tccli 3.0.1228.1__py2.py3-none-any.whl → 3.0.1229.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/aiart/v20221229/api.json +12 -3
  3. tccli/services/cam/v20190116/api.json +25 -25
  4. tccli/services/cam/v20190116/examples.json +8 -8
  5. tccli/services/cdb/v20170320/api.json +8 -8
  6. tccli/services/ckafka/v20190819/api.json +1 -1
  7. tccli/services/ckafka/v20190819/examples.json +14 -14
  8. tccli/services/clb/v20180317/api.json +1 -1
  9. tccli/services/cloudaudit/v20190319/api.json +15 -15
  10. tccli/services/cloudaudit/v20190319/examples.json +3 -3
  11. tccli/services/config/v20220802/api.json +70 -68
  12. tccli/services/config/v20220802/examples.json +6 -6
  13. tccli/services/cynosdb/cynosdb_client.py +118 -12
  14. tccli/services/cynosdb/v20190107/api.json +126 -0
  15. tccli/services/cynosdb/v20190107/examples.json +16 -0
  16. tccli/services/essbasic/v20210526/api.json +10 -0
  17. tccli/services/facefusion/v20181201/api.json +12 -6
  18. tccli/services/hai/v20230812/api.json +6 -6
  19. tccli/services/hai/v20230812/examples.json +2 -2
  20. tccli/services/mqtt/mqtt_client.py +118 -12
  21. tccli/services/mqtt/v20240516/api.json +312 -33
  22. tccli/services/mqtt/v20240516/examples.json +23 -13
  23. tccli/services/ocr/v20181119/api.json +11 -2
  24. tccli/services/ocr/v20181119/examples.json +6 -6
  25. tccli/services/pts/v20210728/api.json +22 -12
  26. tccli/services/redis/v20180412/api.json +14 -14
  27. tccli/services/scf/v20180416/api.json +12 -0
  28. tccli/services/ssl/v20191205/api.json +246 -173
  29. tccli/services/ssl/v20191205/examples.json +69 -69
  30. tccli/services/sts/v20180813/api.json +17 -11
  31. tccli/services/sts/v20180813/examples.json +6 -6
  32. tccli/services/tcr/v20190924/api.json +17 -17
  33. tccli/services/tdmq/tdmq_client.py +4 -57
  34. tccli/services/tdmq/v20200217/api.json +119 -200
  35. tccli/services/tdmq/v20200217/examples.json +29 -49
  36. tccli/services/trtc/v20190722/api.json +1 -1
  37. tccli/services/vclm/v20240523/api.json +25 -15
  38. tccli/services/vclm/v20240523/examples.json +2 -2
  39. tccli/services/vod/v20180717/api.json +1 -1
  40. tccli/services/vpc/v20170312/api.json +166 -137
  41. tccli/services/vpc/v20170312/examples.json +3 -3
  42. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/METADATA +2 -2
  43. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/RECORD +46 -46
  44. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/WHEEL +0 -0
  45. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/entry_points.txt +0 -0
  46. {tccli-3.0.1228.1.dist-info → tccli-3.0.1229.1.dist-info}/license_files/LICENSE +0 -0
@@ -17,7 +17,7 @@ from tencentcloud.mqtt.v20240516 import models as models_v20240516
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
- def doModifyAuthorizationPolicy(args, parsed_globals):
20
+ def doCreateTopic(args, parsed_globals):
21
21
  g_param = parse_global_arg(parsed_globals)
22
22
 
23
23
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -46,11 +46,11 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
46
46
  client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
47
47
  client._sdkVersion += ("_CLI_" + __version__)
48
48
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
49
- model = models.ModifyAuthorizationPolicyRequest()
49
+ model = models.CreateTopicRequest()
50
50
  model.from_json_string(json.dumps(args))
51
51
  start_time = time.time()
52
52
  while True:
53
- rsp = client.ModifyAuthorizationPolicy(model)
53
+ rsp = client.CreateTopic(model)
54
54
  result = rsp.to_json_string()
55
55
  try:
56
56
  json_obj = json.loads(result)
@@ -69,7 +69,7 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
69
69
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
70
 
71
71
 
72
- def doDeleteAuthorizationPolicy(args, parsed_globals):
72
+ def doActivateDeviceCertificate(args, parsed_globals):
73
73
  g_param = parse_global_arg(parsed_globals)
74
74
 
75
75
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -98,11 +98,11 @@ def doDeleteAuthorizationPolicy(args, parsed_globals):
98
98
  client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
99
99
  client._sdkVersion += ("_CLI_" + __version__)
100
100
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.DeleteAuthorizationPolicyRequest()
101
+ model = models.ActivateDeviceCertificateRequest()
102
102
  model.from_json_string(json.dumps(args))
103
103
  start_time = time.time()
104
104
  while True:
105
- rsp = client.DeleteAuthorizationPolicy(model)
105
+ rsp = client.ActivateDeviceCertificate(model)
106
106
  result = rsp.to_json_string()
107
107
  try:
108
108
  json_obj = json.loads(result)
@@ -381,7 +381,7 @@ def doRegisterDeviceCertificate(args, parsed_globals):
381
381
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
382
 
383
383
 
384
- def doCreateTopic(args, parsed_globals):
384
+ def doModifyAuthorizationPolicy(args, parsed_globals):
385
385
  g_param = parse_global_arg(parsed_globals)
386
386
 
387
387
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -410,11 +410,11 @@ def doCreateTopic(args, parsed_globals):
410
410
  client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
411
411
  client._sdkVersion += ("_CLI_" + __version__)
412
412
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.CreateTopicRequest()
413
+ model = models.ModifyAuthorizationPolicyRequest()
414
414
  model.from_json_string(json.dumps(args))
415
415
  start_time = time.time()
416
416
  while True:
417
- rsp = client.CreateTopic(model)
417
+ rsp = client.ModifyAuthorizationPolicy(model)
418
418
  result = rsp.to_json_string()
419
419
  try:
420
420
  json_obj = json.loads(result)
@@ -641,6 +641,58 @@ def doDescribeInstance(args, parsed_globals):
641
641
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
642
 
643
643
 
644
+ def doDeleteAuthorizationPolicy(args, parsed_globals):
645
+ g_param = parse_global_arg(parsed_globals)
646
+
647
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
648
+ cred = credential.CVMRoleCredential()
649
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
650
+ cred = credential.STSAssumeRoleCredential(
651
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
+ )
654
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
+ else:
657
+ cred = credential.Credential(
658
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
659
+ )
660
+ http_profile = HttpProfile(
661
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
662
+ reqMethod="POST",
663
+ endpoint=g_param[OptionsDefine.Endpoint],
664
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
+ )
666
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
667
+ if g_param[OptionsDefine.Language]:
668
+ profile.language = g_param[OptionsDefine.Language]
669
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
670
+ client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
671
+ client._sdkVersion += ("_CLI_" + __version__)
672
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
+ model = models.DeleteAuthorizationPolicyRequest()
674
+ model.from_json_string(json.dumps(args))
675
+ start_time = time.time()
676
+ while True:
677
+ rsp = client.DeleteAuthorizationPolicy(model)
678
+ result = rsp.to_json_string()
679
+ try:
680
+ json_obj = json.loads(result)
681
+ except TypeError as e:
682
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
683
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
684
+ break
685
+ cur_time = time.time()
686
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
687
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
688
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
689
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
690
+ else:
691
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
692
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
693
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
+
695
+
644
696
  def doUpdateAuthorizationPolicyPriority(args, parsed_globals):
645
697
  g_param = parse_global_arg(parsed_globals)
646
698
 
@@ -1005,6 +1057,58 @@ def doModifyJWKSAuthenticator(args, parsed_globals):
1005
1057
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1058
 
1007
1059
 
1060
+ def doDescribeDeviceCertificates(args, parsed_globals):
1061
+ g_param = parse_global_arg(parsed_globals)
1062
+
1063
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1064
+ cred = credential.CVMRoleCredential()
1065
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1066
+ cred = credential.STSAssumeRoleCredential(
1067
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
+ )
1070
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
+ else:
1073
+ cred = credential.Credential(
1074
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1075
+ )
1076
+ http_profile = HttpProfile(
1077
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1078
+ reqMethod="POST",
1079
+ endpoint=g_param[OptionsDefine.Endpoint],
1080
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
+ )
1082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1083
+ if g_param[OptionsDefine.Language]:
1084
+ profile.language = g_param[OptionsDefine.Language]
1085
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
+ client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
1087
+ client._sdkVersion += ("_CLI_" + __version__)
1088
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
+ model = models.DescribeDeviceCertificatesRequest()
1090
+ model.from_json_string(json.dumps(args))
1091
+ start_time = time.time()
1092
+ while True:
1093
+ rsp = client.DescribeDeviceCertificates(model)
1094
+ result = rsp.to_json_string()
1095
+ try:
1096
+ json_obj = json.loads(result)
1097
+ except TypeError as e:
1098
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1099
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1100
+ break
1101
+ cur_time = time.time()
1102
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1103
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1104
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1105
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1106
+ else:
1107
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1108
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1109
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
+
1111
+
1008
1112
  CLIENT_MAP = {
1009
1113
  "v20240516": mqtt_client_v20240516,
1010
1114
 
@@ -1016,18 +1120,19 @@ MODELS_MAP = {
1016
1120
  }
1017
1121
 
1018
1122
  ACTION_MAP = {
1019
- "ModifyAuthorizationPolicy": doModifyAuthorizationPolicy,
1020
- "DeleteAuthorizationPolicy": doDeleteAuthorizationPolicy,
1123
+ "CreateTopic": doCreateTopic,
1124
+ "ActivateDeviceCertificate": doActivateDeviceCertificate,
1021
1125
  "DescribeAuthorizationPolicies": doDescribeAuthorizationPolicies,
1022
1126
  "DescribeTopicList": doDescribeTopicList,
1023
1127
  "ModifyTopic": doModifyTopic,
1024
1128
  "CreateAuthorizationPolicy": doCreateAuthorizationPolicy,
1025
1129
  "RegisterDeviceCertificate": doRegisterDeviceCertificate,
1026
- "CreateTopic": doCreateTopic,
1130
+ "ModifyAuthorizationPolicy": doModifyAuthorizationPolicy,
1027
1131
  "CreateJWTAuthenticator": doCreateJWTAuthenticator,
1028
1132
  "DeleteAuthenticator": doDeleteAuthenticator,
1029
1133
  "DescribeAuthenticator": doDescribeAuthenticator,
1030
1134
  "DescribeInstance": doDescribeInstance,
1135
+ "DeleteAuthorizationPolicy": doDeleteAuthorizationPolicy,
1031
1136
  "UpdateAuthorizationPolicyPriority": doUpdateAuthorizationPolicyPriority,
1032
1137
  "DescribeTopic": doDescribeTopic,
1033
1138
  "DescribeInstanceList": doDescribeInstanceList,
@@ -1035,6 +1140,7 @@ ACTION_MAP = {
1035
1140
  "ModifyJWTAuthenticator": doModifyJWTAuthenticator,
1036
1141
  "DeleteTopic": doDeleteTopic,
1037
1142
  "ModifyJWKSAuthenticator": doModifyJWKSAuthenticator,
1143
+ "DescribeDeviceCertificates": doDescribeDeviceCertificates,
1038
1144
 
1039
1145
  }
1040
1146