tccli 3.0.1338.1__py2.py3-none-any.whl → 3.0.1339.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/apm/v20210622/api.json +10 -0
- tccli/services/ccc/v20200210/api.json +100 -1
- tccli/services/cdb/v20170320/api.json +37 -37
- tccli/services/cdb/v20170320/examples.json +7 -7
- tccli/services/cdn/v20180606/api.json +2 -2
- tccli/services/cfs/v20190719/api.json +9 -0
- tccli/services/cfw/v20190904/examples.json +12 -0
- tccli/services/ckafka/v20190819/api.json +19 -0
- tccli/services/cls/v20201016/api.json +1 -1
- tccli/services/csip/csip_client.py +791 -102
- tccli/services/csip/v20221121/api.json +6108 -3458
- tccli/services/csip/v20221121/examples.json +104 -0
- tccli/services/dts/v20211206/api.json +11 -0
- tccli/services/es/v20180416/api.json +55 -0
- tccli/services/ess/ess_client.py +53 -0
- tccli/services/ess/v20201111/api.json +115 -4
- tccli/services/ess/v20201111/examples.json +12 -4
- tccli/services/essbasic/essbasic_client.py +57 -4
- tccli/services/essbasic/v20210526/api.json +103 -3
- tccli/services/essbasic/v20210526/examples.json +9 -1
- tccli/services/gwlb/v20240906/api.json +1 -1
- tccli/services/gwlb/v20240906/examples.json +1 -1
- tccli/services/ioa/v20220601/api.json +55 -0
- tccli/services/ioa/v20220601/examples.json +1 -1
- tccli/services/iotexplorer/iotexplorer_client.py +57 -4
- tccli/services/iotexplorer/v20190423/api.json +145 -19
- tccli/services/iotexplorer/v20190423/examples.json +8 -0
- tccli/services/live/live_client.py +0 -106
- tccli/services/live/v20180801/api.json +14 -138
- tccli/services/live/v20180801/examples.json +0 -16
- tccli/services/lkeap/lkeap_client.py +0 -53
- tccli/services/lkeap/v20240522/api.json +0 -90
- tccli/services/lkeap/v20240522/examples.json +0 -8
- tccli/services/ocr/v20181119/api.json +21 -1
- tccli/services/ocr/v20181119/examples.json +1 -1
- tccli/services/ssl/ssl_client.py +212 -0
- tccli/services/ssl/v20191205/api.json +625 -10
- tccli/services/ssl/v20191205/examples.json +38 -0
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tdmq/v20200217/api.json +56 -47
- tccli/services/tdmq/v20200217/examples.json +8 -8
- tccli/services/trocket/v20230308/api.json +111 -92
- tccli/services/trocket/v20230308/examples.json +13 -13
- tccli/services/trtc/v20190722/api.json +3 -3
- tccli/services/tse/v20201207/api.json +19 -0
- tccli/services/tsf/v20180326/api.json +1 -1
- tccli/services/wedata/v20210820/api.json +607 -3
- tccli/services/wedata/v20210820/examples.json +18 -8
- tccli/services/wedata/wedata_client.py +106 -0
- {tccli-3.0.1338.1.dist-info → tccli-3.0.1339.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1338.1.dist-info → tccli-3.0.1339.1.dist-info}/RECORD +55 -55
- {tccli-3.0.1338.1.dist-info → tccli-3.0.1339.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1338.1.dist-info → tccli-3.0.1339.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1338.1.dist-info → tccli-3.0.1339.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/ssl/ssl_client.py
CHANGED
@@ -329,6 +329,162 @@ def doUploadRevokeLetter(args, parsed_globals):
|
|
329
329
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
330
330
|
|
331
331
|
|
332
|
+
def doDescribeHostUploadUpdateRecord(args, parsed_globals):
|
333
|
+
g_param = parse_global_arg(parsed_globals)
|
334
|
+
|
335
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
336
|
+
cred = credential.CVMRoleCredential()
|
337
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
338
|
+
cred = credential.STSAssumeRoleCredential(
|
339
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
340
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
341
|
+
)
|
342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
343
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
344
|
+
else:
|
345
|
+
cred = credential.Credential(
|
346
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
347
|
+
)
|
348
|
+
http_profile = HttpProfile(
|
349
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
350
|
+
reqMethod="POST",
|
351
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
352
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
353
|
+
)
|
354
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
355
|
+
if g_param[OptionsDefine.Language]:
|
356
|
+
profile.language = g_param[OptionsDefine.Language]
|
357
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
358
|
+
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
359
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
360
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
361
|
+
model = models.DescribeHostUploadUpdateRecordRequest()
|
362
|
+
model.from_json_string(json.dumps(args))
|
363
|
+
start_time = time.time()
|
364
|
+
while True:
|
365
|
+
rsp = client.DescribeHostUploadUpdateRecord(model)
|
366
|
+
result = rsp.to_json_string()
|
367
|
+
try:
|
368
|
+
json_obj = json.loads(result)
|
369
|
+
except TypeError as e:
|
370
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
371
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
372
|
+
break
|
373
|
+
cur_time = time.time()
|
374
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
375
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
376
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
377
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
378
|
+
else:
|
379
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
380
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
381
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
382
|
+
|
383
|
+
|
384
|
+
def doUploadUpdateCertificateRecordRetry(args, parsed_globals):
|
385
|
+
g_param = parse_global_arg(parsed_globals)
|
386
|
+
|
387
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
388
|
+
cred = credential.CVMRoleCredential()
|
389
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
390
|
+
cred = credential.STSAssumeRoleCredential(
|
391
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
392
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
393
|
+
)
|
394
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
395
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
396
|
+
else:
|
397
|
+
cred = credential.Credential(
|
398
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
399
|
+
)
|
400
|
+
http_profile = HttpProfile(
|
401
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
402
|
+
reqMethod="POST",
|
403
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
404
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
405
|
+
)
|
406
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
407
|
+
if g_param[OptionsDefine.Language]:
|
408
|
+
profile.language = g_param[OptionsDefine.Language]
|
409
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
410
|
+
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
411
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
412
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
413
|
+
model = models.UploadUpdateCertificateRecordRetryRequest()
|
414
|
+
model.from_json_string(json.dumps(args))
|
415
|
+
start_time = time.time()
|
416
|
+
while True:
|
417
|
+
rsp = client.UploadUpdateCertificateRecordRetry(model)
|
418
|
+
result = rsp.to_json_string()
|
419
|
+
try:
|
420
|
+
json_obj = json.loads(result)
|
421
|
+
except TypeError as e:
|
422
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
423
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
424
|
+
break
|
425
|
+
cur_time = time.time()
|
426
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
427
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
428
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
429
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
430
|
+
else:
|
431
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
432
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
433
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
434
|
+
|
435
|
+
|
436
|
+
def doUploadUpdateCertificateRecordRollback(args, parsed_globals):
|
437
|
+
g_param = parse_global_arg(parsed_globals)
|
438
|
+
|
439
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
440
|
+
cred = credential.CVMRoleCredential()
|
441
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
442
|
+
cred = credential.STSAssumeRoleCredential(
|
443
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
444
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
445
|
+
)
|
446
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
447
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
448
|
+
else:
|
449
|
+
cred = credential.Credential(
|
450
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
451
|
+
)
|
452
|
+
http_profile = HttpProfile(
|
453
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
454
|
+
reqMethod="POST",
|
455
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
456
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
457
|
+
)
|
458
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
459
|
+
if g_param[OptionsDefine.Language]:
|
460
|
+
profile.language = g_param[OptionsDefine.Language]
|
461
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
462
|
+
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
463
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
464
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
465
|
+
model = models.UploadUpdateCertificateRecordRollbackRequest()
|
466
|
+
model.from_json_string(json.dumps(args))
|
467
|
+
start_time = time.time()
|
468
|
+
while True:
|
469
|
+
rsp = client.UploadUpdateCertificateRecordRollback(model)
|
470
|
+
result = rsp.to_json_string()
|
471
|
+
try:
|
472
|
+
json_obj = json.loads(result)
|
473
|
+
except TypeError as e:
|
474
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
475
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
476
|
+
break
|
477
|
+
cur_time = time.time()
|
478
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
479
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
480
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
481
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
482
|
+
else:
|
483
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
484
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
485
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
486
|
+
|
487
|
+
|
332
488
|
def doDeleteManager(args, parsed_globals):
|
333
489
|
g_param = parse_global_arg(parsed_globals)
|
334
490
|
|
@@ -2201,6 +2357,58 @@ def doDescribeHostDeployRecord(args, parsed_globals):
|
|
2201
2357
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2202
2358
|
|
2203
2359
|
|
2360
|
+
def doDescribeHostUploadUpdateRecordDetail(args, parsed_globals):
|
2361
|
+
g_param = parse_global_arg(parsed_globals)
|
2362
|
+
|
2363
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2364
|
+
cred = credential.CVMRoleCredential()
|
2365
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2366
|
+
cred = credential.STSAssumeRoleCredential(
|
2367
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2368
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2369
|
+
)
|
2370
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2371
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2372
|
+
else:
|
2373
|
+
cred = credential.Credential(
|
2374
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2375
|
+
)
|
2376
|
+
http_profile = HttpProfile(
|
2377
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2378
|
+
reqMethod="POST",
|
2379
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2380
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2381
|
+
)
|
2382
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2383
|
+
if g_param[OptionsDefine.Language]:
|
2384
|
+
profile.language = g_param[OptionsDefine.Language]
|
2385
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2386
|
+
client = mod.SslClient(cred, g_param[OptionsDefine.Region], profile)
|
2387
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2388
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2389
|
+
model = models.DescribeHostUploadUpdateRecordDetailRequest()
|
2390
|
+
model.from_json_string(json.dumps(args))
|
2391
|
+
start_time = time.time()
|
2392
|
+
while True:
|
2393
|
+
rsp = client.DescribeHostUploadUpdateRecordDetail(model)
|
2394
|
+
result = rsp.to_json_string()
|
2395
|
+
try:
|
2396
|
+
json_obj = json.loads(result)
|
2397
|
+
except TypeError as e:
|
2398
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2399
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2400
|
+
break
|
2401
|
+
cur_time = time.time()
|
2402
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2403
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2404
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2405
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2406
|
+
else:
|
2407
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2408
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2409
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2410
|
+
|
2411
|
+
|
2204
2412
|
def doUpdateCertificateRecordRetry(args, parsed_globals):
|
2205
2413
|
g_param = parse_global_arg(parsed_globals)
|
2206
2414
|
|
@@ -3362,6 +3570,9 @@ ACTION_MAP = {
|
|
3362
3570
|
"CheckCertificateDomainVerification": doCheckCertificateDomainVerification,
|
3363
3571
|
"DescribeHostTkeInstanceList": doDescribeHostTkeInstanceList,
|
3364
3572
|
"UploadRevokeLetter": doUploadRevokeLetter,
|
3573
|
+
"DescribeHostUploadUpdateRecord": doDescribeHostUploadUpdateRecord,
|
3574
|
+
"UploadUpdateCertificateRecordRetry": doUploadUpdateCertificateRecordRetry,
|
3575
|
+
"UploadUpdateCertificateRecordRollback": doUploadUpdateCertificateRecordRollback,
|
3365
3576
|
"DeleteManager": doDeleteManager,
|
3366
3577
|
"CertificateInfoSubmit": doCertificateInfoSubmit,
|
3367
3578
|
"DescribeDownloadCertificateUrl": doDescribeDownloadCertificateUrl,
|
@@ -3398,6 +3609,7 @@ ACTION_MAP = {
|
|
3398
3609
|
"DescribeCertificateBindResourceTaskResult": doDescribeCertificateBindResourceTaskResult,
|
3399
3610
|
"CancelAuditCertificate": doCancelAuditCertificate,
|
3400
3611
|
"DescribeHostDeployRecord": doDescribeHostDeployRecord,
|
3612
|
+
"DescribeHostUploadUpdateRecordDetail": doDescribeHostUploadUpdateRecordDetail,
|
3401
3613
|
"UpdateCertificateRecordRetry": doUpdateCertificateRecordRetry,
|
3402
3614
|
"DescribeDeleteCertificatesTaskResult": doDescribeDeleteCertificatesTaskResult,
|
3403
3615
|
"ModifyCertificateProject": doModifyCertificateProject,
|