tccli 3.0.1330.1__py2.py3-none-any.whl → 3.0.1333.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/asr/v20190614/api.json +1 -1
  3. tccli/services/autoscaling/v20180419/api.json +1 -1
  4. tccli/services/bmvpc/v20180625/api.json +36 -36
  5. tccli/services/ccc/ccc_client.py +53 -0
  6. tccli/services/ccc/v20200210/api.json +71 -2
  7. tccli/services/ccc/v20200210/examples.json +8 -0
  8. tccli/services/cdb/v20170320/api.json +37 -37
  9. tccli/services/cdn/v20180606/api.json +5 -5
  10. tccli/services/cdn/v20180606/examples.json +5 -5
  11. tccli/services/cfw/v20190904/api.json +1 -1
  12. tccli/services/ckafka/v20190819/api.json +11 -1
  13. tccli/services/clb/v20180317/api.json +18 -0
  14. tccli/services/cwp/v20180228/api.json +4 -4
  15. tccli/services/dbbrain/v20210527/api.json +1 -0
  16. tccli/services/dc/v20180410/api.json +39 -0
  17. tccli/services/dnspod/dnspod_client.py +106 -0
  18. tccli/services/dnspod/v20210323/api.json +509 -2
  19. tccli/services/dnspod/v20210323/examples.json +17 -1
  20. tccli/services/emr/v20190103/api.json +2 -2
  21. tccli/services/ess/ess_client.py +57 -4
  22. tccli/services/ess/v20201111/api.json +63 -2
  23. tccli/services/ess/v20201111/examples.json +8 -0
  24. tccli/services/essbasic/v20210526/api.json +3 -3
  25. tccli/services/faceid/v20180301/api.json +4 -4
  26. tccli/services/goosefs/v20220519/api.json +2 -2
  27. tccli/services/gs/gs_client.py +163 -4
  28. tccli/services/gs/v20191118/api.json +216 -0
  29. tccli/services/gs/v20191118/examples.json +24 -0
  30. tccli/services/ioa/ioa_client.py +167 -8
  31. tccli/services/ioa/v20220601/api.json +541 -1
  32. tccli/services/ioa/v20220601/examples.json +42 -0
  33. tccli/services/iotexplorer/v20190423/api.json +12 -12
  34. tccli/services/iotexplorer/v20190423/examples.json +2 -2
  35. tccli/services/live/v20180801/api.json +3 -3
  36. tccli/services/lke/lke_client.py +699 -63
  37. tccli/services/lke/v20231130/api.json +1754 -79
  38. tccli/services/lke/v20231130/examples.json +96 -0
  39. tccli/services/lkeap/v20240522/examples.json +5 -5
  40. tccli/services/lowcode/v20210108/api.json +41 -1
  41. tccli/services/lowcode/v20210108/examples.json +2 -2
  42. tccli/services/ocr/ocr_client.py +532 -320
  43. tccli/services/ocr/v20181119/api.json +545 -8
  44. tccli/services/ocr/v20181119/examples.json +32 -0
  45. tccli/services/sms/v20190711/api.json +4 -4
  46. tccli/services/sms/v20210111/api.json +4 -4
  47. tccli/services/ssl/v20191205/api.json +4 -4
  48. tccli/services/ssl/v20191205/examples.json +1 -1
  49. tccli/services/tat/v20201028/api.json +1 -1
  50. tccli/services/teo/v20220901/api.json +1 -1
  51. tccli/services/tke/tke_client.py +106 -0
  52. tccli/services/tke/v20180525/api.json +124 -0
  53. tccli/services/tke/v20180525/examples.json +16 -0
  54. tccli/services/trtc/v20190722/api.json +2 -2
  55. tccli/services/tsf/v20180326/api.json +46 -17
  56. tccli/services/tsf/v20180326/examples.json +10 -10
  57. tccli/services/vpc/v20170312/api.json +5 -5
  58. tccli/services/vpc/v20170312/examples.json +6 -6
  59. {tccli-3.0.1330.1.dist-info → tccli-3.0.1333.1.dist-info}/METADATA +2 -2
  60. {tccli-3.0.1330.1.dist-info → tccli-3.0.1333.1.dist-info}/RECORD +63 -63
  61. {tccli-3.0.1330.1.dist-info → tccli-3.0.1333.1.dist-info}/WHEEL +0 -0
  62. {tccli-3.0.1330.1.dist-info → tccli-3.0.1333.1.dist-info}/entry_points.txt +0 -0
  63. {tccli-3.0.1330.1.dist-info → tccli-3.0.1333.1.dist-info}/license_files/LICENSE +0 -0
@@ -121,7 +121,7 @@ def doDescribeLocalAccounts(args, parsed_globals):
121
121
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
122
122
 
123
123
 
124
- def doCreatePrivilegeCode(args, parsed_globals):
124
+ def doCreateDeviceTask(args, parsed_globals):
125
125
  g_param = parse_global_arg(parsed_globals)
126
126
 
127
127
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -150,11 +150,11 @@ def doCreatePrivilegeCode(args, parsed_globals):
150
150
  client = mod.IoaClient(cred, g_param[OptionsDefine.Region], profile)
151
151
  client._sdkVersion += ("_CLI_" + __version__)
152
152
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
153
- model = models.CreatePrivilegeCodeRequest()
153
+ model = models.CreateDeviceTaskRequest()
154
154
  model.from_json_string(json.dumps(args))
155
155
  start_time = time.time()
156
156
  while True:
157
- rsp = client.CreatePrivilegeCode(model)
157
+ rsp = client.CreateDeviceTask(model)
158
158
  result = rsp.to_json_string()
159
159
  try:
160
160
  json_obj = json.loads(result)
@@ -277,7 +277,7 @@ def doCreateDLPFileDetectionTask(args, parsed_globals):
277
277
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
278
278
 
279
279
 
280
- def doDescribeSoftCensusListByDevice(args, parsed_globals):
280
+ def doCreatePrivilegeCode(args, parsed_globals):
281
281
  g_param = parse_global_arg(parsed_globals)
282
282
 
283
283
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -306,11 +306,115 @@ def doDescribeSoftCensusListByDevice(args, parsed_globals):
306
306
  client = mod.IoaClient(cred, g_param[OptionsDefine.Region], profile)
307
307
  client._sdkVersion += ("_CLI_" + __version__)
308
308
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.DescribeSoftCensusListByDeviceRequest()
309
+ model = models.CreatePrivilegeCodeRequest()
310
310
  model.from_json_string(json.dumps(args))
311
311
  start_time = time.time()
312
312
  while True:
313
- rsp = client.DescribeSoftCensusListByDevice(model)
313
+ rsp = client.CreatePrivilegeCode(model)
314
+ result = rsp.to_json_string()
315
+ try:
316
+ json_obj = json.loads(result)
317
+ except TypeError as e:
318
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
319
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
320
+ break
321
+ cur_time = time.time()
322
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
323
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
324
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
325
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
326
+ else:
327
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
328
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
329
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
+
331
+
332
+ def doDescribeDeviceInfo(args, parsed_globals):
333
+ g_param = parse_global_arg(parsed_globals)
334
+
335
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
336
+ cred = credential.CVMRoleCredential()
337
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
338
+ cred = credential.STSAssumeRoleCredential(
339
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
+ )
342
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
+ else:
345
+ cred = credential.Credential(
346
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
347
+ )
348
+ http_profile = HttpProfile(
349
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
350
+ reqMethod="POST",
351
+ endpoint=g_param[OptionsDefine.Endpoint],
352
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
+ )
354
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
355
+ if g_param[OptionsDefine.Language]:
356
+ profile.language = g_param[OptionsDefine.Language]
357
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
+ client = mod.IoaClient(cred, g_param[OptionsDefine.Region], profile)
359
+ client._sdkVersion += ("_CLI_" + __version__)
360
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
+ model = models.DescribeDeviceInfoRequest()
362
+ model.from_json_string(json.dumps(args))
363
+ start_time = time.time()
364
+ while True:
365
+ rsp = client.DescribeDeviceInfo(model)
366
+ result = rsp.to_json_string()
367
+ try:
368
+ json_obj = json.loads(result)
369
+ except TypeError as e:
370
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
371
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
372
+ break
373
+ cur_time = time.time()
374
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
375
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
376
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
377
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
378
+ else:
379
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
380
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
381
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
+
383
+
384
+ def doDescribeSoftwareInformation(args, parsed_globals):
385
+ g_param = parse_global_arg(parsed_globals)
386
+
387
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
388
+ cred = credential.CVMRoleCredential()
389
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
390
+ cred = credential.STSAssumeRoleCredential(
391
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
+ )
394
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
+ else:
397
+ cred = credential.Credential(
398
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
399
+ )
400
+ http_profile = HttpProfile(
401
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
402
+ reqMethod="POST",
403
+ endpoint=g_param[OptionsDefine.Endpoint],
404
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
+ )
406
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
407
+ if g_param[OptionsDefine.Language]:
408
+ profile.language = g_param[OptionsDefine.Language]
409
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
+ client = mod.IoaClient(cred, g_param[OptionsDefine.Region], profile)
411
+ client._sdkVersion += ("_CLI_" + __version__)
412
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
+ model = models.DescribeSoftwareInformationRequest()
414
+ model.from_json_string(json.dumps(args))
415
+ start_time = time.time()
416
+ while True:
417
+ rsp = client.DescribeSoftwareInformation(model)
314
418
  result = rsp.to_json_string()
315
419
  try:
316
420
  json_obj = json.loads(result)
@@ -485,6 +589,58 @@ def doDescribeDLPFileDetectResult(args, parsed_globals):
485
589
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
590
 
487
591
 
592
+ def doDescribeSoftCensusListByDevice(args, parsed_globals):
593
+ g_param = parse_global_arg(parsed_globals)
594
+
595
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
596
+ cred = credential.CVMRoleCredential()
597
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
598
+ cred = credential.STSAssumeRoleCredential(
599
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
+ )
602
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
+ else:
605
+ cred = credential.Credential(
606
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
607
+ )
608
+ http_profile = HttpProfile(
609
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
610
+ reqMethod="POST",
611
+ endpoint=g_param[OptionsDefine.Endpoint],
612
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
+ )
614
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
615
+ if g_param[OptionsDefine.Language]:
616
+ profile.language = g_param[OptionsDefine.Language]
617
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
618
+ client = mod.IoaClient(cred, g_param[OptionsDefine.Region], profile)
619
+ client._sdkVersion += ("_CLI_" + __version__)
620
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
+ model = models.DescribeSoftCensusListByDeviceRequest()
622
+ model.from_json_string(json.dumps(args))
623
+ start_time = time.time()
624
+ while True:
625
+ rsp = client.DescribeSoftCensusListByDevice(model)
626
+ result = rsp.to_json_string()
627
+ try:
628
+ json_obj = json.loads(result)
629
+ except TypeError as e:
630
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
631
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
632
+ break
633
+ cur_time = time.time()
634
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
635
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
636
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
637
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
638
+ else:
639
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
640
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
641
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
+
643
+
488
644
  def doDescribeAccountGroups(args, parsed_globals):
489
645
  g_param = parse_global_arg(parsed_globals)
490
646
 
@@ -550,13 +706,16 @@ MODELS_MAP = {
550
706
  ACTION_MAP = {
551
707
  "CreateDeviceVirtualGroup": doCreateDeviceVirtualGroup,
552
708
  "DescribeLocalAccounts": doDescribeLocalAccounts,
553
- "CreatePrivilegeCode": doCreatePrivilegeCode,
709
+ "CreateDeviceTask": doCreateDeviceTask,
554
710
  "DescribeDevices": doDescribeDevices,
555
711
  "CreateDLPFileDetectionTask": doCreateDLPFileDetectionTask,
556
- "DescribeSoftCensusListByDevice": doDescribeSoftCensusListByDevice,
712
+ "CreatePrivilegeCode": doCreatePrivilegeCode,
713
+ "DescribeDeviceInfo": doDescribeDeviceInfo,
714
+ "DescribeSoftwareInformation": doDescribeSoftwareInformation,
557
715
  "DescribeDeviceHardwareInfoList": doDescribeDeviceHardwareInfoList,
558
716
  "DescribeRootAccountGroup": doDescribeRootAccountGroup,
559
717
  "DescribeDLPFileDetectResult": doDescribeDLPFileDetectResult,
718
+ "DescribeSoftCensusListByDevice": doDescribeSoftCensusListByDevice,
560
719
  "DescribeAccountGroups": doDescribeAccountGroups,
561
720
 
562
721
  }