tccli 3.0.1228.1__py2.py3-none-any.whl → 3.0.1229.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/aiart/v20221229/api.json +12 -3
- tccli/services/cam/v20190116/api.json +25 -25
- tccli/services/cam/v20190116/examples.json +8 -8
- tccli/services/cdb/v20170320/api.json +8 -8
- tccli/services/ckafka/v20190819/api.json +1 -1
- tccli/services/ckafka/v20190819/examples.json +14 -14
- tccli/services/clb/v20180317/api.json +1 -1
- tccli/services/cloudaudit/v20190319/api.json +15 -15
- tccli/services/cloudaudit/v20190319/examples.json +3 -3
- tccli/services/config/v20220802/api.json +70 -68
- tccli/services/config/v20220802/examples.json +6 -6
- tccli/services/cynosdb/cynosdb_client.py +118 -12
- tccli/services/cynosdb/v20190107/api.json +126 -0
- tccli/services/cynosdb/v20190107/examples.json +16 -0
- tccli/services/essbasic/v20210526/api.json +10 -0
- tccli/services/facefusion/v20181201/api.json +12 -6
- tccli/services/hai/v20230812/api.json +6 -6
- tccli/services/hai/v20230812/examples.json +2 -2
- tccli/services/mqtt/mqtt_client.py +118 -12
- tccli/services/mqtt/v20240516/api.json +312 -33
- tccli/services/mqtt/v20240516/examples.json +23 -13
- tccli/services/ocr/v20181119/api.json +11 -2
- tccli/services/ocr/v20181119/examples.json +6 -6
- tccli/services/pts/v20210728/api.json +22 -12
- tccli/services/redis/v20180412/api.json +14 -14
- tccli/services/scf/v20180416/api.json +12 -0
- tccli/services/ssl/v20191205/api.json +246 -173
- tccli/services/ssl/v20191205/examples.json +69 -69
- tccli/services/sts/v20180813/api.json +17 -11
- tccli/services/sts/v20180813/examples.json +6 -6
- tccli/services/tcr/v20190924/api.json +17 -17
- tccli/services/tdmq/tdmq_client.py +4 -57
- tccli/services/tdmq/v20200217/api.json +119 -200
- tccli/services/tdmq/v20200217/examples.json +29 -49
- tccli/services/trtc/v20190722/api.json +1 -1
- tccli/services/vclm/v20240523/api.json +25 -15
- tccli/services/vclm/v20240523/examples.json +2 -2
- tccli/services/vod/v20180717/api.json +1 -1
- tccli/services/vpc/v20170312/api.json +166 -137
- tccli/services/vpc/v20170312/examples.json +3 -3
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/RECORD +46 -46
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/license_files/LICENSE +0 -0
@@ -17,7 +17,7 @@ from tencentcloud.mqtt.v20240516 import models as models_v20240516
|
|
17
17
|
from jmespath import search
|
18
18
|
import time
|
19
19
|
|
20
|
-
def
|
20
|
+
def doCreateTopic(args, parsed_globals):
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
22
22
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -46,11 +46,11 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
|
|
46
46
|
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
47
47
|
client._sdkVersion += ("_CLI_" + __version__)
|
48
48
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
49
|
-
model = models.
|
49
|
+
model = models.CreateTopicRequest()
|
50
50
|
model.from_json_string(json.dumps(args))
|
51
51
|
start_time = time.time()
|
52
52
|
while True:
|
53
|
-
rsp = client.
|
53
|
+
rsp = client.CreateTopic(model)
|
54
54
|
result = rsp.to_json_string()
|
55
55
|
try:
|
56
56
|
json_obj = json.loads(result)
|
@@ -69,7 +69,7 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
|
|
69
69
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
70
70
|
|
71
71
|
|
72
|
-
def
|
72
|
+
def doActivateDeviceCertificate(args, parsed_globals):
|
73
73
|
g_param = parse_global_arg(parsed_globals)
|
74
74
|
|
75
75
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -98,11 +98,11 @@ def doDeleteAuthorizationPolicy(args, parsed_globals):
|
|
98
98
|
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
99
99
|
client._sdkVersion += ("_CLI_" + __version__)
|
100
100
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
101
|
-
model = models.
|
101
|
+
model = models.ActivateDeviceCertificateRequest()
|
102
102
|
model.from_json_string(json.dumps(args))
|
103
103
|
start_time = time.time()
|
104
104
|
while True:
|
105
|
-
rsp = client.
|
105
|
+
rsp = client.ActivateDeviceCertificate(model)
|
106
106
|
result = rsp.to_json_string()
|
107
107
|
try:
|
108
108
|
json_obj = json.loads(result)
|
@@ -381,7 +381,7 @@ def doRegisterDeviceCertificate(args, parsed_globals):
|
|
381
381
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
382
382
|
|
383
383
|
|
384
|
-
def
|
384
|
+
def doModifyAuthorizationPolicy(args, parsed_globals):
|
385
385
|
g_param = parse_global_arg(parsed_globals)
|
386
386
|
|
387
387
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -410,11 +410,11 @@ def doCreateTopic(args, parsed_globals):
|
|
410
410
|
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
411
411
|
client._sdkVersion += ("_CLI_" + __version__)
|
412
412
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
413
|
-
model = models.
|
413
|
+
model = models.ModifyAuthorizationPolicyRequest()
|
414
414
|
model.from_json_string(json.dumps(args))
|
415
415
|
start_time = time.time()
|
416
416
|
while True:
|
417
|
-
rsp = client.
|
417
|
+
rsp = client.ModifyAuthorizationPolicy(model)
|
418
418
|
result = rsp.to_json_string()
|
419
419
|
try:
|
420
420
|
json_obj = json.loads(result)
|
@@ -641,6 +641,58 @@ def doDescribeInstance(args, parsed_globals):
|
|
641
641
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
642
642
|
|
643
643
|
|
644
|
+
def doDeleteAuthorizationPolicy(args, parsed_globals):
|
645
|
+
g_param = parse_global_arg(parsed_globals)
|
646
|
+
|
647
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
648
|
+
cred = credential.CVMRoleCredential()
|
649
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
650
|
+
cred = credential.STSAssumeRoleCredential(
|
651
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
652
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
653
|
+
)
|
654
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
655
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
656
|
+
else:
|
657
|
+
cred = credential.Credential(
|
658
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
659
|
+
)
|
660
|
+
http_profile = HttpProfile(
|
661
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
662
|
+
reqMethod="POST",
|
663
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
664
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
665
|
+
)
|
666
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
667
|
+
if g_param[OptionsDefine.Language]:
|
668
|
+
profile.language = g_param[OptionsDefine.Language]
|
669
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
670
|
+
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
671
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
672
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
673
|
+
model = models.DeleteAuthorizationPolicyRequest()
|
674
|
+
model.from_json_string(json.dumps(args))
|
675
|
+
start_time = time.time()
|
676
|
+
while True:
|
677
|
+
rsp = client.DeleteAuthorizationPolicy(model)
|
678
|
+
result = rsp.to_json_string()
|
679
|
+
try:
|
680
|
+
json_obj = json.loads(result)
|
681
|
+
except TypeError as e:
|
682
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
683
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
684
|
+
break
|
685
|
+
cur_time = time.time()
|
686
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
687
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
688
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
689
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
690
|
+
else:
|
691
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
692
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
693
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
694
|
+
|
695
|
+
|
644
696
|
def doUpdateAuthorizationPolicyPriority(args, parsed_globals):
|
645
697
|
g_param = parse_global_arg(parsed_globals)
|
646
698
|
|
@@ -1005,6 +1057,58 @@ def doModifyJWKSAuthenticator(args, parsed_globals):
|
|
1005
1057
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1006
1058
|
|
1007
1059
|
|
1060
|
+
def doDescribeDeviceCertificates(args, parsed_globals):
|
1061
|
+
g_param = parse_global_arg(parsed_globals)
|
1062
|
+
|
1063
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1064
|
+
cred = credential.CVMRoleCredential()
|
1065
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1066
|
+
cred = credential.STSAssumeRoleCredential(
|
1067
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1068
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1069
|
+
)
|
1070
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1071
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1072
|
+
else:
|
1073
|
+
cred = credential.Credential(
|
1074
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1075
|
+
)
|
1076
|
+
http_profile = HttpProfile(
|
1077
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1078
|
+
reqMethod="POST",
|
1079
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1080
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1081
|
+
)
|
1082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1083
|
+
if g_param[OptionsDefine.Language]:
|
1084
|
+
profile.language = g_param[OptionsDefine.Language]
|
1085
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1086
|
+
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
1087
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1088
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1089
|
+
model = models.DescribeDeviceCertificatesRequest()
|
1090
|
+
model.from_json_string(json.dumps(args))
|
1091
|
+
start_time = time.time()
|
1092
|
+
while True:
|
1093
|
+
rsp = client.DescribeDeviceCertificates(model)
|
1094
|
+
result = rsp.to_json_string()
|
1095
|
+
try:
|
1096
|
+
json_obj = json.loads(result)
|
1097
|
+
except TypeError as e:
|
1098
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1099
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1100
|
+
break
|
1101
|
+
cur_time = time.time()
|
1102
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1103
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1104
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1105
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1106
|
+
else:
|
1107
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1108
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1109
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1110
|
+
|
1111
|
+
|
1008
1112
|
CLIENT_MAP = {
|
1009
1113
|
"v20240516": mqtt_client_v20240516,
|
1010
1114
|
|
@@ -1016,18 +1120,19 @@ MODELS_MAP = {
|
|
1016
1120
|
}
|
1017
1121
|
|
1018
1122
|
ACTION_MAP = {
|
1019
|
-
"
|
1020
|
-
"
|
1123
|
+
"CreateTopic": doCreateTopic,
|
1124
|
+
"ActivateDeviceCertificate": doActivateDeviceCertificate,
|
1021
1125
|
"DescribeAuthorizationPolicies": doDescribeAuthorizationPolicies,
|
1022
1126
|
"DescribeTopicList": doDescribeTopicList,
|
1023
1127
|
"ModifyTopic": doModifyTopic,
|
1024
1128
|
"CreateAuthorizationPolicy": doCreateAuthorizationPolicy,
|
1025
1129
|
"RegisterDeviceCertificate": doRegisterDeviceCertificate,
|
1026
|
-
"
|
1130
|
+
"ModifyAuthorizationPolicy": doModifyAuthorizationPolicy,
|
1027
1131
|
"CreateJWTAuthenticator": doCreateJWTAuthenticator,
|
1028
1132
|
"DeleteAuthenticator": doDeleteAuthenticator,
|
1029
1133
|
"DescribeAuthenticator": doDescribeAuthenticator,
|
1030
1134
|
"DescribeInstance": doDescribeInstance,
|
1135
|
+
"DeleteAuthorizationPolicy": doDeleteAuthorizationPolicy,
|
1031
1136
|
"UpdateAuthorizationPolicyPriority": doUpdateAuthorizationPolicyPriority,
|
1032
1137
|
"DescribeTopic": doDescribeTopic,
|
1033
1138
|
"DescribeInstanceList": doDescribeInstanceList,
|
@@ -1035,6 +1140,7 @@ ACTION_MAP = {
|
|
1035
1140
|
"ModifyJWTAuthenticator": doModifyJWTAuthenticator,
|
1036
1141
|
"DeleteTopic": doDeleteTopic,
|
1037
1142
|
"ModifyJWKSAuthenticator": doModifyJWKSAuthenticator,
|
1143
|
+
"DescribeDeviceCertificates": doDescribeDeviceCertificates,
|
1038
1144
|
|
1039
1145
|
}
|
1040
1146
|
|