tccli 3.0.1264.1__py2.py3-none-any.whl → 3.0.1266.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/batch/v20170312/api.json +1 -1
- tccli/services/bh/v20230418/api.json +490 -5
- tccli/services/bh/v20230418/examples.json +2 -2
- tccli/services/billing/v20180709/api.json +4 -2
- tccli/services/cbs/v20170312/api.json +12 -2
- tccli/services/cbs/v20170312/examples.json +2 -2
- tccli/services/cdn/v20180606/api.json +33 -11
- tccli/services/chdfs/v20201112/api.json +7 -7
- tccli/services/cls/v20201016/api.json +11 -2
- tccli/services/cvm/v20170312/api.json +13 -3
- tccli/services/ess/v20201111/api.json +19 -19
- tccli/services/essbasic/v20210526/api.json +2 -2
- tccli/services/facefusion/v20220927/api.json +2 -2
- tccli/services/lcic/v20220817/api.json +30 -35
- tccli/services/lighthouse/v20200324/api.json +7 -7
- tccli/services/lkeap/v20240522/api.json +412 -9
- tccli/services/lkeap/v20240522/examples.json +19 -19
- tccli/services/mna/v20210119/api.json +21 -21
- tccli/services/mongodb/mongodb_client.py +53 -0
- tccli/services/mongodb/v20190725/api.json +70 -0
- tccli/services/mongodb/v20190725/examples.json +8 -0
- tccli/services/mps/v20190612/api.json +84 -8
- tccli/services/mqtt/mqtt_client.py +658 -75
- tccli/services/mqtt/v20240516/api.json +1038 -54
- tccli/services/mqtt/v20240516/examples.json +88 -0
- tccli/services/ocr/v20181119/api.json +52 -22
- tccli/services/rum/v20210622/api.json +12 -12
- tccli/services/rum/v20210622/examples.json +6 -6
- tccli/services/ssl/ssl_client.py +122 -16
- tccli/services/ssl/v20191205/api.json +468 -22
- tccli/services/ssl/v20191205/examples.json +18 -2
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/tcr/v20190924/api.json +2 -2
- tccli/services/teo/v20220901/api.json +1 -1
- tccli/services/tke/v20180525/api.json +18 -0
- tccli/services/tmt/v20180321/api.json +1 -1
- tccli/services/trro/v20220325/api.json +1 -1
- tccli/services/trtc/v20190722/api.json +34 -35
- tccli/services/trtc/v20190722/examples.json +14 -14
- tccli/services/vms/v20200902/api.json +9 -9
- tccli/services/vms/v20200902/examples.json +5 -5
- tccli/services/vpc/v20170312/api.json +6 -6
- tccli/services/vpc/v20170312/examples.json +4 -4
- tccli/services/waf/v20180125/api.json +24 -2
- tccli/services/wedata/v20210820/api.json +107 -0
- tccli/services/wedata/v20210820/examples.json +8 -0
- tccli/services/wedata/wedata_client.py +53 -0
- {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/RECORD +53 -53
- {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/ssl/ssl_client.py
CHANGED
@@ -173,7 +173,7 @@ def doDescribeHostCdnInstanceList(args, parsed_globals):
|
|
173
173
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
174
174
|
|
175
175
|
|
176
|
-
def
|
176
|
+
def doCheckCertificateDomainVerification(args, parsed_globals):
|
177
177
|
g_param = parse_global_arg(parsed_globals)
|
178
178
|
|
179
179
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -202,11 +202,11 @@ def doCancelAuditCertificate(args, parsed_globals):
|
|
202
202
|
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
203
203
|
client._sdkVersion += ("_CLI_" + __version__)
|
204
204
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
205
|
-
model = models.
|
205
|
+
model = models.CheckCertificateDomainVerificationRequest()
|
206
206
|
model.from_json_string(json.dumps(args))
|
207
207
|
start_time = time.time()
|
208
208
|
while True:
|
209
|
-
rsp = client.
|
209
|
+
rsp = client.CheckCertificateDomainVerification(model)
|
210
210
|
result = rsp.to_json_string()
|
211
211
|
try:
|
212
212
|
json_obj = json.loads(result)
|
@@ -381,6 +381,58 @@ def doDeleteManager(args, parsed_globals):
|
|
381
381
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
382
382
|
|
383
383
|
|
384
|
+
def doCertificateInfoSubmit(args, parsed_globals):
|
385
|
+
g_param = parse_global_arg(parsed_globals)
|
386
|
+
|
387
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
388
|
+
cred = credential.CVMRoleCredential()
|
389
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
390
|
+
cred = credential.STSAssumeRoleCredential(
|
391
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
392
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
393
|
+
)
|
394
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
395
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
396
|
+
else:
|
397
|
+
cred = credential.Credential(
|
398
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
399
|
+
)
|
400
|
+
http_profile = HttpProfile(
|
401
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
402
|
+
reqMethod="POST",
|
403
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
404
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
405
|
+
)
|
406
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
407
|
+
if g_param[OptionsDefine.Language]:
|
408
|
+
profile.language = g_param[OptionsDefine.Language]
|
409
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
410
|
+
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
411
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
412
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
413
|
+
model = models.CertificateInfoSubmitRequest()
|
414
|
+
model.from_json_string(json.dumps(args))
|
415
|
+
start_time = time.time()
|
416
|
+
while True:
|
417
|
+
rsp = client.CertificateInfoSubmit(model)
|
418
|
+
result = rsp.to_json_string()
|
419
|
+
try:
|
420
|
+
json_obj = json.loads(result)
|
421
|
+
except TypeError as e:
|
422
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
423
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
424
|
+
break
|
425
|
+
cur_time = time.time()
|
426
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
427
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
428
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
429
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
430
|
+
else:
|
431
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
432
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
433
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
434
|
+
|
435
|
+
|
384
436
|
def doDescribeDownloadCertificateUrl(args, parsed_globals):
|
385
437
|
g_param = parse_global_arg(parsed_globals)
|
386
438
|
|
@@ -1005,6 +1057,58 @@ def doCancelCertificateOrder(args, parsed_globals):
|
|
1005
1057
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1006
1058
|
|
1007
1059
|
|
1060
|
+
def doCertificateOrderSubmit(args, parsed_globals):
|
1061
|
+
g_param = parse_global_arg(parsed_globals)
|
1062
|
+
|
1063
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1064
|
+
cred = credential.CVMRoleCredential()
|
1065
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1066
|
+
cred = credential.STSAssumeRoleCredential(
|
1067
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1068
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1069
|
+
)
|
1070
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1071
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1072
|
+
else:
|
1073
|
+
cred = credential.Credential(
|
1074
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1075
|
+
)
|
1076
|
+
http_profile = HttpProfile(
|
1077
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1078
|
+
reqMethod="POST",
|
1079
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1080
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1081
|
+
)
|
1082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1083
|
+
if g_param[OptionsDefine.Language]:
|
1084
|
+
profile.language = g_param[OptionsDefine.Language]
|
1085
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1086
|
+
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
1087
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1088
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1089
|
+
model = models.CertificateOrderSubmitRequest()
|
1090
|
+
model.from_json_string(json.dumps(args))
|
1091
|
+
start_time = time.time()
|
1092
|
+
while True:
|
1093
|
+
rsp = client.CertificateOrderSubmit(model)
|
1094
|
+
result = rsp.to_json_string()
|
1095
|
+
try:
|
1096
|
+
json_obj = json.loads(result)
|
1097
|
+
except TypeError as e:
|
1098
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1099
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1100
|
+
break
|
1101
|
+
cur_time = time.time()
|
1102
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1103
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1104
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1105
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1106
|
+
else:
|
1107
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1108
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1109
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1110
|
+
|
1111
|
+
|
1008
1112
|
def doDownloadCertificate(args, parsed_globals):
|
1009
1113
|
g_param = parse_global_arg(parsed_globals)
|
1010
1114
|
|
@@ -1941,7 +2045,7 @@ def doDescribeCertificateBindResourceTaskResult(args, parsed_globals):
|
|
1941
2045
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1942
2046
|
|
1943
2047
|
|
1944
|
-
def
|
2048
|
+
def doCancelAuditCertificate(args, parsed_globals):
|
1945
2049
|
g_param = parse_global_arg(parsed_globals)
|
1946
2050
|
|
1947
2051
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1970,11 +2074,11 @@ def doCheckCertificateDomainVerification(args, parsed_globals):
|
|
1970
2074
|
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
1971
2075
|
client._sdkVersion += ("_CLI_" + __version__)
|
1972
2076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1973
|
-
model = models.
|
2077
|
+
model = models.CancelAuditCertificateRequest()
|
1974
2078
|
model.from_json_string(json.dumps(args))
|
1975
2079
|
start_time = time.time()
|
1976
2080
|
while True:
|
1977
|
-
rsp = client.
|
2081
|
+
rsp = client.CancelAuditCertificate(model)
|
1978
2082
|
result = rsp.to_json_string()
|
1979
2083
|
try:
|
1980
2084
|
json_obj = json.loads(result)
|
@@ -2357,7 +2461,7 @@ def doDescribeHostUpdateRecord(args, parsed_globals):
|
|
2357
2461
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2358
2462
|
|
2359
2463
|
|
2360
|
-
def
|
2464
|
+
def doCreateCertificate(args, parsed_globals):
|
2361
2465
|
g_param = parse_global_arg(parsed_globals)
|
2362
2466
|
|
2363
2467
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2386,11 +2490,11 @@ def doCreateCertificateByPackage(args, parsed_globals):
|
|
2386
2490
|
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
2387
2491
|
client._sdkVersion += ("_CLI_" + __version__)
|
2388
2492
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2389
|
-
model = models.
|
2493
|
+
model = models.CreateCertificateRequest()
|
2390
2494
|
model.from_json_string(json.dumps(args))
|
2391
2495
|
start_time = time.time()
|
2392
2496
|
while True:
|
2393
|
-
rsp = client.
|
2497
|
+
rsp = client.CreateCertificate(model)
|
2394
2498
|
result = rsp.to_json_string()
|
2395
2499
|
try:
|
2396
2500
|
json_obj = json.loads(result)
|
@@ -2721,7 +2825,7 @@ def doDescribeHostApiGatewayInstanceList(args, parsed_globals):
|
|
2721
2825
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2722
2826
|
|
2723
2827
|
|
2724
|
-
def
|
2828
|
+
def doCreateCertificateByPackage(args, parsed_globals):
|
2725
2829
|
g_param = parse_global_arg(parsed_globals)
|
2726
2830
|
|
2727
2831
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2750,11 +2854,11 @@ def doCreateCertificate(args, parsed_globals):
|
|
2750
2854
|
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
2751
2855
|
client._sdkVersion += ("_CLI_" + __version__)
|
2752
2856
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2753
|
-
model = models.
|
2857
|
+
model = models.CreateCertificateByPackageRequest()
|
2754
2858
|
model.from_json_string(json.dumps(args))
|
2755
2859
|
start_time = time.time()
|
2756
2860
|
while True:
|
2757
|
-
rsp = client.
|
2861
|
+
rsp = client.CreateCertificateByPackage(model)
|
2758
2862
|
result = rsp.to_json_string()
|
2759
2863
|
try:
|
2760
2864
|
json_obj = json.loads(result)
|
@@ -3203,10 +3307,11 @@ ACTION_MAP = {
|
|
3203
3307
|
"DescribeHostCosInstanceList": doDescribeHostCosInstanceList,
|
3204
3308
|
"DescribeCertificates": doDescribeCertificates,
|
3205
3309
|
"DescribeHostCdnInstanceList": doDescribeHostCdnInstanceList,
|
3206
|
-
"
|
3310
|
+
"CheckCertificateDomainVerification": doCheckCertificateDomainVerification,
|
3207
3311
|
"DescribeHostTkeInstanceList": doDescribeHostTkeInstanceList,
|
3208
3312
|
"UploadRevokeLetter": doUploadRevokeLetter,
|
3209
3313
|
"DeleteManager": doDeleteManager,
|
3314
|
+
"CertificateInfoSubmit": doCertificateInfoSubmit,
|
3210
3315
|
"DescribeDownloadCertificateUrl": doDescribeDownloadCertificateUrl,
|
3211
3316
|
"DeployCertificateInstance": doDeployCertificateInstance,
|
3212
3317
|
"SubmitAuditManager": doSubmitAuditManager,
|
@@ -3219,6 +3324,7 @@ ACTION_MAP = {
|
|
3219
3324
|
"DescribeHostClbInstanceList": doDescribeHostClbInstanceList,
|
3220
3325
|
"DescribeHostTeoInstanceList": doDescribeHostTeoInstanceList,
|
3221
3326
|
"CancelCertificateOrder": doCancelCertificateOrder,
|
3327
|
+
"CertificateOrderSubmit": doCertificateOrderSubmit,
|
3222
3328
|
"DownloadCertificate": doDownloadCertificate,
|
3223
3329
|
"DeleteCertificate": doDeleteCertificate,
|
3224
3330
|
"VerifyManager": doVerifyManager,
|
@@ -3237,7 +3343,7 @@ ACTION_MAP = {
|
|
3237
3343
|
"DeployCertificateRecordRollback": doDeployCertificateRecordRollback,
|
3238
3344
|
"DeployCertificateRecordRetry": doDeployCertificateRecordRetry,
|
3239
3345
|
"DescribeCertificateBindResourceTaskResult": doDescribeCertificateBindResourceTaskResult,
|
3240
|
-
"
|
3346
|
+
"CancelAuditCertificate": doCancelAuditCertificate,
|
3241
3347
|
"DescribeHostDeployRecord": doDescribeHostDeployRecord,
|
3242
3348
|
"UpdateCertificateRecordRetry": doUpdateCertificateRecordRetry,
|
3243
3349
|
"DescribeDeleteCertificatesTaskResult": doDescribeDeleteCertificatesTaskResult,
|
@@ -3245,14 +3351,14 @@ ACTION_MAP = {
|
|
3245
3351
|
"ModifyCertificateAlias": doModifyCertificateAlias,
|
3246
3352
|
"DescribeHostUpdateRecordDetail": doDescribeHostUpdateRecordDetail,
|
3247
3353
|
"DescribeHostUpdateRecord": doDescribeHostUpdateRecord,
|
3248
|
-
"
|
3354
|
+
"CreateCertificate": doCreateCertificate,
|
3249
3355
|
"UploadConfirmLetter": doUploadConfirmLetter,
|
3250
3356
|
"DescribeHostLighthouseInstanceList": doDescribeHostLighthouseInstanceList,
|
3251
3357
|
"UpdateCertificateRecordRollback": doUpdateCertificateRecordRollback,
|
3252
3358
|
"DescribeHostVodInstanceList": doDescribeHostVodInstanceList,
|
3253
3359
|
"DescribeCertificateOperateLogs": doDescribeCertificateOperateLogs,
|
3254
3360
|
"DescribeHostApiGatewayInstanceList": doDescribeHostApiGatewayInstanceList,
|
3255
|
-
"
|
3361
|
+
"CreateCertificateByPackage": doCreateCertificateByPackage,
|
3256
3362
|
"CreateCertificateBindResourceSyncTask": doCreateCertificateBindResourceSyncTask,
|
3257
3363
|
"ModifyCertificatesExpiringNotificationSwitch": doModifyCertificatesExpiringNotificationSwitch,
|
3258
3364
|
"ReplaceCertificate": doReplaceCertificate,
|