tccli 3.0.1379.1__py2.py3-none-any.whl → 3.0.1381.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/cbs/v20170312/api.json +6 -6
  3. tccli/services/cbs/v20170312/examples.json +6 -6
  4. tccli/services/dcdb/dcdb_client.py +243 -31
  5. tccli/services/dcdb/v20180411/api.json +348 -0
  6. tccli/services/dcdb/v20180411/examples.json +32 -0
  7. tccli/services/emr/v20190103/api.json +1 -1
  8. tccli/services/ioa/v20220601/api.json +22 -13
  9. tccli/services/iotexplorer/iotexplorer_client.py +269 -57
  10. tccli/services/iotexplorer/v20190423/api.json +357 -0
  11. tccli/services/iotexplorer/v20190423/examples.json +32 -0
  12. tccli/services/lke/v20231130/api.json +91 -8
  13. tccli/services/lkeap/v20240522/api.json +65 -19
  14. tccli/services/lkeap/v20240522/examples.json +6 -0
  15. tccli/services/mariadb/mariadb_client.py +220 -8
  16. tccli/services/mariadb/v20170312/api.json +330 -0
  17. tccli/services/mariadb/v20170312/examples.json +32 -0
  18. tccli/services/mna/mna_client.py +53 -0
  19. tccli/services/mna/v20210119/api.json +137 -0
  20. tccli/services/mna/v20210119/examples.json +8 -0
  21. tccli/services/monitor/v20180724/api.json +2 -2
  22. tccli/services/oceanus/v20190422/api.json +105 -17
  23. tccli/services/redis/v20180412/api.json +3 -3
  24. tccli/services/redis/v20180412/examples.json +1 -1
  25. tccli/services/tcb/v20180608/api.json +10 -0
  26. tccli/services/tcbr/v20220217/api.json +10 -0
  27. tccli/services/teo/v20220901/api.json +1 -1
  28. tccli/services/tke/v20180525/api.json +11 -11
  29. tccli/services/trtc/v20190722/api.json +1 -1
  30. tccli/services/tsf/v20180326/examples.json +1 -1
  31. tccli/services/vclm/v20240523/api.json +1 -1
  32. tccli/services/waf/v20180125/api.json +1541 -158
  33. tccli/services/waf/v20180125/examples.json +56 -0
  34. tccli/services/waf/waf_client.py +391 -20
  35. tccli/services/wsa/v20250508/api.json +1 -1
  36. {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/METADATA +2 -2
  37. {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/RECORD +40 -40
  38. {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/WHEEL +0 -0
  39. {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/entry_points.txt +0 -0
  40. {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/license_files/LICENSE +0 -0
@@ -173,6 +173,58 @@ def doDescribeDomainDetailsClb(args, parsed_globals):
173
173
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
174
 
175
175
 
176
+ def doDescribeExports(args, parsed_globals):
177
+ g_param = parse_global_arg(parsed_globals)
178
+
179
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
180
+ cred = credential.CVMRoleCredential()
181
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
182
+ cred = credential.STSAssumeRoleCredential(
183
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
+ )
186
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
+ else:
189
+ cred = credential.Credential(
190
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
191
+ )
192
+ http_profile = HttpProfile(
193
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
194
+ reqMethod="POST",
195
+ endpoint=g_param[OptionsDefine.Endpoint],
196
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
+ )
198
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
199
+ if g_param[OptionsDefine.Language]:
200
+ profile.language = g_param[OptionsDefine.Language]
201
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
202
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
203
+ client._sdkVersion += ("_CLI_" + __version__)
204
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
+ model = models.DescribeExportsRequest()
206
+ model.from_json_string(json.dumps(args))
207
+ start_time = time.time()
208
+ while True:
209
+ rsp = client.DescribeExports(model)
210
+ result = rsp.to_json_string()
211
+ try:
212
+ json_obj = json.loads(result)
213
+ except TypeError as e:
214
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
215
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
216
+ break
217
+ cur_time = time.time()
218
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
219
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
220
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
221
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
222
+ else:
223
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
224
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
225
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
+
227
+
176
228
  def doAddAntiInfoLeakRules(args, parsed_globals):
177
229
  g_param = parse_global_arg(parsed_globals)
178
230
 
@@ -1057,6 +1109,58 @@ def doDescribeScanIp(args, parsed_globals):
1057
1109
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1110
 
1059
1111
 
1112
+ def doModifyObject(args, parsed_globals):
1113
+ g_param = parse_global_arg(parsed_globals)
1114
+
1115
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1116
+ cred = credential.CVMRoleCredential()
1117
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1118
+ cred = credential.STSAssumeRoleCredential(
1119
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
+ )
1122
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
+ else:
1125
+ cred = credential.Credential(
1126
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1127
+ )
1128
+ http_profile = HttpProfile(
1129
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1130
+ reqMethod="POST",
1131
+ endpoint=g_param[OptionsDefine.Endpoint],
1132
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
+ )
1134
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1135
+ if g_param[OptionsDefine.Language]:
1136
+ profile.language = g_param[OptionsDefine.Language]
1137
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1138
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1139
+ client._sdkVersion += ("_CLI_" + __version__)
1140
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1141
+ model = models.ModifyObjectRequest()
1142
+ model.from_json_string(json.dumps(args))
1143
+ start_time = time.time()
1144
+ while True:
1145
+ rsp = client.ModifyObject(model)
1146
+ result = rsp.to_json_string()
1147
+ try:
1148
+ json_obj = json.loads(result)
1149
+ except TypeError as e:
1150
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1151
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1152
+ break
1153
+ cur_time = time.time()
1154
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1155
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1156
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1157
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1158
+ else:
1159
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1160
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1161
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
+
1163
+
1060
1164
  def doDeleteOwaspRuleStatus(args, parsed_globals):
1061
1165
  g_param = parse_global_arg(parsed_globals)
1062
1166
 
@@ -1369,7 +1473,7 @@ def doModifyInstanceElasticMode(args, parsed_globals):
1369
1473
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
1474
 
1371
1475
 
1372
- def doDescribeUserCdcClbWafRegions(args, parsed_globals):
1476
+ def doDescribeTopics(args, parsed_globals):
1373
1477
  g_param = parse_global_arg(parsed_globals)
1374
1478
 
1375
1479
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1398,11 +1502,11 @@ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
1398
1502
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1399
1503
  client._sdkVersion += ("_CLI_" + __version__)
1400
1504
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.DescribeUserCdcClbWafRegionsRequest()
1505
+ model = models.DescribeTopicsRequest()
1402
1506
  model.from_json_string(json.dumps(args))
1403
1507
  start_time = time.time()
1404
1508
  while True:
1405
- rsp = client.DescribeUserCdcClbWafRegions(model)
1509
+ rsp = client.DescribeTopics(model)
1406
1510
  result = rsp.to_json_string()
1407
1511
  try:
1408
1512
  json_obj = json.loads(result)
@@ -1837,7 +1941,7 @@ def doDescribeIpHitItems(args, parsed_globals):
1837
1941
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1838
1942
 
1839
1943
 
1840
- def doDescribeOwaspRuleTypes(args, parsed_globals):
1944
+ def doCreateExport(args, parsed_globals):
1841
1945
  g_param = parse_global_arg(parsed_globals)
1842
1946
 
1843
1947
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1866,11 +1970,11 @@ def doDescribeOwaspRuleTypes(args, parsed_globals):
1866
1970
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1867
1971
  client._sdkVersion += ("_CLI_" + __version__)
1868
1972
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1869
- model = models.DescribeOwaspRuleTypesRequest()
1973
+ model = models.CreateExportRequest()
1870
1974
  model.from_json_string(json.dumps(args))
1871
1975
  start_time = time.time()
1872
1976
  while True:
1873
- rsp = client.DescribeOwaspRuleTypes(model)
1977
+ rsp = client.CreateExport(model)
1874
1978
  result = rsp.to_json_string()
1875
1979
  try:
1876
1980
  json_obj = json.loads(result)
@@ -3501,7 +3605,7 @@ def doDescribeCCRule(args, parsed_globals):
3501
3605
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3502
3606
 
3503
3607
 
3504
- def doDescribeUserLevel(args, parsed_globals):
3608
+ def doDescribeLogHistogram(args, parsed_globals):
3505
3609
  g_param = parse_global_arg(parsed_globals)
3506
3610
 
3507
3611
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3530,11 +3634,11 @@ def doDescribeUserLevel(args, parsed_globals):
3530
3634
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3531
3635
  client._sdkVersion += ("_CLI_" + __version__)
3532
3636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3533
- model = models.DescribeUserLevelRequest()
3637
+ model = models.DescribeLogHistogramRequest()
3534
3638
  model.from_json_string(json.dumps(args))
3535
3639
  start_time = time.time()
3536
3640
  while True:
3537
- rsp = client.DescribeUserLevel(model)
3641
+ rsp = client.DescribeLogHistogram(model)
3538
3642
  result = rsp.to_json_string()
3539
3643
  try:
3540
3644
  json_obj = json.loads(result)
@@ -3709,6 +3813,58 @@ def doModifyWafThreatenIntelligence(args, parsed_globals):
3709
3813
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
3814
 
3711
3815
 
3816
+ def doDescribeOwaspRuleTypes(args, parsed_globals):
3817
+ g_param = parse_global_arg(parsed_globals)
3818
+
3819
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3820
+ cred = credential.CVMRoleCredential()
3821
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3822
+ cred = credential.STSAssumeRoleCredential(
3823
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
+ )
3826
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
+ else:
3829
+ cred = credential.Credential(
3830
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3831
+ )
3832
+ http_profile = HttpProfile(
3833
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3834
+ reqMethod="POST",
3835
+ endpoint=g_param[OptionsDefine.Endpoint],
3836
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
+ )
3838
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3839
+ if g_param[OptionsDefine.Language]:
3840
+ profile.language = g_param[OptionsDefine.Language]
3841
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3842
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3843
+ client._sdkVersion += ("_CLI_" + __version__)
3844
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3845
+ model = models.DescribeOwaspRuleTypesRequest()
3846
+ model.from_json_string(json.dumps(args))
3847
+ start_time = time.time()
3848
+ while True:
3849
+ rsp = client.DescribeOwaspRuleTypes(model)
3850
+ result = rsp.to_json_string()
3851
+ try:
3852
+ json_obj = json.loads(result)
3853
+ except TypeError as e:
3854
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3855
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3856
+ break
3857
+ cur_time = time.time()
3858
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3859
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3860
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3861
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3862
+ else:
3863
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3864
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3865
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
+
3867
+
3712
3868
  def doDeleteAttackDownloadRecord(args, parsed_globals):
3713
3869
  g_param = parse_global_arg(parsed_globals)
3714
3870
 
@@ -3865,6 +4021,58 @@ def doDescribeAttackOverview(args, parsed_globals):
3865
4021
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
4022
 
3867
4023
 
4024
+ def doDescribeUserLevel(args, parsed_globals):
4025
+ g_param = parse_global_arg(parsed_globals)
4026
+
4027
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4028
+ cred = credential.CVMRoleCredential()
4029
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4030
+ cred = credential.STSAssumeRoleCredential(
4031
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
+ )
4034
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
+ else:
4037
+ cred = credential.Credential(
4038
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4039
+ )
4040
+ http_profile = HttpProfile(
4041
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4042
+ reqMethod="POST",
4043
+ endpoint=g_param[OptionsDefine.Endpoint],
4044
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4045
+ )
4046
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4047
+ if g_param[OptionsDefine.Language]:
4048
+ profile.language = g_param[OptionsDefine.Language]
4049
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4050
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4051
+ client._sdkVersion += ("_CLI_" + __version__)
4052
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4053
+ model = models.DescribeUserLevelRequest()
4054
+ model.from_json_string(json.dumps(args))
4055
+ start_time = time.time()
4056
+ while True:
4057
+ rsp = client.DescribeUserLevel(model)
4058
+ result = rsp.to_json_string()
4059
+ try:
4060
+ json_obj = json.loads(result)
4061
+ except TypeError as e:
4062
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4063
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4064
+ break
4065
+ cur_time = time.time()
4066
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4067
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4068
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4069
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4070
+ else:
4071
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4072
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4073
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4074
+
4075
+
3868
4076
  def doModifyOwaspWhiteRule(args, parsed_globals):
3869
4077
  g_param = parse_global_arg(parsed_globals)
3870
4078
 
@@ -5841,6 +6049,58 @@ def doDescribeDomainCountInfo(args, parsed_globals):
5841
6049
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5842
6050
 
5843
6051
 
6052
+ def doModifyProtectionLevel(args, parsed_globals):
6053
+ g_param = parse_global_arg(parsed_globals)
6054
+
6055
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
6056
+ cred = credential.CVMRoleCredential()
6057
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
6058
+ cred = credential.STSAssumeRoleCredential(
6059
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
6060
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
6061
+ )
6062
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6063
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
6064
+ else:
6065
+ cred = credential.Credential(
6066
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
6067
+ )
6068
+ http_profile = HttpProfile(
6069
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
6070
+ reqMethod="POST",
6071
+ endpoint=g_param[OptionsDefine.Endpoint],
6072
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
6073
+ )
6074
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6075
+ if g_param[OptionsDefine.Language]:
6076
+ profile.language = g_param[OptionsDefine.Language]
6077
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
6078
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
6079
+ client._sdkVersion += ("_CLI_" + __version__)
6080
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
6081
+ model = models.ModifyProtectionLevelRequest()
6082
+ model.from_json_string(json.dumps(args))
6083
+ start_time = time.time()
6084
+ while True:
6085
+ rsp = client.ModifyProtectionLevel(model)
6086
+ result = rsp.to_json_string()
6087
+ try:
6088
+ json_obj = json.loads(result)
6089
+ except TypeError as e:
6090
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
6091
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
6092
+ break
6093
+ cur_time = time.time()
6094
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
6095
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
6096
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
6097
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
6098
+ else:
6099
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
6100
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
6101
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6102
+
6103
+
5844
6104
  def doDeleteSpartaProtection(args, parsed_globals):
5845
6105
  g_param = parse_global_arg(parsed_globals)
5846
6106
 
@@ -6465,7 +6725,7 @@ def doDestroyPostCKafkaFlow(args, parsed_globals):
6465
6725
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6466
6726
 
6467
6727
 
6468
- def doPostAttackDownloadTask(args, parsed_globals):
6728
+ def doDeleteExport(args, parsed_globals):
6469
6729
  g_param = parse_global_arg(parsed_globals)
6470
6730
 
6471
6731
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -6494,11 +6754,11 @@ def doPostAttackDownloadTask(args, parsed_globals):
6494
6754
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
6495
6755
  client._sdkVersion += ("_CLI_" + __version__)
6496
6756
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
6497
- model = models.PostAttackDownloadTaskRequest()
6757
+ model = models.DeleteExportRequest()
6498
6758
  model.from_json_string(json.dumps(args))
6499
6759
  start_time = time.time()
6500
6760
  while True:
6501
- rsp = client.PostAttackDownloadTask(model)
6761
+ rsp = client.DeleteExport(model)
6502
6762
  result = rsp.to_json_string()
6503
6763
  try:
6504
6764
  json_obj = json.loads(result)
@@ -7765,6 +8025,58 @@ def doModifyAreaBanRule(args, parsed_globals):
7765
8025
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7766
8026
 
7767
8027
 
8028
+ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
8029
+ g_param = parse_global_arg(parsed_globals)
8030
+
8031
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
8032
+ cred = credential.CVMRoleCredential()
8033
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
8034
+ cred = credential.STSAssumeRoleCredential(
8035
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
8036
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
8037
+ )
8038
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
8039
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
8040
+ else:
8041
+ cred = credential.Credential(
8042
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
8043
+ )
8044
+ http_profile = HttpProfile(
8045
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
8046
+ reqMethod="POST",
8047
+ endpoint=g_param[OptionsDefine.Endpoint],
8048
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
8049
+ )
8050
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
8051
+ if g_param[OptionsDefine.Language]:
8052
+ profile.language = g_param[OptionsDefine.Language]
8053
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
8054
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
8055
+ client._sdkVersion += ("_CLI_" + __version__)
8056
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
8057
+ model = models.DescribeUserCdcClbWafRegionsRequest()
8058
+ model.from_json_string(json.dumps(args))
8059
+ start_time = time.time()
8060
+ while True:
8061
+ rsp = client.DescribeUserCdcClbWafRegions(model)
8062
+ result = rsp.to_json_string()
8063
+ try:
8064
+ json_obj = json.loads(result)
8065
+ except TypeError as e:
8066
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
8067
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
8068
+ break
8069
+ cur_time = time.time()
8070
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
8071
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
8072
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
8073
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
8074
+ else:
8075
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
8076
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
8077
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
8078
+
8079
+
7768
8080
  def doDescribeWafAutoDenyStatus(args, parsed_globals):
7769
8081
  g_param = parse_global_arg(parsed_globals)
7770
8082
 
@@ -7921,6 +8233,58 @@ def doModifyCustomWhiteRuleStatus(args, parsed_globals):
7921
8233
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7922
8234
 
7923
8235
 
8236
+ def doPostAttackDownloadTask(args, parsed_globals):
8237
+ g_param = parse_global_arg(parsed_globals)
8238
+
8239
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
8240
+ cred = credential.CVMRoleCredential()
8241
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
8242
+ cred = credential.STSAssumeRoleCredential(
8243
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
8244
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
8245
+ )
8246
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
8247
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
8248
+ else:
8249
+ cred = credential.Credential(
8250
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
8251
+ )
8252
+ http_profile = HttpProfile(
8253
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
8254
+ reqMethod="POST",
8255
+ endpoint=g_param[OptionsDefine.Endpoint],
8256
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
8257
+ )
8258
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
8259
+ if g_param[OptionsDefine.Language]:
8260
+ profile.language = g_param[OptionsDefine.Language]
8261
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
8262
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
8263
+ client._sdkVersion += ("_CLI_" + __version__)
8264
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
8265
+ model = models.PostAttackDownloadTaskRequest()
8266
+ model.from_json_string(json.dumps(args))
8267
+ start_time = time.time()
8268
+ while True:
8269
+ rsp = client.PostAttackDownloadTask(model)
8270
+ result = rsp.to_json_string()
8271
+ try:
8272
+ json_obj = json.loads(result)
8273
+ except TypeError as e:
8274
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
8275
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
8276
+ break
8277
+ cur_time = time.time()
8278
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
8279
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
8280
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
8281
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
8282
+ else:
8283
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
8284
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
8285
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
8286
+
8287
+
7924
8288
  def doDescribePorts(args, parsed_globals):
7925
8289
  g_param = parse_global_arg(parsed_globals)
7926
8290
 
@@ -8181,7 +8545,7 @@ def doUpsertCCRule(args, parsed_globals):
8181
8545
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
8182
8546
 
8183
8547
 
8184
- def doModifyObject(args, parsed_globals):
8548
+ def doSearchLog(args, parsed_globals):
8185
8549
  g_param = parse_global_arg(parsed_globals)
8186
8550
 
8187
8551
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -8210,11 +8574,11 @@ def doModifyObject(args, parsed_globals):
8210
8574
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
8211
8575
  client._sdkVersion += ("_CLI_" + __version__)
8212
8576
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
8213
- model = models.ModifyObjectRequest()
8577
+ model = models.SearchLogRequest()
8214
8578
  model.from_json_string(json.dumps(args))
8215
8579
  start_time = time.time()
8216
8580
  while True:
8217
- rsp = client.ModifyObject(model)
8581
+ rsp = client.SearchLog(model)
8218
8582
  result = rsp.to_json_string()
8219
8583
  try:
8220
8584
  json_obj = json.loads(result)
@@ -9131,6 +9495,7 @@ ACTION_MAP = {
9131
9495
  "DescribeAttackType": doDescribeAttackType,
9132
9496
  "DescribePeakPoints": doDescribePeakPoints,
9133
9497
  "DescribeDomainDetailsClb": doDescribeDomainDetailsClb,
9498
+ "DescribeExports": doDescribeExports,
9134
9499
  "AddAntiInfoLeakRules": doAddAntiInfoLeakRules,
9135
9500
  "DescribeAccessIndex": doDescribeAccessIndex,
9136
9501
  "GetAttackTotalCount": doGetAttackTotalCount,
@@ -9148,13 +9513,14 @@ ACTION_MAP = {
9148
9513
  "GetAttackDownloadRecords": doGetAttackDownloadRecords,
9149
9514
  "DescribeApiDetail": doDescribeApiDetail,
9150
9515
  "DescribeScanIp": doDescribeScanIp,
9516
+ "ModifyObject": doModifyObject,
9151
9517
  "DeleteOwaspRuleStatus": doDeleteOwaspRuleStatus,
9152
9518
  "CreatePostCKafkaFlow": doCreatePostCKafkaFlow,
9153
9519
  "DeleteCustomRule": doDeleteCustomRule,
9154
9520
  "ModifyAntiFakeUrl": doModifyAntiFakeUrl,
9155
9521
  "ModifySpartaProtection": doModifySpartaProtection,
9156
9522
  "ModifyInstanceElasticMode": doModifyInstanceElasticMode,
9157
- "DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
9523
+ "DescribeTopics": doDescribeTopics,
9158
9524
  "ModifyWafAutoDenyRules": doModifyWafAutoDenyRules,
9159
9525
  "DescribeUserDomainInfo": doDescribeUserDomainInfo,
9160
9526
  "DeleteCCRule": doDeleteCCRule,
@@ -9163,7 +9529,7 @@ ACTION_MAP = {
9163
9529
  "ModifyBotSceneUCBRule": doModifyBotSceneUCBRule,
9164
9530
  "DescribeBotSceneUCBRule": doDescribeBotSceneUCBRule,
9165
9531
  "DescribeIpHitItems": doDescribeIpHitItems,
9166
- "DescribeOwaspRuleTypes": doDescribeOwaspRuleTypes,
9532
+ "CreateExport": doCreateExport,
9167
9533
  "DescribeHistogram": doDescribeHistogram,
9168
9534
  "DescribeWebshellStatus": doDescribeWebshellStatus,
9169
9535
  "DescribeDomainWhiteRules": doDescribeDomainWhiteRules,
@@ -9195,13 +9561,15 @@ ACTION_MAP = {
9195
9561
  "SwitchElasticMode": doSwitchElasticMode,
9196
9562
  "ModifyInstanceRenewFlag": doModifyInstanceRenewFlag,
9197
9563
  "DescribeCCRule": doDescribeCCRule,
9198
- "DescribeUserLevel": doDescribeUserLevel,
9564
+ "DescribeLogHistogram": doDescribeLogHistogram,
9199
9565
  "ModifyOwaspRuleTypeAction": doModifyOwaspRuleTypeAction,
9200
9566
  "DescribePeakValue": doDescribePeakValue,
9201
9567
  "ModifyWafThreatenIntelligence": doModifyWafThreatenIntelligence,
9568
+ "DescribeOwaspRuleTypes": doDescribeOwaspRuleTypes,
9202
9569
  "DeleteAttackDownloadRecord": doDeleteAttackDownloadRecord,
9203
9570
  "DescribeCustomRuleList": doDescribeCustomRuleList,
9204
9571
  "DescribeAttackOverview": doDescribeAttackOverview,
9572
+ "DescribeUserLevel": doDescribeUserLevel,
9205
9573
  "ModifyOwaspWhiteRule": doModifyOwaspWhiteRule,
9206
9574
  "DescribeAttackWhiteRule": doDescribeAttackWhiteRule,
9207
9575
  "DescribeHosts": doDescribeHosts,
@@ -9240,6 +9608,7 @@ ACTION_MAP = {
9240
9608
  "AddAttackWhiteRule": doAddAttackWhiteRule,
9241
9609
  "AddAreaBanAreas": doAddAreaBanAreas,
9242
9610
  "DescribeDomainCountInfo": doDescribeDomainCountInfo,
9611
+ "ModifyProtectionLevel": doModifyProtectionLevel,
9243
9612
  "DeleteSpartaProtection": doDeleteSpartaProtection,
9244
9613
  "SwitchDomainRules": doSwitchDomainRules,
9245
9614
  "UpsertCCAutoStatus": doUpsertCCAutoStatus,
@@ -9252,7 +9621,7 @@ ACTION_MAP = {
9252
9621
  "CreateHost": doCreateHost,
9253
9622
  "ModifyDomainsCLSStatus": doModifyDomainsCLSStatus,
9254
9623
  "DestroyPostCKafkaFlow": doDestroyPostCKafkaFlow,
9255
- "PostAttackDownloadTask": doPostAttackDownloadTask,
9624
+ "DeleteExport": doDeleteExport,
9256
9625
  "DescribeCustomWhiteRule": doDescribeCustomWhiteRule,
9257
9626
  "DescribeHost": doDescribeHost,
9258
9627
  "ModifyUserSignatureRuleV2": doModifyUserSignatureRuleV2,
@@ -9277,15 +9646,17 @@ ACTION_MAP = {
9277
9646
  "ModifyModuleStatus": doModifyModuleStatus,
9278
9647
  "ModifyApiAnalyzeStatus": doModifyApiAnalyzeStatus,
9279
9648
  "ModifyAreaBanRule": doModifyAreaBanRule,
9649
+ "DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
9280
9650
  "DescribeWafAutoDenyStatus": doDescribeWafAutoDenyStatus,
9281
9651
  "DescribeSession": doDescribeSession,
9282
9652
  "ModifyCustomWhiteRuleStatus": doModifyCustomWhiteRuleStatus,
9653
+ "PostAttackDownloadTask": doPostAttackDownloadTask,
9283
9654
  "DescribePorts": doDescribePorts,
9284
9655
  "ModifyHostMode": doModifyHostMode,
9285
9656
  "ModifyDomainPostAction": doModifyDomainPostAction,
9286
9657
  "DescribeModuleStatus": doDescribeModuleStatus,
9287
9658
  "UpsertCCRule": doUpsertCCRule,
9288
- "ModifyObject": doModifyObject,
9659
+ "SearchLog": doSearchLog,
9289
9660
  "DeleteAntiFakeUrl": doDeleteAntiFakeUrl,
9290
9661
  "DescribeCCRuleList": doDescribeCCRuleList,
9291
9662
  "ModifyWebshellStatus": doModifyWebshellStatus,
@@ -10,7 +10,7 @@
10
10
  },
11
11
  "metadata": {
12
12
  "apiVersion": "2025-05-08",
13
- "api_brief": "联网搜索API,以json形式向客户提供搜索结果数据,包含不仅限于标题、摘要、内容来源url等信息",
13
+ "api_brief": "联网搜索API,以JSON形式向客户提供搜索结果数据,包含不仅限于标题、摘要、内容来源url等信息",
14
14
  "serviceNameCN": "联网搜索API",
15
15
  "serviceShortName": "wsa"
16
16
  },
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: tccli
3
- Version: 3.0.1379.1
3
+ Version: 3.0.1381.1
4
4
  Summary: Universal Command Line Environment for Tencent Cloud
5
5
  Project-URL: Bug Tracker, https://github.com/TencentCloud/tencentcloud-cli/issues
6
6
  Project-URL: Homepage, https://github.com/TencentCloud/tencentcloud-cli
@@ -13,7 +13,7 @@ Classifier: Programming Language :: Python :: 2.7
13
13
  Classifier: Programming Language :: Python :: 3
14
14
  Requires-Dist: jmespath==0.10.0
15
15
  Requires-Dist: six==1.16.0
16
- Requires-Dist: tencentcloud-sdk-python>=3.0.1379
16
+ Requires-Dist: tencentcloud-sdk-python>=3.0.1381
17
17
  Description-Content-Type: text/markdown
18
18
 
19
19
  # 命令行工具简介