tccli 3.0.1337.1__py2.py3-none-any.whl → 3.0.1339.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/apm/v20210622/api.json +10 -0
  3. tccli/services/asr/v20190614/api.json +1 -1
  4. tccli/services/ccc/v20200210/api.json +100 -1
  5. tccli/services/cdb/v20170320/api.json +37 -37
  6. tccli/services/cdb/v20170320/examples.json +7 -7
  7. tccli/services/cdn/v20180606/api.json +2 -2
  8. tccli/services/cdwdoris/v20211228/api.json +2 -2
  9. tccli/services/cfs/v20190719/api.json +15 -3
  10. tccli/services/cfw/v20190904/examples.json +12 -0
  11. tccli/services/ckafka/v20190819/api.json +19 -0
  12. tccli/services/cls/v20201016/api.json +2 -2
  13. tccli/services/csip/csip_client.py +791 -102
  14. tccli/services/csip/v20221121/api.json +6108 -3458
  15. tccli/services/csip/v20221121/examples.json +104 -0
  16. tccli/services/dts/v20211206/api.json +11 -0
  17. tccli/services/es/v20180416/api.json +55 -0
  18. tccli/services/es/v20250101/api.json +21 -0
  19. tccli/services/ess/ess_client.py +159 -0
  20. tccli/services/ess/v20201111/api.json +284 -4
  21. tccli/services/ess/v20201111/examples.json +28 -4
  22. tccli/services/essbasic/essbasic_client.py +171 -12
  23. tccli/services/essbasic/v20210526/api.json +256 -5
  24. tccli/services/essbasic/v20210526/examples.json +25 -1
  25. tccli/services/gwlb/v20240906/api.json +1 -1
  26. tccli/services/gwlb/v20240906/examples.json +1 -1
  27. tccli/services/hunyuan/v20230901/api.json +3 -3
  28. tccli/services/ioa/v20220601/api.json +55 -0
  29. tccli/services/ioa/v20220601/examples.json +1 -1
  30. tccli/services/iotexplorer/iotexplorer_client.py +57 -4
  31. tccli/services/iotexplorer/v20190423/api.json +145 -19
  32. tccli/services/iotexplorer/v20190423/examples.json +8 -0
  33. tccli/services/live/live_client.py +208 -49
  34. tccli/services/live/v20180801/api.json +498 -73
  35. tccli/services/live/v20180801/examples.json +35 -11
  36. tccli/services/lkeap/lkeap_client.py +0 -53
  37. tccli/services/lkeap/v20240522/api.json +0 -90
  38. tccli/services/lkeap/v20240522/examples.json +0 -8
  39. tccli/services/ocr/v20181119/api.json +21 -1
  40. tccli/services/ocr/v20181119/examples.json +1 -1
  41. tccli/services/ssl/ssl_client.py +212 -0
  42. tccli/services/ssl/v20191205/api.json +625 -10
  43. tccli/services/ssl/v20191205/examples.json +38 -0
  44. tccli/services/tcbr/v20220217/api.json +11 -0
  45. tccli/services/tdmq/v20200217/api.json +56 -47
  46. tccli/services/tdmq/v20200217/examples.json +8 -8
  47. tccli/services/trocket/trocket_client.py +104 -51
  48. tccli/services/trocket/v20230308/api.json +238 -61
  49. tccli/services/trocket/v20230308/examples.json +20 -12
  50. tccli/services/trtc/v20190722/api.json +3 -3
  51. tccli/services/tse/v20201207/api.json +19 -0
  52. tccli/services/tsf/v20180326/api.json +1 -1
  53. tccli/services/wedata/v20210820/api.json +607 -3
  54. tccli/services/wedata/v20210820/examples.json +18 -8
  55. tccli/services/wedata/wedata_client.py +106 -0
  56. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/METADATA +2 -2
  57. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/RECORD +60 -60
  58. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/WHEEL +0 -0
  59. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/entry_points.txt +0 -0
  60. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/license_files/LICENSE +0 -0
@@ -329,6 +329,162 @@ def doUploadRevokeLetter(args, parsed_globals):
329
329
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
330
 
331
331
 
332
+ def doDescribeHostUploadUpdateRecord(args, parsed_globals):
333
+ g_param = parse_global_arg(parsed_globals)
334
+
335
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
336
+ cred = credential.CVMRoleCredential()
337
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
338
+ cred = credential.STSAssumeRoleCredential(
339
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
+ )
342
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
+ else:
345
+ cred = credential.Credential(
346
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
347
+ )
348
+ http_profile = HttpProfile(
349
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
350
+ reqMethod="POST",
351
+ endpoint=g_param[OptionsDefine.Endpoint],
352
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
+ )
354
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
355
+ if g_param[OptionsDefine.Language]:
356
+ profile.language = g_param[OptionsDefine.Language]
357
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
+ client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
359
+ client._sdkVersion += ("_CLI_" + __version__)
360
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
+ model = models.DescribeHostUploadUpdateRecordRequest()
362
+ model.from_json_string(json.dumps(args))
363
+ start_time = time.time()
364
+ while True:
365
+ rsp = client.DescribeHostUploadUpdateRecord(model)
366
+ result = rsp.to_json_string()
367
+ try:
368
+ json_obj = json.loads(result)
369
+ except TypeError as e:
370
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
371
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
372
+ break
373
+ cur_time = time.time()
374
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
375
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
376
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
377
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
378
+ else:
379
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
380
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
381
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
+
383
+
384
+ def doUploadUpdateCertificateRecordRetry(args, parsed_globals):
385
+ g_param = parse_global_arg(parsed_globals)
386
+
387
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
388
+ cred = credential.CVMRoleCredential()
389
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
390
+ cred = credential.STSAssumeRoleCredential(
391
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
+ )
394
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
+ else:
397
+ cred = credential.Credential(
398
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
399
+ )
400
+ http_profile = HttpProfile(
401
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
402
+ reqMethod="POST",
403
+ endpoint=g_param[OptionsDefine.Endpoint],
404
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
+ )
406
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
407
+ if g_param[OptionsDefine.Language]:
408
+ profile.language = g_param[OptionsDefine.Language]
409
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
+ client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
411
+ client._sdkVersion += ("_CLI_" + __version__)
412
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
+ model = models.UploadUpdateCertificateRecordRetryRequest()
414
+ model.from_json_string(json.dumps(args))
415
+ start_time = time.time()
416
+ while True:
417
+ rsp = client.UploadUpdateCertificateRecordRetry(model)
418
+ result = rsp.to_json_string()
419
+ try:
420
+ json_obj = json.loads(result)
421
+ except TypeError as e:
422
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
423
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
424
+ break
425
+ cur_time = time.time()
426
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
427
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
428
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
429
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
430
+ else:
431
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
432
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
433
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
+
435
+
436
+ def doUploadUpdateCertificateRecordRollback(args, parsed_globals):
437
+ g_param = parse_global_arg(parsed_globals)
438
+
439
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
440
+ cred = credential.CVMRoleCredential()
441
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
442
+ cred = credential.STSAssumeRoleCredential(
443
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
+ )
446
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
+ else:
449
+ cred = credential.Credential(
450
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
451
+ )
452
+ http_profile = HttpProfile(
453
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
454
+ reqMethod="POST",
455
+ endpoint=g_param[OptionsDefine.Endpoint],
456
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
+ )
458
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
459
+ if g_param[OptionsDefine.Language]:
460
+ profile.language = g_param[OptionsDefine.Language]
461
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
462
+ client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
463
+ client._sdkVersion += ("_CLI_" + __version__)
464
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
+ model = models.UploadUpdateCertificateRecordRollbackRequest()
466
+ model.from_json_string(json.dumps(args))
467
+ start_time = time.time()
468
+ while True:
469
+ rsp = client.UploadUpdateCertificateRecordRollback(model)
470
+ result = rsp.to_json_string()
471
+ try:
472
+ json_obj = json.loads(result)
473
+ except TypeError as e:
474
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
475
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
476
+ break
477
+ cur_time = time.time()
478
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
479
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
480
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
481
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
482
+ else:
483
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
484
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
485
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
+
487
+
332
488
  def doDeleteManager(args, parsed_globals):
333
489
  g_param = parse_global_arg(parsed_globals)
334
490
 
@@ -2201,6 +2357,58 @@ def doDescribeHostDeployRecord(args, parsed_globals):
2201
2357
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2202
2358
 
2203
2359
 
2360
+ def doDescribeHostUploadUpdateRecordDetail(args, parsed_globals):
2361
+ g_param = parse_global_arg(parsed_globals)
2362
+
2363
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2364
+ cred = credential.CVMRoleCredential()
2365
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2366
+ cred = credential.STSAssumeRoleCredential(
2367
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
+ )
2370
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
+ else:
2373
+ cred = credential.Credential(
2374
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2375
+ )
2376
+ http_profile = HttpProfile(
2377
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2378
+ reqMethod="POST",
2379
+ endpoint=g_param[OptionsDefine.Endpoint],
2380
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
+ )
2382
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2383
+ if g_param[OptionsDefine.Language]:
2384
+ profile.language = g_param[OptionsDefine.Language]
2385
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2386
+ client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
2387
+ client._sdkVersion += ("_CLI_" + __version__)
2388
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
+ model = models.DescribeHostUploadUpdateRecordDetailRequest()
2390
+ model.from_json_string(json.dumps(args))
2391
+ start_time = time.time()
2392
+ while True:
2393
+ rsp = client.DescribeHostUploadUpdateRecordDetail(model)
2394
+ result = rsp.to_json_string()
2395
+ try:
2396
+ json_obj = json.loads(result)
2397
+ except TypeError as e:
2398
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2399
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2400
+ break
2401
+ cur_time = time.time()
2402
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2403
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2404
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2405
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2406
+ else:
2407
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2408
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2409
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
+
2411
+
2204
2412
  def doUpdateCertificateRecordRetry(args, parsed_globals):
2205
2413
  g_param = parse_global_arg(parsed_globals)
2206
2414
 
@@ -3362,6 +3570,9 @@ ACTION_MAP = {
3362
3570
  "CheckCertificateDomainVerification": doCheckCertificateDomainVerification,
3363
3571
  "DescribeHostTkeInstanceList": doDescribeHostTkeInstanceList,
3364
3572
  "UploadRevokeLetter": doUploadRevokeLetter,
3573
+ "DescribeHostUploadUpdateRecord": doDescribeHostUploadUpdateRecord,
3574
+ "UploadUpdateCertificateRecordRetry": doUploadUpdateCertificateRecordRetry,
3575
+ "UploadUpdateCertificateRecordRollback": doUploadUpdateCertificateRecordRollback,
3365
3576
  "DeleteManager": doDeleteManager,
3366
3577
  "CertificateInfoSubmit": doCertificateInfoSubmit,
3367
3578
  "DescribeDownloadCertificateUrl": doDescribeDownloadCertificateUrl,
@@ -3398,6 +3609,7 @@ ACTION_MAP = {
3398
3609
  "DescribeCertificateBindResourceTaskResult": doDescribeCertificateBindResourceTaskResult,
3399
3610
  "CancelAuditCertificate": doCancelAuditCertificate,
3400
3611
  "DescribeHostDeployRecord": doDescribeHostDeployRecord,
3612
+ "DescribeHostUploadUpdateRecordDetail": doDescribeHostUploadUpdateRecordDetail,
3401
3613
  "UpdateCertificateRecordRetry": doUpdateCertificateRecordRetry,
3402
3614
  "DescribeDeleteCertificatesTaskResult": doDescribeDeleteCertificatesTaskResult,
3403
3615
  "ModifyCertificateProject": doModifyCertificateProject,