12326
12491
  json_obj = json.loads(result)
@@ -12339,7 +12504,7 @@ def doDescribeDDosAttackData(args, parsed_globals):
12339
12504
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12340
12505
 
12341
12506
 
12342
- def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12507
+ def doDescribeDDosAttackData(args, parsed_globals):
12343
12508
  g_param = parse_global_arg(parsed_globals)
12344
12509
 
12345
12510
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12371,11 +12536,11 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12371
12536
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12372
12537
  client._sdkVersion += ("_CLI_" + __version__)
12373
12538
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12374
- model = models.CreateMultiPathGatewaySecretKeyRequest()
12539
+ model = models.DescribeDDosAttackDataRequest()
12375
12540
  model.from_json_string(json.dumps(args))
12376
12541
  start_time = time.time()
12377
12542
  while True:
12378
- rsp = client.CreateMultiPathGatewaySecretKey(model)
12543
+ rsp = client.DescribeDDosAttackData(model)
12379
12544
  result = rsp.to_json_string()
12380
12545
  try:
12381
12546
  json_obj = json.loads(result)
@@ -12394,7 +12559,7 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12394
12559
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12395
12560
 
12396
12561
 
12397
- def doModifyCustomErrorPage(args, parsed_globals):
12562
+ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
12398
12563
  g_param = parse_global_arg(parsed_globals)
12399
12564
 
12400
12565
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12426,11 +12591,11 @@ def doModifyCustomErrorPage(args, parsed_globals):
12426
12591
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12427
12592
  client._sdkVersion += ("_CLI_" + __version__)
12428
12593
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12429
- model = models.ModifyCustomErrorPageRequest()
12594
+ model = models.CreateMultiPathGatewaySecretKeyRequest()
12430
12595
  model.from_json_string(json.dumps(args))
12431
12596
  start_time = time.time()
12432
12597
  while True:
12433
- rsp = client.ModifyCustomErrorPage(model)
12598
+ rsp = client.CreateMultiPathGatewaySecretKey(model)
12434
12599
  result = rsp.to_json_string()
12435
12600
  try:
12436
12601
  json_obj = json.loads(result)
@@ -12449,7 +12614,7 @@ def doModifyCustomErrorPage(args, parsed_globals):
12449
12614
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12450
12615
 
12451
12616
 
12452
- def doDescribeL4ProxyRules(args, parsed_globals):
12617
+ def doModifyCustomErrorPage(args, parsed_globals):
12453
12618
  g_param = parse_global_arg(parsed_globals)
12454
12619
 
12455
12620
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12481,11 +12646,11 @@ def doDescribeL4ProxyRules(args, parsed_globals):
12481
12646
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12482
12647
  client._sdkVersion += ("_CLI_" + __version__)
12483
12648
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12484
- model = models.DescribeL4ProxyRulesRequest()
12649
+ model = models.ModifyCustomErrorPageRequest()
12485
12650
  model.from_json_string(json.dumps(args))
12486
12651
  start_time = time.time()
12487
12652
  while True:
12488
- rsp = client.DescribeL4ProxyRules(model)
12653
+ rsp = client.ModifyCustomErrorPage(model)
12489
12654
  result = rsp.to_json_string()
12490
12655
  try:
12491
12656
  json_obj = json.loads(result)
@@ -12504,7 +12669,7 @@ def doDescribeL4ProxyRules(args, parsed_globals):
12504
12669
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12505
12670
 
12506
12671
 
12507
- def doDescribeDDoSAttackData(args, parsed_globals):
12672
+ def doDescribeL4ProxyRules(args, parsed_globals):
12508
12673
  g_param = parse_global_arg(parsed_globals)
12509
12674
 
12510
12675
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12536,11 +12701,11 @@ def doDescribeDDoSAttackData(args, parsed_globals):
12536
12701
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12537
12702
  client._sdkVersion += ("_CLI_" + __version__)
12538
12703
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12539
- model = models.DescribeDDoSAttackDataRequest()
12704
+ model = models.DescribeL4ProxyRulesRequest()
12540
12705
  model.from_json_string(json.dumps(args))
12541
12706
  start_time = time.time()
12542
12707
  while True:
12543
- rsp = client.DescribeDDoSAttackData(model)
12708
+ rsp = client.DescribeL4ProxyRules(model)
12544
12709
  result = rsp.to_json_string()
12545
12710
  try:
12546
12711
  json_obj = json.loads(result)
@@ -12559,7 +12724,7 @@ def doDescribeDDoSAttackData(args, parsed_globals):
12559
12724
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12560
12725
 
12561
12726
 
12562
- def doDeleteSharedCNAME(args, parsed_globals):
12727
+ def doDescribeDDoSAttackData(args, parsed_globals):
12563
12728
  g_param = parse_global_arg(parsed_globals)
12564
12729
 
12565
12730
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12591,11 +12756,11 @@ def doDeleteSharedCNAME(args, parsed_globals):
12591
12756
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12592
12757
  client._sdkVersion += ("_CLI_" + __version__)
12593
12758
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12594
- model = models.DeleteSharedCNAMERequest()
12759
+ model = models.DescribeDDoSAttackDataRequest()
12595
12760
  model.from_json_string(json.dumps(args))
12596
12761
  start_time = time.time()
12597
12762
  while True:
12598
- rsp = client.DeleteSharedCNAME(model)
12763
+ rsp = client.DescribeDDoSAttackData(model)
12599
12764
  result = rsp.to_json_string()
12600
12765
  try:
12601
12766
  json_obj = json.loads(result)
@@ -12614,7 +12779,7 @@ def doDeleteSharedCNAME(args, parsed_globals):
12614
12779
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12615
12780
 
12616
12781
 
12617
- def doDescribeWebManagedRulesData(args, parsed_globals):
12782
+ def doDeleteSharedCNAME(args, parsed_globals):
12618
12783
  g_param = parse_global_arg(parsed_globals)
12619
12784
 
12620
12785
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12646,11 +12811,11 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
12646
12811
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12647
12812
  client._sdkVersion += ("_CLI_" + __version__)
12648
12813
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12649
- model = models.DescribeWebManagedRulesDataRequest()
12814
+ model = models.DeleteSharedCNAMERequest()
12650
12815
  model.from_json_string(json.dumps(args))
12651
12816
  start_time = time.time()
12652
12817
  while True:
12653
- rsp = client.DescribeWebManagedRulesData(model)
12818
+ rsp = client.DeleteSharedCNAME(model)
12654
12819
  result = rsp.to_json_string()
12655
12820
  try:
12656
12821
  json_obj = json.loads(result)
@@ -12669,7 +12834,7 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
12669
12834
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12670
12835
 
12671
12836
 
12672
- def doImportDnsRecords(args, parsed_globals):
12837
+ def doDescribeWebManagedRulesData(args, parsed_globals):
12673
12838
  g_param = parse_global_arg(parsed_globals)
12674
12839
 
12675
12840
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12701,11 +12866,11 @@ def doImportDnsRecords(args, parsed_globals):
12701
12866
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12702
12867
  client._sdkVersion += ("_CLI_" + __version__)
12703
12868
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12704
- model = models.ImportDnsRecordsRequest()
12869
+ model = models.DescribeWebManagedRulesDataRequest()
12705
12870
  model.from_json_string(json.dumps(args))
12706
12871
  start_time = time.time()
12707
12872
  while True:
12708
- rsp = client.ImportDnsRecords(model)
12873
+ rsp = client.DescribeWebManagedRulesData(model)
12709
12874
  result = rsp.to_json_string()
12710
12875
  try:
12711
12876
  json_obj = json.loads(result)
@@ -12724,7 +12889,7 @@ def doImportDnsRecords(args, parsed_globals):
12724
12889
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12725
12890
 
12726
12891
 
12727
- def doCreateSecurityAPIService(args, parsed_globals):
12892
+ def doImportDnsRecords(args, parsed_globals):
12728
12893
  g_param = parse_global_arg(parsed_globals)
12729
12894
 
12730
12895
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12756,11 +12921,11 @@ def doCreateSecurityAPIService(args, parsed_globals):
12756
12921
  client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
12757
12922
  client._sdkVersion += ("_CLI_" + __version__)
12758
12923
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12759
- model = models.CreateSecurityAPIServiceRequest()
12924
+ model = models.ImportDnsRecordsRequest()
12760
12925
  model.from_json_string(json.dumps(args))
12761
12926
  start_time = time.time()
12762
12927
  while True:
12763
- rsp = client.CreateSecurityAPIService(model)
12928
+ rsp = client.ImportDnsRecords(model)
12764
12929
  result = rsp.to_json_string()
12765
12930
  try:
12766
12931
  json_obj = json.loads(result)
@@ -13323,7 +13488,7 @@ ACTION_MAP = {
13323
13488
  "DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
13324
13489
  "ModifyL4ProxyStatus": doModifyL4ProxyStatus,
13325
13490
  "DownloadL7Logs": doDownloadL7Logs,
13326
- "DescribeEnvironments": doDescribeEnvironments,
13491
+ "CreateContentIdentifier": doCreateContentIdentifier,
13327
13492
  "DescribeOriginACL": doDescribeOriginACL,
13328
13493
  "DeleteApplicationProxyRule": doDeleteApplicationProxyRule,
13329
13494
  "CheckCnameStatus": doCheckCnameStatus,
@@ -13361,6 +13526,7 @@ ACTION_MAP = {
13361
13526
  "RefreshMultiPathGatewaySecretKey": doRefreshMultiPathGatewaySecretKey,
13362
13527
  "CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
13363
13528
  "ModifyL4Proxy": doModifyL4Proxy,
13529
+ "CheckFreeCertificateVerification": doCheckFreeCertificateVerification,
13364
13530
  "ModifyL4ProxyRules": doModifyL4ProxyRules,
13365
13531
  "DescribeIdentifications": doDescribeIdentifications,
13366
13532
  "DescribeDDosAttackEventDetail": doDescribeDDosAttackEventDetail,
@@ -13494,7 +13660,7 @@ ACTION_MAP = {
13494
13660
  "DescribeZoneSetting": doDescribeZoneSetting,
13495
13661
  "DescribeSecurityAPIResource": doDescribeSecurityAPIResource,
13496
13662
  "DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
13497
- "CreateContentIdentifier": doCreateContentIdentifier,
13663
+ "CreateSecurityAPIService": doCreateSecurityAPIService,
13498
13664
  "DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
13499
13665
  "CreateApplicationProxyRule": doCreateApplicationProxyRule,
13500
13666
  "ModifySecurityJSInjectionRule": doModifySecurityJSInjectionRule,
@@ -13502,7 +13668,10 @@ ACTION_MAP = {
13502
13668
  "DescribeFunctions": doDescribeFunctions,
13503
13669
  "ReclaimZone": doReclaimZone,
13504
13670
  "DeleteZone": doDeleteZone,
13671
+ "DescribeTimingL7OriginPullData": doDescribeTimingL7OriginPullData,
13672
+ "ApplyFreeCertificate": doApplyFreeCertificate,
13505
13673
  "DescribeDDosAttackEvent": doDescribeDDosAttackEvent,
13674
+ "DescribeEnvironments": doDescribeEnvironments,
13506
13675
  "DescribeSecurityIPGroupInfo": doDescribeSecurityIPGroupInfo,
13507
13676
  "ModifyLoadBalancingStatus": doModifyLoadBalancingStatus,
13508
13677
  "CreatePlan": doCreatePlan,
@@ -13518,7 +13687,6 @@ ACTION_MAP = {
13518
13687
  "DeleteSharedCNAME": doDeleteSharedCNAME,
13519
13688
  "DescribeWebManagedRulesData": doDescribeWebManagedRulesData,
13520
13689
  "ImportDnsRecords": doImportDnsRecords,
13521
- "CreateSecurityAPIService": doCreateSecurityAPIService,
13522
13690
  "DescribeSecurityPolicyManagedRulesId": doDescribeSecurityPolicyManagedRulesId,
13523
13691
  "DescribeAliasDomains": doDescribeAliasDomains,
13524
13692
  "DescribeOriginGroupDetail": doDescribeOriginGroupDetail,