tccli 3.0.1228.1__py2.py3-none-any.whl → 3.0.1229.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (46) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/aiart/v20221229/api.json +12 -3
  3. tccli/services/cam/v20190116/api.json +25 -25
  4. tccli/services/cam/v20190116/examples.json +8 -8
  5. tccli/services/cdb/v20170320/api.json +8 -8
  6. tccli/services/ckafka/v20190819/api.json +1 -1
  7. tccli/services/ckafka/v20190819/examples.json +14 -14
  8. tccli/services/clb/v20180317/api.json +1 -1
  9. tccli/services/cloudaudit/v20190319/api.json +15 -15
  10. tccli/services/cloudaudit/v20190319/examples.json +3 -3
  11. tccli/services/config/v20220802/api.json +70 -68
  12. tccli/services/config/v20220802/examples.json +6 -6
  13. tccli/services/cynosdb/cynosdb_client.py +118 -12
  14. tccli/services/cynosdb/v20190107/api.json +126 -0
  15. tccli/services/cynosdb/v20190107/examples.json +16 -0
  16. tccli/services/essbasic/v20210526/api.json +10 -0
  17. tccli/services/facefusion/v20181201/api.json +12 -6
  18. tccli/services/hai/v20230812/api.json +6 -6
  19. tccli/services/hai/v20230812/examples.json +2 -2
  20. tccli/services/mqtt/mqtt_client.py +118 -12
  21. tccli/services/mqtt/v20240516/api.json +312 -33
  22. tccli/services/mqtt/v20240516/examples.json +23 -13
  23. tccli/services/ocr/v20181119/api.json +11 -2
  24. tccli/services/ocr/v20181119/examples.json +6 -6
  25. tccli/services/pts/v20210728/api.json +22 -12
  26. tccli/services/redis/v20180412/api.json +14 -14
  27. tccli/services/scf/v20180416/api.json +12 -0
  28. tccli/services/ssl/v20191205/api.json +246 -173
  29. tccli/services/ssl/v20191205/examples.json +69 -69
  30. tccli/services/sts/v20180813/api.json +17 -11
  31. tccli/services/sts/v20180813/examples.json +6 -6
  32. tccli/services/tcr/v20190924/api.json +17 -17
  33. tccli/services/tdmq/tdmq_client.py +4 -57
  34. tccli/services/tdmq/v20200217/api.json +119 -200
  35. tccli/services/tdmq/v20200217/examples.json +29 -49
  36. tccli/services/trtc/v20190722/api.json +1 -1
  37. tccli/services/vclm/v20240523/api.json +25 -15
  38. tccli/services/vclm/v20240523/examples.json +2 -2
  39. tccli/services/vod/v20180717/api.json +1 -1
  40. tccli/services/vpc/v20170312/api.json +166 -137
  41. tccli/services/vpc/v20170312/examples.json +3 -3
  42. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/METADATA +2 -2
  43. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/RECORD +46 -46
  44. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/WHEEL +0 -0
  45. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/entry_points.txt +0 -0
  46. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/license_files/LICENSE +0 -0
@@ -17,7 +17,7 @@ from tencentcloud.mqtt.v20240516 import models as models_v20240516
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
- def doModifyAuthorizationPolicy(args, parsed_globals):
20
+ def doCreateTopic(args, parsed_globals):
21
21
  g_param = parse_global_arg(parsed_globals)
22
22
 
23
23
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -46,11 +46,11 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
46
46
  client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
47
47
  client._sdkVersion += ("_CLI_" + __version__)
48
48
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
49
- model = models.ModifyAuthorizationPolicyRequest()
49
+ model = models.CreateTopicRequest()
50
50
  model.from_json_string(json.dumps(args))
51
51
  start_time = time.time()
52
52
  while True:
53
- rsp = client.ModifyAuthorizationPolicy(model)
53
+ rsp = client.CreateTopic(model)
54
54
  result = rsp.to_json_string()
55
55
  try:
56
56
  json_obj = json.loads(result)
@@ -69,7 +69,7 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
69
69
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
70
 
71
71
 
72
- def doDeleteAuthorizationPolicy(args, parsed_globals):
72
+ def doActivateDeviceCertificate(args, parsed_globals):
73
73
  g_param = parse_global_arg(parsed_globals)
74
74
 
75
75
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -98,11 +98,11 @@ def doDeleteAuthorizationPolicy(args, parsed_globals):
98
98
  client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
99
99
  client._sdkVersion += ("_CLI_" + __version__)
100
100
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.DeleteAuthorizationPolicyRequest()
101
+ model = models.ActivateDeviceCertificateRequest()
102
102
  model.from_json_string(json.dumps(args))
103
103
  start_time = time.time()
104
104
  while True:
105
- rsp = client.DeleteAuthorizationPolicy(model)
105
+ rsp = client.ActivateDeviceCertificate(model)
106
106
  result = rsp.to_json_string()
107
107
  try:
108
108
  json_obj = json.loads(result)
@@ -381,7 +381,7 @@ def doRegisterDeviceCertificate(args, parsed_globals):
381
381
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
382
 
383
383
 
384
- def doCreateTopic(args, parsed_globals):
384
+ def doModifyAuthorizationPolicy(args, parsed_globals):
385
385
  g_param = parse_global_arg(parsed_globals)
386
386
 
387
387
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -410,11 +410,11 @@ def doCreateTopic(args, parsed_globals):
410
410
  client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
411
411
  client._sdkVersion += ("_CLI_" + __version__)
412
412
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.CreateTopicRequest()
413
+ model = models.ModifyAuthorizationPolicyRequest()
414
414
  model.from_json_string(json.dumps(args))
415
415
  start_time = time.time()
416
416
  while True:
417
- rsp = client.CreateTopic(model)
417
+ rsp = client.ModifyAuthorizationPolicy(model)
418
418
  result = rsp.to_json_string()
419
419
  try:
420
420
  json_obj = json.loads(result)
@@ -641,6 +641,58 @@ def doDescribeInstance(args, parsed_globals):
641
641
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
642
 
643
643
 
644
+ def doDeleteAuthorizationPolicy(args, parsed_globals):
645
+ g_param = parse_global_arg(parsed_globals)
646
+
647
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
648
+ cred = credential.CVMRoleCredential()
649
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
650
+ cred = credential.STSAssumeRoleCredential(
651
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
+ )
654
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
+ else:
657
+ cred = credential.Credential(
658
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
659
+ )
660
+ http_profile = HttpProfile(
661
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
662
+ reqMethod="POST",
663
+ endpoint=g_param[OptionsDefine.Endpoint],
664
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
+ )
666
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
667
+ if g_param[OptionsDefine.Language]:
668
+ profile.language = g_param[OptionsDefine.Language]
669
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
670
+ client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
671
+ client._sdkVersion += ("_CLI_" + __version__)
672
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
+ model = models.DeleteAuthorizationPolicyRequest()
674
+ model.from_json_string(json.dumps(args))
675
+ start_time = time.time()
676
+ while True:
677
+ rsp = client.DeleteAuthorizationPolicy(model)
678
+ result = rsp.to_json_string()
679
+ try:
680
+ json_obj = json.loads(result)
681
+ except TypeError as e:
682
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
683
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
684
+ break
685
+ cur_time = time.time()
686
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
687
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
688
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
689
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
690
+ else:
691
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
692
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
693
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
+
695
+
644
696
  def doUpdateAuthorizationPolicyPriority(args, parsed_globals):
645
697
  g_param = parse_global_arg(parsed_globals)
646
698
 
@@ -1005,6 +1057,58 @@ def doModifyJWKSAuthenticator(args, parsed_globals):
1005
1057
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1058
 
1007
1059
 
1060
+ def doDescribeDeviceCertificates(args, parsed_globals):
1061
+ g_param = parse_global_arg(parsed_globals)
1062
+
1063
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1064
+ cred = credential.CVMRoleCredential()
1065
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1066
+ cred = credential.STSAssumeRoleCredential(
1067
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
+ )
1070
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
+ else:
1073
+ cred = credential.Credential(
1074
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1075
+ )
1076
+ http_profile = HttpProfile(
1077
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1078
+ reqMethod="POST",
1079
+ endpoint=g_param[OptionsDefine.Endpoint],
1080
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
+ )
1082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1083
+ if g_param[OptionsDefine.Language]:
1084
+ profile.language = g_param[OptionsDefine.Language]
1085
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
+ client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
1087
+ client._sdkVersion += ("_CLI_" + __version__)
1088
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
+ model = models.DescribeDeviceCertificatesRequest()
1090
+ model.from_json_string(json.dumps(args))
1091
+ start_time = time.time()
1092
+ while True:
1093
+ rsp = client.DescribeDeviceCertificates(model)
1094
+ result = rsp.to_json_string()
1095
+ try:
1096
+ json_obj = json.loads(result)
1097
+ except TypeError as e:
1098
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1099
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1100
+ break
1101
+ cur_time = time.time()
1102
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1103
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1104
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1105
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1106
+ else:
1107
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1108
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1109
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
+
1111
+
1008
1112
  CLIENT_MAP = {
1009
1113
  "v20240516": mqtt_client_v20240516,
1010
1114
 
@@ -1016,18 +1120,19 @@ MODELS_MAP = {
1016
1120
  }
1017
1121
 
1018
1122
  ACTION_MAP = {
1019
- "ModifyAuthorizationPolicy": doModifyAuthorizationPolicy,
1020
- "DeleteAuthorizationPolicy": doDeleteAuthorizationPolicy,
1123
+ "CreateTopic": doCreateTopic,
1124
+ "ActivateDeviceCertificate": doActivateDeviceCertificate,
1021
1125
  "DescribeAuthorizationPolicies": doDescribeAuthorizationPolicies,
1022
1126
  "DescribeTopicList": doDescribeTopicList,
1023
1127
  "ModifyTopic": doModifyTopic,
1024
1128
  "CreateAuthorizationPolicy": doCreateAuthorizationPolicy,
1025
1129
  "RegisterDeviceCertificate": doRegisterDeviceCertificate,
1026
- "CreateTopic": doCreateTopic,
1130
+ "ModifyAuthorizationPolicy": doModifyAuthorizationPolicy,
1027
1131
  "CreateJWTAuthenticator": doCreateJWTAuthenticator,
1028
1132
  "DeleteAuthenticator": doDeleteAuthenticator,
1029
1133
  "DescribeAuthenticator": doDescribeAuthenticator,
1030
1134
  "DescribeInstance": doDescribeInstance,
1135
+ "DeleteAuthorizationPolicy": doDeleteAuthorizationPolicy,
1031
1136
  "UpdateAuthorizationPolicyPriority": doUpdateAuthorizationPolicyPriority,
1032
1137
  "DescribeTopic": doDescribeTopic,
1033
1138
  "DescribeInstanceList": doDescribeInstanceList,
@@ -1035,6 +1140,7 @@ ACTION_MAP = {
1035
1140
  "ModifyJWTAuthenticator": doModifyJWTAuthenticator,
1036
1141
  "DeleteTopic": doDeleteTopic,
1037
1142
  "ModifyJWKSAuthenticator": doModifyJWKSAuthenticator,
1143
+ "DescribeDeviceCertificates": doDescribeDeviceCertificates,
1038
1144
 
1039
1145
  }
1040
1146