tccli 3.0.1282.1__py2.py3-none-any.whl → 3.0.1284.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/acp/v20220105/api.json +23 -23
  3. tccli/services/acp/v20220105/examples.json +2 -8
  4. tccli/services/advisor/v20200721/api.json +4 -2
  5. tccli/services/antiddos/v20200309/api.json +1 -1
  6. tccli/services/apm/v20210622/api.json +1 -1
  7. tccli/services/cdn/v20180606/api.json +4 -2
  8. tccli/services/cdwch/v20200915/api.json +3 -3
  9. tccli/services/cdwch/v20200915/examples.json +1 -1
  10. tccli/services/cdwdoris/v20211228/api.json +18 -0
  11. tccli/services/cfg/v20210820/api.json +5 -5
  12. tccli/services/chdfs/v20201112/api.json +12 -12
  13. tccli/services/clb/v20180317/api.json +20 -2
  14. tccli/services/cynosdb/v20190107/api.json +10 -0
  15. tccli/services/dbbrain/v20191016/api.json +17 -17
  16. tccli/services/dbbrain/v20210527/api.json +22 -22
  17. tccli/services/dcdb/v20180411/api.json +14 -4
  18. tccli/services/dcdb/v20180411/examples.json +1 -1
  19. tccli/services/dlc/v20210125/api.json +128 -56
  20. tccli/services/dlc/v20210125/examples.json +3 -3
  21. tccli/services/domain/v20180808/api.json +3 -3
  22. tccli/services/dts/v20180330/api.json +16 -16
  23. tccli/services/dts/v20211206/api.json +493 -488
  24. tccli/services/es/v20180416/api.json +3 -3
  25. tccli/services/es/v20180416/examples.json +1 -1
  26. tccli/services/ess/ess_client.py +53 -0
  27. tccli/services/ess/v20201111/api.json +122 -1
  28. tccli/services/ess/v20201111/examples.json +26 -0
  29. tccli/services/essbasic/essbasic_client.py +57 -4
  30. tccli/services/essbasic/v20210526/api.json +163 -0
  31. tccli/services/essbasic/v20210526/examples.json +26 -0
  32. tccli/services/goosefs/v20220519/api.json +26 -24
  33. tccli/services/goosefs/v20220519/examples.json +2 -2
  34. tccli/services/lke/v20231130/api.json +8 -8
  35. tccli/services/lke/v20231130/examples.json +1 -1
  36. tccli/services/lowcode/v20210108/api.json +165 -165
  37. tccli/services/lowcode/v20210108/examples.json +5 -5
  38. tccli/services/mariadb/v20170312/api.json +12 -2
  39. tccli/services/mariadb/v20170312/examples.json +4 -4
  40. tccli/services/mongodb/v20190725/api.json +2 -2
  41. tccli/services/mongodb/v20190725/examples.json +2 -2
  42. tccli/services/monitor/v20180724/api.json +7 -7
  43. tccli/services/monitor/v20180724/examples.json +2 -2
  44. tccli/services/mqtt/mqtt_client.py +106 -0
  45. tccli/services/mqtt/v20240516/api.json +511 -213
  46. tccli/services/mqtt/v20240516/examples.json +21 -5
  47. tccli/services/oceanus/v20190422/api.json +43 -4
  48. tccli/services/ocr/v20181119/api.json +2 -2
  49. tccli/services/ocr/v20181119/examples.json +2 -2
  50. tccli/services/organization/organization_client.py +53 -0
  51. tccli/services/organization/v20210331/api.json +61 -0
  52. tccli/services/organization/v20210331/examples.json +8 -0
  53. tccli/services/redis/v20180412/api.json +11 -2
  54. tccli/services/redis/v20180412/examples.json +1 -1
  55. tccli/services/rum/v20210622/api.json +2 -2
  56. tccli/services/scf/v20180416/api.json +40 -0
  57. tccli/services/tdmq/tdmq_client.py +4 -57
  58. tccli/services/tdmq/v20200217/api.json +118 -212
  59. tccli/services/tdmq/v20200217/examples.json +0 -8
  60. tccli/services/tds/v20220801/api.json +2 -2
  61. tccli/services/tione/v20211111/api.json +41 -1
  62. tccli/services/tse/v20201207/api.json +207 -104
  63. tccli/services/vclm/v20240523/api.json +20 -2
  64. tccli/services/vdb/v20230616/api.json +62 -62
  65. tccli/services/vdb/v20230616/examples.json +2 -2
  66. tccli/services/waf/v20180125/api.json +143 -0
  67. tccli/services/waf/v20180125/examples.json +16 -0
  68. tccli/services/waf/waf_client.py +106 -0
  69. tccli/services/wedata/v20210820/api.json +965 -133
  70. tccli/services/wedata/v20210820/examples.json +24 -8
  71. tccli/services/wedata/wedata_client.py +106 -0
  72. {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/METADATA +2 -2
  73. {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/RECORD +76 -76
  74. {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/WHEEL +0 -0
  75. {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/entry_points.txt +0 -0
  76. {tccli-3.0.1282.1.dist-info → tccli-3.0.1284.1.dist-info}/license_files/LICENSE +0 -0
@@ -7609,6 +7609,58 @@ def doModifyApiSecEventChange(args, parsed_globals):
7609
7609
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7610
7610
 
7611
7611
 
7612
+ def doModifyUserSignatureClass(args, parsed_globals):
7613
+ g_param = parse_global_arg(parsed_globals)
7614
+
7615
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
7616
+ cred = credential.CVMRoleCredential()
7617
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
7618
+ cred = credential.STSAssumeRoleCredential(
7619
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
7620
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
7621
+ )
7622
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
7623
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
7624
+ else:
7625
+ cred = credential.Credential(
7626
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
7627
+ )
7628
+ http_profile = HttpProfile(
7629
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
7630
+ reqMethod="POST",
7631
+ endpoint=g_param[OptionsDefine.Endpoint],
7632
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
7633
+ )
7634
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
7635
+ if g_param[OptionsDefine.Language]:
7636
+ profile.language = g_param[OptionsDefine.Language]
7637
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
7638
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
7639
+ client._sdkVersion += ("_CLI_" + __version__)
7640
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
7641
+ model = models.ModifyUserSignatureClassRequest()
7642
+ model.from_json_string(json.dumps(args))
7643
+ start_time = time.time()
7644
+ while True:
7645
+ rsp = client.ModifyUserSignatureClass(model)
7646
+ result = rsp.to_json_string()
7647
+ try:
7648
+ json_obj = json.loads(result)
7649
+ except TypeError as e:
7650
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
7651
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
7652
+ break
7653
+ cur_time = time.time()
7654
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
7655
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
7656
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
7657
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
7658
+ else:
7659
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
7660
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
7661
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7662
+
7663
+
7612
7664
  def doAddDomainWhiteRule(args, parsed_globals):
7613
7665
  g_param = parse_global_arg(parsed_globals)
7614
7666
 
@@ -7713,6 +7765,58 @@ def doModifyDomainIpv6Status(args, parsed_globals):
7713
7765
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7714
7766
 
7715
7767
 
7768
+ def doUpdateProtectionModes(args, parsed_globals):
7769
+ g_param = parse_global_arg(parsed_globals)
7770
+
7771
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
7772
+ cred = credential.CVMRoleCredential()
7773
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
7774
+ cred = credential.STSAssumeRoleCredential(
7775
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
7776
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
7777
+ )
7778
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
7779
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
7780
+ else:
7781
+ cred = credential.Credential(
7782
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
7783
+ )
7784
+ http_profile = HttpProfile(
7785
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
7786
+ reqMethod="POST",
7787
+ endpoint=g_param[OptionsDefine.Endpoint],
7788
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
7789
+ )
7790
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
7791
+ if g_param[OptionsDefine.Language]:
7792
+ profile.language = g_param[OptionsDefine.Language]
7793
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
7794
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
7795
+ client._sdkVersion += ("_CLI_" + __version__)
7796
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
7797
+ model = models.UpdateProtectionModesRequest()
7798
+ model.from_json_string(json.dumps(args))
7799
+ start_time = time.time()
7800
+ while True:
7801
+ rsp = client.UpdateProtectionModes(model)
7802
+ result = rsp.to_json_string()
7803
+ try:
7804
+ json_obj = json.loads(result)
7805
+ except TypeError as e:
7806
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
7807
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
7808
+ break
7809
+ cur_time = time.time()
7810
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
7811
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
7812
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
7813
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
7814
+ else:
7815
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
7816
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
7817
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7818
+
7819
+
7716
7820
  def doModifyUserLevel(args, parsed_globals):
7717
7821
  g_param = parse_global_arg(parsed_globals)
7718
7822
 
@@ -7922,8 +8026,10 @@ ACTION_MAP = {
7922
8026
  "FreshAntiFakeUrl": doFreshAntiFakeUrl,
7923
8027
  "DescribeDomainRules": doDescribeDomainRules,
7924
8028
  "ModifyApiSecEventChange": doModifyApiSecEventChange,
8029
+ "ModifyUserSignatureClass": doModifyUserSignatureClass,
7925
8030
  "AddDomainWhiteRule": doAddDomainWhiteRule,
7926
8031
  "ModifyDomainIpv6Status": doModifyDomainIpv6Status,
8032
+ "UpdateProtectionModes": doUpdateProtectionModes,
7927
8033
  "ModifyUserLevel": doModifyUserLevel,
7928
8034
 
7929
8035
  }