tccli 3.0.1291.1__py2.py3-none-any.whl → 3.0.1292.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/antiddos/antiddos_client.py +7 -113
  3. tccli/services/antiddos/v20200309/api.json +41 -401
  4. tccli/services/antiddos/v20200309/examples.json +1 -17
  5. tccli/services/apm/v20210622/api.json +44 -44
  6. tccli/services/apm/v20210622/examples.json +5 -5
  7. tccli/services/batch/v20170312/api.json +161 -161
  8. tccli/services/batch/v20170312/examples.json +1 -1
  9. tccli/services/cdwch/v20200915/api.json +303 -219
  10. tccli/services/cdwch/v20200915/examples.json +18 -18
  11. tccli/services/cdwpg/v20201230/api.json +21 -21
  12. tccli/services/cdwpg/v20201230/examples.json +2 -2
  13. tccli/services/ckafka/v20190819/api.json +1015 -1005
  14. tccli/services/cls/v20201016/api.json +112 -112
  15. tccli/services/dbbrain/v20191016/api.json +2 -2
  16. tccli/services/dbbrain/v20210527/api.json +14 -5
  17. tccli/services/emr/v20190103/api.json +249 -13
  18. tccli/services/emr/v20190103/examples.json +2 -2
  19. tccli/services/hunyuan/v20230901/api.json +13 -2
  20. tccli/services/iotexplorer/iotexplorer_client.py +53 -0
  21. tccli/services/iotexplorer/v20190423/api.json +72 -0
  22. tccli/services/iotexplorer/v20190423/examples.json +8 -0
  23. tccli/services/iotvideoindustry/v20201201/api.json +75 -75
  24. tccli/services/iotvideoindustry/v20201201/examples.json +1 -1
  25. tccli/services/lke/lke_client.py +0 -53
  26. tccli/services/lke/v20231130/api.json +0 -43
  27. tccli/services/lke/v20231130/examples.json +0 -8
  28. tccli/services/lkeap/v20240522/api.json +1 -1
  29. tccli/services/memcached/v20190318/api.json +1 -1
  30. tccli/services/monitor/monitor_client.py +57 -4
  31. tccli/services/monitor/v20180724/api.json +249 -0
  32. tccli/services/monitor/v20180724/examples.json +8 -0
  33. tccli/services/redis/v20180412/api.json +2 -2
  34. tccli/services/svp/v20240125/api.json +3 -3
  35. tccli/services/svp/v20240125/examples.json +1 -1
  36. tccli/services/tdmq/v20200217/api.json +266 -266
  37. tccli/services/teo/teo_client.py +53 -0
  38. tccli/services/teo/v20220901/api.json +50 -7
  39. tccli/services/teo/v20220901/examples.json +8 -0
  40. tccli/services/thpc/v20220401/api.json +6 -6
  41. tccli/services/thpc/v20230321/api.json +14 -14
  42. tccli/services/wedata/v20210820/api.json +166 -12
  43. {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/METADATA +2 -2
  44. {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/RECORD +47 -47
  45. {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/WHEEL +0 -0
  46. {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/entry_points.txt +0 -0
  47. {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/license_files/LICENSE +0 -0
tccli/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = '3.0.1291.1'
1
+ __version__ = '3.0.1292.1'
@@ -537,58 +537,6 @@ def doDescribeCcBlackWhiteIpList(args, parsed_globals):
537
537
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
538
 
539
539
 
540
- def doDescribeBlackWhiteIpList(args, parsed_globals):
541
- g_param = parse_global_arg(parsed_globals)
542
-
543
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
544
- cred = credential.CVMRoleCredential()
545
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
546
- cred = credential.STSAssumeRoleCredential(
547
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
- )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
- else:
553
- cred = credential.Credential(
554
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
555
- )
556
- http_profile = HttpProfile(
557
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
558
- reqMethod="POST",
559
- endpoint=g_param[OptionsDefine.Endpoint],
560
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
- )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
563
- if g_param[OptionsDefine.Language]:
564
- profile.language = g_param[OptionsDefine.Language]
565
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
566
- client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
567
- client._sdkVersion += ("_CLI_" + __version__)
568
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.DescribeBlackWhiteIpListRequest()
570
- model.from_json_string(json.dumps(args))
571
- start_time = time.time()
572
- while True:
573
- rsp = client.DescribeBlackWhiteIpList(model)
574
- result = rsp.to_json_string()
575
- try:
576
- json_obj = json.loads(result)
577
- except TypeError as e:
578
- json_obj = json.loads(result.decode('utf-8')) # python3.3
579
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
580
- break
581
- cur_time = time.time()
582
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
583
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
584
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
585
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
586
- else:
587
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
588
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
589
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
-
591
-
592
540
  def doDescribeCCLevelList(args, parsed_globals):
593
541
  g_param = parse_global_arg(parsed_globals)
594
542
 
@@ -4541,58 +4489,6 @@ def doDeleteCcBlackWhiteIpList(args, parsed_globals):
4541
4489
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4542
4490
 
4543
4491
 
4544
- def doDescribeListProtectThresholdConfig(args, parsed_globals):
4545
- g_param = parse_global_arg(parsed_globals)
4546
-
4547
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4548
- cred = credential.CVMRoleCredential()
4549
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4550
- cred = credential.STSAssumeRoleCredential(
4551
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4552
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4553
- )
4554
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4555
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4556
- else:
4557
- cred = credential.Credential(
4558
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4559
- )
4560
- http_profile = HttpProfile(
4561
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4562
- reqMethod="POST",
4563
- endpoint=g_param[OptionsDefine.Endpoint],
4564
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4565
- )
4566
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4567
- if g_param[OptionsDefine.Language]:
4568
- profile.language = g_param[OptionsDefine.Language]
4569
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4570
- client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
4571
- client._sdkVersion += ("_CLI_" + __version__)
4572
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
4573
- model = models.DescribeListProtectThresholdConfigRequest()
4574
- model.from_json_string(json.dumps(args))
4575
- start_time = time.time()
4576
- while True:
4577
- rsp = client.DescribeListProtectThresholdConfig(model)
4578
- result = rsp.to_json_string()
4579
- try:
4580
- json_obj = json.loads(result)
4581
- except TypeError as e:
4582
- json_obj = json.loads(result.decode('utf-8')) # python3.3
4583
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4584
- break
4585
- cur_time = time.time()
4586
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4587
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4588
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4589
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4590
- else:
4591
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4592
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4593
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4594
-
4595
-
4596
4492
  def doDeleteCCPrecisionPolicy(args, parsed_globals):
4597
4493
  g_param = parse_global_arg(parsed_globals)
4598
4494
 
@@ -4905,7 +4801,7 @@ def doCreateWaterPrintKey(args, parsed_globals):
4905
4801
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4906
4802
 
4907
4803
 
4908
- def doDeleteCCRequestLimitPolicy(args, parsed_globals):
4804
+ def doModifyDDoSGeoIPBlockConfig(args, parsed_globals):
4909
4805
  g_param = parse_global_arg(parsed_globals)
4910
4806
 
4911
4807
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4934,11 +4830,11 @@ def doDeleteCCRequestLimitPolicy(args, parsed_globals):
4934
4830
  client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
4935
4831
  client._sdkVersion += ("_CLI_" + __version__)
4936
4832
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4937
- model = models.DeleteCCRequestLimitPolicyRequest()
4833
+ model = models.ModifyDDoSGeoIPBlockConfigRequest()
4938
4834
  model.from_json_string(json.dumps(args))
4939
4835
  start_time = time.time()
4940
4836
  while True:
4941
- rsp = client.DeleteCCRequestLimitPolicy(model)
4837
+ rsp = client.ModifyDDoSGeoIPBlockConfig(model)
4942
4838
  result = rsp.to_json_string()
4943
4839
  try:
4944
4840
  json_obj = json.loads(result)
@@ -4957,7 +4853,7 @@ def doDeleteCCRequestLimitPolicy(args, parsed_globals):
4957
4853
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4958
4854
 
4959
4855
 
4960
- def doModifyDDoSGeoIPBlockConfig(args, parsed_globals):
4856
+ def doDeleteCCRequestLimitPolicy(args, parsed_globals):
4961
4857
  g_param = parse_global_arg(parsed_globals)
4962
4858
 
4963
4859
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4986,11 +4882,11 @@ def doModifyDDoSGeoIPBlockConfig(args, parsed_globals):
4986
4882
  client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
4987
4883
  client._sdkVersion += ("_CLI_" + __version__)
4988
4884
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4989
- model = models.ModifyDDoSGeoIPBlockConfigRequest()
4885
+ model = models.DeleteCCRequestLimitPolicyRequest()
4990
4886
  model.from_json_string(json.dumps(args))
4991
4887
  start_time = time.time()
4992
4888
  while True:
4993
- rsp = client.ModifyDDoSGeoIPBlockConfig(model)
4889
+ rsp = client.DeleteCCRequestLimitPolicy(model)
4994
4890
  result = rsp.to_json_string()
4995
4891
  try:
4996
4892
  json_obj = json.loads(result)
@@ -5030,7 +4926,6 @@ ACTION_MAP = {
5030
4926
  "DescribeDDoSConnectLimitList": doDescribeDDoSConnectLimitList,
5031
4927
  "DescribeNewL7RulesErrHealth": doDescribeNewL7RulesErrHealth,
5032
4928
  "DescribeCcBlackWhiteIpList": doDescribeCcBlackWhiteIpList,
5033
- "DescribeBlackWhiteIpList": doDescribeBlackWhiteIpList,
5034
4929
  "DescribeCCLevelList": doDescribeCCLevelList,
5035
4930
  "CreateCCPrecisionPolicy": doCreateCCPrecisionPolicy,
5036
4931
  "DescribeCCThresholdList": doDescribeCCThresholdList,
@@ -5107,15 +5002,14 @@ ACTION_MAP = {
5107
5002
  "CreateDDoSBlackWhiteIpList": doCreateDDoSBlackWhiteIpList,
5108
5003
  "DescribeCCTrend": doDescribeCCTrend,
5109
5004
  "DeleteCcBlackWhiteIpList": doDeleteCcBlackWhiteIpList,
5110
- "DescribeListProtectThresholdConfig": doDescribeListProtectThresholdConfig,
5111
5005
  "DeleteCCPrecisionPolicy": doDeleteCCPrecisionPolicy,
5112
5006
  "DescribeDDoSBlackWhiteIpList": doDescribeDDoSBlackWhiteIpList,
5113
5007
  "CreateDDoSConnectLimit": doCreateDDoSConnectLimit,
5114
5008
  "CreateDDoSGeoIPBlockConfig": doCreateDDoSGeoIPBlockConfig,
5115
5009
  "DescribeCcGeoIPBlockConfigList": doDescribeCcGeoIPBlockConfigList,
5116
5010
  "CreateWaterPrintKey": doCreateWaterPrintKey,
5117
- "DeleteCCRequestLimitPolicy": doDeleteCCRequestLimitPolicy,
5118
5011
  "ModifyDDoSGeoIPBlockConfig": doModifyDDoSGeoIPBlockConfig,
5012
+ "DeleteCCRequestLimitPolicy": doDeleteCCRequestLimitPolicy,
5119
5013
 
5120
5014
  }
5121
5015