tccli 3.0.1379.1__py2.py3-none-any.whl → 3.0.1381.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/cbs/v20170312/api.json +6 -6
- tccli/services/cbs/v20170312/examples.json +6 -6
- tccli/services/dcdb/dcdb_client.py +243 -31
- tccli/services/dcdb/v20180411/api.json +348 -0
- tccli/services/dcdb/v20180411/examples.json +32 -0
- tccli/services/emr/v20190103/api.json +1 -1
- tccli/services/ioa/v20220601/api.json +22 -13
- tccli/services/iotexplorer/iotexplorer_client.py +269 -57
- tccli/services/iotexplorer/v20190423/api.json +357 -0
- tccli/services/iotexplorer/v20190423/examples.json +32 -0
- tccli/services/lke/v20231130/api.json +91 -8
- tccli/services/lkeap/v20240522/api.json +65 -19
- tccli/services/lkeap/v20240522/examples.json +6 -0
- tccli/services/mariadb/mariadb_client.py +220 -8
- tccli/services/mariadb/v20170312/api.json +330 -0
- tccli/services/mariadb/v20170312/examples.json +32 -0
- tccli/services/mna/mna_client.py +53 -0
- tccli/services/mna/v20210119/api.json +137 -0
- tccli/services/mna/v20210119/examples.json +8 -0
- tccli/services/monitor/v20180724/api.json +2 -2
- tccli/services/oceanus/v20190422/api.json +105 -17
- tccli/services/redis/v20180412/api.json +3 -3
- tccli/services/redis/v20180412/examples.json +1 -1
- tccli/services/tcb/v20180608/api.json +10 -0
- tccli/services/tcbr/v20220217/api.json +10 -0
- tccli/services/teo/v20220901/api.json +1 -1
- tccli/services/tke/v20180525/api.json +11 -11
- tccli/services/trtc/v20190722/api.json +1 -1
- tccli/services/tsf/v20180326/examples.json +1 -1
- tccli/services/vclm/v20240523/api.json +1 -1
- tccli/services/waf/v20180125/api.json +1541 -158
- tccli/services/waf/v20180125/examples.json +56 -0
- tccli/services/waf/waf_client.py +391 -20
- tccli/services/wsa/v20250508/api.json +1 -1
- {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/RECORD +40 -40
- {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1379.1.dist-info → tccli-3.0.1381.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/waf/waf_client.py
CHANGED
@@ -173,6 +173,58 @@ def doDescribeDomainDetailsClb(args, parsed_globals):
|
|
173
173
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
174
174
|
|
175
175
|
|
176
|
+
def doDescribeExports(args, parsed_globals):
|
177
|
+
g_param = parse_global_arg(parsed_globals)
|
178
|
+
|
179
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
180
|
+
cred = credential.CVMRoleCredential()
|
181
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
182
|
+
cred = credential.STSAssumeRoleCredential(
|
183
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
184
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
185
|
+
)
|
186
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
187
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
188
|
+
else:
|
189
|
+
cred = credential.Credential(
|
190
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
191
|
+
)
|
192
|
+
http_profile = HttpProfile(
|
193
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
194
|
+
reqMethod="POST",
|
195
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
196
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
197
|
+
)
|
198
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
199
|
+
if g_param[OptionsDefine.Language]:
|
200
|
+
profile.language = g_param[OptionsDefine.Language]
|
201
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
202
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
203
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
204
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
205
|
+
model = models.DescribeExportsRequest()
|
206
|
+
model.from_json_string(json.dumps(args))
|
207
|
+
start_time = time.time()
|
208
|
+
while True:
|
209
|
+
rsp = client.DescribeExports(model)
|
210
|
+
result = rsp.to_json_string()
|
211
|
+
try:
|
212
|
+
json_obj = json.loads(result)
|
213
|
+
except TypeError as e:
|
214
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
215
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
216
|
+
break
|
217
|
+
cur_time = time.time()
|
218
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
219
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
220
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
221
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
222
|
+
else:
|
223
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
224
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
225
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
226
|
+
|
227
|
+
|
176
228
|
def doAddAntiInfoLeakRules(args, parsed_globals):
|
177
229
|
g_param = parse_global_arg(parsed_globals)
|
178
230
|
|
@@ -1057,6 +1109,58 @@ def doDescribeScanIp(args, parsed_globals):
|
|
1057
1109
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1058
1110
|
|
1059
1111
|
|
1112
|
+
def doModifyObject(args, parsed_globals):
|
1113
|
+
g_param = parse_global_arg(parsed_globals)
|
1114
|
+
|
1115
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1116
|
+
cred = credential.CVMRoleCredential()
|
1117
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1118
|
+
cred = credential.STSAssumeRoleCredential(
|
1119
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1120
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1121
|
+
)
|
1122
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1123
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1124
|
+
else:
|
1125
|
+
cred = credential.Credential(
|
1126
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1127
|
+
)
|
1128
|
+
http_profile = HttpProfile(
|
1129
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1130
|
+
reqMethod="POST",
|
1131
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1132
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1133
|
+
)
|
1134
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1135
|
+
if g_param[OptionsDefine.Language]:
|
1136
|
+
profile.language = g_param[OptionsDefine.Language]
|
1137
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1138
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1139
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1140
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1141
|
+
model = models.ModifyObjectRequest()
|
1142
|
+
model.from_json_string(json.dumps(args))
|
1143
|
+
start_time = time.time()
|
1144
|
+
while True:
|
1145
|
+
rsp = client.ModifyObject(model)
|
1146
|
+
result = rsp.to_json_string()
|
1147
|
+
try:
|
1148
|
+
json_obj = json.loads(result)
|
1149
|
+
except TypeError as e:
|
1150
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1151
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1152
|
+
break
|
1153
|
+
cur_time = time.time()
|
1154
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1155
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1156
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1157
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1158
|
+
else:
|
1159
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1160
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1161
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1162
|
+
|
1163
|
+
|
1060
1164
|
def doDeleteOwaspRuleStatus(args, parsed_globals):
|
1061
1165
|
g_param = parse_global_arg(parsed_globals)
|
1062
1166
|
|
@@ -1369,7 +1473,7 @@ def doModifyInstanceElasticMode(args, parsed_globals):
|
|
1369
1473
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1370
1474
|
|
1371
1475
|
|
1372
|
-
def
|
1476
|
+
def doDescribeTopics(args, parsed_globals):
|
1373
1477
|
g_param = parse_global_arg(parsed_globals)
|
1374
1478
|
|
1375
1479
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1398,11 +1502,11 @@ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
|
|
1398
1502
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1399
1503
|
client._sdkVersion += ("_CLI_" + __version__)
|
1400
1504
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1401
|
-
model = models.
|
1505
|
+
model = models.DescribeTopicsRequest()
|
1402
1506
|
model.from_json_string(json.dumps(args))
|
1403
1507
|
start_time = time.time()
|
1404
1508
|
while True:
|
1405
|
-
rsp = client.
|
1509
|
+
rsp = client.DescribeTopics(model)
|
1406
1510
|
result = rsp.to_json_string()
|
1407
1511
|
try:
|
1408
1512
|
json_obj = json.loads(result)
|
@@ -1837,7 +1941,7 @@ def doDescribeIpHitItems(args, parsed_globals):
|
|
1837
1941
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1838
1942
|
|
1839
1943
|
|
1840
|
-
def
|
1944
|
+
def doCreateExport(args, parsed_globals):
|
1841
1945
|
g_param = parse_global_arg(parsed_globals)
|
1842
1946
|
|
1843
1947
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1866,11 +1970,11 @@ def doDescribeOwaspRuleTypes(args, parsed_globals):
|
|
1866
1970
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1867
1971
|
client._sdkVersion += ("_CLI_" + __version__)
|
1868
1972
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1869
|
-
model = models.
|
1973
|
+
model = models.CreateExportRequest()
|
1870
1974
|
model.from_json_string(json.dumps(args))
|
1871
1975
|
start_time = time.time()
|
1872
1976
|
while True:
|
1873
|
-
rsp = client.
|
1977
|
+
rsp = client.CreateExport(model)
|
1874
1978
|
result = rsp.to_json_string()
|
1875
1979
|
try:
|
1876
1980
|
json_obj = json.loads(result)
|
@@ -3501,7 +3605,7 @@ def doDescribeCCRule(args, parsed_globals):
|
|
3501
3605
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3502
3606
|
|
3503
3607
|
|
3504
|
-
def
|
3608
|
+
def doDescribeLogHistogram(args, parsed_globals):
|
3505
3609
|
g_param = parse_global_arg(parsed_globals)
|
3506
3610
|
|
3507
3611
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3530,11 +3634,11 @@ def doDescribeUserLevel(args, parsed_globals):
|
|
3530
3634
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3531
3635
|
client._sdkVersion += ("_CLI_" + __version__)
|
3532
3636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3533
|
-
model = models.
|
3637
|
+
model = models.DescribeLogHistogramRequest()
|
3534
3638
|
model.from_json_string(json.dumps(args))
|
3535
3639
|
start_time = time.time()
|
3536
3640
|
while True:
|
3537
|
-
rsp = client.
|
3641
|
+
rsp = client.DescribeLogHistogram(model)
|
3538
3642
|
result = rsp.to_json_string()
|
3539
3643
|
try:
|
3540
3644
|
json_obj = json.loads(result)
|
@@ -3709,6 +3813,58 @@ def doModifyWafThreatenIntelligence(args, parsed_globals):
|
|
3709
3813
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3710
3814
|
|
3711
3815
|
|
3816
|
+
def doDescribeOwaspRuleTypes(args, parsed_globals):
|
3817
|
+
g_param = parse_global_arg(parsed_globals)
|
3818
|
+
|
3819
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3820
|
+
cred = credential.CVMRoleCredential()
|
3821
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3822
|
+
cred = credential.STSAssumeRoleCredential(
|
3823
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3824
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3825
|
+
)
|
3826
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3827
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3828
|
+
else:
|
3829
|
+
cred = credential.Credential(
|
3830
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3831
|
+
)
|
3832
|
+
http_profile = HttpProfile(
|
3833
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3834
|
+
reqMethod="POST",
|
3835
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
3836
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3837
|
+
)
|
3838
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3839
|
+
if g_param[OptionsDefine.Language]:
|
3840
|
+
profile.language = g_param[OptionsDefine.Language]
|
3841
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3842
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3843
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
3844
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3845
|
+
model = models.DescribeOwaspRuleTypesRequest()
|
3846
|
+
model.from_json_string(json.dumps(args))
|
3847
|
+
start_time = time.time()
|
3848
|
+
while True:
|
3849
|
+
rsp = client.DescribeOwaspRuleTypes(model)
|
3850
|
+
result = rsp.to_json_string()
|
3851
|
+
try:
|
3852
|
+
json_obj = json.loads(result)
|
3853
|
+
except TypeError as e:
|
3854
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3855
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3856
|
+
break
|
3857
|
+
cur_time = time.time()
|
3858
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3859
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3860
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3861
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3862
|
+
else:
|
3863
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3864
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3865
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3866
|
+
|
3867
|
+
|
3712
3868
|
def doDeleteAttackDownloadRecord(args, parsed_globals):
|
3713
3869
|
g_param = parse_global_arg(parsed_globals)
|
3714
3870
|
|
@@ -3865,6 +4021,58 @@ def doDescribeAttackOverview(args, parsed_globals):
|
|
3865
4021
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3866
4022
|
|
3867
4023
|
|
4024
|
+
def doDescribeUserLevel(args, parsed_globals):
|
4025
|
+
g_param = parse_global_arg(parsed_globals)
|
4026
|
+
|
4027
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4028
|
+
cred = credential.CVMRoleCredential()
|
4029
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4030
|
+
cred = credential.STSAssumeRoleCredential(
|
4031
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4032
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4033
|
+
)
|
4034
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4035
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4036
|
+
else:
|
4037
|
+
cred = credential.Credential(
|
4038
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4039
|
+
)
|
4040
|
+
http_profile = HttpProfile(
|
4041
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4042
|
+
reqMethod="POST",
|
4043
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4044
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4045
|
+
)
|
4046
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4047
|
+
if g_param[OptionsDefine.Language]:
|
4048
|
+
profile.language = g_param[OptionsDefine.Language]
|
4049
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4050
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4051
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4052
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4053
|
+
model = models.DescribeUserLevelRequest()
|
4054
|
+
model.from_json_string(json.dumps(args))
|
4055
|
+
start_time = time.time()
|
4056
|
+
while True:
|
4057
|
+
rsp = client.DescribeUserLevel(model)
|
4058
|
+
result = rsp.to_json_string()
|
4059
|
+
try:
|
4060
|
+
json_obj = json.loads(result)
|
4061
|
+
except TypeError as e:
|
4062
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4063
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4064
|
+
break
|
4065
|
+
cur_time = time.time()
|
4066
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4067
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4068
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4069
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4070
|
+
else:
|
4071
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4072
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4073
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4074
|
+
|
4075
|
+
|
3868
4076
|
def doModifyOwaspWhiteRule(args, parsed_globals):
|
3869
4077
|
g_param = parse_global_arg(parsed_globals)
|
3870
4078
|
|
@@ -5841,6 +6049,58 @@ def doDescribeDomainCountInfo(args, parsed_globals):
|
|
5841
6049
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5842
6050
|
|
5843
6051
|
|
6052
|
+
def doModifyProtectionLevel(args, parsed_globals):
|
6053
|
+
g_param = parse_global_arg(parsed_globals)
|
6054
|
+
|
6055
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6056
|
+
cred = credential.CVMRoleCredential()
|
6057
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6058
|
+
cred = credential.STSAssumeRoleCredential(
|
6059
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6060
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6061
|
+
)
|
6062
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6063
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6064
|
+
else:
|
6065
|
+
cred = credential.Credential(
|
6066
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6067
|
+
)
|
6068
|
+
http_profile = HttpProfile(
|
6069
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6070
|
+
reqMethod="POST",
|
6071
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6072
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6073
|
+
)
|
6074
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6075
|
+
if g_param[OptionsDefine.Language]:
|
6076
|
+
profile.language = g_param[OptionsDefine.Language]
|
6077
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6078
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
6079
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6080
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6081
|
+
model = models.ModifyProtectionLevelRequest()
|
6082
|
+
model.from_json_string(json.dumps(args))
|
6083
|
+
start_time = time.time()
|
6084
|
+
while True:
|
6085
|
+
rsp = client.ModifyProtectionLevel(model)
|
6086
|
+
result = rsp.to_json_string()
|
6087
|
+
try:
|
6088
|
+
json_obj = json.loads(result)
|
6089
|
+
except TypeError as e:
|
6090
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6091
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6092
|
+
break
|
6093
|
+
cur_time = time.time()
|
6094
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6095
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6096
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6097
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6098
|
+
else:
|
6099
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6100
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6101
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6102
|
+
|
6103
|
+
|
5844
6104
|
def doDeleteSpartaProtection(args, parsed_globals):
|
5845
6105
|
g_param = parse_global_arg(parsed_globals)
|
5846
6106
|
|
@@ -6465,7 +6725,7 @@ def doDestroyPostCKafkaFlow(args, parsed_globals):
|
|
6465
6725
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6466
6726
|
|
6467
6727
|
|
6468
|
-
def
|
6728
|
+
def doDeleteExport(args, parsed_globals):
|
6469
6729
|
g_param = parse_global_arg(parsed_globals)
|
6470
6730
|
|
6471
6731
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -6494,11 +6754,11 @@ def doPostAttackDownloadTask(args, parsed_globals):
|
|
6494
6754
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
6495
6755
|
client._sdkVersion += ("_CLI_" + __version__)
|
6496
6756
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6497
|
-
model = models.
|
6757
|
+
model = models.DeleteExportRequest()
|
6498
6758
|
model.from_json_string(json.dumps(args))
|
6499
6759
|
start_time = time.time()
|
6500
6760
|
while True:
|
6501
|
-
rsp = client.
|
6761
|
+
rsp = client.DeleteExport(model)
|
6502
6762
|
result = rsp.to_json_string()
|
6503
6763
|
try:
|
6504
6764
|
json_obj = json.loads(result)
|
@@ -7765,6 +8025,58 @@ def doModifyAreaBanRule(args, parsed_globals):
|
|
7765
8025
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7766
8026
|
|
7767
8027
|
|
8028
|
+
def doDescribeUserCdcClbWafRegions(args, parsed_globals):
|
8029
|
+
g_param = parse_global_arg(parsed_globals)
|
8030
|
+
|
8031
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
8032
|
+
cred = credential.CVMRoleCredential()
|
8033
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8034
|
+
cred = credential.STSAssumeRoleCredential(
|
8035
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8036
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8037
|
+
)
|
8038
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8039
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
8040
|
+
else:
|
8041
|
+
cred = credential.Credential(
|
8042
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
8043
|
+
)
|
8044
|
+
http_profile = HttpProfile(
|
8045
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
8046
|
+
reqMethod="POST",
|
8047
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
8048
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
8049
|
+
)
|
8050
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
8051
|
+
if g_param[OptionsDefine.Language]:
|
8052
|
+
profile.language = g_param[OptionsDefine.Language]
|
8053
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
8054
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
8055
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
8056
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8057
|
+
model = models.DescribeUserCdcClbWafRegionsRequest()
|
8058
|
+
model.from_json_string(json.dumps(args))
|
8059
|
+
start_time = time.time()
|
8060
|
+
while True:
|
8061
|
+
rsp = client.DescribeUserCdcClbWafRegions(model)
|
8062
|
+
result = rsp.to_json_string()
|
8063
|
+
try:
|
8064
|
+
json_obj = json.loads(result)
|
8065
|
+
except TypeError as e:
|
8066
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
8067
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
8068
|
+
break
|
8069
|
+
cur_time = time.time()
|
8070
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
8071
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
8072
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
8073
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
8074
|
+
else:
|
8075
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
8076
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
8077
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8078
|
+
|
8079
|
+
|
7768
8080
|
def doDescribeWafAutoDenyStatus(args, parsed_globals):
|
7769
8081
|
g_param = parse_global_arg(parsed_globals)
|
7770
8082
|
|
@@ -7921,6 +8233,58 @@ def doModifyCustomWhiteRuleStatus(args, parsed_globals):
|
|
7921
8233
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7922
8234
|
|
7923
8235
|
|
8236
|
+
def doPostAttackDownloadTask(args, parsed_globals):
|
8237
|
+
g_param = parse_global_arg(parsed_globals)
|
8238
|
+
|
8239
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
8240
|
+
cred = credential.CVMRoleCredential()
|
8241
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
8242
|
+
cred = credential.STSAssumeRoleCredential(
|
8243
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
8244
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
8245
|
+
)
|
8246
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
8247
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
8248
|
+
else:
|
8249
|
+
cred = credential.Credential(
|
8250
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
8251
|
+
)
|
8252
|
+
http_profile = HttpProfile(
|
8253
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
8254
|
+
reqMethod="POST",
|
8255
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
8256
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
8257
|
+
)
|
8258
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
8259
|
+
if g_param[OptionsDefine.Language]:
|
8260
|
+
profile.language = g_param[OptionsDefine.Language]
|
8261
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
8262
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
8263
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
8264
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8265
|
+
model = models.PostAttackDownloadTaskRequest()
|
8266
|
+
model.from_json_string(json.dumps(args))
|
8267
|
+
start_time = time.time()
|
8268
|
+
while True:
|
8269
|
+
rsp = client.PostAttackDownloadTask(model)
|
8270
|
+
result = rsp.to_json_string()
|
8271
|
+
try:
|
8272
|
+
json_obj = json.loads(result)
|
8273
|
+
except TypeError as e:
|
8274
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
8275
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
8276
|
+
break
|
8277
|
+
cur_time = time.time()
|
8278
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
8279
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
8280
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
8281
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
8282
|
+
else:
|
8283
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
8284
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
8285
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8286
|
+
|
8287
|
+
|
7924
8288
|
def doDescribePorts(args, parsed_globals):
|
7925
8289
|
g_param = parse_global_arg(parsed_globals)
|
7926
8290
|
|
@@ -8181,7 +8545,7 @@ def doUpsertCCRule(args, parsed_globals):
|
|
8181
8545
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8182
8546
|
|
8183
8547
|
|
8184
|
-
def
|
8548
|
+
def doSearchLog(args, parsed_globals):
|
8185
8549
|
g_param = parse_global_arg(parsed_globals)
|
8186
8550
|
|
8187
8551
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8210,11 +8574,11 @@ def doModifyObject(args, parsed_globals):
|
|
8210
8574
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
8211
8575
|
client._sdkVersion += ("_CLI_" + __version__)
|
8212
8576
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8213
|
-
model = models.
|
8577
|
+
model = models.SearchLogRequest()
|
8214
8578
|
model.from_json_string(json.dumps(args))
|
8215
8579
|
start_time = time.time()
|
8216
8580
|
while True:
|
8217
|
-
rsp = client.
|
8581
|
+
rsp = client.SearchLog(model)
|
8218
8582
|
result = rsp.to_json_string()
|
8219
8583
|
try:
|
8220
8584
|
json_obj = json.loads(result)
|
@@ -9131,6 +9495,7 @@ ACTION_MAP = {
|
|
9131
9495
|
"DescribeAttackType": doDescribeAttackType,
|
9132
9496
|
"DescribePeakPoints": doDescribePeakPoints,
|
9133
9497
|
"DescribeDomainDetailsClb": doDescribeDomainDetailsClb,
|
9498
|
+
"DescribeExports": doDescribeExports,
|
9134
9499
|
"AddAntiInfoLeakRules": doAddAntiInfoLeakRules,
|
9135
9500
|
"DescribeAccessIndex": doDescribeAccessIndex,
|
9136
9501
|
"GetAttackTotalCount": doGetAttackTotalCount,
|
@@ -9148,13 +9513,14 @@ ACTION_MAP = {
|
|
9148
9513
|
"GetAttackDownloadRecords": doGetAttackDownloadRecords,
|
9149
9514
|
"DescribeApiDetail": doDescribeApiDetail,
|
9150
9515
|
"DescribeScanIp": doDescribeScanIp,
|
9516
|
+
"ModifyObject": doModifyObject,
|
9151
9517
|
"DeleteOwaspRuleStatus": doDeleteOwaspRuleStatus,
|
9152
9518
|
"CreatePostCKafkaFlow": doCreatePostCKafkaFlow,
|
9153
9519
|
"DeleteCustomRule": doDeleteCustomRule,
|
9154
9520
|
"ModifyAntiFakeUrl": doModifyAntiFakeUrl,
|
9155
9521
|
"ModifySpartaProtection": doModifySpartaProtection,
|
9156
9522
|
"ModifyInstanceElasticMode": doModifyInstanceElasticMode,
|
9157
|
-
"
|
9523
|
+
"DescribeTopics": doDescribeTopics,
|
9158
9524
|
"ModifyWafAutoDenyRules": doModifyWafAutoDenyRules,
|
9159
9525
|
"DescribeUserDomainInfo": doDescribeUserDomainInfo,
|
9160
9526
|
"DeleteCCRule": doDeleteCCRule,
|
@@ -9163,7 +9529,7 @@ ACTION_MAP = {
|
|
9163
9529
|
"ModifyBotSceneUCBRule": doModifyBotSceneUCBRule,
|
9164
9530
|
"DescribeBotSceneUCBRule": doDescribeBotSceneUCBRule,
|
9165
9531
|
"DescribeIpHitItems": doDescribeIpHitItems,
|
9166
|
-
"
|
9532
|
+
"CreateExport": doCreateExport,
|
9167
9533
|
"DescribeHistogram": doDescribeHistogram,
|
9168
9534
|
"DescribeWebshellStatus": doDescribeWebshellStatus,
|
9169
9535
|
"DescribeDomainWhiteRules": doDescribeDomainWhiteRules,
|
@@ -9195,13 +9561,15 @@ ACTION_MAP = {
|
|
9195
9561
|
"SwitchElasticMode": doSwitchElasticMode,
|
9196
9562
|
"ModifyInstanceRenewFlag": doModifyInstanceRenewFlag,
|
9197
9563
|
"DescribeCCRule": doDescribeCCRule,
|
9198
|
-
"
|
9564
|
+
"DescribeLogHistogram": doDescribeLogHistogram,
|
9199
9565
|
"ModifyOwaspRuleTypeAction": doModifyOwaspRuleTypeAction,
|
9200
9566
|
"DescribePeakValue": doDescribePeakValue,
|
9201
9567
|
"ModifyWafThreatenIntelligence": doModifyWafThreatenIntelligence,
|
9568
|
+
"DescribeOwaspRuleTypes": doDescribeOwaspRuleTypes,
|
9202
9569
|
"DeleteAttackDownloadRecord": doDeleteAttackDownloadRecord,
|
9203
9570
|
"DescribeCustomRuleList": doDescribeCustomRuleList,
|
9204
9571
|
"DescribeAttackOverview": doDescribeAttackOverview,
|
9572
|
+
"DescribeUserLevel": doDescribeUserLevel,
|
9205
9573
|
"ModifyOwaspWhiteRule": doModifyOwaspWhiteRule,
|
9206
9574
|
"DescribeAttackWhiteRule": doDescribeAttackWhiteRule,
|
9207
9575
|
"DescribeHosts": doDescribeHosts,
|
@@ -9240,6 +9608,7 @@ ACTION_MAP = {
|
|
9240
9608
|
"AddAttackWhiteRule": doAddAttackWhiteRule,
|
9241
9609
|
"AddAreaBanAreas": doAddAreaBanAreas,
|
9242
9610
|
"DescribeDomainCountInfo": doDescribeDomainCountInfo,
|
9611
|
+
"ModifyProtectionLevel": doModifyProtectionLevel,
|
9243
9612
|
"DeleteSpartaProtection": doDeleteSpartaProtection,
|
9244
9613
|
"SwitchDomainRules": doSwitchDomainRules,
|
9245
9614
|
"UpsertCCAutoStatus": doUpsertCCAutoStatus,
|
@@ -9252,7 +9621,7 @@ ACTION_MAP = {
|
|
9252
9621
|
"CreateHost": doCreateHost,
|
9253
9622
|
"ModifyDomainsCLSStatus": doModifyDomainsCLSStatus,
|
9254
9623
|
"DestroyPostCKafkaFlow": doDestroyPostCKafkaFlow,
|
9255
|
-
"
|
9624
|
+
"DeleteExport": doDeleteExport,
|
9256
9625
|
"DescribeCustomWhiteRule": doDescribeCustomWhiteRule,
|
9257
9626
|
"DescribeHost": doDescribeHost,
|
9258
9627
|
"ModifyUserSignatureRuleV2": doModifyUserSignatureRuleV2,
|
@@ -9277,15 +9646,17 @@ ACTION_MAP = {
|
|
9277
9646
|
"ModifyModuleStatus": doModifyModuleStatus,
|
9278
9647
|
"ModifyApiAnalyzeStatus": doModifyApiAnalyzeStatus,
|
9279
9648
|
"ModifyAreaBanRule": doModifyAreaBanRule,
|
9649
|
+
"DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
|
9280
9650
|
"DescribeWafAutoDenyStatus": doDescribeWafAutoDenyStatus,
|
9281
9651
|
"DescribeSession": doDescribeSession,
|
9282
9652
|
"ModifyCustomWhiteRuleStatus": doModifyCustomWhiteRuleStatus,
|
9653
|
+
"PostAttackDownloadTask": doPostAttackDownloadTask,
|
9283
9654
|
"DescribePorts": doDescribePorts,
|
9284
9655
|
"ModifyHostMode": doModifyHostMode,
|
9285
9656
|
"ModifyDomainPostAction": doModifyDomainPostAction,
|
9286
9657
|
"DescribeModuleStatus": doDescribeModuleStatus,
|
9287
9658
|
"UpsertCCRule": doUpsertCCRule,
|
9288
|
-
"
|
9659
|
+
"SearchLog": doSearchLog,
|
9289
9660
|
"DeleteAntiFakeUrl": doDeleteAntiFakeUrl,
|
9290
9661
|
"DescribeCCRuleList": doDescribeCCRuleList,
|
9291
9662
|
"ModifyWebshellStatus": doModifyWebshellStatus,
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: tccli
|
3
|
-
Version: 3.0.
|
3
|
+
Version: 3.0.1381.1
|
4
4
|
Summary: Universal Command Line Environment for Tencent Cloud
|
5
5
|
Project-URL: Bug Tracker, https://github.com/TencentCloud/tencentcloud-cli/issues
|
6
6
|
Project-URL: Homepage, https://github.com/TencentCloud/tencentcloud-cli
|
@@ -13,7 +13,7 @@ Classifier: Programming Language :: Python :: 2.7
|
|
13
13
|
Classifier: Programming Language :: Python :: 3
|
14
14
|
Requires-Dist: jmespath==0.10.0
|
15
15
|
Requires-Dist: six==1.16.0
|
16
|
-
Requires-Dist: tencentcloud-sdk-python>=3.0.
|
16
|
+
Requires-Dist: tencentcloud-sdk-python>=3.0.1381
|
17
17
|
Description-Content-Type: text/markdown
|
18
18
|
|
19
19
|
# 命令行工具简介
|