tccli 3.0.1291.1__py2.py3-none-any.whl → 3.0.1292.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/antiddos/antiddos_client.py +7 -113
- tccli/services/antiddos/v20200309/api.json +41 -401
- tccli/services/antiddos/v20200309/examples.json +1 -17
- tccli/services/apm/v20210622/api.json +44 -44
- tccli/services/apm/v20210622/examples.json +5 -5
- tccli/services/batch/v20170312/api.json +161 -161
- tccli/services/batch/v20170312/examples.json +1 -1
- tccli/services/cdwch/v20200915/api.json +303 -219
- tccli/services/cdwch/v20200915/examples.json +18 -18
- tccli/services/cdwpg/v20201230/api.json +21 -21
- tccli/services/cdwpg/v20201230/examples.json +2 -2
- tccli/services/ckafka/v20190819/api.json +1015 -1005
- tccli/services/cls/v20201016/api.json +112 -112
- tccli/services/dbbrain/v20191016/api.json +2 -2
- tccli/services/dbbrain/v20210527/api.json +14 -5
- tccli/services/emr/v20190103/api.json +249 -13
- tccli/services/emr/v20190103/examples.json +2 -2
- tccli/services/hunyuan/v20230901/api.json +13 -2
- tccli/services/iotexplorer/iotexplorer_client.py +53 -0
- tccli/services/iotexplorer/v20190423/api.json +72 -0
- tccli/services/iotexplorer/v20190423/examples.json +8 -0
- tccli/services/iotvideoindustry/v20201201/api.json +75 -75
- tccli/services/iotvideoindustry/v20201201/examples.json +1 -1
- tccli/services/lke/lke_client.py +0 -53
- tccli/services/lke/v20231130/api.json +0 -43
- tccli/services/lke/v20231130/examples.json +0 -8
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/memcached/v20190318/api.json +1 -1
- tccli/services/monitor/monitor_client.py +57 -4
- tccli/services/monitor/v20180724/api.json +249 -0
- tccli/services/monitor/v20180724/examples.json +8 -0
- tccli/services/redis/v20180412/api.json +2 -2
- tccli/services/svp/v20240125/api.json +3 -3
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/tdmq/v20200217/api.json +266 -266
- tccli/services/teo/teo_client.py +53 -0
- tccli/services/teo/v20220901/api.json +50 -7
- tccli/services/teo/v20220901/examples.json +8 -0
- tccli/services/thpc/v20220401/api.json +6 -6
- tccli/services/thpc/v20230321/api.json +14 -14
- tccli/services/wedata/v20210820/api.json +166 -12
- {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/RECORD +47 -47
- {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1291.1.dist-info → tccli-3.0.1292.1.dist-info}/license_files/LICENSE +0 -0
tccli/__init__.py
CHANGED
@@ -1 +1 @@
|
|
1
|
-
__version__ = '3.0.
|
1
|
+
__version__ = '3.0.1292.1'
|
@@ -537,58 +537,6 @@ def doDescribeCcBlackWhiteIpList(args, parsed_globals):
|
|
537
537
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
538
538
|
|
539
539
|
|
540
|
-
def doDescribeBlackWhiteIpList(args, parsed_globals):
|
541
|
-
g_param = parse_global_arg(parsed_globals)
|
542
|
-
|
543
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
544
|
-
cred = credential.CVMRoleCredential()
|
545
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
546
|
-
cred = credential.STSAssumeRoleCredential(
|
547
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
548
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
549
|
-
)
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
551
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
552
|
-
else:
|
553
|
-
cred = credential.Credential(
|
554
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
555
|
-
)
|
556
|
-
http_profile = HttpProfile(
|
557
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
558
|
-
reqMethod="POST",
|
559
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
560
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
561
|
-
)
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
563
|
-
if g_param[OptionsDefine.Language]:
|
564
|
-
profile.language = g_param[OptionsDefine.Language]
|
565
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
566
|
-
client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
|
567
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
568
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
569
|
-
model = models.DescribeBlackWhiteIpListRequest()
|
570
|
-
model.from_json_string(json.dumps(args))
|
571
|
-
start_time = time.time()
|
572
|
-
while True:
|
573
|
-
rsp = client.DescribeBlackWhiteIpList(model)
|
574
|
-
result = rsp.to_json_string()
|
575
|
-
try:
|
576
|
-
json_obj = json.loads(result)
|
577
|
-
except TypeError as e:
|
578
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
579
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
580
|
-
break
|
581
|
-
cur_time = time.time()
|
582
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
583
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
584
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
585
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
586
|
-
else:
|
587
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
588
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
589
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
590
|
-
|
591
|
-
|
592
540
|
def doDescribeCCLevelList(args, parsed_globals):
|
593
541
|
g_param = parse_global_arg(parsed_globals)
|
594
542
|
|
@@ -4541,58 +4489,6 @@ def doDeleteCcBlackWhiteIpList(args, parsed_globals):
|
|
4541
4489
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4542
4490
|
|
4543
4491
|
|
4544
|
-
def doDescribeListProtectThresholdConfig(args, parsed_globals):
|
4545
|
-
g_param = parse_global_arg(parsed_globals)
|
4546
|
-
|
4547
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4548
|
-
cred = credential.CVMRoleCredential()
|
4549
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4550
|
-
cred = credential.STSAssumeRoleCredential(
|
4551
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4552
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4553
|
-
)
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4555
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4556
|
-
else:
|
4557
|
-
cred = credential.Credential(
|
4558
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4559
|
-
)
|
4560
|
-
http_profile = HttpProfile(
|
4561
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4562
|
-
reqMethod="POST",
|
4563
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
4564
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4565
|
-
)
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4567
|
-
if g_param[OptionsDefine.Language]:
|
4568
|
-
profile.language = g_param[OptionsDefine.Language]
|
4569
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4570
|
-
client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
|
4571
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
4572
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4573
|
-
model = models.DescribeListProtectThresholdConfigRequest()
|
4574
|
-
model.from_json_string(json.dumps(args))
|
4575
|
-
start_time = time.time()
|
4576
|
-
while True:
|
4577
|
-
rsp = client.DescribeListProtectThresholdConfig(model)
|
4578
|
-
result = rsp.to_json_string()
|
4579
|
-
try:
|
4580
|
-
json_obj = json.loads(result)
|
4581
|
-
except TypeError as e:
|
4582
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4583
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4584
|
-
break
|
4585
|
-
cur_time = time.time()
|
4586
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4587
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4588
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4589
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4590
|
-
else:
|
4591
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4592
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4593
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4594
|
-
|
4595
|
-
|
4596
4492
|
def doDeleteCCPrecisionPolicy(args, parsed_globals):
|
4597
4493
|
g_param = parse_global_arg(parsed_globals)
|
4598
4494
|
|
@@ -4905,7 +4801,7 @@ def doCreateWaterPrintKey(args, parsed_globals):
|
|
4905
4801
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4906
4802
|
|
4907
4803
|
|
4908
|
-
def
|
4804
|
+
def doModifyDDoSGeoIPBlockConfig(args, parsed_globals):
|
4909
4805
|
g_param = parse_global_arg(parsed_globals)
|
4910
4806
|
|
4911
4807
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4934,11 +4830,11 @@ def doDeleteCCRequestLimitPolicy(args, parsed_globals):
|
|
4934
4830
|
client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
|
4935
4831
|
client._sdkVersion += ("_CLI_" + __version__)
|
4936
4832
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4937
|
-
model = models.
|
4833
|
+
model = models.ModifyDDoSGeoIPBlockConfigRequest()
|
4938
4834
|
model.from_json_string(json.dumps(args))
|
4939
4835
|
start_time = time.time()
|
4940
4836
|
while True:
|
4941
|
-
rsp = client.
|
4837
|
+
rsp = client.ModifyDDoSGeoIPBlockConfig(model)
|
4942
4838
|
result = rsp.to_json_string()
|
4943
4839
|
try:
|
4944
4840
|
json_obj = json.loads(result)
|
@@ -4957,7 +4853,7 @@ def doDeleteCCRequestLimitPolicy(args, parsed_globals):
|
|
4957
4853
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4958
4854
|
|
4959
4855
|
|
4960
|
-
def
|
4856
|
+
def doDeleteCCRequestLimitPolicy(args, parsed_globals):
|
4961
4857
|
g_param = parse_global_arg(parsed_globals)
|
4962
4858
|
|
4963
4859
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4986,11 +4882,11 @@ def doModifyDDoSGeoIPBlockConfig(args, parsed_globals):
|
|
4986
4882
|
client = mod.AntiddosClient(cred, g_param[OptionsDefine.Region], profile)
|
4987
4883
|
client._sdkVersion += ("_CLI_" + __version__)
|
4988
4884
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4989
|
-
model = models.
|
4885
|
+
model = models.DeleteCCRequestLimitPolicyRequest()
|
4990
4886
|
model.from_json_string(json.dumps(args))
|
4991
4887
|
start_time = time.time()
|
4992
4888
|
while True:
|
4993
|
-
rsp = client.
|
4889
|
+
rsp = client.DeleteCCRequestLimitPolicy(model)
|
4994
4890
|
result = rsp.to_json_string()
|
4995
4891
|
try:
|
4996
4892
|
json_obj = json.loads(result)
|
@@ -5030,7 +4926,6 @@ ACTION_MAP = {
|
|
5030
4926
|
"DescribeDDoSConnectLimitList": doDescribeDDoSConnectLimitList,
|
5031
4927
|
"DescribeNewL7RulesErrHealth": doDescribeNewL7RulesErrHealth,
|
5032
4928
|
"DescribeCcBlackWhiteIpList": doDescribeCcBlackWhiteIpList,
|
5033
|
-
"DescribeBlackWhiteIpList": doDescribeBlackWhiteIpList,
|
5034
4929
|
"DescribeCCLevelList": doDescribeCCLevelList,
|
5035
4930
|
"CreateCCPrecisionPolicy": doCreateCCPrecisionPolicy,
|
5036
4931
|
"DescribeCCThresholdList": doDescribeCCThresholdList,
|
@@ -5107,15 +5002,14 @@ ACTION_MAP = {
|
|
5107
5002
|
"CreateDDoSBlackWhiteIpList": doCreateDDoSBlackWhiteIpList,
|
5108
5003
|
"DescribeCCTrend": doDescribeCCTrend,
|
5109
5004
|
"DeleteCcBlackWhiteIpList": doDeleteCcBlackWhiteIpList,
|
5110
|
-
"DescribeListProtectThresholdConfig": doDescribeListProtectThresholdConfig,
|
5111
5005
|
"DeleteCCPrecisionPolicy": doDeleteCCPrecisionPolicy,
|
5112
5006
|
"DescribeDDoSBlackWhiteIpList": doDescribeDDoSBlackWhiteIpList,
|
5113
5007
|
"CreateDDoSConnectLimit": doCreateDDoSConnectLimit,
|
5114
5008
|
"CreateDDoSGeoIPBlockConfig": doCreateDDoSGeoIPBlockConfig,
|
5115
5009
|
"DescribeCcGeoIPBlockConfigList": doDescribeCcGeoIPBlockConfigList,
|
5116
5010
|
"CreateWaterPrintKey": doCreateWaterPrintKey,
|
5117
|
-
"DeleteCCRequestLimitPolicy": doDeleteCCRequestLimitPolicy,
|
5118
5011
|
"ModifyDDoSGeoIPBlockConfig": doModifyDDoSGeoIPBlockConfig,
|
5012
|
+
"DeleteCCRequestLimitPolicy": doDeleteCCRequestLimitPolicy,
|
5119
5013
|
|
5120
5014
|
}
|
5121
5015
|
|