tccli 3.0.1282.1__py2.py3-none-any.whl → 3.0.1284.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/acp/v20220105/api.json +23 -23
- tccli/services/acp/v20220105/examples.json +2 -8
- tccli/services/advisor/v20200721/api.json +4 -2
- tccli/services/antiddos/v20200309/api.json +1 -1
- tccli/services/apm/v20210622/api.json +1 -1
- tccli/services/cdn/v20180606/api.json +4 -2
- tccli/services/cdwch/v20200915/api.json +3 -3
- tccli/services/cdwch/v20200915/examples.json +1 -1
- tccli/services/cdwdoris/v20211228/api.json +18 -0
- tccli/services/cfg/v20210820/api.json +5 -5
- tccli/services/chdfs/v20201112/api.json +12 -12
- tccli/services/clb/v20180317/api.json +20 -2
- tccli/services/cynosdb/v20190107/api.json +10 -0
- tccli/services/dbbrain/v20191016/api.json +17 -17
- tccli/services/dbbrain/v20210527/api.json +22 -22
- tccli/services/dcdb/v20180411/api.json +14 -4
- tccli/services/dcdb/v20180411/examples.json +1 -1
- tccli/services/dlc/v20210125/api.json +128 -56
- tccli/services/dlc/v20210125/examples.json +3 -3
- tccli/services/domain/v20180808/api.json +3 -3
- tccli/services/dts/v20180330/api.json +16 -16
- tccli/services/dts/v20211206/api.json +493 -488
- tccli/services/es/v20180416/api.json +3 -3
- tccli/services/es/v20180416/examples.json +1 -1
- tccli/services/ess/ess_client.py +53 -0
- tccli/services/ess/v20201111/api.json +122 -1
- tccli/services/ess/v20201111/examples.json +26 -0
- tccli/services/essbasic/essbasic_client.py +57 -4
- tccli/services/essbasic/v20210526/api.json +163 -0
- tccli/services/essbasic/v20210526/examples.json +26 -0
- tccli/services/goosefs/v20220519/api.json +26 -24
- tccli/services/goosefs/v20220519/examples.json +2 -2
- tccli/services/lke/v20231130/api.json +8 -8
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lowcode/v20210108/api.json +165 -165
- tccli/services/lowcode/v20210108/examples.json +5 -5
- tccli/services/mariadb/v20170312/api.json +12 -2
- tccli/services/mariadb/v20170312/examples.json +4 -4
- tccli/services/mongodb/v20190725/api.json +2 -2
- tccli/services/mongodb/v20190725/examples.json +2 -2
- tccli/services/monitor/v20180724/api.json +7 -7
- tccli/services/monitor/v20180724/examples.json +2 -2
- tccli/services/mqtt/mqtt_client.py +106 -0
- tccli/services/mqtt/v20240516/api.json +511 -213
- tccli/services/mqtt/v20240516/examples.json +21 -5
- tccli/services/oceanus/v20190422/api.json +43 -4
- tccli/services/ocr/v20181119/api.json +2 -2
- tccli/services/ocr/v20181119/examples.json +2 -2
- tccli/services/organization/organization_client.py +53 -0
- tccli/services/organization/v20210331/api.json +61 -0
- tccli/services/organization/v20210331/examples.json +8 -0
- tccli/services/redis/v20180412/api.json +11 -2
- tccli/services/redis/v20180412/examples.json +1 -1
- tccli/services/rum/v20210622/api.json +2 -2
- tccli/services/scf/v20180416/api.json +40 -0
- tccli/services/tdmq/tdmq_client.py +4 -57
- tccli/services/tdmq/v20200217/api.json +118 -212
- tccli/services/tdmq/v20200217/examples.json +0 -8
- tccli/services/tds/v20220801/api.json +2 -2
- tccli/services/tione/v20211111/api.json +41 -1
- tccli/services/tse/v20201207/api.json +207 -104
- tccli/services/vclm/v20240523/api.json +20 -2
- tccli/services/vdb/v20230616/api.json +62 -62
- tccli/services/vdb/v20230616/examples.json +2 -2
- tccli/services/waf/v20180125/api.json +143 -0
- tccli/services/waf/v20180125/examples.json +16 -0
- tccli/services/waf/waf_client.py +106 -0
- tccli/services/wedata/v20210820/api.json +965 -133
- tccli/services/wedata/v20210820/examples.json +24 -8
- tccli/services/wedata/wedata_client.py +106 -0
- {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/RECORD +76 -76
- {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/waf/waf_client.py
CHANGED
@@ -7609,6 +7609,58 @@ def doModifyApiSecEventChange(args, parsed_globals):
|
|
7609
7609
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7610
7610
|
|
7611
7611
|
|
7612
|
+
def doModifyUserSignatureClass(args, parsed_globals):
|
7613
|
+
g_param = parse_global_arg(parsed_globals)
|
7614
|
+
|
7615
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7616
|
+
cred = credential.CVMRoleCredential()
|
7617
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7618
|
+
cred = credential.STSAssumeRoleCredential(
|
7619
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7620
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7621
|
+
)
|
7622
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7623
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7624
|
+
else:
|
7625
|
+
cred = credential.Credential(
|
7626
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7627
|
+
)
|
7628
|
+
http_profile = HttpProfile(
|
7629
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7630
|
+
reqMethod="POST",
|
7631
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7632
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7633
|
+
)
|
7634
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7635
|
+
if g_param[OptionsDefine.Language]:
|
7636
|
+
profile.language = g_param[OptionsDefine.Language]
|
7637
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7638
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
7639
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7640
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7641
|
+
model = models.ModifyUserSignatureClassRequest()
|
7642
|
+
model.from_json_string(json.dumps(args))
|
7643
|
+
start_time = time.time()
|
7644
|
+
while True:
|
7645
|
+
rsp = client.ModifyUserSignatureClass(model)
|
7646
|
+
result = rsp.to_json_string()
|
7647
|
+
try:
|
7648
|
+
json_obj = json.loads(result)
|
7649
|
+
except TypeError as e:
|
7650
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7651
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7652
|
+
break
|
7653
|
+
cur_time = time.time()
|
7654
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7655
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7656
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7657
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7658
|
+
else:
|
7659
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7660
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7661
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7662
|
+
|
7663
|
+
|
7612
7664
|
def doAddDomainWhiteRule(args, parsed_globals):
|
7613
7665
|
g_param = parse_global_arg(parsed_globals)
|
7614
7666
|
|
@@ -7713,6 +7765,58 @@ def doModifyDomainIpv6Status(args, parsed_globals):
|
|
7713
7765
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7714
7766
|
|
7715
7767
|
|
7768
|
+
def doUpdateProtectionModes(args, parsed_globals):
|
7769
|
+
g_param = parse_global_arg(parsed_globals)
|
7770
|
+
|
7771
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7772
|
+
cred = credential.CVMRoleCredential()
|
7773
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7774
|
+
cred = credential.STSAssumeRoleCredential(
|
7775
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7776
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7777
|
+
)
|
7778
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7779
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7780
|
+
else:
|
7781
|
+
cred = credential.Credential(
|
7782
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7783
|
+
)
|
7784
|
+
http_profile = HttpProfile(
|
7785
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7786
|
+
reqMethod="POST",
|
7787
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7788
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7789
|
+
)
|
7790
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7791
|
+
if g_param[OptionsDefine.Language]:
|
7792
|
+
profile.language = g_param[OptionsDefine.Language]
|
7793
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7794
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
7795
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7796
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7797
|
+
model = models.UpdateProtectionModesRequest()
|
7798
|
+
model.from_json_string(json.dumps(args))
|
7799
|
+
start_time = time.time()
|
7800
|
+
while True:
|
7801
|
+
rsp = client.UpdateProtectionModes(model)
|
7802
|
+
result = rsp.to_json_string()
|
7803
|
+
try:
|
7804
|
+
json_obj = json.loads(result)
|
7805
|
+
except TypeError as e:
|
7806
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7807
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7808
|
+
break
|
7809
|
+
cur_time = time.time()
|
7810
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7811
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7812
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7813
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7814
|
+
else:
|
7815
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7816
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7817
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7818
|
+
|
7819
|
+
|
7716
7820
|
def doModifyUserLevel(args, parsed_globals):
|
7717
7821
|
g_param = parse_global_arg(parsed_globals)
|
7718
7822
|
|
@@ -7922,8 +8026,10 @@ ACTION_MAP = {
|
|
7922
8026
|
"FreshAntiFakeUrl": doFreshAntiFakeUrl,
|
7923
8027
|
"DescribeDomainRules": doDescribeDomainRules,
|
7924
8028
|
"ModifyApiSecEventChange": doModifyApiSecEventChange,
|
8029
|
+
"ModifyUserSignatureClass": doModifyUserSignatureClass,
|
7925
8030
|
"AddDomainWhiteRule": doAddDomainWhiteRule,
|
7926
8031
|
"ModifyDomainIpv6Status": doModifyDomainIpv6Status,
|
8032
|
+
"UpdateProtectionModes": doUpdateProtectionModes,
|
7927
8033
|
"ModifyUserLevel": doModifyUserLevel,
|
7928
8034
|
|
7929
8035
|
}
|