tccli 3.0.1264.1__py2.py3-none-any.whl → 3.0.1266.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/batch/v20170312/api.json +1 -1
  3. tccli/services/bh/v20230418/api.json +490 -5
  4. tccli/services/bh/v20230418/examples.json +2 -2
  5. tccli/services/billing/v20180709/api.json +4 -2
  6. tccli/services/cbs/v20170312/api.json +12 -2
  7. tccli/services/cbs/v20170312/examples.json +2 -2
  8. tccli/services/cdn/v20180606/api.json +33 -11
  9. tccli/services/chdfs/v20201112/api.json +7 -7
  10. tccli/services/cls/v20201016/api.json +11 -2
  11. tccli/services/cvm/v20170312/api.json +13 -3
  12. tccli/services/ess/v20201111/api.json +19 -19
  13. tccli/services/essbasic/v20210526/api.json +2 -2
  14. tccli/services/facefusion/v20220927/api.json +2 -2
  15. tccli/services/lcic/v20220817/api.json +30 -35
  16. tccli/services/lighthouse/v20200324/api.json +7 -7
  17. tccli/services/lkeap/v20240522/api.json +412 -9
  18. tccli/services/lkeap/v20240522/examples.json +19 -19
  19. tccli/services/mna/v20210119/api.json +21 -21
  20. tccli/services/mongodb/mongodb_client.py +53 -0
  21. tccli/services/mongodb/v20190725/api.json +70 -0
  22. tccli/services/mongodb/v20190725/examples.json +8 -0
  23. tccli/services/mps/v20190612/api.json +84 -8
  24. tccli/services/mqtt/mqtt_client.py +658 -75
  25. tccli/services/mqtt/v20240516/api.json +1038 -54
  26. tccli/services/mqtt/v20240516/examples.json +88 -0
  27. tccli/services/ocr/v20181119/api.json +52 -22
  28. tccli/services/rum/v20210622/api.json +12 -12
  29. tccli/services/rum/v20210622/examples.json +6 -6
  30. tccli/services/ssl/ssl_client.py +122 -16
  31. tccli/services/ssl/v20191205/api.json +468 -22
  32. tccli/services/ssl/v20191205/examples.json +18 -2
  33. tccli/services/sts/v20180813/api.json +1 -1
  34. tccli/services/tcr/v20190924/api.json +2 -2
  35. tccli/services/teo/v20220901/api.json +1 -1
  36. tccli/services/tke/v20180525/api.json +18 -0
  37. tccli/services/tmt/v20180321/api.json +1 -1
  38. tccli/services/trro/v20220325/api.json +1 -1
  39. tccli/services/trtc/v20190722/api.json +34 -35
  40. tccli/services/trtc/v20190722/examples.json +14 -14
  41. tccli/services/vms/v20200902/api.json +9 -9
  42. tccli/services/vms/v20200902/examples.json +5 -5
  43. tccli/services/vpc/v20170312/api.json +6 -6
  44. tccli/services/vpc/v20170312/examples.json +4 -4
  45. tccli/services/waf/v20180125/api.json +24 -2
  46. tccli/services/wedata/v20210820/api.json +107 -0
  47. tccli/services/wedata/v20210820/examples.json +8 -0
  48. tccli/services/wedata/wedata_client.py +53 -0
  49. {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/METADATA +2 -2
  50. {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/RECORD +53 -53
  51. {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/WHEEL +0 -0
  52. {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/entry_points.txt +0 -0
  53. {tccli-3.0.1264.1.dist-info → tccli-3.0.1266.1.dist-info}/license_files/LICENSE +0 -0
@@ -173,7 +173,7 @@ def doDescribeHostCdnInstanceList(args, parsed_globals):
173
173
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
174
 
175
175
 
176
- def doCancelAuditCertificate(args, parsed_globals):
176
+ def doCheckCertificateDomainVerification(args, parsed_globals):
177
177
  g_param = parse_global_arg(parsed_globals)
178
178
 
179
179
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -202,11 +202,11 @@ def doCancelAuditCertificate(args, parsed_globals):
202
202
  client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
203
203
  client._sdkVersion += ("_CLI_" + __version__)
204
204
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
- model = models.CancelAuditCertificateRequest()
205
+ model = models.CheckCertificateDomainVerificationRequest()
206
206
  model.from_json_string(json.dumps(args))
207
207
  start_time = time.time()
208
208
  while True:
209
- rsp = client.CancelAuditCertificate(model)
209
+ rsp = client.CheckCertificateDomainVerification(model)
210
210
  result = rsp.to_json_string()
211
211
  try:
212
212
  json_obj = json.loads(result)
@@ -381,6 +381,58 @@ def doDeleteManager(args, parsed_globals):
381
381
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
382
 
383
383
 
384
+ def doCertificateInfoSubmit(args, parsed_globals):
385
+ g_param = parse_global_arg(parsed_globals)
386
+
387
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
388
+ cred = credential.CVMRoleCredential()
389
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
390
+ cred = credential.STSAssumeRoleCredential(
391
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
+ )
394
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
+ else:
397
+ cred = credential.Credential(
398
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
399
+ )
400
+ http_profile = HttpProfile(
401
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
402
+ reqMethod="POST",
403
+ endpoint=g_param[OptionsDefine.Endpoint],
404
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
+ )
406
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
407
+ if g_param[OptionsDefine.Language]:
408
+ profile.language = g_param[OptionsDefine.Language]
409
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
+ client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
411
+ client._sdkVersion += ("_CLI_" + __version__)
412
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
+ model = models.CertificateInfoSubmitRequest()
414
+ model.from_json_string(json.dumps(args))
415
+ start_time = time.time()
416
+ while True:
417
+ rsp = client.CertificateInfoSubmit(model)
418
+ result = rsp.to_json_string()
419
+ try:
420
+ json_obj = json.loads(result)
421
+ except TypeError as e:
422
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
423
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
424
+ break
425
+ cur_time = time.time()
426
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
427
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
428
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
429
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
430
+ else:
431
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
432
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
433
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
+
435
+
384
436
  def doDescribeDownloadCertificateUrl(args, parsed_globals):
385
437
  g_param = parse_global_arg(parsed_globals)
386
438
 
@@ -1005,6 +1057,58 @@ def doCancelCertificateOrder(args, parsed_globals):
1005
1057
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1058
 
1007
1059
 
1060
+ def doCertificateOrderSubmit(args, parsed_globals):
1061
+ g_param = parse_global_arg(parsed_globals)
1062
+
1063
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1064
+ cred = credential.CVMRoleCredential()
1065
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1066
+ cred = credential.STSAssumeRoleCredential(
1067
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
+ )
1070
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
+ else:
1073
+ cred = credential.Credential(
1074
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1075
+ )
1076
+ http_profile = HttpProfile(
1077
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1078
+ reqMethod="POST",
1079
+ endpoint=g_param[OptionsDefine.Endpoint],
1080
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
+ )
1082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1083
+ if g_param[OptionsDefine.Language]:
1084
+ profile.language = g_param[OptionsDefine.Language]
1085
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
+ client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
1087
+ client._sdkVersion += ("_CLI_" + __version__)
1088
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
+ model = models.CertificateOrderSubmitRequest()
1090
+ model.from_json_string(json.dumps(args))
1091
+ start_time = time.time()
1092
+ while True:
1093
+ rsp = client.CertificateOrderSubmit(model)
1094
+ result = rsp.to_json_string()
1095
+ try:
1096
+ json_obj = json.loads(result)
1097
+ except TypeError as e:
1098
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1099
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1100
+ break
1101
+ cur_time = time.time()
1102
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1103
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1104
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1105
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1106
+ else:
1107
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1108
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1109
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
+
1111
+
1008
1112
  def doDownloadCertificate(args, parsed_globals):
1009
1113
  g_param = parse_global_arg(parsed_globals)
1010
1114
 
@@ -1941,7 +2045,7 @@ def doDescribeCertificateBindResourceTaskResult(args, parsed_globals):
1941
2045
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
2046
 
1943
2047
 
1944
- def doCheckCertificateDomainVerification(args, parsed_globals):
2048
+ def doCancelAuditCertificate(args, parsed_globals):
1945
2049
  g_param = parse_global_arg(parsed_globals)
1946
2050
 
1947
2051
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1970,11 +2074,11 @@ def doCheckCertificateDomainVerification(args, parsed_globals):
1970
2074
  client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
1971
2075
  client._sdkVersion += ("_CLI_" + __version__)
1972
2076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1973
- model = models.CheckCertificateDomainVerificationRequest()
2077
+ model = models.CancelAuditCertificateRequest()
1974
2078
  model.from_json_string(json.dumps(args))
1975
2079
  start_time = time.time()
1976
2080
  while True:
1977
- rsp = client.CheckCertificateDomainVerification(model)
2081
+ rsp = client.CancelAuditCertificate(model)
1978
2082
  result = rsp.to_json_string()
1979
2083
  try:
1980
2084
  json_obj = json.loads(result)
@@ -2357,7 +2461,7 @@ def doDescribeHostUpdateRecord(args, parsed_globals):
2357
2461
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
2462
 
2359
2463
 
2360
- def doCreateCertificateByPackage(args, parsed_globals):
2464
+ def doCreateCertificate(args, parsed_globals):
2361
2465
  g_param = parse_global_arg(parsed_globals)
2362
2466
 
2363
2467
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2386,11 +2490,11 @@ def doCreateCertificateByPackage(args, parsed_globals):
2386
2490
  client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
2387
2491
  client._sdkVersion += ("_CLI_" + __version__)
2388
2492
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
- model = models.CreateCertificateByPackageRequest()
2493
+ model = models.CreateCertificateRequest()
2390
2494
  model.from_json_string(json.dumps(args))
2391
2495
  start_time = time.time()
2392
2496
  while True:
2393
- rsp = client.CreateCertificateByPackage(model)
2497
+ rsp = client.CreateCertificate(model)
2394
2498
  result = rsp.to_json_string()
2395
2499
  try:
2396
2500
  json_obj = json.loads(result)
@@ -2721,7 +2825,7 @@ def doDescribeHostApiGatewayInstanceList(args, parsed_globals):
2721
2825
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2722
2826
 
2723
2827
 
2724
- def doCreateCertificate(args, parsed_globals):
2828
+ def doCreateCertificateByPackage(args, parsed_globals):
2725
2829
  g_param = parse_global_arg(parsed_globals)
2726
2830
 
2727
2831
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2750,11 +2854,11 @@ def doCreateCertificate(args, parsed_globals):
2750
2854
  client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
2751
2855
  client._sdkVersion += ("_CLI_" + __version__)
2752
2856
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2753
- model = models.CreateCertificateRequest()
2857
+ model = models.CreateCertificateByPackageRequest()
2754
2858
  model.from_json_string(json.dumps(args))
2755
2859
  start_time = time.time()
2756
2860
  while True:
2757
- rsp = client.CreateCertificate(model)
2861
+ rsp = client.CreateCertificateByPackage(model)
2758
2862
  result = rsp.to_json_string()
2759
2863
  try:
2760
2864
  json_obj = json.loads(result)
@@ -3203,10 +3307,11 @@ ACTION_MAP = {
3203
3307
  "DescribeHostCosInstanceList": doDescribeHostCosInstanceList,
3204
3308
  "DescribeCertificates": doDescribeCertificates,
3205
3309
  "DescribeHostCdnInstanceList": doDescribeHostCdnInstanceList,
3206
- "CancelAuditCertificate": doCancelAuditCertificate,
3310
+ "CheckCertificateDomainVerification": doCheckCertificateDomainVerification,
3207
3311
  "DescribeHostTkeInstanceList": doDescribeHostTkeInstanceList,
3208
3312
  "UploadRevokeLetter": doUploadRevokeLetter,
3209
3313
  "DeleteManager": doDeleteManager,
3314
+ "CertificateInfoSubmit": doCertificateInfoSubmit,
3210
3315
  "DescribeDownloadCertificateUrl": doDescribeDownloadCertificateUrl,
3211
3316
  "DeployCertificateInstance": doDeployCertificateInstance,
3212
3317
  "SubmitAuditManager": doSubmitAuditManager,
@@ -3219,6 +3324,7 @@ ACTION_MAP = {
3219
3324
  "DescribeHostClbInstanceList": doDescribeHostClbInstanceList,
3220
3325
  "DescribeHostTeoInstanceList": doDescribeHostTeoInstanceList,
3221
3326
  "CancelCertificateOrder": doCancelCertificateOrder,
3327
+ "CertificateOrderSubmit": doCertificateOrderSubmit,
3222
3328
  "DownloadCertificate": doDownloadCertificate,
3223
3329
  "DeleteCertificate": doDeleteCertificate,
3224
3330
  "VerifyManager": doVerifyManager,
@@ -3237,7 +3343,7 @@ ACTION_MAP = {
3237
3343
  "DeployCertificateRecordRollback": doDeployCertificateRecordRollback,
3238
3344
  "DeployCertificateRecordRetry": doDeployCertificateRecordRetry,
3239
3345
  "DescribeCertificateBindResourceTaskResult": doDescribeCertificateBindResourceTaskResult,
3240
- "CheckCertificateDomainVerification": doCheckCertificateDomainVerification,
3346
+ "CancelAuditCertificate": doCancelAuditCertificate,
3241
3347
  "DescribeHostDeployRecord": doDescribeHostDeployRecord,
3242
3348
  "UpdateCertificateRecordRetry": doUpdateCertificateRecordRetry,
3243
3349
  "DescribeDeleteCertificatesTaskResult": doDescribeDeleteCertificatesTaskResult,
@@ -3245,14 +3351,14 @@ ACTION_MAP = {
3245
3351
  "ModifyCertificateAlias": doModifyCertificateAlias,
3246
3352
  "DescribeHostUpdateRecordDetail": doDescribeHostUpdateRecordDetail,
3247
3353
  "DescribeHostUpdateRecord": doDescribeHostUpdateRecord,
3248
- "CreateCertificateByPackage": doCreateCertificateByPackage,
3354
+ "CreateCertificate": doCreateCertificate,
3249
3355
  "UploadConfirmLetter": doUploadConfirmLetter,
3250
3356
  "DescribeHostLighthouseInstanceList": doDescribeHostLighthouseInstanceList,
3251
3357
  "UpdateCertificateRecordRollback": doUpdateCertificateRecordRollback,
3252
3358
  "DescribeHostVodInstanceList": doDescribeHostVodInstanceList,
3253
3359
  "DescribeCertificateOperateLogs": doDescribeCertificateOperateLogs,
3254
3360
  "DescribeHostApiGatewayInstanceList": doDescribeHostApiGatewayInstanceList,
3255
- "CreateCertificate": doCreateCertificate,
3361
+ "CreateCertificateByPackage": doCreateCertificateByPackage,
3256
3362
  "CreateCertificateBindResourceSyncTask": doCreateCertificateBindResourceSyncTask,
3257
3363
  "ModifyCertificatesExpiringNotificationSwitch": doModifyCertificatesExpiringNotificationSwitch,
3258
3364
  "ReplaceCertificate": doReplaceCertificate,