tccli 3.0.1196.1__py2.py3-none-any.whl → 3.0.1198.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/apigateway/apigateway_client.py +57 -4
- tccli/services/apigateway/v20180808/api.json +24 -0
- tccli/services/apigateway/v20180808/examples.json +8 -0
- tccli/services/cvm/v20170312/api.json +24 -24
- tccli/services/emr/emr_client.py +114 -8
- tccli/services/emr/v20190103/api.json +296 -3
- tccli/services/emr/v20190103/examples.json +16 -0
- tccli/services/ess/v20201111/api.json +19 -1
- tccli/services/ess/v20201111/examples.json +1 -1
- tccli/services/essbasic/v20210526/api.json +18 -0
- tccli/services/essbasic/v20210526/examples.json +1 -1
- tccli/services/faceid/v20180301/api.json +9 -0
- tccli/services/hunyuan/v20230901/api.json +1 -1
- tccli/services/organization/organization_client.py +106 -0
- tccli/services/organization/v20210331/api.json +324 -27
- tccli/services/organization/v20210331/examples.json +17 -1
- tccli/services/postgres/postgres_client.py +106 -0
- tccli/services/postgres/v20170312/api.json +236 -9
- tccli/services/postgres/v20170312/examples.json +24 -2
- tccli/services/sms/v20190711/api.json +8 -8
- tccli/services/sms/v20210111/api.json +13 -13
- tccli/services/teo/v20220901/api.json +6 -6
- tccli/services/vod/v20180717/api.json +3 -3
- {tccli-3.0.1196.1.dist-info → tccli-3.0.1198.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1196.1.dist-info → tccli-3.0.1198.1.dist-info}/RECORD +29 -29
- {tccli-3.0.1196.1.dist-info → tccli-3.0.1198.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1196.1.dist-info → tccli-3.0.1198.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1196.1.dist-info → tccli-3.0.1198.1.dist-info}/license_files/LICENSE +0 -0
@@ -5635,6 +5635,58 @@ def doListRoleConfigurations(args, parsed_globals):
|
|
5635
5635
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5636
5636
|
|
5637
5637
|
|
5638
|
+
def doInviteOrganizationMember(args, parsed_globals):
|
5639
|
+
g_param = parse_global_arg(parsed_globals)
|
5640
|
+
|
5641
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5642
|
+
cred = credential.CVMRoleCredential()
|
5643
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5644
|
+
cred = credential.STSAssumeRoleCredential(
|
5645
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5646
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5647
|
+
)
|
5648
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5649
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5650
|
+
else:
|
5651
|
+
cred = credential.Credential(
|
5652
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5653
|
+
)
|
5654
|
+
http_profile = HttpProfile(
|
5655
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5656
|
+
reqMethod="POST",
|
5657
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5658
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5659
|
+
)
|
5660
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5661
|
+
if g_param[OptionsDefine.Language]:
|
5662
|
+
profile.language = g_param[OptionsDefine.Language]
|
5663
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5664
|
+
client = mod.OrganizationClient(cred, g_param[OptionsDefine.Region], profile)
|
5665
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5666
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5667
|
+
model = models.InviteOrganizationMemberRequest()
|
5668
|
+
model.from_json_string(json.dumps(args))
|
5669
|
+
start_time = time.time()
|
5670
|
+
while True:
|
5671
|
+
rsp = client.InviteOrganizationMember(model)
|
5672
|
+
result = rsp.to_json_string()
|
5673
|
+
try:
|
5674
|
+
json_obj = json.loads(result)
|
5675
|
+
except TypeError as e:
|
5676
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5677
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5678
|
+
break
|
5679
|
+
cur_time = time.time()
|
5680
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5681
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5682
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5683
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5684
|
+
else:
|
5685
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5686
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5687
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5688
|
+
|
5689
|
+
|
5638
5690
|
def doAddShareUnitResources(args, parsed_globals):
|
5639
5691
|
g_param = parse_global_arg(parsed_globals)
|
5640
5692
|
|
@@ -6623,6 +6675,58 @@ def doListOrganizationService(args, parsed_globals):
|
|
6623
6675
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6624
6676
|
|
6625
6677
|
|
6678
|
+
def doUpdateCustomPolicyForRoleConfiguration(args, parsed_globals):
|
6679
|
+
g_param = parse_global_arg(parsed_globals)
|
6680
|
+
|
6681
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6682
|
+
cred = credential.CVMRoleCredential()
|
6683
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6684
|
+
cred = credential.STSAssumeRoleCredential(
|
6685
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6686
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6687
|
+
)
|
6688
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6689
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6690
|
+
else:
|
6691
|
+
cred = credential.Credential(
|
6692
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6693
|
+
)
|
6694
|
+
http_profile = HttpProfile(
|
6695
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6696
|
+
reqMethod="POST",
|
6697
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6698
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6699
|
+
)
|
6700
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6701
|
+
if g_param[OptionsDefine.Language]:
|
6702
|
+
profile.language = g_param[OptionsDefine.Language]
|
6703
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6704
|
+
client = mod.OrganizationClient(cred, g_param[OptionsDefine.Region], profile)
|
6705
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6706
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6707
|
+
model = models.UpdateCustomPolicyForRoleConfigurationRequest()
|
6708
|
+
model.from_json_string(json.dumps(args))
|
6709
|
+
start_time = time.time()
|
6710
|
+
while True:
|
6711
|
+
rsp = client.UpdateCustomPolicyForRoleConfiguration(model)
|
6712
|
+
result = rsp.to_json_string()
|
6713
|
+
try:
|
6714
|
+
json_obj = json.loads(result)
|
6715
|
+
except TypeError as e:
|
6716
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6717
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6718
|
+
break
|
6719
|
+
cur_time = time.time()
|
6720
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6721
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6722
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6723
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6724
|
+
else:
|
6725
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6726
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6727
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6728
|
+
|
6729
|
+
|
6626
6730
|
def doDeleteOrganizationMemberAuthIdentity(args, parsed_globals):
|
6627
6731
|
g_param = parse_global_arg(parsed_globals)
|
6628
6732
|
|
@@ -6796,6 +6900,7 @@ ACTION_MAP = {
|
|
6796
6900
|
"DescribeOrganizationMemberPolicies": doDescribeOrganizationMemberPolicies,
|
6797
6901
|
"DeleteUserSyncProvisioning": doDeleteUserSyncProvisioning,
|
6798
6902
|
"ListRoleConfigurations": doListRoleConfigurations,
|
6903
|
+
"InviteOrganizationMember": doInviteOrganizationMember,
|
6799
6904
|
"AddShareUnitResources": doAddShareUnitResources,
|
6800
6905
|
"AttachPolicy": doAttachPolicy,
|
6801
6906
|
"DescribeShareAreas": doDescribeShareAreas,
|
@@ -6815,6 +6920,7 @@ ACTION_MAP = {
|
|
6815
6920
|
"GetTaskStatus": doGetTaskStatus,
|
6816
6921
|
"CreateOrganizationMemberPolicy": doCreateOrganizationMemberPolicy,
|
6817
6922
|
"ListOrganizationService": doListOrganizationService,
|
6923
|
+
"UpdateCustomPolicyForRoleConfiguration": doUpdateCustomPolicyForRoleConfiguration,
|
6818
6924
|
"DeleteOrganizationMemberAuthIdentity": doDeleteOrganizationMemberAuthIdentity,
|
6819
6925
|
|
6820
6926
|
}
|