tccli 3.0.1364.1__py2.py3-none-any.whl → 3.0.1366.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/autoscaling/v20180419/api.json +1 -1
- tccli/services/cdb/v20170320/api.json +12 -12
- tccli/services/cdn/cdn_client.py +161 -1380
- tccli/services/cdn/v20180606/api.json +5302 -9471
- tccli/services/cdn/v20180606/examples.json +0 -184
- tccli/services/cfs/v20190719/api.json +7 -7
- tccli/services/chc/v20230418/api.json +1 -1
- tccli/services/cls/v20201016/api.json +28 -24
- tccli/services/cls/v20201016/examples.json +2 -2
- tccli/services/cynosdb/v20190107/api.json +1 -1
- tccli/services/cynosdb/v20190107/examples.json +1 -1
- tccli/services/dlc/dlc_client.py +1622 -403
- tccli/services/dlc/v20210125/api.json +10988 -8007
- tccli/services/dlc/v20210125/examples.json +186 -2
- tccli/services/emr/v20190103/api.json +1 -1
- tccli/services/es/v20250101/api.json +38 -1
- tccli/services/ess/ess_client.py +110 -4
- tccli/services/ess/v20201111/api.json +359 -6
- tccli/services/ess/v20201111/examples.json +22 -0
- tccli/services/hunyuan/hunyuan_client.py +73 -179
- tccli/services/hunyuan/v20230901/api.json +0 -190
- tccli/services/hunyuan/v20230901/examples.json +0 -16
- tccli/services/ims/v20201229/api.json +2 -2
- tccli/services/lke/v20231130/api.json +47 -4
- tccli/services/mongodb/v20190725/api.json +2 -2
- tccli/services/mongodb/v20190725/examples.json +1 -1
- tccli/services/monitor/v20180724/api.json +2 -2
- tccli/services/mps/v20190612/api.json +5 -5
- tccli/services/mqtt/v20240516/api.json +84 -0
- tccli/services/ocr/v20181119/api.json +49 -3
- tccli/services/partners/v20180321/api.json +4 -4
- tccli/services/postgres/v20170312/api.json +20 -20
- tccli/services/postgres/v20170312/examples.json +2 -2
- tccli/services/sqlserver/v20180328/api.json +10 -10
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssl/v20191205/api.json +4 -4
- tccli/services/tcbr/v20220217/api.json +114 -9
- tccli/services/tcr/v20190924/api.json +2 -2
- tccli/services/teo/teo_client.py +1266 -206
- tccli/services/teo/v20220901/api.json +1798 -116
- tccli/services/teo/v20220901/examples.json +160 -0
- tccli/services/tione/v20211111/api.json +48 -38
- tccli/services/tione/v20211111/examples.json +1 -1
- tccli/services/trtc/v20190722/api.json +40 -7
- tccli/services/waf/v20180125/api.json +499 -0
- tccli/services/waf/v20180125/examples.json +32 -0
- tccli/services/waf/waf_client.py +224 -12
- tccli/services/wsa/v20250508/api.json +2 -2
- tccli/services/wsa/v20250508/examples.json +2 -2
- {tccli-3.0.1364.1.dist-info → tccli-3.0.1366.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1364.1.dist-info → tccli-3.0.1366.1.dist-info}/RECORD +55 -55
- {tccli-3.0.1364.1.dist-info → tccli-3.0.1366.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1364.1.dist-info → tccli-3.0.1366.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1364.1.dist-info → tccli-3.0.1366.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/teo/teo_client.py
CHANGED
@@ -435,6 +435,58 @@ def doDescribeMultiPathGatewayRegions(args, parsed_globals):
|
|
435
435
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
436
436
|
|
437
437
|
|
438
|
+
def doConfirmOriginACLUpdate(args, parsed_globals):
|
439
|
+
g_param = parse_global_arg(parsed_globals)
|
440
|
+
|
441
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
442
|
+
cred = credential.CVMRoleCredential()
|
443
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
444
|
+
cred = credential.STSAssumeRoleCredential(
|
445
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
446
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
447
|
+
)
|
448
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
449
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
450
|
+
else:
|
451
|
+
cred = credential.Credential(
|
452
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
453
|
+
)
|
454
|
+
http_profile = HttpProfile(
|
455
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
456
|
+
reqMethod="POST",
|
457
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
458
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
459
|
+
)
|
460
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
461
|
+
if g_param[OptionsDefine.Language]:
|
462
|
+
profile.language = g_param[OptionsDefine.Language]
|
463
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
464
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
465
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
466
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
467
|
+
model = models.ConfirmOriginACLUpdateRequest()
|
468
|
+
model.from_json_string(json.dumps(args))
|
469
|
+
start_time = time.time()
|
470
|
+
while True:
|
471
|
+
rsp = client.ConfirmOriginACLUpdate(model)
|
472
|
+
result = rsp.to_json_string()
|
473
|
+
try:
|
474
|
+
json_obj = json.loads(result)
|
475
|
+
except TypeError as e:
|
476
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
477
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
478
|
+
break
|
479
|
+
cur_time = time.time()
|
480
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
481
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
482
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
483
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
484
|
+
else:
|
485
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
486
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
487
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
488
|
+
|
489
|
+
|
438
490
|
def doDownloadL4Logs(args, parsed_globals):
|
439
491
|
g_param = parse_global_arg(parsed_globals)
|
440
492
|
|
@@ -1059,7 +1111,7 @@ def doModifyL7AccRule(args, parsed_globals):
|
|
1059
1111
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1060
1112
|
|
1061
1113
|
|
1062
|
-
def
|
1114
|
+
def doCreateSecurityJSInjectionRule(args, parsed_globals):
|
1063
1115
|
g_param = parse_global_arg(parsed_globals)
|
1064
1116
|
|
1065
1117
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1088,11 +1140,11 @@ def doDescribeAccelerationDomains(args, parsed_globals):
|
|
1088
1140
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1089
1141
|
client._sdkVersion += ("_CLI_" + __version__)
|
1090
1142
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1091
|
-
model = models.
|
1143
|
+
model = models.CreateSecurityJSInjectionRuleRequest()
|
1092
1144
|
model.from_json_string(json.dumps(args))
|
1093
1145
|
start_time = time.time()
|
1094
1146
|
while True:
|
1095
|
-
rsp = client.
|
1147
|
+
rsp = client.CreateSecurityJSInjectionRule(model)
|
1096
1148
|
result = rsp.to_json_string()
|
1097
1149
|
try:
|
1098
1150
|
json_obj = json.loads(result)
|
@@ -1215,6 +1267,58 @@ def doModifyOriginGroup(args, parsed_globals):
|
|
1215
1267
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1216
1268
|
|
1217
1269
|
|
1270
|
+
def doDeleteSecurityAPIResource(args, parsed_globals):
|
1271
|
+
g_param = parse_global_arg(parsed_globals)
|
1272
|
+
|
1273
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1274
|
+
cred = credential.CVMRoleCredential()
|
1275
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1276
|
+
cred = credential.STSAssumeRoleCredential(
|
1277
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1278
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1279
|
+
)
|
1280
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1281
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1282
|
+
else:
|
1283
|
+
cred = credential.Credential(
|
1284
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1285
|
+
)
|
1286
|
+
http_profile = HttpProfile(
|
1287
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1288
|
+
reqMethod="POST",
|
1289
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1290
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1291
|
+
)
|
1292
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1293
|
+
if g_param[OptionsDefine.Language]:
|
1294
|
+
profile.language = g_param[OptionsDefine.Language]
|
1295
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1296
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1297
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1298
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1299
|
+
model = models.DeleteSecurityAPIResourceRequest()
|
1300
|
+
model.from_json_string(json.dumps(args))
|
1301
|
+
start_time = time.time()
|
1302
|
+
while True:
|
1303
|
+
rsp = client.DeleteSecurityAPIResource(model)
|
1304
|
+
result = rsp.to_json_string()
|
1305
|
+
try:
|
1306
|
+
json_obj = json.loads(result)
|
1307
|
+
except TypeError as e:
|
1308
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1309
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1310
|
+
break
|
1311
|
+
cur_time = time.time()
|
1312
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1313
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1314
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1315
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1316
|
+
else:
|
1317
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1318
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1319
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1320
|
+
|
1321
|
+
|
1218
1322
|
def doDeleteApplicationProxy(args, parsed_globals):
|
1219
1323
|
g_param = parse_global_arg(parsed_globals)
|
1220
1324
|
|
@@ -1319,6 +1423,58 @@ def doModifyL7AccSetting(args, parsed_globals):
|
|
1319
1423
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1320
1424
|
|
1321
1425
|
|
1426
|
+
def doCreateSecurityAPIResource(args, parsed_globals):
|
1427
|
+
g_param = parse_global_arg(parsed_globals)
|
1428
|
+
|
1429
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1430
|
+
cred = credential.CVMRoleCredential()
|
1431
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1432
|
+
cred = credential.STSAssumeRoleCredential(
|
1433
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1434
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1435
|
+
)
|
1436
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1437
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1438
|
+
else:
|
1439
|
+
cred = credential.Credential(
|
1440
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1441
|
+
)
|
1442
|
+
http_profile = HttpProfile(
|
1443
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1444
|
+
reqMethod="POST",
|
1445
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1446
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1447
|
+
)
|
1448
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1449
|
+
if g_param[OptionsDefine.Language]:
|
1450
|
+
profile.language = g_param[OptionsDefine.Language]
|
1451
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1452
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1453
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1454
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1455
|
+
model = models.CreateSecurityAPIResourceRequest()
|
1456
|
+
model.from_json_string(json.dumps(args))
|
1457
|
+
start_time = time.time()
|
1458
|
+
while True:
|
1459
|
+
rsp = client.CreateSecurityAPIResource(model)
|
1460
|
+
result = rsp.to_json_string()
|
1461
|
+
try:
|
1462
|
+
json_obj = json.loads(result)
|
1463
|
+
except TypeError as e:
|
1464
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1465
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1466
|
+
break
|
1467
|
+
cur_time = time.time()
|
1468
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1469
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1470
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1471
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1472
|
+
else:
|
1473
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1474
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1475
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1476
|
+
|
1477
|
+
|
1322
1478
|
def doDescribeConfigGroupVersions(args, parsed_globals):
|
1323
1479
|
g_param = parse_global_arg(parsed_globals)
|
1324
1480
|
|
@@ -2567,7 +2723,7 @@ def doDescribeIPRegion(args, parsed_globals):
|
|
2567
2723
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2568
2724
|
|
2569
2725
|
|
2570
|
-
def
|
2726
|
+
def doDescribeAccelerationDomains(args, parsed_globals):
|
2571
2727
|
g_param = parse_global_arg(parsed_globals)
|
2572
2728
|
|
2573
2729
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2596,11 +2752,11 @@ def doModifyLoadBalancer(args, parsed_globals):
|
|
2596
2752
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
2597
2753
|
client._sdkVersion += ("_CLI_" + __version__)
|
2598
2754
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2599
|
-
model = models.
|
2755
|
+
model = models.DescribeAccelerationDomainsRequest()
|
2600
2756
|
model.from_json_string(json.dumps(args))
|
2601
2757
|
start_time = time.time()
|
2602
2758
|
while True:
|
2603
|
-
rsp = client.
|
2759
|
+
rsp = client.DescribeAccelerationDomains(model)
|
2604
2760
|
result = rsp.to_json_string()
|
2605
2761
|
try:
|
2606
2762
|
json_obj = json.loads(result)
|
@@ -2671,6 +2827,58 @@ def doDeleteAccelerationDomains(args, parsed_globals):
|
|
2671
2827
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2672
2828
|
|
2673
2829
|
|
2830
|
+
def doDeleteSecurityJSInjectionRule(args, parsed_globals):
|
2831
|
+
g_param = parse_global_arg(parsed_globals)
|
2832
|
+
|
2833
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2834
|
+
cred = credential.CVMRoleCredential()
|
2835
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2836
|
+
cred = credential.STSAssumeRoleCredential(
|
2837
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2838
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2839
|
+
)
|
2840
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2841
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2842
|
+
else:
|
2843
|
+
cred = credential.Credential(
|
2844
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2845
|
+
)
|
2846
|
+
http_profile = HttpProfile(
|
2847
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2848
|
+
reqMethod="POST",
|
2849
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2850
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2851
|
+
)
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2853
|
+
if g_param[OptionsDefine.Language]:
|
2854
|
+
profile.language = g_param[OptionsDefine.Language]
|
2855
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2856
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
2857
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2858
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2859
|
+
model = models.DeleteSecurityJSInjectionRuleRequest()
|
2860
|
+
model.from_json_string(json.dumps(args))
|
2861
|
+
start_time = time.time()
|
2862
|
+
while True:
|
2863
|
+
rsp = client.DeleteSecurityJSInjectionRule(model)
|
2864
|
+
result = rsp.to_json_string()
|
2865
|
+
try:
|
2866
|
+
json_obj = json.loads(result)
|
2867
|
+
except TypeError as e:
|
2868
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2869
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2870
|
+
break
|
2871
|
+
cur_time = time.time()
|
2872
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2873
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2874
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2875
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2876
|
+
else:
|
2877
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2878
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2879
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2880
|
+
|
2881
|
+
|
2674
2882
|
def doRefreshMultiPathGatewaySecretKey(args, parsed_globals):
|
2675
2883
|
g_param = parse_global_arg(parsed_globals)
|
2676
2884
|
|
@@ -3191,7 +3399,7 @@ def doModifyWebSecurityTemplate(args, parsed_globals):
|
|
3191
3399
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3192
3400
|
|
3193
3401
|
|
3194
|
-
def
|
3402
|
+
def doDescribeSecurityIPGroupContent(args, parsed_globals):
|
3195
3403
|
g_param = parse_global_arg(parsed_globals)
|
3196
3404
|
|
3197
3405
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3220,11 +3428,11 @@ def doModifyL7AccRulePriority(args, parsed_globals):
|
|
3220
3428
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3221
3429
|
client._sdkVersion += ("_CLI_" + __version__)
|
3222
3430
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3223
|
-
model = models.
|
3431
|
+
model = models.DescribeSecurityIPGroupContentRequest()
|
3224
3432
|
model.from_json_string(json.dumps(args))
|
3225
3433
|
start_time = time.time()
|
3226
3434
|
while True:
|
3227
|
-
rsp = client.
|
3435
|
+
rsp = client.DescribeSecurityIPGroupContent(model)
|
3228
3436
|
result = rsp.to_json_string()
|
3229
3437
|
try:
|
3230
3438
|
json_obj = json.loads(result)
|
@@ -3243,7 +3451,7 @@ def doModifyL7AccRulePriority(args, parsed_globals):
|
|
3243
3451
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3244
3452
|
|
3245
3453
|
|
3246
|
-
def
|
3454
|
+
def doModifyL7AccRulePriority(args, parsed_globals):
|
3247
3455
|
g_param = parse_global_arg(parsed_globals)
|
3248
3456
|
|
3249
3457
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3272,11 +3480,11 @@ def doModifyZoneSetting(args, parsed_globals):
|
|
3272
3480
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3273
3481
|
client._sdkVersion += ("_CLI_" + __version__)
|
3274
3482
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3275
|
-
model = models.
|
3483
|
+
model = models.ModifyL7AccRulePriorityRequest()
|
3276
3484
|
model.from_json_string(json.dumps(args))
|
3277
3485
|
start_time = time.time()
|
3278
3486
|
while True:
|
3279
|
-
rsp = client.
|
3487
|
+
rsp = client.ModifyL7AccRulePriority(model)
|
3280
3488
|
result = rsp.to_json_string()
|
3281
3489
|
try:
|
3282
3490
|
json_obj = json.loads(result)
|
@@ -3295,7 +3503,7 @@ def doModifyZoneSetting(args, parsed_globals):
|
|
3295
3503
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3296
3504
|
|
3297
3505
|
|
3298
|
-
def
|
3506
|
+
def doModifyZoneSetting(args, parsed_globals):
|
3299
3507
|
g_param = parse_global_arg(parsed_globals)
|
3300
3508
|
|
3301
3509
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3324,11 +3532,11 @@ def doCreateAliasDomain(args, parsed_globals):
|
|
3324
3532
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3325
3533
|
client._sdkVersion += ("_CLI_" + __version__)
|
3326
3534
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3327
|
-
model = models.
|
3535
|
+
model = models.ModifyZoneSettingRequest()
|
3328
3536
|
model.from_json_string(json.dumps(args))
|
3329
3537
|
start_time = time.time()
|
3330
3538
|
while True:
|
3331
|
-
rsp = client.
|
3539
|
+
rsp = client.ModifyZoneSetting(model)
|
3332
3540
|
result = rsp.to_json_string()
|
3333
3541
|
try:
|
3334
3542
|
json_obj = json.loads(result)
|
@@ -3347,7 +3555,7 @@ def doCreateAliasDomain(args, parsed_globals):
|
|
3347
3555
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3348
3556
|
|
3349
3557
|
|
3350
|
-
def
|
3558
|
+
def doCreateAliasDomain(args, parsed_globals):
|
3351
3559
|
g_param = parse_global_arg(parsed_globals)
|
3352
3560
|
|
3353
3561
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3376,11 +3584,11 @@ def doModifyAliasDomainStatus(args, parsed_globals):
|
|
3376
3584
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3377
3585
|
client._sdkVersion += ("_CLI_" + __version__)
|
3378
3586
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3379
|
-
model = models.
|
3587
|
+
model = models.CreateAliasDomainRequest()
|
3380
3588
|
model.from_json_string(json.dumps(args))
|
3381
3589
|
start_time = time.time()
|
3382
3590
|
while True:
|
3383
|
-
rsp = client.
|
3591
|
+
rsp = client.CreateAliasDomain(model)
|
3384
3592
|
result = rsp.to_json_string()
|
3385
3593
|
try:
|
3386
3594
|
json_obj = json.loads(result)
|
@@ -3399,7 +3607,7 @@ def doModifyAliasDomainStatus(args, parsed_globals):
|
|
3399
3607
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3400
3608
|
|
3401
3609
|
|
3402
|
-
def
|
3610
|
+
def doModifyAliasDomainStatus(args, parsed_globals):
|
3403
3611
|
g_param = parse_global_arg(parsed_globals)
|
3404
3612
|
|
3405
3613
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3428,11 +3636,11 @@ def doDescribeSecurityIPGroup(args, parsed_globals):
|
|
3428
3636
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3429
3637
|
client._sdkVersion += ("_CLI_" + __version__)
|
3430
3638
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3431
|
-
model = models.
|
3639
|
+
model = models.ModifyAliasDomainStatusRequest()
|
3432
3640
|
model.from_json_string(json.dumps(args))
|
3433
3641
|
start_time = time.time()
|
3434
3642
|
while True:
|
3435
|
-
rsp = client.
|
3643
|
+
rsp = client.ModifyAliasDomainStatus(model)
|
3436
3644
|
result = rsp.to_json_string()
|
3437
3645
|
try:
|
3438
3646
|
json_obj = json.loads(result)
|
@@ -3451,7 +3659,7 @@ def doDescribeSecurityIPGroup(args, parsed_globals):
|
|
3451
3659
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3452
3660
|
|
3453
3661
|
|
3454
|
-
def
|
3662
|
+
def doDescribeSecurityIPGroup(args, parsed_globals):
|
3455
3663
|
g_param = parse_global_arg(parsed_globals)
|
3456
3664
|
|
3457
3665
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3480,11 +3688,11 @@ def doCreateL4ProxyRules(args, parsed_globals):
|
|
3480
3688
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3481
3689
|
client._sdkVersion += ("_CLI_" + __version__)
|
3482
3690
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3483
|
-
model = models.
|
3691
|
+
model = models.DescribeSecurityIPGroupRequest()
|
3484
3692
|
model.from_json_string(json.dumps(args))
|
3485
3693
|
start_time = time.time()
|
3486
3694
|
while True:
|
3487
|
-
rsp = client.
|
3695
|
+
rsp = client.DescribeSecurityIPGroup(model)
|
3488
3696
|
result = rsp.to_json_string()
|
3489
3697
|
try:
|
3490
3698
|
json_obj = json.loads(result)
|
@@ -3503,7 +3711,7 @@ def doCreateL4ProxyRules(args, parsed_globals):
|
|
3503
3711
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3504
3712
|
|
3505
3713
|
|
3506
|
-
def
|
3714
|
+
def doCreateL4ProxyRules(args, parsed_globals):
|
3507
3715
|
g_param = parse_global_arg(parsed_globals)
|
3508
3716
|
|
3509
3717
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3532,11 +3740,11 @@ def doDescribeOriginGroup(args, parsed_globals):
|
|
3532
3740
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3533
3741
|
client._sdkVersion += ("_CLI_" + __version__)
|
3534
3742
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3535
|
-
model = models.
|
3743
|
+
model = models.CreateL4ProxyRulesRequest()
|
3536
3744
|
model.from_json_string(json.dumps(args))
|
3537
3745
|
start_time = time.time()
|
3538
3746
|
while True:
|
3539
|
-
rsp = client.
|
3747
|
+
rsp = client.CreateL4ProxyRules(model)
|
3540
3748
|
result = rsp.to_json_string()
|
3541
3749
|
try:
|
3542
3750
|
json_obj = json.loads(result)
|
@@ -3555,7 +3763,7 @@ def doDescribeOriginGroup(args, parsed_globals):
|
|
3555
3763
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3556
3764
|
|
3557
3765
|
|
3558
|
-
def
|
3766
|
+
def doDescribeOriginGroup(args, parsed_globals):
|
3559
3767
|
g_param = parse_global_arg(parsed_globals)
|
3560
3768
|
|
3561
3769
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3584,11 +3792,11 @@ def doDescribeTimingL4Data(args, parsed_globals):
|
|
3584
3792
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3585
3793
|
client._sdkVersion += ("_CLI_" + __version__)
|
3586
3794
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3587
|
-
model = models.
|
3795
|
+
model = models.DescribeOriginGroupRequest()
|
3588
3796
|
model.from_json_string(json.dumps(args))
|
3589
3797
|
start_time = time.time()
|
3590
3798
|
while True:
|
3591
|
-
rsp = client.
|
3799
|
+
rsp = client.DescribeOriginGroup(model)
|
3592
3800
|
result = rsp.to_json_string()
|
3593
3801
|
try:
|
3594
3802
|
json_obj = json.loads(result)
|
@@ -3659,7 +3867,7 @@ def doDescribeTopL7CacheData(args, parsed_globals):
|
|
3659
3867
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3660
3868
|
|
3661
3869
|
|
3662
|
-
def
|
3870
|
+
def doDescribeTimingL4Data(args, parsed_globals):
|
3663
3871
|
g_param = parse_global_arg(parsed_globals)
|
3664
3872
|
|
3665
3873
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3688,7 +3896,59 @@ def doModifyRule(args, parsed_globals):
|
|
3688
3896
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3689
3897
|
client._sdkVersion += ("_CLI_" + __version__)
|
3690
3898
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3691
|
-
model = models.
|
3899
|
+
model = models.DescribeTimingL4DataRequest()
|
3900
|
+
model.from_json_string(json.dumps(args))
|
3901
|
+
start_time = time.time()
|
3902
|
+
while True:
|
3903
|
+
rsp = client.DescribeTimingL4Data(model)
|
3904
|
+
result = rsp.to_json_string()
|
3905
|
+
try:
|
3906
|
+
json_obj = json.loads(result)
|
3907
|
+
except TypeError as e:
|
3908
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3909
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3910
|
+
break
|
3911
|
+
cur_time = time.time()
|
3912
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3913
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3914
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3915
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3916
|
+
else:
|
3917
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3918
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3919
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3920
|
+
|
3921
|
+
|
3922
|
+
def doModifyRule(args, parsed_globals):
|
3923
|
+
g_param = parse_global_arg(parsed_globals)
|
3924
|
+
|
3925
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3926
|
+
cred = credential.CVMRoleCredential()
|
3927
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3928
|
+
cred = credential.STSAssumeRoleCredential(
|
3929
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3930
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3931
|
+
)
|
3932
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3933
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3934
|
+
else:
|
3935
|
+
cred = credential.Credential(
|
3936
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3937
|
+
)
|
3938
|
+
http_profile = HttpProfile(
|
3939
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3940
|
+
reqMethod="POST",
|
3941
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
3942
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3943
|
+
)
|
3944
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3945
|
+
if g_param[OptionsDefine.Language]:
|
3946
|
+
profile.language = g_param[OptionsDefine.Language]
|
3947
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3948
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3949
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
3950
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3951
|
+
model = models.ModifyRuleRequest()
|
3692
3952
|
model.from_json_string(json.dumps(args))
|
3693
3953
|
start_time = time.time()
|
3694
3954
|
while True:
|
@@ -3867,6 +4127,58 @@ def doDeleteDnsRecords(args, parsed_globals):
|
|
3867
4127
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3868
4128
|
|
3869
4129
|
|
4130
|
+
def doDescribeSecurityClientAttester(args, parsed_globals):
|
4131
|
+
g_param = parse_global_arg(parsed_globals)
|
4132
|
+
|
4133
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4134
|
+
cred = credential.CVMRoleCredential()
|
4135
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4136
|
+
cred = credential.STSAssumeRoleCredential(
|
4137
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4138
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4139
|
+
)
|
4140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4141
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4142
|
+
else:
|
4143
|
+
cred = credential.Credential(
|
4144
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4145
|
+
)
|
4146
|
+
http_profile = HttpProfile(
|
4147
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4148
|
+
reqMethod="POST",
|
4149
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4150
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4151
|
+
)
|
4152
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4153
|
+
if g_param[OptionsDefine.Language]:
|
4154
|
+
profile.language = g_param[OptionsDefine.Language]
|
4155
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4156
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4157
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4158
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4159
|
+
model = models.DescribeSecurityClientAttesterRequest()
|
4160
|
+
model.from_json_string(json.dumps(args))
|
4161
|
+
start_time = time.time()
|
4162
|
+
while True:
|
4163
|
+
rsp = client.DescribeSecurityClientAttester(model)
|
4164
|
+
result = rsp.to_json_string()
|
4165
|
+
try:
|
4166
|
+
json_obj = json.loads(result)
|
4167
|
+
except TypeError as e:
|
4168
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4169
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4170
|
+
break
|
4171
|
+
cur_time = time.time()
|
4172
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4173
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4174
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4175
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4176
|
+
else:
|
4177
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4178
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4179
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4180
|
+
|
4181
|
+
|
3870
4182
|
def doModifySecurityPolicy(args, parsed_globals):
|
3871
4183
|
g_param = parse_global_arg(parsed_globals)
|
3872
4184
|
|
@@ -4387,6 +4699,58 @@ def doIncreasePlanQuota(args, parsed_globals):
|
|
4387
4699
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4388
4700
|
|
4389
4701
|
|
4702
|
+
def doModifySecurityAPIResource(args, parsed_globals):
|
4703
|
+
g_param = parse_global_arg(parsed_globals)
|
4704
|
+
|
4705
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4706
|
+
cred = credential.CVMRoleCredential()
|
4707
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4708
|
+
cred = credential.STSAssumeRoleCredential(
|
4709
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4710
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4711
|
+
)
|
4712
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4713
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4714
|
+
else:
|
4715
|
+
cred = credential.Credential(
|
4716
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4717
|
+
)
|
4718
|
+
http_profile = HttpProfile(
|
4719
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4720
|
+
reqMethod="POST",
|
4721
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4722
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4723
|
+
)
|
4724
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4725
|
+
if g_param[OptionsDefine.Language]:
|
4726
|
+
profile.language = g_param[OptionsDefine.Language]
|
4727
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4728
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4729
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4730
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4731
|
+
model = models.ModifySecurityAPIResourceRequest()
|
4732
|
+
model.from_json_string(json.dumps(args))
|
4733
|
+
start_time = time.time()
|
4734
|
+
while True:
|
4735
|
+
rsp = client.ModifySecurityAPIResource(model)
|
4736
|
+
result = rsp.to_json_string()
|
4737
|
+
try:
|
4738
|
+
json_obj = json.loads(result)
|
4739
|
+
except TypeError as e:
|
4740
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4741
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4742
|
+
break
|
4743
|
+
cur_time = time.time()
|
4744
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4745
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4746
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4747
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4748
|
+
else:
|
4749
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4750
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4751
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4752
|
+
|
4753
|
+
|
4390
4754
|
def doModifyApplicationProxyStatus(args, parsed_globals):
|
4391
4755
|
g_param = parse_global_arg(parsed_globals)
|
4392
4756
|
|
@@ -4439,7 +4803,7 @@ def doModifyApplicationProxyStatus(args, parsed_globals):
|
|
4439
4803
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4440
4804
|
|
4441
4805
|
|
4442
|
-
def
|
4806
|
+
def doDeleteLoadBalancer(args, parsed_globals):
|
4443
4807
|
g_param = parse_global_arg(parsed_globals)
|
4444
4808
|
|
4445
4809
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4468,11 +4832,11 @@ def doCreatePlan(args, parsed_globals):
|
|
4468
4832
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4469
4833
|
client._sdkVersion += ("_CLI_" + __version__)
|
4470
4834
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4471
|
-
model = models.
|
4835
|
+
model = models.DeleteLoadBalancerRequest()
|
4472
4836
|
model.from_json_string(json.dumps(args))
|
4473
4837
|
start_time = time.time()
|
4474
4838
|
while True:
|
4475
|
-
rsp = client.
|
4839
|
+
rsp = client.DeleteLoadBalancer(model)
|
4476
4840
|
result = rsp.to_json_string()
|
4477
4841
|
try:
|
4478
4842
|
json_obj = json.loads(result)
|
@@ -4751,6 +5115,58 @@ def doCreateSharedCNAME(args, parsed_globals):
|
|
4751
5115
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4752
5116
|
|
4753
5117
|
|
5118
|
+
def doDescribeSecurityJSInjectionRule(args, parsed_globals):
|
5119
|
+
g_param = parse_global_arg(parsed_globals)
|
5120
|
+
|
5121
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5122
|
+
cred = credential.CVMRoleCredential()
|
5123
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5124
|
+
cred = credential.STSAssumeRoleCredential(
|
5125
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5126
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5127
|
+
)
|
5128
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5129
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5130
|
+
else:
|
5131
|
+
cred = credential.Credential(
|
5132
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5133
|
+
)
|
5134
|
+
http_profile = HttpProfile(
|
5135
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5136
|
+
reqMethod="POST",
|
5137
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5138
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5139
|
+
)
|
5140
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5141
|
+
if g_param[OptionsDefine.Language]:
|
5142
|
+
profile.language = g_param[OptionsDefine.Language]
|
5143
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5144
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5145
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5146
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5147
|
+
model = models.DescribeSecurityJSInjectionRuleRequest()
|
5148
|
+
model.from_json_string(json.dumps(args))
|
5149
|
+
start_time = time.time()
|
5150
|
+
while True:
|
5151
|
+
rsp = client.DescribeSecurityJSInjectionRule(model)
|
5152
|
+
result = rsp.to_json_string()
|
5153
|
+
try:
|
5154
|
+
json_obj = json.loads(result)
|
5155
|
+
except TypeError as e:
|
5156
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5157
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5158
|
+
break
|
5159
|
+
cur_time = time.time()
|
5160
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5161
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5162
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5163
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5164
|
+
else:
|
5165
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5166
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5167
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5168
|
+
|
5169
|
+
|
4754
5170
|
def doCreateRule(args, parsed_globals):
|
4755
5171
|
g_param = parse_global_arg(parsed_globals)
|
4756
5172
|
|
@@ -5271,7 +5687,7 @@ def doDescribePlans(args, parsed_globals):
|
|
5271
5687
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5272
5688
|
|
5273
5689
|
|
5274
|
-
def
|
5690
|
+
def doCreateSecurityClientAttester(args, parsed_globals):
|
5275
5691
|
g_param = parse_global_arg(parsed_globals)
|
5276
5692
|
|
5277
5693
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5300,11 +5716,11 @@ def doDeleteLoadBalancer(args, parsed_globals):
|
|
5300
5716
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5301
5717
|
client._sdkVersion += ("_CLI_" + __version__)
|
5302
5718
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5303
|
-
model = models.
|
5719
|
+
model = models.CreateSecurityClientAttesterRequest()
|
5304
5720
|
model.from_json_string(json.dumps(args))
|
5305
5721
|
start_time = time.time()
|
5306
5722
|
while True:
|
5307
|
-
rsp = client.
|
5723
|
+
rsp = client.CreateSecurityClientAttester(model)
|
5308
5724
|
result = rsp.to_json_string()
|
5309
5725
|
try:
|
5310
5726
|
json_obj = json.loads(result)
|
@@ -5583,7 +5999,7 @@ def doModifyAccelerationDomainStatuses(args, parsed_globals):
|
|
5583
5999
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5584
6000
|
|
5585
6001
|
|
5586
|
-
def
|
6002
|
+
def doModifySecurityAPIService(args, parsed_globals):
|
5587
6003
|
g_param = parse_global_arg(parsed_globals)
|
5588
6004
|
|
5589
6005
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5612,11 +6028,11 @@ def doDescribeFunctionRules(args, parsed_globals):
|
|
5612
6028
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5613
6029
|
client._sdkVersion += ("_CLI_" + __version__)
|
5614
6030
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5615
|
-
model = models.
|
6031
|
+
model = models.ModifySecurityAPIServiceRequest()
|
5616
6032
|
model.from_json_string(json.dumps(args))
|
5617
6033
|
start_time = time.time()
|
5618
6034
|
while True:
|
5619
|
-
rsp = client.
|
6035
|
+
rsp = client.ModifySecurityAPIService(model)
|
5620
6036
|
result = rsp.to_json_string()
|
5621
6037
|
try:
|
5622
6038
|
json_obj = json.loads(result)
|
@@ -5635,7 +6051,7 @@ def doDescribeFunctionRules(args, parsed_globals):
|
|
5635
6051
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5636
6052
|
|
5637
6053
|
|
5638
|
-
def
|
6054
|
+
def doDescribeFunctionRules(args, parsed_globals):
|
5639
6055
|
g_param = parse_global_arg(parsed_globals)
|
5640
6056
|
|
5641
6057
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5664,11 +6080,11 @@ def doDeleteRealtimeLogDeliveryTask(args, parsed_globals):
|
|
5664
6080
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5665
6081
|
client._sdkVersion += ("_CLI_" + __version__)
|
5666
6082
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5667
|
-
model = models.
|
6083
|
+
model = models.DescribeFunctionRulesRequest()
|
5668
6084
|
model.from_json_string(json.dumps(args))
|
5669
6085
|
start_time = time.time()
|
5670
6086
|
while True:
|
5671
|
-
rsp = client.
|
6087
|
+
rsp = client.DescribeFunctionRules(model)
|
5672
6088
|
result = rsp.to_json_string()
|
5673
6089
|
try:
|
5674
6090
|
json_obj = json.loads(result)
|
@@ -5687,7 +6103,7 @@ def doDeleteRealtimeLogDeliveryTask(args, parsed_globals):
|
|
5687
6103
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5688
6104
|
|
5689
6105
|
|
5690
|
-
def
|
6106
|
+
def doUpgradePlan(args, parsed_globals):
|
5691
6107
|
g_param = parse_global_arg(parsed_globals)
|
5692
6108
|
|
5693
6109
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5716,11 +6132,11 @@ def doDescribeDDoSAttackTopData(args, parsed_globals):
|
|
5716
6132
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5717
6133
|
client._sdkVersion += ("_CLI_" + __version__)
|
5718
6134
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5719
|
-
model = models.
|
6135
|
+
model = models.UpgradePlanRequest()
|
5720
6136
|
model.from_json_string(json.dumps(args))
|
5721
6137
|
start_time = time.time()
|
5722
6138
|
while True:
|
5723
|
-
rsp = client.
|
6139
|
+
rsp = client.UpgradePlan(model)
|
5724
6140
|
result = rsp.to_json_string()
|
5725
6141
|
try:
|
5726
6142
|
json_obj = json.loads(result)
|
@@ -5739,7 +6155,7 @@ def doDescribeDDoSAttackTopData(args, parsed_globals):
|
|
5739
6155
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5740
6156
|
|
5741
6157
|
|
5742
|
-
def
|
6158
|
+
def doDescribeDDoSAttackTopData(args, parsed_globals):
|
5743
6159
|
g_param = parse_global_arg(parsed_globals)
|
5744
6160
|
|
5745
6161
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5768,11 +6184,11 @@ def doModifyZoneStatus(args, parsed_globals):
|
|
5768
6184
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5769
6185
|
client._sdkVersion += ("_CLI_" + __version__)
|
5770
6186
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5771
|
-
model = models.
|
6187
|
+
model = models.DescribeDDoSAttackTopDataRequest()
|
5772
6188
|
model.from_json_string(json.dumps(args))
|
5773
6189
|
start_time = time.time()
|
5774
6190
|
while True:
|
5775
|
-
rsp = client.
|
6191
|
+
rsp = client.DescribeDDoSAttackTopData(model)
|
5776
6192
|
result = rsp.to_json_string()
|
5777
6193
|
try:
|
5778
6194
|
json_obj = json.loads(result)
|
@@ -5791,7 +6207,7 @@ def doModifyZoneStatus(args, parsed_globals):
|
|
5791
6207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5792
6208
|
|
5793
6209
|
|
5794
|
-
def
|
6210
|
+
def doModifyZoneStatus(args, parsed_globals):
|
5795
6211
|
g_param = parse_global_arg(parsed_globals)
|
5796
6212
|
|
5797
6213
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5820,11 +6236,11 @@ def doCreateL7AccRules(args, parsed_globals):
|
|
5820
6236
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5821
6237
|
client._sdkVersion += ("_CLI_" + __version__)
|
5822
6238
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5823
|
-
model = models.
|
6239
|
+
model = models.ModifyZoneStatusRequest()
|
5824
6240
|
model.from_json_string(json.dumps(args))
|
5825
6241
|
start_time = time.time()
|
5826
6242
|
while True:
|
5827
|
-
rsp = client.
|
6243
|
+
rsp = client.ModifyZoneStatus(model)
|
5828
6244
|
result = rsp.to_json_string()
|
5829
6245
|
try:
|
5830
6246
|
json_obj = json.loads(result)
|
@@ -5843,7 +6259,7 @@ def doCreateL7AccRules(args, parsed_globals):
|
|
5843
6259
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5844
6260
|
|
5845
6261
|
|
5846
|
-
def
|
6262
|
+
def doCreateL7AccRules(args, parsed_globals):
|
5847
6263
|
g_param = parse_global_arg(parsed_globals)
|
5848
6264
|
|
5849
6265
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5872,11 +6288,11 @@ def doDescribePurgeTasks(args, parsed_globals):
|
|
5872
6288
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5873
6289
|
client._sdkVersion += ("_CLI_" + __version__)
|
5874
6290
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5875
|
-
model = models.
|
6291
|
+
model = models.CreateL7AccRulesRequest()
|
5876
6292
|
model.from_json_string(json.dumps(args))
|
5877
6293
|
start_time = time.time()
|
5878
6294
|
while True:
|
5879
|
-
rsp = client.
|
6295
|
+
rsp = client.CreateL7AccRules(model)
|
5880
6296
|
result = rsp.to_json_string()
|
5881
6297
|
try:
|
5882
6298
|
json_obj = json.loads(result)
|
@@ -5895,7 +6311,7 @@ def doDescribePurgeTasks(args, parsed_globals):
|
|
5895
6311
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5896
6312
|
|
5897
6313
|
|
5898
|
-
def
|
6314
|
+
def doDescribePurgeTasks(args, parsed_globals):
|
5899
6315
|
g_param = parse_global_arg(parsed_globals)
|
5900
6316
|
|
5901
6317
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5924,11 +6340,11 @@ def doDescribeMultiPathGateway(args, parsed_globals):
|
|
5924
6340
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5925
6341
|
client._sdkVersion += ("_CLI_" + __version__)
|
5926
6342
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5927
|
-
model = models.
|
6343
|
+
model = models.DescribePurgeTasksRequest()
|
5928
6344
|
model.from_json_string(json.dumps(args))
|
5929
6345
|
start_time = time.time()
|
5930
6346
|
while True:
|
5931
|
-
rsp = client.
|
6347
|
+
rsp = client.DescribePurgeTasks(model)
|
5932
6348
|
result = rsp.to_json_string()
|
5933
6349
|
try:
|
5934
6350
|
json_obj = json.loads(result)
|
@@ -5947,7 +6363,7 @@ def doDescribeMultiPathGateway(args, parsed_globals):
|
|
5947
6363
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5948
6364
|
|
5949
6365
|
|
5950
|
-
def
|
6366
|
+
def doDescribeMultiPathGateway(args, parsed_globals):
|
5951
6367
|
g_param = parse_global_arg(parsed_globals)
|
5952
6368
|
|
5953
6369
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5976,11 +6392,11 @@ def doDeleteRules(args, parsed_globals):
|
|
5976
6392
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
5977
6393
|
client._sdkVersion += ("_CLI_" + __version__)
|
5978
6394
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5979
|
-
model = models.
|
6395
|
+
model = models.DescribeMultiPathGatewayRequest()
|
5980
6396
|
model.from_json_string(json.dumps(args))
|
5981
6397
|
start_time = time.time()
|
5982
6398
|
while True:
|
5983
|
-
rsp = client.
|
6399
|
+
rsp = client.DescribeMultiPathGateway(model)
|
5984
6400
|
result = rsp.to_json_string()
|
5985
6401
|
try:
|
5986
6402
|
json_obj = json.loads(result)
|
@@ -5999,7 +6415,7 @@ def doDeleteRules(args, parsed_globals):
|
|
5999
6415
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6000
6416
|
|
6001
6417
|
|
6002
|
-
def
|
6418
|
+
def doDeleteRules(args, parsed_globals):
|
6003
6419
|
g_param = parse_global_arg(parsed_globals)
|
6004
6420
|
|
6005
6421
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6028,11 +6444,63 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
6028
6444
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6029
6445
|
client._sdkVersion += ("_CLI_" + __version__)
|
6030
6446
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6031
|
-
model = models.
|
6447
|
+
model = models.DeleteRulesRequest()
|
6032
6448
|
model.from_json_string(json.dumps(args))
|
6033
6449
|
start_time = time.time()
|
6034
6450
|
while True:
|
6035
|
-
rsp = client.
|
6451
|
+
rsp = client.DeleteRules(model)
|
6452
|
+
result = rsp.to_json_string()
|
6453
|
+
try:
|
6454
|
+
json_obj = json.loads(result)
|
6455
|
+
except TypeError as e:
|
6456
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6457
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6458
|
+
break
|
6459
|
+
cur_time = time.time()
|
6460
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6461
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6462
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6463
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6464
|
+
else:
|
6465
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6466
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6467
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6468
|
+
|
6469
|
+
|
6470
|
+
def doDeleteSecurityAPIService(args, parsed_globals):
|
6471
|
+
g_param = parse_global_arg(parsed_globals)
|
6472
|
+
|
6473
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6474
|
+
cred = credential.CVMRoleCredential()
|
6475
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6476
|
+
cred = credential.STSAssumeRoleCredential(
|
6477
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6478
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6479
|
+
)
|
6480
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6481
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6482
|
+
else:
|
6483
|
+
cred = credential.Credential(
|
6484
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6485
|
+
)
|
6486
|
+
http_profile = HttpProfile(
|
6487
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6488
|
+
reqMethod="POST",
|
6489
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6490
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6491
|
+
)
|
6492
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6493
|
+
if g_param[OptionsDefine.Language]:
|
6494
|
+
profile.language = g_param[OptionsDefine.Language]
|
6495
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6496
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6497
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6498
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6499
|
+
model = models.DeleteSecurityAPIServiceRequest()
|
6500
|
+
model.from_json_string(json.dumps(args))
|
6501
|
+
start_time = time.time()
|
6502
|
+
while True:
|
6503
|
+
rsp = client.DeleteSecurityAPIService(model)
|
6036
6504
|
result = rsp.to_json_string()
|
6037
6505
|
try:
|
6038
6506
|
json_obj = json.loads(result)
|
@@ -6103,7 +6571,7 @@ def doDeleteMultiPathGateway(args, parsed_globals):
|
|
6103
6571
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6104
6572
|
|
6105
6573
|
|
6106
|
-
def
|
6574
|
+
def doDeleteCustomErrorPage(args, parsed_globals):
|
6107
6575
|
g_param = parse_global_arg(parsed_globals)
|
6108
6576
|
|
6109
6577
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6132,11 +6600,11 @@ def doDescribeL4Proxy(args, parsed_globals):
|
|
6132
6600
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6133
6601
|
client._sdkVersion += ("_CLI_" + __version__)
|
6134
6602
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6135
|
-
model = models.
|
6603
|
+
model = models.DeleteCustomErrorPageRequest()
|
6136
6604
|
model.from_json_string(json.dumps(args))
|
6137
6605
|
start_time = time.time()
|
6138
6606
|
while True:
|
6139
|
-
rsp = client.
|
6607
|
+
rsp = client.DeleteCustomErrorPage(model)
|
6140
6608
|
result = rsp.to_json_string()
|
6141
6609
|
try:
|
6142
6610
|
json_obj = json.loads(result)
|
@@ -6363,6 +6831,58 @@ def doDeleteWebSecurityTemplate(args, parsed_globals):
|
|
6363
6831
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6364
6832
|
|
6365
6833
|
|
6834
|
+
def doModifySecurityClientAttester(args, parsed_globals):
|
6835
|
+
g_param = parse_global_arg(parsed_globals)
|
6836
|
+
|
6837
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6838
|
+
cred = credential.CVMRoleCredential()
|
6839
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6840
|
+
cred = credential.STSAssumeRoleCredential(
|
6841
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6842
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6843
|
+
)
|
6844
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6845
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6846
|
+
else:
|
6847
|
+
cred = credential.Credential(
|
6848
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6849
|
+
)
|
6850
|
+
http_profile = HttpProfile(
|
6851
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6852
|
+
reqMethod="POST",
|
6853
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6854
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6855
|
+
)
|
6856
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6857
|
+
if g_param[OptionsDefine.Language]:
|
6858
|
+
profile.language = g_param[OptionsDefine.Language]
|
6859
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6860
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6861
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6862
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6863
|
+
model = models.ModifySecurityClientAttesterRequest()
|
6864
|
+
model.from_json_string(json.dumps(args))
|
6865
|
+
start_time = time.time()
|
6866
|
+
while True:
|
6867
|
+
rsp = client.ModifySecurityClientAttester(model)
|
6868
|
+
result = rsp.to_json_string()
|
6869
|
+
try:
|
6870
|
+
json_obj = json.loads(result)
|
6871
|
+
except TypeError as e:
|
6872
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6873
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6874
|
+
break
|
6875
|
+
cur_time = time.time()
|
6876
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6877
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6878
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6879
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6880
|
+
else:
|
6881
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6882
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6883
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6884
|
+
|
6885
|
+
|
6366
6886
|
def doDescribeSecurityPolicy(args, parsed_globals):
|
6367
6887
|
g_param = parse_global_arg(parsed_globals)
|
6368
6888
|
|
@@ -6415,6 +6935,110 @@ def doDescribeSecurityPolicy(args, parsed_globals):
|
|
6415
6935
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6416
6936
|
|
6417
6937
|
|
6938
|
+
def doDeleteSecurityClientAttester(args, parsed_globals):
|
6939
|
+
g_param = parse_global_arg(parsed_globals)
|
6940
|
+
|
6941
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6942
|
+
cred = credential.CVMRoleCredential()
|
6943
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6944
|
+
cred = credential.STSAssumeRoleCredential(
|
6945
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6946
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6947
|
+
)
|
6948
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6949
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6950
|
+
else:
|
6951
|
+
cred = credential.Credential(
|
6952
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6953
|
+
)
|
6954
|
+
http_profile = HttpProfile(
|
6955
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6956
|
+
reqMethod="POST",
|
6957
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6958
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6959
|
+
)
|
6960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6961
|
+
if g_param[OptionsDefine.Language]:
|
6962
|
+
profile.language = g_param[OptionsDefine.Language]
|
6963
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6964
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6965
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6966
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6967
|
+
model = models.DeleteSecurityClientAttesterRequest()
|
6968
|
+
model.from_json_string(json.dumps(args))
|
6969
|
+
start_time = time.time()
|
6970
|
+
while True:
|
6971
|
+
rsp = client.DeleteSecurityClientAttester(model)
|
6972
|
+
result = rsp.to_json_string()
|
6973
|
+
try:
|
6974
|
+
json_obj = json.loads(result)
|
6975
|
+
except TypeError as e:
|
6976
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6977
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6978
|
+
break
|
6979
|
+
cur_time = time.time()
|
6980
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6981
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6982
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6983
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6984
|
+
else:
|
6985
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6986
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6987
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6988
|
+
|
6989
|
+
|
6990
|
+
def doModifyHostsCertificate(args, parsed_globals):
|
6991
|
+
g_param = parse_global_arg(parsed_globals)
|
6992
|
+
|
6993
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6994
|
+
cred = credential.CVMRoleCredential()
|
6995
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6996
|
+
cred = credential.STSAssumeRoleCredential(
|
6997
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6998
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6999
|
+
)
|
7000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7001
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7002
|
+
else:
|
7003
|
+
cred = credential.Credential(
|
7004
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7005
|
+
)
|
7006
|
+
http_profile = HttpProfile(
|
7007
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7008
|
+
reqMethod="POST",
|
7009
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7010
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7011
|
+
)
|
7012
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7013
|
+
if g_param[OptionsDefine.Language]:
|
7014
|
+
profile.language = g_param[OptionsDefine.Language]
|
7015
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7016
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7017
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7018
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7019
|
+
model = models.ModifyHostsCertificateRequest()
|
7020
|
+
model.from_json_string(json.dumps(args))
|
7021
|
+
start_time = time.time()
|
7022
|
+
while True:
|
7023
|
+
rsp = client.ModifyHostsCertificate(model)
|
7024
|
+
result = rsp.to_json_string()
|
7025
|
+
try:
|
7026
|
+
json_obj = json.loads(result)
|
7027
|
+
except TypeError as e:
|
7028
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7029
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7030
|
+
break
|
7031
|
+
cur_time = time.time()
|
7032
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7033
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7034
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7035
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7036
|
+
else:
|
7037
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7038
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7039
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7040
|
+
|
7041
|
+
|
6418
7042
|
def doModifyFunctionRulePriority(args, parsed_globals):
|
6419
7043
|
g_param = parse_global_arg(parsed_globals)
|
6420
7044
|
|
@@ -6571,7 +7195,423 @@ def doModifyMultiPathGatewaySecretKey(args, parsed_globals):
|
|
6571
7195
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6572
7196
|
|
6573
7197
|
|
6574
|
-
def doDescribeRules(args, parsed_globals):
|
7198
|
+
def doDescribeRules(args, parsed_globals):
|
7199
|
+
g_param = parse_global_arg(parsed_globals)
|
7200
|
+
|
7201
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7202
|
+
cred = credential.CVMRoleCredential()
|
7203
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7204
|
+
cred = credential.STSAssumeRoleCredential(
|
7205
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7206
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7207
|
+
)
|
7208
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7209
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7210
|
+
else:
|
7211
|
+
cred = credential.Credential(
|
7212
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7213
|
+
)
|
7214
|
+
http_profile = HttpProfile(
|
7215
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7216
|
+
reqMethod="POST",
|
7217
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7218
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7219
|
+
)
|
7220
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7221
|
+
if g_param[OptionsDefine.Language]:
|
7222
|
+
profile.language = g_param[OptionsDefine.Language]
|
7223
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7224
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7225
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7226
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7227
|
+
model = models.DescribeRulesRequest()
|
7228
|
+
model.from_json_string(json.dumps(args))
|
7229
|
+
start_time = time.time()
|
7230
|
+
while True:
|
7231
|
+
rsp = client.DescribeRules(model)
|
7232
|
+
result = rsp.to_json_string()
|
7233
|
+
try:
|
7234
|
+
json_obj = json.loads(result)
|
7235
|
+
except TypeError as e:
|
7236
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7237
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7238
|
+
break
|
7239
|
+
cur_time = time.time()
|
7240
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7241
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7242
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7243
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7244
|
+
else:
|
7245
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7246
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7247
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7248
|
+
|
7249
|
+
|
7250
|
+
def doCreateCLSIndex(args, parsed_globals):
|
7251
|
+
g_param = parse_global_arg(parsed_globals)
|
7252
|
+
|
7253
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7254
|
+
cred = credential.CVMRoleCredential()
|
7255
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7256
|
+
cred = credential.STSAssumeRoleCredential(
|
7257
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7258
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7259
|
+
)
|
7260
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7261
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7262
|
+
else:
|
7263
|
+
cred = credential.Credential(
|
7264
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7265
|
+
)
|
7266
|
+
http_profile = HttpProfile(
|
7267
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7268
|
+
reqMethod="POST",
|
7269
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7270
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7271
|
+
)
|
7272
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7273
|
+
if g_param[OptionsDefine.Language]:
|
7274
|
+
profile.language = g_param[OptionsDefine.Language]
|
7275
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7276
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7277
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7278
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7279
|
+
model = models.CreateCLSIndexRequest()
|
7280
|
+
model.from_json_string(json.dumps(args))
|
7281
|
+
start_time = time.time()
|
7282
|
+
while True:
|
7283
|
+
rsp = client.CreateCLSIndex(model)
|
7284
|
+
result = rsp.to_json_string()
|
7285
|
+
try:
|
7286
|
+
json_obj = json.loads(result)
|
7287
|
+
except TypeError as e:
|
7288
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7289
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7290
|
+
break
|
7291
|
+
cur_time = time.time()
|
7292
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7293
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7294
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7295
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7296
|
+
else:
|
7297
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7298
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7299
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7300
|
+
|
7301
|
+
|
7302
|
+
def doModifyLoadBalancer(args, parsed_globals):
|
7303
|
+
g_param = parse_global_arg(parsed_globals)
|
7304
|
+
|
7305
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7306
|
+
cred = credential.CVMRoleCredential()
|
7307
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7308
|
+
cred = credential.STSAssumeRoleCredential(
|
7309
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7310
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7311
|
+
)
|
7312
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7313
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7314
|
+
else:
|
7315
|
+
cred = credential.Credential(
|
7316
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7317
|
+
)
|
7318
|
+
http_profile = HttpProfile(
|
7319
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7320
|
+
reqMethod="POST",
|
7321
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7322
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7323
|
+
)
|
7324
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7325
|
+
if g_param[OptionsDefine.Language]:
|
7326
|
+
profile.language = g_param[OptionsDefine.Language]
|
7327
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7328
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7329
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7330
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7331
|
+
model = models.ModifyLoadBalancerRequest()
|
7332
|
+
model.from_json_string(json.dumps(args))
|
7333
|
+
start_time = time.time()
|
7334
|
+
while True:
|
7335
|
+
rsp = client.ModifyLoadBalancer(model)
|
7336
|
+
result = rsp.to_json_string()
|
7337
|
+
try:
|
7338
|
+
json_obj = json.loads(result)
|
7339
|
+
except TypeError as e:
|
7340
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7341
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7342
|
+
break
|
7343
|
+
cur_time = time.time()
|
7344
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7345
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7346
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7347
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7348
|
+
else:
|
7349
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7350
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7351
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7352
|
+
|
7353
|
+
|
7354
|
+
def doCreateApplicationProxy(args, parsed_globals):
|
7355
|
+
g_param = parse_global_arg(parsed_globals)
|
7356
|
+
|
7357
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7358
|
+
cred = credential.CVMRoleCredential()
|
7359
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7360
|
+
cred = credential.STSAssumeRoleCredential(
|
7361
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7362
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7363
|
+
)
|
7364
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7365
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7366
|
+
else:
|
7367
|
+
cred = credential.Credential(
|
7368
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7369
|
+
)
|
7370
|
+
http_profile = HttpProfile(
|
7371
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7372
|
+
reqMethod="POST",
|
7373
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7374
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7375
|
+
)
|
7376
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7377
|
+
if g_param[OptionsDefine.Language]:
|
7378
|
+
profile.language = g_param[OptionsDefine.Language]
|
7379
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7380
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7381
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7382
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7383
|
+
model = models.CreateApplicationProxyRequest()
|
7384
|
+
model.from_json_string(json.dumps(args))
|
7385
|
+
start_time = time.time()
|
7386
|
+
while True:
|
7387
|
+
rsp = client.CreateApplicationProxy(model)
|
7388
|
+
result = rsp.to_json_string()
|
7389
|
+
try:
|
7390
|
+
json_obj = json.loads(result)
|
7391
|
+
except TypeError as e:
|
7392
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7393
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7394
|
+
break
|
7395
|
+
cur_time = time.time()
|
7396
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7397
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7398
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7399
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7400
|
+
else:
|
7401
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7402
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7403
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7404
|
+
|
7405
|
+
|
7406
|
+
def doDeleteRealtimeLogDeliveryTask(args, parsed_globals):
|
7407
|
+
g_param = parse_global_arg(parsed_globals)
|
7408
|
+
|
7409
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7410
|
+
cred = credential.CVMRoleCredential()
|
7411
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7412
|
+
cred = credential.STSAssumeRoleCredential(
|
7413
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7414
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7415
|
+
)
|
7416
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7417
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7418
|
+
else:
|
7419
|
+
cred = credential.Credential(
|
7420
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7421
|
+
)
|
7422
|
+
http_profile = HttpProfile(
|
7423
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7424
|
+
reqMethod="POST",
|
7425
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7426
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7427
|
+
)
|
7428
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7429
|
+
if g_param[OptionsDefine.Language]:
|
7430
|
+
profile.language = g_param[OptionsDefine.Language]
|
7431
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7432
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7433
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7434
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7435
|
+
model = models.DeleteRealtimeLogDeliveryTaskRequest()
|
7436
|
+
model.from_json_string(json.dumps(args))
|
7437
|
+
start_time = time.time()
|
7438
|
+
while True:
|
7439
|
+
rsp = client.DeleteRealtimeLogDeliveryTask(model)
|
7440
|
+
result = rsp.to_json_string()
|
7441
|
+
try:
|
7442
|
+
json_obj = json.loads(result)
|
7443
|
+
except TypeError as e:
|
7444
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7445
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7446
|
+
break
|
7447
|
+
cur_time = time.time()
|
7448
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7449
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7450
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7451
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7452
|
+
else:
|
7453
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7454
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7455
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7456
|
+
|
7457
|
+
|
7458
|
+
def doEnableOriginACL(args, parsed_globals):
|
7459
|
+
g_param = parse_global_arg(parsed_globals)
|
7460
|
+
|
7461
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7462
|
+
cred = credential.CVMRoleCredential()
|
7463
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7464
|
+
cred = credential.STSAssumeRoleCredential(
|
7465
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7466
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7467
|
+
)
|
7468
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7469
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7470
|
+
else:
|
7471
|
+
cred = credential.Credential(
|
7472
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7473
|
+
)
|
7474
|
+
http_profile = HttpProfile(
|
7475
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7476
|
+
reqMethod="POST",
|
7477
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7478
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7479
|
+
)
|
7480
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7481
|
+
if g_param[OptionsDefine.Language]:
|
7482
|
+
profile.language = g_param[OptionsDefine.Language]
|
7483
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7484
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7485
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7486
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7487
|
+
model = models.EnableOriginACLRequest()
|
7488
|
+
model.from_json_string(json.dumps(args))
|
7489
|
+
start_time = time.time()
|
7490
|
+
while True:
|
7491
|
+
rsp = client.EnableOriginACL(model)
|
7492
|
+
result = rsp.to_json_string()
|
7493
|
+
try:
|
7494
|
+
json_obj = json.loads(result)
|
7495
|
+
except TypeError as e:
|
7496
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7497
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7498
|
+
break
|
7499
|
+
cur_time = time.time()
|
7500
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7501
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7502
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7503
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7504
|
+
else:
|
7505
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7506
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7507
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7508
|
+
|
7509
|
+
|
7510
|
+
def doModifyAliasDomain(args, parsed_globals):
|
7511
|
+
g_param = parse_global_arg(parsed_globals)
|
7512
|
+
|
7513
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7514
|
+
cred = credential.CVMRoleCredential()
|
7515
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7516
|
+
cred = credential.STSAssumeRoleCredential(
|
7517
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7518
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7519
|
+
)
|
7520
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7521
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7522
|
+
else:
|
7523
|
+
cred = credential.Credential(
|
7524
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7525
|
+
)
|
7526
|
+
http_profile = HttpProfile(
|
7527
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7528
|
+
reqMethod="POST",
|
7529
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7530
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7531
|
+
)
|
7532
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7533
|
+
if g_param[OptionsDefine.Language]:
|
7534
|
+
profile.language = g_param[OptionsDefine.Language]
|
7535
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7536
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7537
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7538
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7539
|
+
model = models.ModifyAliasDomainRequest()
|
7540
|
+
model.from_json_string(json.dumps(args))
|
7541
|
+
start_time = time.time()
|
7542
|
+
while True:
|
7543
|
+
rsp = client.ModifyAliasDomain(model)
|
7544
|
+
result = rsp.to_json_string()
|
7545
|
+
try:
|
7546
|
+
json_obj = json.loads(result)
|
7547
|
+
except TypeError as e:
|
7548
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7549
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7550
|
+
break
|
7551
|
+
cur_time = time.time()
|
7552
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7553
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7554
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7555
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7556
|
+
else:
|
7557
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7558
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7559
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7560
|
+
|
7561
|
+
|
7562
|
+
def doCreateLoadBalancer(args, parsed_globals):
|
7563
|
+
g_param = parse_global_arg(parsed_globals)
|
7564
|
+
|
7565
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7566
|
+
cred = credential.CVMRoleCredential()
|
7567
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7568
|
+
cred = credential.STSAssumeRoleCredential(
|
7569
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7570
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7571
|
+
)
|
7572
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7573
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7574
|
+
else:
|
7575
|
+
cred = credential.Credential(
|
7576
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7577
|
+
)
|
7578
|
+
http_profile = HttpProfile(
|
7579
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7580
|
+
reqMethod="POST",
|
7581
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7582
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7583
|
+
)
|
7584
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7585
|
+
if g_param[OptionsDefine.Language]:
|
7586
|
+
profile.language = g_param[OptionsDefine.Language]
|
7587
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7588
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7589
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7590
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7591
|
+
model = models.CreateLoadBalancerRequest()
|
7592
|
+
model.from_json_string(json.dumps(args))
|
7593
|
+
start_time = time.time()
|
7594
|
+
while True:
|
7595
|
+
rsp = client.CreateLoadBalancer(model)
|
7596
|
+
result = rsp.to_json_string()
|
7597
|
+
try:
|
7598
|
+
json_obj = json.loads(result)
|
7599
|
+
except TypeError as e:
|
7600
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7601
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7602
|
+
break
|
7603
|
+
cur_time = time.time()
|
7604
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7605
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7606
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7607
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7608
|
+
else:
|
7609
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7610
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7611
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7612
|
+
|
7613
|
+
|
7614
|
+
def doDescribeJustInTimeTranscodeTemplates(args, parsed_globals):
|
6575
7615
|
g_param = parse_global_arg(parsed_globals)
|
6576
7616
|
|
6577
7617
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6600,11 +7640,11 @@ def doDescribeRules(args, parsed_globals):
|
|
6600
7640
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6601
7641
|
client._sdkVersion += ("_CLI_" + __version__)
|
6602
7642
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6603
|
-
model = models.
|
7643
|
+
model = models.DescribeJustInTimeTranscodeTemplatesRequest()
|
6604
7644
|
model.from_json_string(json.dumps(args))
|
6605
7645
|
start_time = time.time()
|
6606
7646
|
while True:
|
6607
|
-
rsp = client.
|
7647
|
+
rsp = client.DescribeJustInTimeTranscodeTemplates(model)
|
6608
7648
|
result = rsp.to_json_string()
|
6609
7649
|
try:
|
6610
7650
|
json_obj = json.loads(result)
|
@@ -6623,7 +7663,7 @@ def doDescribeRules(args, parsed_globals):
|
|
6623
7663
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6624
7664
|
|
6625
7665
|
|
6626
|
-
def
|
7666
|
+
def doModifyApplicationProxyRule(args, parsed_globals):
|
6627
7667
|
g_param = parse_global_arg(parsed_globals)
|
6628
7668
|
|
6629
7669
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6652,11 +7692,11 @@ def doCreateCLSIndex(args, parsed_globals):
|
|
6652
7692
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6653
7693
|
client._sdkVersion += ("_CLI_" + __version__)
|
6654
7694
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6655
|
-
model = models.
|
7695
|
+
model = models.ModifyApplicationProxyRuleRequest()
|
6656
7696
|
model.from_json_string(json.dumps(args))
|
6657
7697
|
start_time = time.time()
|
6658
7698
|
while True:
|
6659
|
-
rsp = client.
|
7699
|
+
rsp = client.ModifyApplicationProxyRule(model)
|
6660
7700
|
result = rsp.to_json_string()
|
6661
7701
|
try:
|
6662
7702
|
json_obj = json.loads(result)
|
@@ -6675,7 +7715,7 @@ def doCreateCLSIndex(args, parsed_globals):
|
|
6675
7715
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6676
7716
|
|
6677
7717
|
|
6678
|
-
def
|
7718
|
+
def doDescribeL7AccSetting(args, parsed_globals):
|
6679
7719
|
g_param = parse_global_arg(parsed_globals)
|
6680
7720
|
|
6681
7721
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6704,11 +7744,11 @@ def doConfirmOriginACLUpdate(args, parsed_globals):
|
|
6704
7744
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6705
7745
|
client._sdkVersion += ("_CLI_" + __version__)
|
6706
7746
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6707
|
-
model = models.
|
7747
|
+
model = models.DescribeL7AccSettingRequest()
|
6708
7748
|
model.from_json_string(json.dumps(args))
|
6709
7749
|
start_time = time.time()
|
6710
7750
|
while True:
|
6711
|
-
rsp = client.
|
7751
|
+
rsp = client.DescribeL7AccSetting(model)
|
6712
7752
|
result = rsp.to_json_string()
|
6713
7753
|
try:
|
6714
7754
|
json_obj = json.loads(result)
|
@@ -6727,7 +7767,7 @@ def doConfirmOriginACLUpdate(args, parsed_globals):
|
|
6727
7767
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6728
7768
|
|
6729
7769
|
|
6730
|
-
def
|
7770
|
+
def doCreateOriginGroup(args, parsed_globals):
|
6731
7771
|
g_param = parse_global_arg(parsed_globals)
|
6732
7772
|
|
6733
7773
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6756,11 +7796,11 @@ def doCreateApplicationProxy(args, parsed_globals):
|
|
6756
7796
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6757
7797
|
client._sdkVersion += ("_CLI_" + __version__)
|
6758
7798
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6759
|
-
model = models.
|
7799
|
+
model = models.CreateOriginGroupRequest()
|
6760
7800
|
model.from_json_string(json.dumps(args))
|
6761
7801
|
start_time = time.time()
|
6762
7802
|
while True:
|
6763
|
-
rsp = client.
|
7803
|
+
rsp = client.CreateOriginGroup(model)
|
6764
7804
|
result = rsp.to_json_string()
|
6765
7805
|
try:
|
6766
7806
|
json_obj = json.loads(result)
|
@@ -6779,7 +7819,7 @@ def doCreateApplicationProxy(args, parsed_globals):
|
|
6779
7819
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6780
7820
|
|
6781
7821
|
|
6782
|
-
def
|
7822
|
+
def doCreateJustInTimeTranscodeTemplate(args, parsed_globals):
|
6783
7823
|
g_param = parse_global_arg(parsed_globals)
|
6784
7824
|
|
6785
7825
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6808,11 +7848,11 @@ def doUpgradePlan(args, parsed_globals):
|
|
6808
7848
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6809
7849
|
client._sdkVersion += ("_CLI_" + __version__)
|
6810
7850
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6811
|
-
model = models.
|
7851
|
+
model = models.CreateJustInTimeTranscodeTemplateRequest()
|
6812
7852
|
model.from_json_string(json.dumps(args))
|
6813
7853
|
start_time = time.time()
|
6814
7854
|
while True:
|
6815
|
-
rsp = client.
|
7855
|
+
rsp = client.CreateJustInTimeTranscodeTemplate(model)
|
6816
7856
|
result = rsp.to_json_string()
|
6817
7857
|
try:
|
6818
7858
|
json_obj = json.loads(result)
|
@@ -6831,7 +7871,7 @@ def doUpgradePlan(args, parsed_globals):
|
|
6831
7871
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6832
7872
|
|
6833
7873
|
|
6834
|
-
def
|
7874
|
+
def doDescribeDeployHistory(args, parsed_globals):
|
6835
7875
|
g_param = parse_global_arg(parsed_globals)
|
6836
7876
|
|
6837
7877
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6860,11 +7900,11 @@ def doEnableOriginACL(args, parsed_globals):
|
|
6860
7900
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6861
7901
|
client._sdkVersion += ("_CLI_" + __version__)
|
6862
7902
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6863
|
-
model = models.
|
7903
|
+
model = models.DescribeDeployHistoryRequest()
|
6864
7904
|
model.from_json_string(json.dumps(args))
|
6865
7905
|
start_time = time.time()
|
6866
7906
|
while True:
|
6867
|
-
rsp = client.
|
7907
|
+
rsp = client.DescribeDeployHistory(model)
|
6868
7908
|
result = rsp.to_json_string()
|
6869
7909
|
try:
|
6870
7910
|
json_obj = json.loads(result)
|
@@ -6883,7 +7923,7 @@ def doEnableOriginACL(args, parsed_globals):
|
|
6883
7923
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6884
7924
|
|
6885
7925
|
|
6886
|
-
def
|
7926
|
+
def doDeployConfigGroupVersion(args, parsed_globals):
|
6887
7927
|
g_param = parse_global_arg(parsed_globals)
|
6888
7928
|
|
6889
7929
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6912,11 +7952,11 @@ def doModifyAliasDomain(args, parsed_globals):
|
|
6912
7952
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6913
7953
|
client._sdkVersion += ("_CLI_" + __version__)
|
6914
7954
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6915
|
-
model = models.
|
7955
|
+
model = models.DeployConfigGroupVersionRequest()
|
6916
7956
|
model.from_json_string(json.dumps(args))
|
6917
7957
|
start_time = time.time()
|
6918
7958
|
while True:
|
6919
|
-
rsp = client.
|
7959
|
+
rsp = client.DeployConfigGroupVersion(model)
|
6920
7960
|
result = rsp.to_json_string()
|
6921
7961
|
try:
|
6922
7962
|
json_obj = json.loads(result)
|
@@ -6935,7 +7975,7 @@ def doModifyAliasDomain(args, parsed_globals):
|
|
6935
7975
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6936
7976
|
|
6937
7977
|
|
6938
|
-
def
|
7978
|
+
def doDescribeHostsSetting(args, parsed_globals):
|
6939
7979
|
g_param = parse_global_arg(parsed_globals)
|
6940
7980
|
|
6941
7981
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6964,11 +8004,11 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
6964
8004
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
6965
8005
|
client._sdkVersion += ("_CLI_" + __version__)
|
6966
8006
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6967
|
-
model = models.
|
8007
|
+
model = models.DescribeHostsSettingRequest()
|
6968
8008
|
model.from_json_string(json.dumps(args))
|
6969
8009
|
start_time = time.time()
|
6970
8010
|
while True:
|
6971
|
-
rsp = client.
|
8011
|
+
rsp = client.DescribeHostsSetting(model)
|
6972
8012
|
result = rsp.to_json_string()
|
6973
8013
|
try:
|
6974
8014
|
json_obj = json.loads(result)
|
@@ -6987,7 +8027,7 @@ def doCreateLoadBalancer(args, parsed_globals):
|
|
6987
8027
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6988
8028
|
|
6989
8029
|
|
6990
|
-
def
|
8030
|
+
def doDescribeSecurityTemplateBindings(args, parsed_globals):
|
6991
8031
|
g_param = parse_global_arg(parsed_globals)
|
6992
8032
|
|
6993
8033
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7016,11 +8056,11 @@ def doModifyApplicationProxyRule(args, parsed_globals):
|
|
7016
8056
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7017
8057
|
client._sdkVersion += ("_CLI_" + __version__)
|
7018
8058
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7019
|
-
model = models.
|
8059
|
+
model = models.DescribeSecurityTemplateBindingsRequest()
|
7020
8060
|
model.from_json_string(json.dumps(args))
|
7021
8061
|
start_time = time.time()
|
7022
8062
|
while True:
|
7023
|
-
rsp = client.
|
8063
|
+
rsp = client.DescribeSecurityTemplateBindings(model)
|
7024
8064
|
result = rsp.to_json_string()
|
7025
8065
|
try:
|
7026
8066
|
json_obj = json.loads(result)
|
@@ -7039,7 +8079,7 @@ def doModifyApplicationProxyRule(args, parsed_globals):
|
|
7039
8079
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7040
8080
|
|
7041
8081
|
|
7042
|
-
def
|
8082
|
+
def doDeleteL4Proxy(args, parsed_globals):
|
7043
8083
|
g_param = parse_global_arg(parsed_globals)
|
7044
8084
|
|
7045
8085
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7068,11 +8108,11 @@ def doDescribeL7AccSetting(args, parsed_globals):
|
|
7068
8108
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7069
8109
|
client._sdkVersion += ("_CLI_" + __version__)
|
7070
8110
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7071
|
-
model = models.
|
8111
|
+
model = models.DeleteL4ProxyRequest()
|
7072
8112
|
model.from_json_string(json.dumps(args))
|
7073
8113
|
start_time = time.time()
|
7074
8114
|
while True:
|
7075
|
-
rsp = client.
|
8115
|
+
rsp = client.DeleteL4Proxy(model)
|
7076
8116
|
result = rsp.to_json_string()
|
7077
8117
|
try:
|
7078
8118
|
json_obj = json.loads(result)
|
@@ -7091,7 +8131,7 @@ def doDescribeL7AccSetting(args, parsed_globals):
|
|
7091
8131
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7092
8132
|
|
7093
8133
|
|
7094
|
-
def
|
8134
|
+
def doBindSharedCNAME(args, parsed_globals):
|
7095
8135
|
g_param = parse_global_arg(parsed_globals)
|
7096
8136
|
|
7097
8137
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7120,11 +8160,11 @@ def doCreateOriginGroup(args, parsed_globals):
|
|
7120
8160
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7121
8161
|
client._sdkVersion += ("_CLI_" + __version__)
|
7122
8162
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7123
|
-
model = models.
|
8163
|
+
model = models.BindSharedCNAMERequest()
|
7124
8164
|
model.from_json_string(json.dumps(args))
|
7125
8165
|
start_time = time.time()
|
7126
8166
|
while True:
|
7127
|
-
rsp = client.
|
8167
|
+
rsp = client.BindSharedCNAME(model)
|
7128
8168
|
result = rsp.to_json_string()
|
7129
8169
|
try:
|
7130
8170
|
json_obj = json.loads(result)
|
@@ -7143,7 +8183,7 @@ def doCreateOriginGroup(args, parsed_globals):
|
|
7143
8183
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7144
8184
|
|
7145
8185
|
|
7146
|
-
def
|
8186
|
+
def doModifyRealtimeLogDeliveryTask(args, parsed_globals):
|
7147
8187
|
g_param = parse_global_arg(parsed_globals)
|
7148
8188
|
|
7149
8189
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7172,11 +8212,11 @@ def doModifyHostsCertificate(args, parsed_globals):
|
|
7172
8212
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7173
8213
|
client._sdkVersion += ("_CLI_" + __version__)
|
7174
8214
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7175
|
-
model = models.
|
8215
|
+
model = models.ModifyRealtimeLogDeliveryTaskRequest()
|
7176
8216
|
model.from_json_string(json.dumps(args))
|
7177
8217
|
start_time = time.time()
|
7178
8218
|
while True:
|
7179
|
-
rsp = client.
|
8219
|
+
rsp = client.ModifyRealtimeLogDeliveryTask(model)
|
7180
8220
|
result = rsp.to_json_string()
|
7181
8221
|
try:
|
7182
8222
|
json_obj = json.loads(result)
|
@@ -7195,7 +8235,7 @@ def doModifyHostsCertificate(args, parsed_globals):
|
|
7195
8235
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7196
8236
|
|
7197
8237
|
|
7198
|
-
def
|
8238
|
+
def doDescribeOriginProtection(args, parsed_globals):
|
7199
8239
|
g_param = parse_global_arg(parsed_globals)
|
7200
8240
|
|
7201
8241
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7224,11 +8264,11 @@ def doDescribeDeployHistory(args, parsed_globals):
|
|
7224
8264
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7225
8265
|
client._sdkVersion += ("_CLI_" + __version__)
|
7226
8266
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7227
|
-
model = models.
|
8267
|
+
model = models.DescribeOriginProtectionRequest()
|
7228
8268
|
model.from_json_string(json.dumps(args))
|
7229
8269
|
start_time = time.time()
|
7230
8270
|
while True:
|
7231
|
-
rsp = client.
|
8271
|
+
rsp = client.DescribeOriginProtection(model)
|
7232
8272
|
result = rsp.to_json_string()
|
7233
8273
|
try:
|
7234
8274
|
json_obj = json.loads(result)
|
@@ -7247,7 +8287,7 @@ def doDescribeDeployHistory(args, parsed_globals):
|
|
7247
8287
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7248
8288
|
|
7249
8289
|
|
7250
|
-
def
|
8290
|
+
def doModifyL4ProxyRulesStatus(args, parsed_globals):
|
7251
8291
|
g_param = parse_global_arg(parsed_globals)
|
7252
8292
|
|
7253
8293
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7276,11 +8316,11 @@ def doDeployConfigGroupVersion(args, parsed_globals):
|
|
7276
8316
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7277
8317
|
client._sdkVersion += ("_CLI_" + __version__)
|
7278
8318
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7279
|
-
model = models.
|
8319
|
+
model = models.ModifyL4ProxyRulesStatusRequest()
|
7280
8320
|
model.from_json_string(json.dumps(args))
|
7281
8321
|
start_time = time.time()
|
7282
8322
|
while True:
|
7283
|
-
rsp = client.
|
8323
|
+
rsp = client.ModifyL4ProxyRulesStatus(model)
|
7284
8324
|
result = rsp.to_json_string()
|
7285
8325
|
try:
|
7286
8326
|
json_obj = json.loads(result)
|
@@ -7299,7 +8339,7 @@ def doDeployConfigGroupVersion(args, parsed_globals):
|
|
7299
8339
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7300
8340
|
|
7301
8341
|
|
7302
|
-
def
|
8342
|
+
def doRenewPlan(args, parsed_globals):
|
7303
8343
|
g_param = parse_global_arg(parsed_globals)
|
7304
8344
|
|
7305
8345
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7328,11 +8368,11 @@ def doDescribeHostsSetting(args, parsed_globals):
|
|
7328
8368
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7329
8369
|
client._sdkVersion += ("_CLI_" + __version__)
|
7330
8370
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7331
|
-
model = models.
|
8371
|
+
model = models.RenewPlanRequest()
|
7332
8372
|
model.from_json_string(json.dumps(args))
|
7333
8373
|
start_time = time.time()
|
7334
8374
|
while True:
|
7335
|
-
rsp = client.
|
8375
|
+
rsp = client.RenewPlan(model)
|
7336
8376
|
result = rsp.to_json_string()
|
7337
8377
|
try:
|
7338
8378
|
json_obj = json.loads(result)
|
@@ -7351,7 +8391,7 @@ def doDescribeHostsSetting(args, parsed_globals):
|
|
7351
8391
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7352
8392
|
|
7353
8393
|
|
7354
|
-
def
|
8394
|
+
def doDescribeZoneSetting(args, parsed_globals):
|
7355
8395
|
g_param = parse_global_arg(parsed_globals)
|
7356
8396
|
|
7357
8397
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7380,11 +8420,11 @@ def doDescribeSecurityTemplateBindings(args, parsed_globals):
|
|
7380
8420
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7381
8421
|
client._sdkVersion += ("_CLI_" + __version__)
|
7382
8422
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7383
|
-
model = models.
|
8423
|
+
model = models.DescribeZoneSettingRequest()
|
7384
8424
|
model.from_json_string(json.dumps(args))
|
7385
8425
|
start_time = time.time()
|
7386
8426
|
while True:
|
7387
|
-
rsp = client.
|
8427
|
+
rsp = client.DescribeZoneSetting(model)
|
7388
8428
|
result = rsp.to_json_string()
|
7389
8429
|
try:
|
7390
8430
|
json_obj = json.loads(result)
|
@@ -7403,7 +8443,7 @@ def doDescribeSecurityTemplateBindings(args, parsed_globals):
|
|
7403
8443
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7404
8444
|
|
7405
8445
|
|
7406
|
-
def
|
8446
|
+
def doDescribeSecurityAPIResource(args, parsed_globals):
|
7407
8447
|
g_param = parse_global_arg(parsed_globals)
|
7408
8448
|
|
7409
8449
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7432,11 +8472,11 @@ def doDeleteL4Proxy(args, parsed_globals):
|
|
7432
8472
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7433
8473
|
client._sdkVersion += ("_CLI_" + __version__)
|
7434
8474
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7435
|
-
model = models.
|
8475
|
+
model = models.DescribeSecurityAPIResourceRequest()
|
7436
8476
|
model.from_json_string(json.dumps(args))
|
7437
8477
|
start_time = time.time()
|
7438
8478
|
while True:
|
7439
|
-
rsp = client.
|
8479
|
+
rsp = client.DescribeSecurityAPIResource(model)
|
7440
8480
|
result = rsp.to_json_string()
|
7441
8481
|
try:
|
7442
8482
|
json_obj = json.loads(result)
|
@@ -7455,7 +8495,7 @@ def doDeleteL4Proxy(args, parsed_globals):
|
|
7455
8495
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7456
8496
|
|
7457
8497
|
|
7458
|
-
def
|
8498
|
+
def doDescribeZoneConfigImportResult(args, parsed_globals):
|
7459
8499
|
g_param = parse_global_arg(parsed_globals)
|
7460
8500
|
|
7461
8501
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7484,11 +8524,11 @@ def doBindSharedCNAME(args, parsed_globals):
|
|
7484
8524
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7485
8525
|
client._sdkVersion += ("_CLI_" + __version__)
|
7486
8526
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7487
|
-
model = models.
|
8527
|
+
model = models.DescribeZoneConfigImportResultRequest()
|
7488
8528
|
model.from_json_string(json.dumps(args))
|
7489
8529
|
start_time = time.time()
|
7490
8530
|
while True:
|
7491
|
-
rsp = client.
|
8531
|
+
rsp = client.DescribeZoneConfigImportResult(model)
|
7492
8532
|
result = rsp.to_json_string()
|
7493
8533
|
try:
|
7494
8534
|
json_obj = json.loads(result)
|
@@ -7507,7 +8547,7 @@ def doBindSharedCNAME(args, parsed_globals):
|
|
7507
8547
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7508
8548
|
|
7509
8549
|
|
7510
|
-
def
|
8550
|
+
def doCreateContentIdentifier(args, parsed_globals):
|
7511
8551
|
g_param = parse_global_arg(parsed_globals)
|
7512
8552
|
|
7513
8553
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7536,11 +8576,11 @@ def doModifyRealtimeLogDeliveryTask(args, parsed_globals):
|
|
7536
8576
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7537
8577
|
client._sdkVersion += ("_CLI_" + __version__)
|
7538
8578
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7539
|
-
model = models.
|
8579
|
+
model = models.CreateContentIdentifierRequest()
|
7540
8580
|
model.from_json_string(json.dumps(args))
|
7541
8581
|
start_time = time.time()
|
7542
8582
|
while True:
|
7543
|
-
rsp = client.
|
8583
|
+
rsp = client.CreateContentIdentifier(model)
|
7544
8584
|
result = rsp.to_json_string()
|
7545
8585
|
try:
|
7546
8586
|
json_obj = json.loads(result)
|
@@ -7559,7 +8599,7 @@ def doModifyRealtimeLogDeliveryTask(args, parsed_globals):
|
|
7559
8599
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7560
8600
|
|
7561
8601
|
|
7562
|
-
def
|
8602
|
+
def doDeleteSecurityIPGroup(args, parsed_globals):
|
7563
8603
|
g_param = parse_global_arg(parsed_globals)
|
7564
8604
|
|
7565
8605
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7588,11 +8628,11 @@ def doDescribeOriginProtection(args, parsed_globals):
|
|
7588
8628
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7589
8629
|
client._sdkVersion += ("_CLI_" + __version__)
|
7590
8630
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7591
|
-
model = models.
|
8631
|
+
model = models.DeleteSecurityIPGroupRequest()
|
7592
8632
|
model.from_json_string(json.dumps(args))
|
7593
8633
|
start_time = time.time()
|
7594
8634
|
while True:
|
7595
|
-
rsp = client.
|
8635
|
+
rsp = client.DeleteSecurityIPGroup(model)
|
7596
8636
|
result = rsp.to_json_string()
|
7597
8637
|
try:
|
7598
8638
|
json_obj = json.loads(result)
|
@@ -7611,7 +8651,7 @@ def doDescribeOriginProtection(args, parsed_globals):
|
|
7611
8651
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7612
8652
|
|
7613
8653
|
|
7614
|
-
def
|
8654
|
+
def doCreateApplicationProxyRule(args, parsed_globals):
|
7615
8655
|
g_param = parse_global_arg(parsed_globals)
|
7616
8656
|
|
7617
8657
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7640,11 +8680,11 @@ def doModifyL4ProxyRulesStatus(args, parsed_globals):
|
|
7640
8680
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7641
8681
|
client._sdkVersion += ("_CLI_" + __version__)
|
7642
8682
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7643
|
-
model = models.
|
8683
|
+
model = models.CreateApplicationProxyRuleRequest()
|
7644
8684
|
model.from_json_string(json.dumps(args))
|
7645
8685
|
start_time = time.time()
|
7646
8686
|
while True:
|
7647
|
-
rsp = client.
|
8687
|
+
rsp = client.CreateApplicationProxyRule(model)
|
7648
8688
|
result = rsp.to_json_string()
|
7649
8689
|
try:
|
7650
8690
|
json_obj = json.loads(result)
|
@@ -7663,7 +8703,7 @@ def doModifyL4ProxyRulesStatus(args, parsed_globals):
|
|
7663
8703
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7664
8704
|
|
7665
8705
|
|
7666
|
-
def
|
8706
|
+
def doModifySecurityJSInjectionRule(args, parsed_globals):
|
7667
8707
|
g_param = parse_global_arg(parsed_globals)
|
7668
8708
|
|
7669
8709
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7692,11 +8732,11 @@ def doRenewPlan(args, parsed_globals):
|
|
7692
8732
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7693
8733
|
client._sdkVersion += ("_CLI_" + __version__)
|
7694
8734
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7695
|
-
model = models.
|
8735
|
+
model = models.ModifySecurityJSInjectionRuleRequest()
|
7696
8736
|
model.from_json_string(json.dumps(args))
|
7697
8737
|
start_time = time.time()
|
7698
8738
|
while True:
|
7699
|
-
rsp = client.
|
8739
|
+
rsp = client.ModifySecurityJSInjectionRule(model)
|
7700
8740
|
result = rsp.to_json_string()
|
7701
8741
|
try:
|
7702
8742
|
json_obj = json.loads(result)
|
@@ -7715,7 +8755,7 @@ def doRenewPlan(args, parsed_globals):
|
|
7715
8755
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7716
8756
|
|
7717
8757
|
|
7718
|
-
def
|
8758
|
+
def doDescribeMultiPathGatewaySecretKey(args, parsed_globals):
|
7719
8759
|
g_param = parse_global_arg(parsed_globals)
|
7720
8760
|
|
7721
8761
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7744,11 +8784,11 @@ def doDescribeZoneSetting(args, parsed_globals):
|
|
7744
8784
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7745
8785
|
client._sdkVersion += ("_CLI_" + __version__)
|
7746
8786
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7747
|
-
model = models.
|
8787
|
+
model = models.DescribeMultiPathGatewaySecretKeyRequest()
|
7748
8788
|
model.from_json_string(json.dumps(args))
|
7749
8789
|
start_time = time.time()
|
7750
8790
|
while True:
|
7751
|
-
rsp = client.
|
8791
|
+
rsp = client.DescribeMultiPathGatewaySecretKey(model)
|
7752
8792
|
result = rsp.to_json_string()
|
7753
8793
|
try:
|
7754
8794
|
json_obj = json.loads(result)
|
@@ -7767,7 +8807,7 @@ def doDescribeZoneSetting(args, parsed_globals):
|
|
7767
8807
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7768
8808
|
|
7769
8809
|
|
7770
|
-
def
|
8810
|
+
def doDescribeFunctions(args, parsed_globals):
|
7771
8811
|
g_param = parse_global_arg(parsed_globals)
|
7772
8812
|
|
7773
8813
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7796,11 +8836,11 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
7796
8836
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7797
8837
|
client._sdkVersion += ("_CLI_" + __version__)
|
7798
8838
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7799
|
-
model = models.
|
8839
|
+
model = models.DescribeFunctionsRequest()
|
7800
8840
|
model.from_json_string(json.dumps(args))
|
7801
8841
|
start_time = time.time()
|
7802
8842
|
while True:
|
7803
|
-
rsp = client.
|
8843
|
+
rsp = client.DescribeFunctions(model)
|
7804
8844
|
result = rsp.to_json_string()
|
7805
8845
|
try:
|
7806
8846
|
json_obj = json.loads(result)
|
@@ -7819,7 +8859,7 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
7819
8859
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7820
8860
|
|
7821
8861
|
|
7822
|
-
def
|
8862
|
+
def doDeleteZone(args, parsed_globals):
|
7823
8863
|
g_param = parse_global_arg(parsed_globals)
|
7824
8864
|
|
7825
8865
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7848,11 +8888,11 @@ def doCreateContentIdentifier(args, parsed_globals):
|
|
7848
8888
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7849
8889
|
client._sdkVersion += ("_CLI_" + __version__)
|
7850
8890
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7851
|
-
model = models.
|
8891
|
+
model = models.DeleteZoneRequest()
|
7852
8892
|
model.from_json_string(json.dumps(args))
|
7853
8893
|
start_time = time.time()
|
7854
8894
|
while True:
|
7855
|
-
rsp = client.
|
8895
|
+
rsp = client.DeleteZone(model)
|
7856
8896
|
result = rsp.to_json_string()
|
7857
8897
|
try:
|
7858
8898
|
json_obj = json.loads(result)
|
@@ -7871,7 +8911,7 @@ def doCreateContentIdentifier(args, parsed_globals):
|
|
7871
8911
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7872
8912
|
|
7873
8913
|
|
7874
|
-
def
|
8914
|
+
def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
7875
8915
|
g_param = parse_global_arg(parsed_globals)
|
7876
8916
|
|
7877
8917
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7900,11 +8940,11 @@ def doDeleteSecurityIPGroup(args, parsed_globals):
|
|
7900
8940
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7901
8941
|
client._sdkVersion += ("_CLI_" + __version__)
|
7902
8942
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7903
|
-
model = models.
|
8943
|
+
model = models.DescribeSecurityIPGroupInfoRequest()
|
7904
8944
|
model.from_json_string(json.dumps(args))
|
7905
8945
|
start_time = time.time()
|
7906
8946
|
while True:
|
7907
|
-
rsp = client.
|
8947
|
+
rsp = client.DescribeSecurityIPGroupInfo(model)
|
7908
8948
|
result = rsp.to_json_string()
|
7909
8949
|
try:
|
7910
8950
|
json_obj = json.loads(result)
|
@@ -7923,7 +8963,7 @@ def doDeleteSecurityIPGroup(args, parsed_globals):
|
|
7923
8963
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7924
8964
|
|
7925
8965
|
|
7926
|
-
def
|
8966
|
+
def doCreatePlan(args, parsed_globals):
|
7927
8967
|
g_param = parse_global_arg(parsed_globals)
|
7928
8968
|
|
7929
8969
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -7952,11 +8992,11 @@ def doCreateApplicationProxyRule(args, parsed_globals):
|
|
7952
8992
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
7953
8993
|
client._sdkVersion += ("_CLI_" + __version__)
|
7954
8994
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7955
|
-
model = models.
|
8995
|
+
model = models.CreatePlanRequest()
|
7956
8996
|
model.from_json_string(json.dumps(args))
|
7957
8997
|
start_time = time.time()
|
7958
8998
|
while True:
|
7959
|
-
rsp = client.
|
8999
|
+
rsp = client.CreatePlan(model)
|
7960
9000
|
result = rsp.to_json_string()
|
7961
9001
|
try:
|
7962
9002
|
json_obj = json.loads(result)
|
@@ -7975,7 +9015,7 @@ def doCreateApplicationProxyRule(args, parsed_globals):
|
|
7975
9015
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7976
9016
|
|
7977
9017
|
|
7978
|
-
def
|
9018
|
+
def doDescribeDnsRecords(args, parsed_globals):
|
7979
9019
|
g_param = parse_global_arg(parsed_globals)
|
7980
9020
|
|
7981
9021
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8004,11 +9044,11 @@ def doDescribeMultiPathGatewaySecretKey(args, parsed_globals):
|
|
8004
9044
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8005
9045
|
client._sdkVersion += ("_CLI_" + __version__)
|
8006
9046
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8007
|
-
model = models.
|
9047
|
+
model = models.DescribeDnsRecordsRequest()
|
8008
9048
|
model.from_json_string(json.dumps(args))
|
8009
9049
|
start_time = time.time()
|
8010
9050
|
while True:
|
8011
|
-
rsp = client.
|
9051
|
+
rsp = client.DescribeDnsRecords(model)
|
8012
9052
|
result = rsp.to_json_string()
|
8013
9053
|
try:
|
8014
9054
|
json_obj = json.loads(result)
|
@@ -8027,7 +9067,7 @@ def doDescribeMultiPathGatewaySecretKey(args, parsed_globals):
|
|
8027
9067
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8028
9068
|
|
8029
9069
|
|
8030
|
-
def
|
9070
|
+
def doModifyDDoSProtection(args, parsed_globals):
|
8031
9071
|
g_param = parse_global_arg(parsed_globals)
|
8032
9072
|
|
8033
9073
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8056,11 +9096,11 @@ def doDescribeFunctions(args, parsed_globals):
|
|
8056
9096
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8057
9097
|
client._sdkVersion += ("_CLI_" + __version__)
|
8058
9098
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8059
|
-
model = models.
|
9099
|
+
model = models.ModifyDDoSProtectionRequest()
|
8060
9100
|
model.from_json_string(json.dumps(args))
|
8061
9101
|
start_time = time.time()
|
8062
9102
|
while True:
|
8063
|
-
rsp = client.
|
9103
|
+
rsp = client.ModifyDDoSProtection(model)
|
8064
9104
|
result = rsp.to_json_string()
|
8065
9105
|
try:
|
8066
9106
|
json_obj = json.loads(result)
|
@@ -8079,7 +9119,7 @@ def doDescribeFunctions(args, parsed_globals):
|
|
8079
9119
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8080
9120
|
|
8081
9121
|
|
8082
|
-
def
|
9122
|
+
def doDescribeSecurityAPIService(args, parsed_globals):
|
8083
9123
|
g_param = parse_global_arg(parsed_globals)
|
8084
9124
|
|
8085
9125
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8108,11 +9148,11 @@ def doDeleteZone(args, parsed_globals):
|
|
8108
9148
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8109
9149
|
client._sdkVersion += ("_CLI_" + __version__)
|
8110
9150
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8111
|
-
model = models.
|
9151
|
+
model = models.DescribeSecurityAPIServiceRequest()
|
8112
9152
|
model.from_json_string(json.dumps(args))
|
8113
9153
|
start_time = time.time()
|
8114
9154
|
while True:
|
8115
|
-
rsp = client.
|
9155
|
+
rsp = client.DescribeSecurityAPIService(model)
|
8116
9156
|
result = rsp.to_json_string()
|
8117
9157
|
try:
|
8118
9158
|
json_obj = json.loads(result)
|
@@ -8131,7 +9171,7 @@ def doDeleteZone(args, parsed_globals):
|
|
8131
9171
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8132
9172
|
|
8133
9173
|
|
8134
|
-
def
|
9174
|
+
def doImportZoneConfig(args, parsed_globals):
|
8135
9175
|
g_param = parse_global_arg(parsed_globals)
|
8136
9176
|
|
8137
9177
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8160,11 +9200,11 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
8160
9200
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8161
9201
|
client._sdkVersion += ("_CLI_" + __version__)
|
8162
9202
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8163
|
-
model = models.
|
9203
|
+
model = models.ImportZoneConfigRequest()
|
8164
9204
|
model.from_json_string(json.dumps(args))
|
8165
9205
|
start_time = time.time()
|
8166
9206
|
while True:
|
8167
|
-
rsp = client.
|
9207
|
+
rsp = client.ImportZoneConfig(model)
|
8168
9208
|
result = rsp.to_json_string()
|
8169
9209
|
try:
|
8170
9210
|
json_obj = json.loads(result)
|
@@ -8183,7 +9223,7 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
8183
9223
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8184
9224
|
|
8185
9225
|
|
8186
|
-
def
|
9226
|
+
def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
8187
9227
|
g_param = parse_global_arg(parsed_globals)
|
8188
9228
|
|
8189
9229
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8212,11 +9252,11 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
8212
9252
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8213
9253
|
client._sdkVersion += ("_CLI_" + __version__)
|
8214
9254
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8215
|
-
model = models.
|
9255
|
+
model = models.CreateMultiPathGatewaySecretKeyRequest()
|
8216
9256
|
model.from_json_string(json.dumps(args))
|
8217
9257
|
start_time = time.time()
|
8218
9258
|
while True:
|
8219
|
-
rsp = client.
|
9259
|
+
rsp = client.CreateMultiPathGatewaySecretKey(model)
|
8220
9260
|
result = rsp.to_json_string()
|
8221
9261
|
try:
|
8222
9262
|
json_obj = json.loads(result)
|
@@ -8235,7 +9275,7 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
8235
9275
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8236
9276
|
|
8237
9277
|
|
8238
|
-
def
|
9278
|
+
def doModifyCustomErrorPage(args, parsed_globals):
|
8239
9279
|
g_param = parse_global_arg(parsed_globals)
|
8240
9280
|
|
8241
9281
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8264,11 +9304,11 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
8264
9304
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8265
9305
|
client._sdkVersion += ("_CLI_" + __version__)
|
8266
9306
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8267
|
-
model = models.
|
9307
|
+
model = models.ModifyCustomErrorPageRequest()
|
8268
9308
|
model.from_json_string(json.dumps(args))
|
8269
9309
|
start_time = time.time()
|
8270
9310
|
while True:
|
8271
|
-
rsp = client.
|
9311
|
+
rsp = client.ModifyCustomErrorPage(model)
|
8272
9312
|
result = rsp.to_json_string()
|
8273
9313
|
try:
|
8274
9314
|
json_obj = json.loads(result)
|
@@ -8287,7 +9327,7 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
8287
9327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8288
9328
|
|
8289
9329
|
|
8290
|
-
def
|
9330
|
+
def doDescribeL4ProxyRules(args, parsed_globals):
|
8291
9331
|
g_param = parse_global_arg(parsed_globals)
|
8292
9332
|
|
8293
9333
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8316,11 +9356,11 @@ def doImportZoneConfig(args, parsed_globals):
|
|
8316
9356
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8317
9357
|
client._sdkVersion += ("_CLI_" + __version__)
|
8318
9358
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8319
|
-
model = models.
|
9359
|
+
model = models.DescribeL4ProxyRulesRequest()
|
8320
9360
|
model.from_json_string(json.dumps(args))
|
8321
9361
|
start_time = time.time()
|
8322
9362
|
while True:
|
8323
|
-
rsp = client.
|
9363
|
+
rsp = client.DescribeL4ProxyRules(model)
|
8324
9364
|
result = rsp.to_json_string()
|
8325
9365
|
try:
|
8326
9366
|
json_obj = json.loads(result)
|
@@ -8339,7 +9379,7 @@ def doImportZoneConfig(args, parsed_globals):
|
|
8339
9379
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8340
9380
|
|
8341
9381
|
|
8342
|
-
def
|
9382
|
+
def doDescribeDDoSAttackData(args, parsed_globals):
|
8343
9383
|
g_param = parse_global_arg(parsed_globals)
|
8344
9384
|
|
8345
9385
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8368,11 +9408,11 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
8368
9408
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8369
9409
|
client._sdkVersion += ("_CLI_" + __version__)
|
8370
9410
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8371
|
-
model = models.
|
9411
|
+
model = models.DescribeDDoSAttackDataRequest()
|
8372
9412
|
model.from_json_string(json.dumps(args))
|
8373
9413
|
start_time = time.time()
|
8374
9414
|
while True:
|
8375
|
-
rsp = client.
|
9415
|
+
rsp = client.DescribeDDoSAttackData(model)
|
8376
9416
|
result = rsp.to_json_string()
|
8377
9417
|
try:
|
8378
9418
|
json_obj = json.loads(result)
|
@@ -8391,7 +9431,7 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
8391
9431
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8392
9432
|
|
8393
9433
|
|
8394
|
-
def
|
9434
|
+
def doDeleteSharedCNAME(args, parsed_globals):
|
8395
9435
|
g_param = parse_global_arg(parsed_globals)
|
8396
9436
|
|
8397
9437
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8420,11 +9460,11 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
8420
9460
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8421
9461
|
client._sdkVersion += ("_CLI_" + __version__)
|
8422
9462
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8423
|
-
model = models.
|
9463
|
+
model = models.DeleteSharedCNAMERequest()
|
8424
9464
|
model.from_json_string(json.dumps(args))
|
8425
9465
|
start_time = time.time()
|
8426
9466
|
while True:
|
8427
|
-
rsp = client.
|
9467
|
+
rsp = client.DeleteSharedCNAME(model)
|
8428
9468
|
result = rsp.to_json_string()
|
8429
9469
|
try:
|
8430
9470
|
json_obj = json.loads(result)
|
@@ -8443,7 +9483,7 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
8443
9483
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8444
9484
|
|
8445
9485
|
|
8446
|
-
def
|
9486
|
+
def doCreateSecurityAPIService(args, parsed_globals):
|
8447
9487
|
g_param = parse_global_arg(parsed_globals)
|
8448
9488
|
|
8449
9489
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8472,11 +9512,11 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
8472
9512
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8473
9513
|
client._sdkVersion += ("_CLI_" + __version__)
|
8474
9514
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8475
|
-
model = models.
|
9515
|
+
model = models.CreateSecurityAPIServiceRequest()
|
8476
9516
|
model.from_json_string(json.dumps(args))
|
8477
9517
|
start_time = time.time()
|
8478
9518
|
while True:
|
8479
|
-
rsp = client.
|
9519
|
+
rsp = client.CreateSecurityAPIService(model)
|
8480
9520
|
result = rsp.to_json_string()
|
8481
9521
|
try:
|
8482
9522
|
json_obj = json.loads(result)
|
@@ -8495,7 +9535,7 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
8495
9535
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8496
9536
|
|
8497
9537
|
|
8498
|
-
def
|
9538
|
+
def doDescribeAliasDomains(args, parsed_globals):
|
8499
9539
|
g_param = parse_global_arg(parsed_globals)
|
8500
9540
|
|
8501
9541
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8524,11 +9564,11 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
8524
9564
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8525
9565
|
client._sdkVersion += ("_CLI_" + __version__)
|
8526
9566
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8527
|
-
model = models.
|
9567
|
+
model = models.DescribeAliasDomainsRequest()
|
8528
9568
|
model.from_json_string(json.dumps(args))
|
8529
9569
|
start_time = time.time()
|
8530
9570
|
while True:
|
8531
|
-
rsp = client.
|
9571
|
+
rsp = client.DescribeAliasDomains(model)
|
8532
9572
|
result = rsp.to_json_string()
|
8533
9573
|
try:
|
8534
9574
|
json_obj = json.loads(result)
|
@@ -8547,7 +9587,7 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
8547
9587
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8548
9588
|
|
8549
9589
|
|
8550
|
-
def
|
9590
|
+
def doDescribeL4Proxy(args, parsed_globals):
|
8551
9591
|
g_param = parse_global_arg(parsed_globals)
|
8552
9592
|
|
8553
9593
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8576,11 +9616,11 @@ def doDescribeAliasDomains(args, parsed_globals):
|
|
8576
9616
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8577
9617
|
client._sdkVersion += ("_CLI_" + __version__)
|
8578
9618
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8579
|
-
model = models.
|
9619
|
+
model = models.DescribeL4ProxyRequest()
|
8580
9620
|
model.from_json_string(json.dumps(args))
|
8581
9621
|
start_time = time.time()
|
8582
9622
|
while True:
|
8583
|
-
rsp = client.
|
9623
|
+
rsp = client.DescribeL4Proxy(model)
|
8584
9624
|
result = rsp.to_json_string()
|
8585
9625
|
try:
|
8586
9626
|
json_obj = json.loads(result)
|
@@ -8599,7 +9639,7 @@ def doDescribeAliasDomains(args, parsed_globals):
|
|
8599
9639
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8600
9640
|
|
8601
9641
|
|
8602
|
-
def
|
9642
|
+
def doDeleteMultiPathGatewayLine(args, parsed_globals):
|
8603
9643
|
g_param = parse_global_arg(parsed_globals)
|
8604
9644
|
|
8605
9645
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8628,11 +9668,11 @@ def doDeleteCustomErrorPage(args, parsed_globals):
|
|
8628
9668
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8629
9669
|
client._sdkVersion += ("_CLI_" + __version__)
|
8630
9670
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8631
|
-
model = models.
|
9671
|
+
model = models.DeleteMultiPathGatewayLineRequest()
|
8632
9672
|
model.from_json_string(json.dumps(args))
|
8633
9673
|
start_time = time.time()
|
8634
9674
|
while True:
|
8635
|
-
rsp = client.
|
9675
|
+
rsp = client.DeleteMultiPathGatewayLine(model)
|
8636
9676
|
result = rsp.to_json_string()
|
8637
9677
|
try:
|
8638
9678
|
json_obj = json.loads(result)
|
@@ -8651,7 +9691,7 @@ def doDeleteCustomErrorPage(args, parsed_globals):
|
|
8651
9691
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8652
9692
|
|
8653
9693
|
|
8654
|
-
def
|
9694
|
+
def doDescribeBillingData(args, parsed_globals):
|
8655
9695
|
g_param = parse_global_arg(parsed_globals)
|
8656
9696
|
|
8657
9697
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8680,11 +9720,11 @@ def doDeleteMultiPathGatewayLine(args, parsed_globals):
|
|
8680
9720
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8681
9721
|
client._sdkVersion += ("_CLI_" + __version__)
|
8682
9722
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8683
|
-
model = models.
|
9723
|
+
model = models.DescribeBillingDataRequest()
|
8684
9724
|
model.from_json_string(json.dumps(args))
|
8685
9725
|
start_time = time.time()
|
8686
9726
|
while True:
|
8687
|
-
rsp = client.
|
9727
|
+
rsp = client.DescribeBillingData(model)
|
8688
9728
|
result = rsp.to_json_string()
|
8689
9729
|
try:
|
8690
9730
|
json_obj = json.loads(result)
|
@@ -8703,7 +9743,7 @@ def doDeleteMultiPathGatewayLine(args, parsed_globals):
|
|
8703
9743
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8704
9744
|
|
8705
9745
|
|
8706
|
-
def
|
9746
|
+
def doDeleteJustInTimeTranscodeTemplates(args, parsed_globals):
|
8707
9747
|
g_param = parse_global_arg(parsed_globals)
|
8708
9748
|
|
8709
9749
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8732,11 +9772,11 @@ def doDescribeBillingData(args, parsed_globals):
|
|
8732
9772
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
8733
9773
|
client._sdkVersion += ("_CLI_" + __version__)
|
8734
9774
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8735
|
-
model = models.
|
9775
|
+
model = models.DeleteJustInTimeTranscodeTemplatesRequest()
|
8736
9776
|
model.from_json_string(json.dumps(args))
|
8737
9777
|
start_time = time.time()
|
8738
9778
|
while True:
|
8739
|
-
rsp = client.
|
9779
|
+
rsp = client.DeleteJustInTimeTranscodeTemplates(model)
|
8740
9780
|
result = rsp.to_json_string()
|
8741
9781
|
try:
|
8742
9782
|
json_obj = json.loads(result)
|
@@ -8828,6 +9868,7 @@ ACTION_MAP = {
|
|
8828
9868
|
"CreatePurgeTask": doCreatePurgeTask,
|
8829
9869
|
"DescribeDDoSProtection": doDescribeDDoSProtection,
|
8830
9870
|
"DescribeMultiPathGatewayRegions": doDescribeMultiPathGatewayRegions,
|
9871
|
+
"ConfirmOriginACLUpdate": doConfirmOriginACLUpdate,
|
8831
9872
|
"DownloadL4Logs": doDownloadL4Logs,
|
8832
9873
|
"CreatePlanForZone": doCreatePlanForZone,
|
8833
9874
|
"DescribeContentQuota": doDescribeContentQuota,
|
@@ -8840,11 +9881,13 @@ ACTION_MAP = {
|
|
8840
9881
|
"IdentifyZone": doIdentifyZone,
|
8841
9882
|
"DescribeDefaultCertificates": doDescribeDefaultCertificates,
|
8842
9883
|
"ModifyL7AccRule": doModifyL7AccRule,
|
8843
|
-
"
|
9884
|
+
"CreateSecurityJSInjectionRule": doCreateSecurityJSInjectionRule,
|
8844
9885
|
"DescribeFunctionRuntimeEnvironment": doDescribeFunctionRuntimeEnvironment,
|
8845
9886
|
"ModifyOriginGroup": doModifyOriginGroup,
|
9887
|
+
"DeleteSecurityAPIResource": doDeleteSecurityAPIResource,
|
8846
9888
|
"DeleteApplicationProxy": doDeleteApplicationProxy,
|
8847
9889
|
"ModifyL7AccSetting": doModifyL7AccSetting,
|
9890
|
+
"CreateSecurityAPIResource": doCreateSecurityAPIResource,
|
8848
9891
|
"DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
|
8849
9892
|
"ModifyL4ProxyStatus": doModifyL4ProxyStatus,
|
8850
9893
|
"DownloadL7Logs": doDownloadL7Logs,
|
@@ -8869,8 +9912,9 @@ ACTION_MAP = {
|
|
8869
9912
|
"DescribeLoadBalancerList": doDescribeLoadBalancerList,
|
8870
9913
|
"CreateSecurityIPGroup": doCreateSecurityIPGroup,
|
8871
9914
|
"DescribeIPRegion": doDescribeIPRegion,
|
8872
|
-
"
|
9915
|
+
"DescribeAccelerationDomains": doDescribeAccelerationDomains,
|
8873
9916
|
"DeleteAccelerationDomains": doDeleteAccelerationDomains,
|
9917
|
+
"DeleteSecurityJSInjectionRule": doDeleteSecurityJSInjectionRule,
|
8874
9918
|
"RefreshMultiPathGatewaySecretKey": doRefreshMultiPathGatewaySecretKey,
|
8875
9919
|
"CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
|
8876
9920
|
"ModifyL4Proxy": doModifyL4Proxy,
|
@@ -8881,6 +9925,7 @@ ACTION_MAP = {
|
|
8881
9925
|
"ModifyFunctionRule": doModifyFunctionRule,
|
8882
9926
|
"ModifyMultiPathGatewayLine": doModifyMultiPathGatewayLine,
|
8883
9927
|
"ModifyWebSecurityTemplate": doModifyWebSecurityTemplate,
|
9928
|
+
"DescribeSecurityIPGroupContent": doDescribeSecurityIPGroupContent,
|
8884
9929
|
"ModifyL7AccRulePriority": doModifyL7AccRulePriority,
|
8885
9930
|
"ModifyZoneSetting": doModifyZoneSetting,
|
8886
9931
|
"CreateAliasDomain": doCreateAliasDomain,
|
@@ -8888,12 +9933,13 @@ ACTION_MAP = {
|
|
8888
9933
|
"DescribeSecurityIPGroup": doDescribeSecurityIPGroup,
|
8889
9934
|
"CreateL4ProxyRules": doCreateL4ProxyRules,
|
8890
9935
|
"DescribeOriginGroup": doDescribeOriginGroup,
|
8891
|
-
"DescribeTimingL4Data": doDescribeTimingL4Data,
|
8892
9936
|
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
9937
|
+
"DescribeTimingL4Data": doDescribeTimingL4Data,
|
8893
9938
|
"ModifyRule": doModifyRule,
|
8894
9939
|
"DescribeMultiPathGateways": doDescribeMultiPathGateways,
|
8895
9940
|
"DescribeTopL7AnalysisData": doDescribeTopL7AnalysisData,
|
8896
9941
|
"DeleteDnsRecords": doDeleteDnsRecords,
|
9942
|
+
"DescribeSecurityClientAttester": doDescribeSecurityClientAttester,
|
8897
9943
|
"ModifySecurityPolicy": doModifySecurityPolicy,
|
8898
9944
|
"DescribeMultiPathGatewayLine": doDescribeMultiPathGatewayLine,
|
8899
9945
|
"DeleteL7AccRules": doDeleteL7AccRules,
|
@@ -8904,13 +9950,15 @@ ACTION_MAP = {
|
|
8904
9950
|
"ModifyAccelerationDomain": doModifyAccelerationDomain,
|
8905
9951
|
"CreateL4Proxy": doCreateL4Proxy,
|
8906
9952
|
"IncreasePlanQuota": doIncreasePlanQuota,
|
9953
|
+
"ModifySecurityAPIResource": doModifySecurityAPIResource,
|
8907
9954
|
"ModifyApplicationProxyStatus": doModifyApplicationProxyStatus,
|
8908
|
-
"
|
9955
|
+
"DeleteLoadBalancer": doDeleteLoadBalancer,
|
8909
9956
|
"DescribeTimingL7AnalysisData": doDescribeTimingL7AnalysisData,
|
8910
9957
|
"CreateFunction": doCreateFunction,
|
8911
9958
|
"DescribeApplicationProxies": doDescribeApplicationProxies,
|
8912
9959
|
"ModifyMultiPathGateway": doModifyMultiPathGateway,
|
8913
9960
|
"CreateSharedCNAME": doCreateSharedCNAME,
|
9961
|
+
"DescribeSecurityJSInjectionRule": doDescribeSecurityJSInjectionRule,
|
8914
9962
|
"CreateRule": doCreateRule,
|
8915
9963
|
"CreateConfigGroupVersion": doCreateConfigGroupVersion,
|
8916
9964
|
"ModifyDnsRecordsStatus": doModifyDnsRecordsStatus,
|
@@ -8921,43 +9969,48 @@ ACTION_MAP = {
|
|
8921
9969
|
"DescribeAvailablePlans": doDescribeAvailablePlans,
|
8922
9970
|
"DescribeCustomErrorPages": doDescribeCustomErrorPages,
|
8923
9971
|
"DescribePlans": doDescribePlans,
|
8924
|
-
"
|
9972
|
+
"CreateSecurityClientAttester": doCreateSecurityClientAttester,
|
8925
9973
|
"DisableOriginACL": doDisableOriginACL,
|
8926
9974
|
"ModifyPlan": doModifyPlan,
|
8927
9975
|
"DeleteContentIdentifier": doDeleteContentIdentifier,
|
8928
9976
|
"DescribeRulesSetting": doDescribeRulesSetting,
|
8929
9977
|
"ModifyAccelerationDomainStatuses": doModifyAccelerationDomainStatuses,
|
9978
|
+
"ModifySecurityAPIService": doModifySecurityAPIService,
|
8930
9979
|
"DescribeFunctionRules": doDescribeFunctionRules,
|
8931
|
-
"
|
9980
|
+
"UpgradePlan": doUpgradePlan,
|
8932
9981
|
"DescribeDDoSAttackTopData": doDescribeDDoSAttackTopData,
|
8933
9982
|
"ModifyZoneStatus": doModifyZoneStatus,
|
8934
9983
|
"CreateL7AccRules": doCreateL7AccRules,
|
8935
9984
|
"DescribePurgeTasks": doDescribePurgeTasks,
|
8936
9985
|
"DescribeMultiPathGateway": doDescribeMultiPathGateway,
|
8937
9986
|
"DeleteRules": doDeleteRules,
|
8938
|
-
"
|
9987
|
+
"DeleteSecurityAPIService": doDeleteSecurityAPIService,
|
8939
9988
|
"DeleteMultiPathGateway": doDeleteMultiPathGateway,
|
8940
|
-
"
|
9989
|
+
"DeleteCustomErrorPage": doDeleteCustomErrorPage,
|
8941
9990
|
"ModifyZone": doModifyZone,
|
8942
9991
|
"HandleFunctionRuntimeEnvironment": doHandleFunctionRuntimeEnvironment,
|
8943
9992
|
"ModifyContentIdentifier": doModifyContentIdentifier,
|
8944
9993
|
"DeleteWebSecurityTemplate": doDeleteWebSecurityTemplate,
|
9994
|
+
"ModifySecurityClientAttester": doModifySecurityClientAttester,
|
8945
9995
|
"DescribeSecurityPolicy": doDescribeSecurityPolicy,
|
9996
|
+
"DeleteSecurityClientAttester": doDeleteSecurityClientAttester,
|
9997
|
+
"ModifyHostsCertificate": doModifyHostsCertificate,
|
8946
9998
|
"ModifyFunctionRulePriority": doModifyFunctionRulePriority,
|
8947
9999
|
"ModifySecurityIPGroup": doModifySecurityIPGroup,
|
8948
10000
|
"ModifyMultiPathGatewaySecretKey": doModifyMultiPathGatewaySecretKey,
|
8949
10001
|
"DescribeRules": doDescribeRules,
|
8950
10002
|
"CreateCLSIndex": doCreateCLSIndex,
|
8951
|
-
"
|
10003
|
+
"ModifyLoadBalancer": doModifyLoadBalancer,
|
8952
10004
|
"CreateApplicationProxy": doCreateApplicationProxy,
|
8953
|
-
"
|
10005
|
+
"DeleteRealtimeLogDeliveryTask": doDeleteRealtimeLogDeliveryTask,
|
8954
10006
|
"EnableOriginACL": doEnableOriginACL,
|
8955
10007
|
"ModifyAliasDomain": doModifyAliasDomain,
|
8956
10008
|
"CreateLoadBalancer": doCreateLoadBalancer,
|
10009
|
+
"DescribeJustInTimeTranscodeTemplates": doDescribeJustInTimeTranscodeTemplates,
|
8957
10010
|
"ModifyApplicationProxyRule": doModifyApplicationProxyRule,
|
8958
10011
|
"DescribeL7AccSetting": doDescribeL7AccSetting,
|
8959
10012
|
"CreateOriginGroup": doCreateOriginGroup,
|
8960
|
-
"
|
10013
|
+
"CreateJustInTimeTranscodeTemplate": doCreateJustInTimeTranscodeTemplate,
|
8961
10014
|
"DescribeDeployHistory": doDescribeDeployHistory,
|
8962
10015
|
"DeployConfigGroupVersion": doDeployConfigGroupVersion,
|
8963
10016
|
"DescribeHostsSetting": doDescribeHostsSetting,
|
@@ -8969,25 +10022,32 @@ ACTION_MAP = {
|
|
8969
10022
|
"ModifyL4ProxyRulesStatus": doModifyL4ProxyRulesStatus,
|
8970
10023
|
"RenewPlan": doRenewPlan,
|
8971
10024
|
"DescribeZoneSetting": doDescribeZoneSetting,
|
10025
|
+
"DescribeSecurityAPIResource": doDescribeSecurityAPIResource,
|
8972
10026
|
"DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
|
8973
10027
|
"CreateContentIdentifier": doCreateContentIdentifier,
|
8974
10028
|
"DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
|
8975
10029
|
"CreateApplicationProxyRule": doCreateApplicationProxyRule,
|
10030
|
+
"ModifySecurityJSInjectionRule": doModifySecurityJSInjectionRule,
|
8976
10031
|
"DescribeMultiPathGatewaySecretKey": doDescribeMultiPathGatewaySecretKey,
|
8977
10032
|
"DescribeFunctions": doDescribeFunctions,
|
8978
10033
|
"DeleteZone": doDeleteZone,
|
8979
10034
|
"DescribeSecurityIPGroupInfo": doDescribeSecurityIPGroupInfo,
|
10035
|
+
"CreatePlan": doCreatePlan,
|
8980
10036
|
"DescribeDnsRecords": doDescribeDnsRecords,
|
8981
10037
|
"ModifyDDoSProtection": doModifyDDoSProtection,
|
10038
|
+
"DescribeSecurityAPIService": doDescribeSecurityAPIService,
|
8982
10039
|
"ImportZoneConfig": doImportZoneConfig,
|
8983
10040
|
"CreateMultiPathGatewaySecretKey": doCreateMultiPathGatewaySecretKey,
|
8984
10041
|
"ModifyCustomErrorPage": doModifyCustomErrorPage,
|
10042
|
+
"DescribeL4ProxyRules": doDescribeL4ProxyRules,
|
8985
10043
|
"DescribeDDoSAttackData": doDescribeDDoSAttackData,
|
8986
10044
|
"DeleteSharedCNAME": doDeleteSharedCNAME,
|
10045
|
+
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
8987
10046
|
"DescribeAliasDomains": doDescribeAliasDomains,
|
8988
|
-
"
|
10047
|
+
"DescribeL4Proxy": doDescribeL4Proxy,
|
8989
10048
|
"DeleteMultiPathGatewayLine": doDeleteMultiPathGatewayLine,
|
8990
10049
|
"DescribeBillingData": doDescribeBillingData,
|
10050
|
+
"DeleteJustInTimeTranscodeTemplates": doDeleteJustInTimeTranscodeTemplates,
|
8991
10051
|
"DescribeOriginGroupHealthStatus": doDescribeOriginGroupHealthStatus,
|
8992
10052
|
|
8993
10053
|
}
|