tccli 3.0.1237.1__py2.py3-none-any.whl → 3.0.1238.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +3 -0
- tccli/services/aca/__init__.py +4 -0
- tccli/services/aca/aca_client.py +578 -0
- tccli/services/aca/v20210323/api.json +3715 -0
- tccli/services/aca/v20210323/examples.json +69 -0
- tccli/services/aiart/v20221229/api.json +18 -9
- tccli/services/aiart/v20221229/examples.json +2 -2
- tccli/services/apm/v20210622/api.json +10 -7
- tccli/services/batch/v20170312/api.json +641 -566
- tccli/services/batch/v20170312/examples.json +7 -7
- tccli/services/bi/v20220105/api.json +9 -0
- tccli/services/bpaas/v20181217/examples.json +1 -1
- tccli/services/cam/v20190116/api.json +32 -30
- tccli/services/cam/v20190116/examples.json +4 -4
- tccli/services/ccc/v20200210/api.json +31 -1
- tccli/services/ccc/v20200210/examples.json +1 -1
- tccli/services/cdb/v20170320/api.json +214 -207
- tccli/services/cdb/v20170320/examples.json +10 -10
- tccli/services/cdwch/v20200915/api.json +6 -6
- tccli/services/cdwdoris/v20211228/api.json +16 -5
- tccli/services/cdwdoris/v20211228/examples.json +1 -1
- tccli/services/cfg/v20210820/api.json +8 -13
- tccli/services/cfg/v20210820/examples.json +1 -1
- tccli/services/cfs/v20190719/api.json +84 -84
- tccli/services/cfs/v20190719/examples.json +6 -6
- tccli/services/chdfs/v20201112/api.json +18 -17
- tccli/services/chdfs/v20201112/examples.json +2 -2
- tccli/services/clb/v20180317/api.json +184 -162
- tccli/services/cloudapp/v20220530/api.json +1 -1
- tccli/services/cloudapp/v20220530/examples.json +3 -3
- tccli/services/cloudaudit/v20190319/api.json +21 -17
- tccli/services/cloudaudit/v20190319/examples.json +3 -3
- tccli/services/cls/v20201016/api.json +21 -21
- tccli/services/cls/v20201016/examples.json +1 -1
- tccli/services/config/v20220802/api.json +2 -0
- tccli/services/config/v20220802/examples.json +2 -2
- tccli/services/dcdb/v20180411/api.json +390 -387
- tccli/services/dcdb/v20180411/examples.json +14 -14
- tccli/services/dlc/v20210125/api.json +162 -7
- tccli/services/dlc/v20210125/examples.json +1 -1
- tccli/services/domain/v20180808/api.json +37 -37
- tccli/services/domain/v20180808/examples.json +16 -10
- tccli/services/dsgc/v20190723/api.json +1796 -1623
- tccli/services/dsgc/v20190723/examples.json +217 -211
- tccli/services/dts/v20180330/api.json +143 -106
- tccli/services/dts/v20211206/api.json +57 -46
- tccli/services/dts/v20211206/examples.json +1 -1
- tccli/services/ecm/v20190719/api.json +6 -6
- tccli/services/emr/v20190103/api.json +80 -20
- tccli/services/ess/ess_client.py +61 -8
- tccli/services/ess/v20201111/api.json +267 -37
- tccli/services/ess/v20201111/examples.json +11 -3
- tccli/services/essbasic/essbasic_client.py +167 -8
- tccli/services/essbasic/v20210526/api.json +527 -54
- tccli/services/essbasic/v20210526/examples.json +46 -16
- tccli/services/facefusion/v20220927/api.json +12 -1
- tccli/services/fmu/v20191213/api.json +8 -8
- tccli/services/gaap/v20180529/api.json +200 -209
- tccli/services/hai/v20230812/api.json +1 -1
- tccli/services/iss/v20230517/api.json +11 -11
- tccli/services/iss/v20230517/examples.json +31 -31
- tccli/services/keewidb/v20220308/api.json +92 -82
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/lighthouse/v20200324/api.json +18 -18
- tccli/services/lighthouse/v20200324/examples.json +5 -5
- tccli/services/live/v20180801/api.json +27 -9
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/mariadb/v20170312/api.json +285 -263
- tccli/services/mariadb/v20170312/examples.json +12 -12
- tccli/services/monitor/monitor_client.py +106 -0
- tccli/services/monitor/v20180724/api.json +222 -0
- tccli/services/monitor/v20180724/examples.json +16 -0
- tccli/services/mps/mps_client.py +228 -16
- tccli/services/mps/v20190612/api.json +385 -23
- tccli/services/mps/v20190612/examples.json +32 -0
- tccli/services/msp/v20180319/api.json +2 -2
- tccli/services/ocr/v20181119/api.json +11 -1
- tccli/services/omics/v20221128/api.json +14 -2
- tccli/services/organization/v20210331/api.json +45 -18
- tccli/services/privatedns/v20201028/api.json +90 -81
- tccli/services/privatedns/v20201028/examples.json +18 -18
- tccli/services/redis/redis_client.py +106 -0
- tccli/services/redis/v20180412/api.json +178 -16
- tccli/services/redis/v20180412/examples.json +16 -0
- tccli/services/region/v20220627/api.json +5 -3
- tccli/services/region/v20220627/examples.json +1 -1
- tccli/services/ssl/v20191205/api.json +6 -4
- tccli/services/tag/v20180813/api.json +4 -5
- tccli/services/tcb/v20180608/api.json +36 -16
- tccli/services/tdmq/tdmq_client.py +53 -0
- tccli/services/tdmq/v20200217/api.json +64 -1
- tccli/services/tdmq/v20200217/examples.json +9 -1
- tccli/services/teo/teo_client.py +485 -8
- tccli/services/teo/v20220901/api.json +837 -39
- tccli/services/teo/v20220901/examples.json +108 -0
- tccli/services/thpc/v20211109/api.json +32 -34
- tccli/services/thpc/v20220401/api.json +31 -33
- tccli/services/thpc/v20230321/api.json +55 -57
- tccli/services/thpc/v20230321/examples.json +1 -1
- tccli/services/tiia/v20190529/api.json +307 -293
- tccli/services/tiia/v20190529/examples.json +41 -41
- tccli/services/tione/v20211111/api.json +4 -4
- tccli/services/tione/v20211111/examples.json +2 -2
- tccli/services/tke/v20180525/api.json +1 -1
- tccli/services/trocket/trocket_client.py +53 -0
- tccli/services/trocket/v20230308/api.json +116 -0
- tccli/services/trocket/v20230308/examples.json +14 -0
- tccli/services/tse/v20201207/api.json +188 -120
- tccli/services/tse/v20201207/examples.json +30 -30
- tccli/services/tsf/v20180326/api.json +826 -745
- tccli/services/tsf/v20180326/examples.json +99 -111
- tccli/services/vclm/v20240523/api.json +1 -1
- tccli/services/vdb/v20230616/api.json +80 -80
- tccli/services/vdb/v20230616/examples.json +1 -1
- tccli/services/vpc/v20170312/api.json +42 -41
- tccli/services/vpc/v20170312/examples.json +5 -5
- {tccli-3.0.1237.1.dist-info → tccli-3.0.1238.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1237.1.dist-info → tccli-3.0.1238.1.dist-info}/RECORD +122 -118
- {tccli-3.0.1237.1.dist-info → tccli-3.0.1238.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1237.1.dist-info → tccli-3.0.1238.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1237.1.dist-info → tccli-3.0.1238.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/teo/teo_client.py
CHANGED
@@ -71,7 +71,7 @@ def doDestroyPlan(args, parsed_globals):
|
|
71
71
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
72
72
|
|
73
73
|
|
74
|
-
def
|
74
|
+
def doCreateDnsRecord(args, parsed_globals):
|
75
75
|
g_param = parse_global_arg(parsed_globals)
|
76
76
|
|
77
77
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -100,11 +100,11 @@ def doDescribeOriginGroupHealthStatus(args, parsed_globals):
|
|
100
100
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
101
101
|
client._sdkVersion += ("_CLI_" + __version__)
|
102
102
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
103
|
-
model = models.
|
103
|
+
model = models.CreateDnsRecordRequest()
|
104
104
|
model.from_json_string(json.dumps(args))
|
105
105
|
start_time = time.time()
|
106
106
|
while True:
|
107
|
-
rsp = client.
|
107
|
+
rsp = client.CreateDnsRecord(model)
|
108
108
|
result = rsp.to_json_string()
|
109
109
|
try:
|
110
110
|
json_obj = json.loads(result)
|
@@ -175,6 +175,58 @@ def doExportZoneConfig(args, parsed_globals):
|
|
175
175
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
176
176
|
|
177
177
|
|
178
|
+
def doDescribeContentIdentifiers(args, parsed_globals):
|
179
|
+
g_param = parse_global_arg(parsed_globals)
|
180
|
+
|
181
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
182
|
+
cred = credential.CVMRoleCredential()
|
183
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
184
|
+
cred = credential.STSAssumeRoleCredential(
|
185
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
186
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
187
|
+
)
|
188
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
189
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
190
|
+
else:
|
191
|
+
cred = credential.Credential(
|
192
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
193
|
+
)
|
194
|
+
http_profile = HttpProfile(
|
195
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
196
|
+
reqMethod="POST",
|
197
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
198
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
199
|
+
)
|
200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
201
|
+
if g_param[OptionsDefine.Language]:
|
202
|
+
profile.language = g_param[OptionsDefine.Language]
|
203
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
204
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
205
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
206
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
207
|
+
model = models.DescribeContentIdentifiersRequest()
|
208
|
+
model.from_json_string(json.dumps(args))
|
209
|
+
start_time = time.time()
|
210
|
+
while True:
|
211
|
+
rsp = client.DescribeContentIdentifiers(model)
|
212
|
+
result = rsp.to_json_string()
|
213
|
+
try:
|
214
|
+
json_obj = json.loads(result)
|
215
|
+
except TypeError as e:
|
216
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
217
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
218
|
+
break
|
219
|
+
cur_time = time.time()
|
220
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
221
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
222
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
223
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
224
|
+
else:
|
225
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
226
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
227
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
228
|
+
|
229
|
+
|
178
230
|
def doDeleteFunction(args, parsed_globals):
|
179
231
|
g_param = parse_global_arg(parsed_globals)
|
180
232
|
|
@@ -2255,6 +2307,58 @@ def doModifyL4ProxyRules(args, parsed_globals):
|
|
2255
2307
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2256
2308
|
|
2257
2309
|
|
2310
|
+
def doModifyDnsRecords(args, parsed_globals):
|
2311
|
+
g_param = parse_global_arg(parsed_globals)
|
2312
|
+
|
2313
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2314
|
+
cred = credential.CVMRoleCredential()
|
2315
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2316
|
+
cred = credential.STSAssumeRoleCredential(
|
2317
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2318
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2319
|
+
)
|
2320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2321
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2322
|
+
else:
|
2323
|
+
cred = credential.Credential(
|
2324
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2325
|
+
)
|
2326
|
+
http_profile = HttpProfile(
|
2327
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2328
|
+
reqMethod="POST",
|
2329
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2330
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2331
|
+
)
|
2332
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2333
|
+
if g_param[OptionsDefine.Language]:
|
2334
|
+
profile.language = g_param[OptionsDefine.Language]
|
2335
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2336
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
2337
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2338
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2339
|
+
model = models.ModifyDnsRecordsRequest()
|
2340
|
+
model.from_json_string(json.dumps(args))
|
2341
|
+
start_time = time.time()
|
2342
|
+
while True:
|
2343
|
+
rsp = client.ModifyDnsRecords(model)
|
2344
|
+
result = rsp.to_json_string()
|
2345
|
+
try:
|
2346
|
+
json_obj = json.loads(result)
|
2347
|
+
except TypeError as e:
|
2348
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2349
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2350
|
+
break
|
2351
|
+
cur_time = time.time()
|
2352
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2353
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2354
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2355
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2356
|
+
else:
|
2357
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2358
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2359
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2360
|
+
|
2361
|
+
|
2258
2362
|
def doDescribeTimingL7CacheData(args, parsed_globals):
|
2259
2363
|
g_param = parse_global_arg(parsed_globals)
|
2260
2364
|
|
@@ -2515,6 +2619,58 @@ def doModifyAliasDomainStatus(args, parsed_globals):
|
|
2515
2619
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2516
2620
|
|
2517
2621
|
|
2622
|
+
def doDescribeDnsRecords(args, parsed_globals):
|
2623
|
+
g_param = parse_global_arg(parsed_globals)
|
2624
|
+
|
2625
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2626
|
+
cred = credential.CVMRoleCredential()
|
2627
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2628
|
+
cred = credential.STSAssumeRoleCredential(
|
2629
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2630
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2631
|
+
)
|
2632
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2633
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2634
|
+
else:
|
2635
|
+
cred = credential.Credential(
|
2636
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2637
|
+
)
|
2638
|
+
http_profile = HttpProfile(
|
2639
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2640
|
+
reqMethod="POST",
|
2641
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2642
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2643
|
+
)
|
2644
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2645
|
+
if g_param[OptionsDefine.Language]:
|
2646
|
+
profile.language = g_param[OptionsDefine.Language]
|
2647
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2648
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
2649
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2650
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2651
|
+
model = models.DescribeDnsRecordsRequest()
|
2652
|
+
model.from_json_string(json.dumps(args))
|
2653
|
+
start_time = time.time()
|
2654
|
+
while True:
|
2655
|
+
rsp = client.DescribeDnsRecords(model)
|
2656
|
+
result = rsp.to_json_string()
|
2657
|
+
try:
|
2658
|
+
json_obj = json.loads(result)
|
2659
|
+
except TypeError as e:
|
2660
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2661
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2662
|
+
break
|
2663
|
+
cur_time = time.time()
|
2664
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2665
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2666
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2667
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2668
|
+
else:
|
2669
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2670
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2671
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2672
|
+
|
2673
|
+
|
2518
2674
|
def doCreateL4ProxyRules(args, parsed_globals):
|
2519
2675
|
g_param = parse_global_arg(parsed_globals)
|
2520
2676
|
|
@@ -2827,6 +2983,58 @@ def doDescribeTopL7AnalysisData(args, parsed_globals):
|
|
2827
2983
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2828
2984
|
|
2829
2985
|
|
2986
|
+
def doDeleteDnsRecords(args, parsed_globals):
|
2987
|
+
g_param = parse_global_arg(parsed_globals)
|
2988
|
+
|
2989
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2990
|
+
cred = credential.CVMRoleCredential()
|
2991
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2992
|
+
cred = credential.STSAssumeRoleCredential(
|
2993
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2994
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2995
|
+
)
|
2996
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2997
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2998
|
+
else:
|
2999
|
+
cred = credential.Credential(
|
3000
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3001
|
+
)
|
3002
|
+
http_profile = HttpProfile(
|
3003
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3004
|
+
reqMethod="POST",
|
3005
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
3006
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3007
|
+
)
|
3008
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3009
|
+
if g_param[OptionsDefine.Language]:
|
3010
|
+
profile.language = g_param[OptionsDefine.Language]
|
3011
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3012
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3013
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
3014
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3015
|
+
model = models.DeleteDnsRecordsRequest()
|
3016
|
+
model.from_json_string(json.dumps(args))
|
3017
|
+
start_time = time.time()
|
3018
|
+
while True:
|
3019
|
+
rsp = client.DeleteDnsRecords(model)
|
3020
|
+
result = rsp.to_json_string()
|
3021
|
+
try:
|
3022
|
+
json_obj = json.loads(result)
|
3023
|
+
except TypeError as e:
|
3024
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3025
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3026
|
+
break
|
3027
|
+
cur_time = time.time()
|
3028
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3029
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3030
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3031
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3032
|
+
else:
|
3033
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3034
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3035
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3036
|
+
|
3037
|
+
|
2830
3038
|
def doModifySecurityPolicy(args, parsed_globals):
|
2831
3039
|
g_param = parse_global_arg(parsed_globals)
|
2832
3040
|
|
@@ -2983,7 +3191,7 @@ def doBindZoneToPlan(args, parsed_globals):
|
|
2983
3191
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2984
3192
|
|
2985
3193
|
|
2986
|
-
def
|
3194
|
+
def doDescribeOriginGroupHealthStatus(args, parsed_globals):
|
2987
3195
|
g_param = parse_global_arg(parsed_globals)
|
2988
3196
|
|
2989
3197
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3012,11 +3220,11 @@ def doDescribeDDoSAttackEvent(args, parsed_globals):
|
|
3012
3220
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3013
3221
|
client._sdkVersion += ("_CLI_" + __version__)
|
3014
3222
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3015
|
-
model = models.
|
3223
|
+
model = models.DescribeOriginGroupHealthStatusRequest()
|
3016
3224
|
model.from_json_string(json.dumps(args))
|
3017
3225
|
start_time = time.time()
|
3018
3226
|
while True:
|
3019
|
-
rsp = client.
|
3227
|
+
rsp = client.DescribeOriginGroupHealthStatus(model)
|
3020
3228
|
result = rsp.to_json_string()
|
3021
3229
|
try:
|
3022
3230
|
json_obj = json.loads(result)
|
@@ -3659,6 +3867,58 @@ def doCreateConfigGroupVersion(args, parsed_globals):
|
|
3659
3867
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3660
3868
|
|
3661
3869
|
|
3870
|
+
def doModifyDnsRecordsStatus(args, parsed_globals):
|
3871
|
+
g_param = parse_global_arg(parsed_globals)
|
3872
|
+
|
3873
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3874
|
+
cred = credential.CVMRoleCredential()
|
3875
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3876
|
+
cred = credential.STSAssumeRoleCredential(
|
3877
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3878
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3879
|
+
)
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3881
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3882
|
+
else:
|
3883
|
+
cred = credential.Credential(
|
3884
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3885
|
+
)
|
3886
|
+
http_profile = HttpProfile(
|
3887
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3888
|
+
reqMethod="POST",
|
3889
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
3890
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3891
|
+
)
|
3892
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3893
|
+
if g_param[OptionsDefine.Language]:
|
3894
|
+
profile.language = g_param[OptionsDefine.Language]
|
3895
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3896
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3897
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
3898
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3899
|
+
model = models.ModifyDnsRecordsStatusRequest()
|
3900
|
+
model.from_json_string(json.dumps(args))
|
3901
|
+
start_time = time.time()
|
3902
|
+
while True:
|
3903
|
+
rsp = client.ModifyDnsRecordsStatus(model)
|
3904
|
+
result = rsp.to_json_string()
|
3905
|
+
try:
|
3906
|
+
json_obj = json.loads(result)
|
3907
|
+
except TypeError as e:
|
3908
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3909
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3910
|
+
break
|
3911
|
+
cur_time = time.time()
|
3912
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3913
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3914
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3915
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3916
|
+
else:
|
3917
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3918
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3919
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3920
|
+
|
3921
|
+
|
3662
3922
|
def doModifyFunction(args, parsed_globals):
|
3663
3923
|
g_param = parse_global_arg(parsed_globals)
|
3664
3924
|
|
@@ -4023,6 +4283,58 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
4023
4283
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4024
4284
|
|
4025
4285
|
|
4286
|
+
def doDeleteContentIdentifier(args, parsed_globals):
|
4287
|
+
g_param = parse_global_arg(parsed_globals)
|
4288
|
+
|
4289
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4290
|
+
cred = credential.CVMRoleCredential()
|
4291
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4292
|
+
cred = credential.STSAssumeRoleCredential(
|
4293
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4294
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4295
|
+
)
|
4296
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4297
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4298
|
+
else:
|
4299
|
+
cred = credential.Credential(
|
4300
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4301
|
+
)
|
4302
|
+
http_profile = HttpProfile(
|
4303
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4304
|
+
reqMethod="POST",
|
4305
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4306
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4307
|
+
)
|
4308
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4309
|
+
if g_param[OptionsDefine.Language]:
|
4310
|
+
profile.language = g_param[OptionsDefine.Language]
|
4311
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4312
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4313
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4314
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4315
|
+
model = models.DeleteContentIdentifierRequest()
|
4316
|
+
model.from_json_string(json.dumps(args))
|
4317
|
+
start_time = time.time()
|
4318
|
+
while True:
|
4319
|
+
rsp = client.DeleteContentIdentifier(model)
|
4320
|
+
result = rsp.to_json_string()
|
4321
|
+
try:
|
4322
|
+
json_obj = json.loads(result)
|
4323
|
+
except TypeError as e:
|
4324
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4325
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4326
|
+
break
|
4327
|
+
cur_time = time.time()
|
4328
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4329
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4330
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4331
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4332
|
+
else:
|
4333
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4334
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4335
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4336
|
+
|
4337
|
+
|
4026
4338
|
def doDescribeRulesSetting(args, parsed_globals):
|
4027
4339
|
g_param = parse_global_arg(parsed_globals)
|
4028
4340
|
|
@@ -4595,6 +4907,110 @@ def doHandleFunctionRuntimeEnvironment(args, parsed_globals):
|
|
4595
4907
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4596
4908
|
|
4597
4909
|
|
4910
|
+
def doDescribeDDoSAttackEvent(args, parsed_globals):
|
4911
|
+
g_param = parse_global_arg(parsed_globals)
|
4912
|
+
|
4913
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4914
|
+
cred = credential.CVMRoleCredential()
|
4915
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4916
|
+
cred = credential.STSAssumeRoleCredential(
|
4917
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4918
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4919
|
+
)
|
4920
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4921
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4922
|
+
else:
|
4923
|
+
cred = credential.Credential(
|
4924
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4925
|
+
)
|
4926
|
+
http_profile = HttpProfile(
|
4927
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4928
|
+
reqMethod="POST",
|
4929
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4930
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4931
|
+
)
|
4932
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4933
|
+
if g_param[OptionsDefine.Language]:
|
4934
|
+
profile.language = g_param[OptionsDefine.Language]
|
4935
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4936
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4937
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4938
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4939
|
+
model = models.DescribeDDoSAttackEventRequest()
|
4940
|
+
model.from_json_string(json.dumps(args))
|
4941
|
+
start_time = time.time()
|
4942
|
+
while True:
|
4943
|
+
rsp = client.DescribeDDoSAttackEvent(model)
|
4944
|
+
result = rsp.to_json_string()
|
4945
|
+
try:
|
4946
|
+
json_obj = json.loads(result)
|
4947
|
+
except TypeError as e:
|
4948
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4949
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4950
|
+
break
|
4951
|
+
cur_time = time.time()
|
4952
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4953
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4954
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4955
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4956
|
+
else:
|
4957
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4958
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4959
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4960
|
+
|
4961
|
+
|
4962
|
+
def doModifyContentIdentifier(args, parsed_globals):
|
4963
|
+
g_param = parse_global_arg(parsed_globals)
|
4964
|
+
|
4965
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4966
|
+
cred = credential.CVMRoleCredential()
|
4967
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4968
|
+
cred = credential.STSAssumeRoleCredential(
|
4969
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4970
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4971
|
+
)
|
4972
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4973
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4974
|
+
else:
|
4975
|
+
cred = credential.Credential(
|
4976
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4977
|
+
)
|
4978
|
+
http_profile = HttpProfile(
|
4979
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4980
|
+
reqMethod="POST",
|
4981
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4982
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4983
|
+
)
|
4984
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4985
|
+
if g_param[OptionsDefine.Language]:
|
4986
|
+
profile.language = g_param[OptionsDefine.Language]
|
4987
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4988
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4989
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4990
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4991
|
+
model = models.ModifyContentIdentifierRequest()
|
4992
|
+
model.from_json_string(json.dumps(args))
|
4993
|
+
start_time = time.time()
|
4994
|
+
while True:
|
4995
|
+
rsp = client.ModifyContentIdentifier(model)
|
4996
|
+
result = rsp.to_json_string()
|
4997
|
+
try:
|
4998
|
+
json_obj = json.loads(result)
|
4999
|
+
except TypeError as e:
|
5000
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5001
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5002
|
+
break
|
5003
|
+
cur_time = time.time()
|
5004
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5005
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5006
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5007
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5008
|
+
else:
|
5009
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5010
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5011
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5012
|
+
|
5013
|
+
|
4598
5014
|
def doModifyFunctionRulePriority(args, parsed_globals):
|
4599
5015
|
g_param = parse_global_arg(parsed_globals)
|
4600
5016
|
|
@@ -5791,6 +6207,58 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
5791
6207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5792
6208
|
|
5793
6209
|
|
6210
|
+
def doCreateContentIdentifier(args, parsed_globals):
|
6211
|
+
g_param = parse_global_arg(parsed_globals)
|
6212
|
+
|
6213
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6214
|
+
cred = credential.CVMRoleCredential()
|
6215
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6216
|
+
cred = credential.STSAssumeRoleCredential(
|
6217
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6218
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6219
|
+
)
|
6220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6221
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6222
|
+
else:
|
6223
|
+
cred = credential.Credential(
|
6224
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6225
|
+
)
|
6226
|
+
http_profile = HttpProfile(
|
6227
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6228
|
+
reqMethod="POST",
|
6229
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6230
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6231
|
+
)
|
6232
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6233
|
+
if g_param[OptionsDefine.Language]:
|
6234
|
+
profile.language = g_param[OptionsDefine.Language]
|
6235
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6236
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6237
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6238
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6239
|
+
model = models.CreateContentIdentifierRequest()
|
6240
|
+
model.from_json_string(json.dumps(args))
|
6241
|
+
start_time = time.time()
|
6242
|
+
while True:
|
6243
|
+
rsp = client.CreateContentIdentifier(model)
|
6244
|
+
result = rsp.to_json_string()
|
6245
|
+
try:
|
6246
|
+
json_obj = json.loads(result)
|
6247
|
+
except TypeError as e:
|
6248
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6249
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6250
|
+
break
|
6251
|
+
cur_time = time.time()
|
6252
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6253
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6254
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6255
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6256
|
+
else:
|
6257
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6258
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6259
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6260
|
+
|
6261
|
+
|
5794
6262
|
def doDeleteSecurityIPGroup(args, parsed_globals):
|
5795
6263
|
g_param = parse_global_arg(parsed_globals)
|
5796
6264
|
|
@@ -6533,8 +7001,9 @@ MODELS_MAP = {
|
|
6533
7001
|
|
6534
7002
|
ACTION_MAP = {
|
6535
7003
|
"DestroyPlan": doDestroyPlan,
|
6536
|
-
"
|
7004
|
+
"CreateDnsRecord": doCreateDnsRecord,
|
6537
7005
|
"ExportZoneConfig": doExportZoneConfig,
|
7006
|
+
"DescribeContentIdentifiers": doDescribeContentIdentifiers,
|
6538
7007
|
"DeleteFunction": doDeleteFunction,
|
6539
7008
|
"CreatePurgeTask": doCreatePurgeTask,
|
6540
7009
|
"DownloadL4Logs": doDownloadL4Logs,
|
@@ -6575,21 +7044,24 @@ ACTION_MAP = {
|
|
6575
7044
|
"CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
|
6576
7045
|
"ModifyL4Proxy": doModifyL4Proxy,
|
6577
7046
|
"ModifyL4ProxyRules": doModifyL4ProxyRules,
|
7047
|
+
"ModifyDnsRecords": doModifyDnsRecords,
|
6578
7048
|
"DescribeTimingL7CacheData": doDescribeTimingL7CacheData,
|
6579
7049
|
"DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
|
6580
7050
|
"ModifyZoneSetting": doModifyZoneSetting,
|
6581
7051
|
"CreateAliasDomain": doCreateAliasDomain,
|
6582
7052
|
"ModifyAliasDomainStatus": doModifyAliasDomainStatus,
|
7053
|
+
"DescribeDnsRecords": doDescribeDnsRecords,
|
6583
7054
|
"CreateL4ProxyRules": doCreateL4ProxyRules,
|
6584
7055
|
"DescribeOriginGroup": doDescribeOriginGroup,
|
6585
7056
|
"DescribeTimingL4Data": doDescribeTimingL4Data,
|
6586
7057
|
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
6587
7058
|
"ModifyRule": doModifyRule,
|
6588
7059
|
"DescribeTopL7AnalysisData": doDescribeTopL7AnalysisData,
|
7060
|
+
"DeleteDnsRecords": doDeleteDnsRecords,
|
6589
7061
|
"ModifySecurityPolicy": doModifySecurityPolicy,
|
6590
7062
|
"ModifyPlan": doModifyPlan,
|
6591
7063
|
"BindZoneToPlan": doBindZoneToPlan,
|
6592
|
-
"
|
7064
|
+
"DescribeOriginGroupHealthStatus": doDescribeOriginGroupHealthStatus,
|
6593
7065
|
"DeleteL4ProxyRules": doDeleteL4ProxyRules,
|
6594
7066
|
"CreateCustomizeErrorPage": doCreateCustomizeErrorPage,
|
6595
7067
|
"ModifyAccelerationDomain": doModifyAccelerationDomain,
|
@@ -6602,6 +7074,7 @@ ACTION_MAP = {
|
|
6602
7074
|
"CreateSharedCNAME": doCreateSharedCNAME,
|
6603
7075
|
"CreateRule": doCreateRule,
|
6604
7076
|
"CreateConfigGroupVersion": doCreateConfigGroupVersion,
|
7077
|
+
"ModifyDnsRecordsStatus": doModifyDnsRecordsStatus,
|
6605
7078
|
"ModifyFunction": doModifyFunction,
|
6606
7079
|
"ModifyApplicationProxy": doModifyApplicationProxy,
|
6607
7080
|
"CreateZone": doCreateZone,
|
@@ -6609,6 +7082,7 @@ ACTION_MAP = {
|
|
6609
7082
|
"DescribeAvailablePlans": doDescribeAvailablePlans,
|
6610
7083
|
"DescribeCustomErrorPages": doDescribeCustomErrorPages,
|
6611
7084
|
"DeleteLoadBalancer": doDeleteLoadBalancer,
|
7085
|
+
"DeleteContentIdentifier": doDeleteContentIdentifier,
|
6612
7086
|
"DescribeRulesSetting": doDescribeRulesSetting,
|
6613
7087
|
"ModifyAccelerationDomainStatuses": doModifyAccelerationDomainStatuses,
|
6614
7088
|
"DescribeFunctionRules": doDescribeFunctionRules,
|
@@ -6620,6 +7094,8 @@ ACTION_MAP = {
|
|
6620
7094
|
"DescribeL4ProxyRules": doDescribeL4ProxyRules,
|
6621
7095
|
"DeleteCustomErrorPage": doDeleteCustomErrorPage,
|
6622
7096
|
"HandleFunctionRuntimeEnvironment": doHandleFunctionRuntimeEnvironment,
|
7097
|
+
"DescribeDDoSAttackEvent": doDescribeDDoSAttackEvent,
|
7098
|
+
"ModifyContentIdentifier": doModifyContentIdentifier,
|
6623
7099
|
"ModifyFunctionRulePriority": doModifyFunctionRulePriority,
|
6624
7100
|
"ModifySecurityIPGroup": doModifySecurityIPGroup,
|
6625
7101
|
"DescribeRules": doDescribeRules,
|
@@ -6643,6 +7119,7 @@ ACTION_MAP = {
|
|
6643
7119
|
"RenewPlan": doRenewPlan,
|
6644
7120
|
"DescribeZoneSetting": doDescribeZoneSetting,
|
6645
7121
|
"DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
|
7122
|
+
"CreateContentIdentifier": doCreateContentIdentifier,
|
6646
7123
|
"DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
|
6647
7124
|
"CreateApplicationProxyRule": doCreateApplicationProxyRule,
|
6648
7125
|
"DescribeZones": doDescribeZones,
|