ims-20190815/alibabacloud_ims20190815/client.py (2,075 lines of code) (raw):

# -*- coding: utf-8 -*- # This file is auto-generated, don't edit it. Thanks. from __future__ import unicode_literals from Tea.core import TeaCore from alibabacloud_tea_openapi.client import Client as OpenApiClient from alibabacloud_tea_openapi import models as open_api_models from alibabacloud_tea_util.client import Client as UtilClient from alibabacloud_endpoint_util.client import Client as EndpointUtilClient from alibabacloud_ims20190815 import models as ims_20190815_models from alibabacloud_tea_util import models as util_models from alibabacloud_openapi_util.client import Client as OpenApiUtilClient class Client(OpenApiClient): """ *\ """ def __init__(self, config): super(Client, self).__init__(config) self._endpoint_rule = 'central' self.check_config(config) self._endpoint = self.get_endpoint('ims', self._region_id, self._endpoint_rule, self._network, self._suffix, self._endpoint_map, self._endpoint) def get_endpoint(self, product_id, region_id, endpoint_rule, network, suffix, endpoint_map, endpoint): if not UtilClient.empty(endpoint): return endpoint if not UtilClient.is_unset(endpoint_map) and not UtilClient.empty(endpoint_map.get(region_id)): return endpoint_map.get(region_id) return EndpointUtilClient.get_endpoint_rules(product_id, region_id, endpoint_rule, network, suffix) def add_client_id_to_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to add the client ID `598469743454717****` to the OIDC IdP named `TestOIDCProvider`. @param request: AddClientIdToOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: AddClientIdToOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.client_id): query['ClientId'] = request.client_id if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='AddClientIdToOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.AddClientIdToOIDCProviderResponse(), self.call_api(params, req, runtime) ) def add_client_id_to_oidcprovider(self, request): """ ### This topic provides an example on how to add the client ID `598469743454717****` to the OIDC IdP named `TestOIDCProvider`. @param request: AddClientIdToOIDCProviderRequest @return: AddClientIdToOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.add_client_id_to_oidcprovider_with_options(request, runtime) def add_fingerprint_to_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to add the fingerprint `902ef2deeb3c5b13ea4c3d5193629309e231****` to the OIDC IdP named `TestOIDCProvider`. @param request: AddFingerprintToOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: AddFingerprintToOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.fingerprint): query['Fingerprint'] = request.fingerprint if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='AddFingerprintToOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.AddFingerprintToOIDCProviderResponse(), self.call_api(params, req, runtime) ) def add_fingerprint_to_oidcprovider(self, request): """ ### This topic provides an example on how to add the fingerprint `902ef2deeb3c5b13ea4c3d5193629309e231****` to the OIDC IdP named `TestOIDCProvider`. @param request: AddFingerprintToOIDCProviderRequest @return: AddFingerprintToOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.add_fingerprint_to_oidcprovider_with_options(request, runtime) def add_user_to_group_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='AddUserToGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.AddUserToGroupResponse(), self.call_api(params, req, runtime) ) def add_user_to_group(self, request): runtime = util_models.RuntimeOptions() return self.add_user_to_group_with_options(request, runtime) def bind_mfadevice_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.authentication_code_1): query['AuthenticationCode1'] = request.authentication_code_1 if not UtilClient.is_unset(request.authentication_code_2): query['AuthenticationCode2'] = request.authentication_code_2 if not UtilClient.is_unset(request.serial_number): query['SerialNumber'] = request.serial_number if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='BindMFADevice', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.BindMFADeviceResponse(), self.call_api(params, req, runtime) ) def bind_mfadevice(self, request): runtime = util_models.RuntimeOptions() return self.bind_mfadevice_with_options(request, runtime) def change_password_with_options(self, request, runtime): """ > This operation is available only for RAM users. Before you call this operation, make sure that `AllowUserToChangePassword` in [SetSecurityPreference](~~43765~~) is set to `True`. The value True indicates that RAM users can change their passwords. @param request: ChangePasswordRequest @param runtime: runtime options for this request RuntimeOptions @return: ChangePasswordResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.new_password): query['NewPassword'] = request.new_password if not UtilClient.is_unset(request.old_password): query['OldPassword'] = request.old_password req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ChangePassword', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ChangePasswordResponse(), self.call_api(params, req, runtime) ) def change_password(self, request): """ > This operation is available only for RAM users. Before you call this operation, make sure that `AllowUserToChangePassword` in [SetSecurityPreference](~~43765~~) is set to `True`. The value True indicates that RAM users can change their passwords. @param request: ChangePasswordRequest @return: ChangePasswordResponse """ runtime = util_models.RuntimeOptions() return self.change_password_with_options(request, runtime) def create_access_key_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateAccessKey', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateAccessKeyResponse(), self.call_api(params, req, runtime) ) def create_access_key(self, request): runtime = util_models.RuntimeOptions() return self.create_access_key_with_options(request, runtime) def create_app_secret_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateAppSecret', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateAppSecretResponse(), self.call_api(params, req, runtime) ) def create_app_secret(self, request): runtime = util_models.RuntimeOptions() return self.create_app_secret_with_options(request, runtime) def create_application_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.access_token_validity): query['AccessTokenValidity'] = request.access_token_validity if not UtilClient.is_unset(request.app_name): query['AppName'] = request.app_name if not UtilClient.is_unset(request.app_type): query['AppType'] = request.app_type if not UtilClient.is_unset(request.display_name): query['DisplayName'] = request.display_name if not UtilClient.is_unset(request.is_multi_tenant): query['IsMultiTenant'] = request.is_multi_tenant if not UtilClient.is_unset(request.predefined_scopes): query['PredefinedScopes'] = request.predefined_scopes if not UtilClient.is_unset(request.redirect_uris): query['RedirectUris'] = request.redirect_uris if not UtilClient.is_unset(request.refresh_token_validity): query['RefreshTokenValidity'] = request.refresh_token_validity if not UtilClient.is_unset(request.required_scopes): query['RequiredScopes'] = request.required_scopes if not UtilClient.is_unset(request.secret_required): query['SecretRequired'] = request.secret_required req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateApplication', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateApplicationResponse(), self.call_api(params, req, runtime) ) def create_application(self, request): runtime = util_models.RuntimeOptions() return self.create_application_with_options(request, runtime) def create_group_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.comments): query['Comments'] = request.comments if not UtilClient.is_unset(request.display_name): query['DisplayName'] = request.display_name if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateGroupResponse(), self.call_api(params, req, runtime) ) def create_group(self, request): runtime = util_models.RuntimeOptions() return self.create_group_with_options(request, runtime) def create_login_profile_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.mfabind_required): query['MFABindRequired'] = request.mfabind_required if not UtilClient.is_unset(request.password): query['Password'] = request.password if not UtilClient.is_unset(request.password_reset_required): query['PasswordResetRequired'] = request.password_reset_required if not UtilClient.is_unset(request.status): query['Status'] = request.status if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateLoginProfile', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateLoginProfileResponse(), self.call_api(params, req, runtime) ) def create_login_profile(self, request): runtime = util_models.RuntimeOptions() return self.create_login_profile_with_options(request, runtime) def create_oidcprovider_with_options(self, request, runtime): """ ### Prerequisites Before you call this operation, make sure that the information such as the URL of the issuer, the fingerprints of HTTPS certificates, and the client IDs are obtained from an external (IdP, such as Google G Suite or Okta. ### Limits * You can create a maximum of 100 OIDC IdPs in an Alibaba Cloud account. * You can add a maximum of 20 client IDs to an OIDC IdP. * You can add a maximum of five fingerprints to an OIDC IdP. ### This topic provides an example on how to create an IdP named `TestOIDCProvider` to configure a trust relationship between the external IdP and Alibaba Cloud. @param request: CreateOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: CreateOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.client_ids): query['ClientIds'] = request.client_ids if not UtilClient.is_unset(request.description): query['Description'] = request.description if not UtilClient.is_unset(request.fingerprints): query['Fingerprints'] = request.fingerprints if not UtilClient.is_unset(request.issuance_limit_time): query['IssuanceLimitTime'] = request.issuance_limit_time if not UtilClient.is_unset(request.issuer_url): query['IssuerUrl'] = request.issuer_url if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateOIDCProviderResponse(), self.call_api(params, req, runtime) ) def create_oidcprovider(self, request): """ ### Prerequisites Before you call this operation, make sure that the information such as the URL of the issuer, the fingerprints of HTTPS certificates, and the client IDs are obtained from an external (IdP, such as Google G Suite or Okta. ### Limits * You can create a maximum of 100 OIDC IdPs in an Alibaba Cloud account. * You can add a maximum of 20 client IDs to an OIDC IdP. * You can add a maximum of five fingerprints to an OIDC IdP. ### This topic provides an example on how to create an IdP named `TestOIDCProvider` to configure a trust relationship between the external IdP and Alibaba Cloud. @param request: CreateOIDCProviderRequest @return: CreateOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.create_oidcprovider_with_options(request, runtime) def create_samlprovider_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.description): query['Description'] = request.description if not UtilClient.is_unset(request.encoded_samlmetadata_document): query['EncodedSAMLMetadataDocument'] = request.encoded_samlmetadata_document if not UtilClient.is_unset(request.samlprovider_name): query['SAMLProviderName'] = request.samlprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateSAMLProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateSAMLProviderResponse(), self.call_api(params, req, runtime) ) def create_samlprovider(self, request): runtime = util_models.RuntimeOptions() return self.create_samlprovider_with_options(request, runtime) def create_user_with_options(self, request, runtime): """ This topic provides an example on how to create a RAM user named `test`. @param request: CreateUserRequest @param runtime: runtime options for this request RuntimeOptions @return: CreateUserResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.comments): query['Comments'] = request.comments if not UtilClient.is_unset(request.display_name): query['DisplayName'] = request.display_name if not UtilClient.is_unset(request.email): query['Email'] = request.email if not UtilClient.is_unset(request.mobile_phone): query['MobilePhone'] = request.mobile_phone if not UtilClient.is_unset(request.tag): query['Tag'] = request.tag if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateUser', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateUserResponse(), self.call_api(params, req, runtime) ) def create_user(self, request): """ This topic provides an example on how to create a RAM user named `test`. @param request: CreateUserRequest @return: CreateUserResponse """ runtime = util_models.RuntimeOptions() return self.create_user_with_options(request, runtime) def create_virtual_mfadevice_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.virtual_mfadevice_name): query['VirtualMFADeviceName'] = request.virtual_mfadevice_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='CreateVirtualMFADevice', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.CreateVirtualMFADeviceResponse(), self.call_api(params, req, runtime) ) def create_virtual_mfadevice(self, request): runtime = util_models.RuntimeOptions() return self.create_virtual_mfadevice_with_options(request, runtime) def delete_access_key_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_access_key_id): query['UserAccessKeyId'] = request.user_access_key_id if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteAccessKey', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteAccessKeyResponse(), self.call_api(params, req, runtime) ) def delete_access_key(self, request): runtime = util_models.RuntimeOptions() return self.delete_access_key_with_options(request, runtime) def delete_app_secret_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id if not UtilClient.is_unset(request.app_secret_id): query['AppSecretId'] = request.app_secret_id req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteAppSecret', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteAppSecretResponse(), self.call_api(params, req, runtime) ) def delete_app_secret(self, request): runtime = util_models.RuntimeOptions() return self.delete_app_secret_with_options(request, runtime) def delete_application_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteApplication', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteApplicationResponse(), self.call_api(params, req, runtime) ) def delete_application(self, request): runtime = util_models.RuntimeOptions() return self.delete_application_with_options(request, runtime) def delete_group_with_options(self, request, runtime): """ Before you delete a RAM user group, make sure that no policies are attached to the group and no RAM users are included in the group. @param request: DeleteGroupRequest @param runtime: runtime options for this request RuntimeOptions @return: DeleteGroupResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteGroupResponse(), self.call_api(params, req, runtime) ) def delete_group(self, request): """ Before you delete a RAM user group, make sure that no policies are attached to the group and no RAM users are included in the group. @param request: DeleteGroupRequest @return: DeleteGroupResponse """ runtime = util_models.RuntimeOptions() return self.delete_group_with_options(request, runtime) def delete_login_profile_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteLoginProfile', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteLoginProfileResponse(), self.call_api(params, req, runtime) ) def delete_login_profile(self, request): runtime = util_models.RuntimeOptions() return self.delete_login_profile_with_options(request, runtime) def delete_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to remove the OIDC IdP named `TestOIDCProvider`. @param request: DeleteOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: DeleteOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteOIDCProviderResponse(), self.call_api(params, req, runtime) ) def delete_oidcprovider(self, request): """ ### This topic provides an example on how to remove the OIDC IdP named `TestOIDCProvider`. @param request: DeleteOIDCProviderRequest @return: DeleteOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.delete_oidcprovider_with_options(request, runtime) def delete_samlprovider_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.samlprovider_name): query['SAMLProviderName'] = request.samlprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteSAMLProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteSAMLProviderResponse(), self.call_api(params, req, runtime) ) def delete_samlprovider(self, request): runtime = util_models.RuntimeOptions() return self.delete_samlprovider_with_options(request, runtime) def delete_user_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_id): query['UserId'] = request.user_id if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteUser', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteUserResponse(), self.call_api(params, req, runtime) ) def delete_user(self, request): runtime = util_models.RuntimeOptions() return self.delete_user_with_options(request, runtime) def delete_virtual_mfadevice_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.serial_number): query['SerialNumber'] = request.serial_number req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DeleteVirtualMFADevice', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DeleteVirtualMFADeviceResponse(), self.call_api(params, req, runtime) ) def delete_virtual_mfadevice(self, request): runtime = util_models.RuntimeOptions() return self.delete_virtual_mfadevice_with_options(request, runtime) def disable_virtual_mfawith_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='DisableVirtualMFA', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.DisableVirtualMFAResponse(), self.call_api(params, req, runtime) ) def disable_virtual_mfa(self, request): runtime = util_models.RuntimeOptions() return self.disable_virtual_mfawith_options(request, runtime) def generate_credential_report_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GenerateCredentialReport', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GenerateCredentialReportResponse(), self.call_api(params, req, runtime) ) def generate_credential_report(self): runtime = util_models.RuntimeOptions() return self.generate_credential_report_with_options(runtime) def get_access_key_last_used_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_access_key_id): query['UserAccessKeyId'] = request.user_access_key_id if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetAccessKeyLastUsed', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetAccessKeyLastUsedResponse(), self.call_api(params, req, runtime) ) def get_access_key_last_used(self, request): runtime = util_models.RuntimeOptions() return self.get_access_key_last_used_with_options(request, runtime) def get_account_mfainfo_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetAccountMFAInfo', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetAccountMFAInfoResponse(), self.call_api(params, req, runtime) ) def get_account_mfainfo(self): runtime = util_models.RuntimeOptions() return self.get_account_mfainfo_with_options(runtime) def get_account_security_practice_report_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetAccountSecurityPracticeReport', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetAccountSecurityPracticeReportResponse(), self.call_api(params, req, runtime) ) def get_account_security_practice_report(self): runtime = util_models.RuntimeOptions() return self.get_account_security_practice_report_with_options(runtime) def get_account_summary_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetAccountSummary', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetAccountSummaryResponse(), self.call_api(params, req, runtime) ) def get_account_summary(self): runtime = util_models.RuntimeOptions() return self.get_account_summary_with_options(runtime) def get_app_secret_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id if not UtilClient.is_unset(request.app_secret_id): query['AppSecretId'] = request.app_secret_id req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetAppSecret', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetAppSecretResponse(), self.call_api(params, req, runtime) ) def get_app_secret(self, request): runtime = util_models.RuntimeOptions() return self.get_app_secret_with_options(request, runtime) def get_application_with_options(self, request, runtime): """ This topic provides an example on how to query the configurations of an application named `472457090344041***`. @param request: GetApplicationRequest @param runtime: runtime options for this request RuntimeOptions @return: GetApplicationResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetApplication', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetApplicationResponse(), self.call_api(params, req, runtime) ) def get_application(self, request): """ This topic provides an example on how to query the configurations of an application named `472457090344041***`. @param request: GetApplicationRequest @return: GetApplicationResponse """ runtime = util_models.RuntimeOptions() return self.get_application_with_options(request, runtime) def get_credential_report_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items if not UtilClient.is_unset(request.next_token): query['NextToken'] = request.next_token req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetCredentialReport', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetCredentialReportResponse(), self.call_api(params, req, runtime) ) def get_credential_report(self, request): runtime = util_models.RuntimeOptions() return self.get_credential_report_with_options(request, runtime) def get_default_domain_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetDefaultDomain', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetDefaultDomainResponse(), self.call_api(params, req, runtime) ) def get_default_domain(self): runtime = util_models.RuntimeOptions() return self.get_default_domain_with_options(runtime) def get_group_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetGroupResponse(), self.call_api(params, req, runtime) ) def get_group(self, request): runtime = util_models.RuntimeOptions() return self.get_group_with_options(request, runtime) def get_login_profile_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetLoginProfile', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetLoginProfileResponse(), self.call_api(params, req, runtime) ) def get_login_profile(self, request): runtime = util_models.RuntimeOptions() return self.get_login_profile_with_options(request, runtime) def get_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to query the information about an OpenID Connect (OIDC) identity provider (IdP) named `TestOIDCProvider`. @param request: GetOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: GetOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetOIDCProviderResponse(), self.call_api(params, req, runtime) ) def get_oidcprovider(self, request): """ ### This topic provides an example on how to query the information about an OpenID Connect (OIDC) identity provider (IdP) named `TestOIDCProvider`. @param request: GetOIDCProviderRequest @return: GetOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.get_oidcprovider_with_options(request, runtime) def get_password_policy_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetPasswordPolicy', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetPasswordPolicyResponse(), self.call_api(params, req, runtime) ) def get_password_policy(self): runtime = util_models.RuntimeOptions() return self.get_password_policy_with_options(runtime) def get_samlprovider_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.samlprovider_name): query['SAMLProviderName'] = request.samlprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetSAMLProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetSAMLProviderResponse(), self.call_api(params, req, runtime) ) def get_samlprovider(self, request): runtime = util_models.RuntimeOptions() return self.get_samlprovider_with_options(request, runtime) def get_security_preference_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetSecurityPreference', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetSecurityPreferenceResponse(), self.call_api(params, req, runtime) ) def get_security_preference(self): runtime = util_models.RuntimeOptions() return self.get_security_preference_with_options(runtime) def get_user_with_options(self, request, runtime): """ This topic provides an example to show how to query the information about a RAM user named `test@example.onaliyun.com`. @param request: GetUserRequest @param runtime: runtime options for this request RuntimeOptions @return: GetUserResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_access_key_id): query['UserAccessKeyId'] = request.user_access_key_id if not UtilClient.is_unset(request.user_id): query['UserId'] = request.user_id if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetUser', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetUserResponse(), self.call_api(params, req, runtime) ) def get_user(self, request): """ This topic provides an example to show how to query the information about a RAM user named `test@example.onaliyun.com`. @param request: GetUserRequest @return: GetUserResponse """ runtime = util_models.RuntimeOptions() return self.get_user_with_options(request, runtime) def get_user_mfainfo_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='GetUserMFAInfo', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetUserMFAInfoResponse(), self.call_api(params, req, runtime) ) def get_user_mfainfo(self, request): runtime = util_models.RuntimeOptions() return self.get_user_mfainfo_with_options(request, runtime) def get_user_sso_settings_with_options(self, runtime): req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='GetUserSsoSettings', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.GetUserSsoSettingsResponse(), self.call_api(params, req, runtime) ) def get_user_sso_settings(self): runtime = util_models.RuntimeOptions() return self.get_user_sso_settings_with_options(runtime) def list_access_keys_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListAccessKeys', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListAccessKeysResponse(), self.call_api(params, req, runtime) ) def list_access_keys(self, request): runtime = util_models.RuntimeOptions() return self.list_access_keys_with_options(request, runtime) def list_app_secret_ids_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListAppSecretIds', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListAppSecretIdsResponse(), self.call_api(params, req, runtime) ) def list_app_secret_ids(self, request): runtime = util_models.RuntimeOptions() return self.list_app_secret_ids_with_options(request, runtime) def list_applications_with_options(self, runtime): """ This topic provides an example on how to query the applications within the current account. The returned result shows that only one application named `myapp` belongs to the current account. @param request: ListApplicationsRequest @param runtime: runtime options for this request RuntimeOptions @return: ListApplicationsResponse """ req = open_api_models.OpenApiRequest() params = open_api_models.Params( action='ListApplications', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListApplicationsResponse(), self.call_api(params, req, runtime) ) def list_applications(self): """ This topic provides an example on how to query the applications within the current account. The returned result shows that only one application named `myapp` belongs to the current account. @return: ListApplicationsResponse """ runtime = util_models.RuntimeOptions() return self.list_applications_with_options(runtime) def list_groups_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListGroups', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListGroupsResponse(), self.call_api(params, req, runtime) ) def list_groups(self, request): runtime = util_models.RuntimeOptions() return self.list_groups_with_options(request, runtime) def list_groups_for_user_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListGroupsForUser', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListGroupsForUserResponse(), self.call_api(params, req, runtime) ) def list_groups_for_user(self, request): runtime = util_models.RuntimeOptions() return self.list_groups_for_user_with_options(request, runtime) def list_oidcproviders_with_options(self, request, runtime): """ ### This topic provides an example on how to query all OpenID Connect (OIDC) identity providers (IdPs) within your Alibaba Cloud account. The response shows that your Alibaba Cloud account has only one OIDC IdP named `TestOIDCProvider`. @param request: ListOIDCProvidersRequest @param runtime: runtime options for this request RuntimeOptions @return: ListOIDCProvidersResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListOIDCProviders', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListOIDCProvidersResponse(), self.call_api(params, req, runtime) ) def list_oidcproviders(self, request): """ ### This topic provides an example on how to query all OpenID Connect (OIDC) identity providers (IdPs) within your Alibaba Cloud account. The response shows that your Alibaba Cloud account has only one OIDC IdP named `TestOIDCProvider`. @param request: ListOIDCProvidersRequest @return: ListOIDCProvidersResponse """ runtime = util_models.RuntimeOptions() return self.list_oidcproviders_with_options(request, runtime) def list_predefined_scopes_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_type): query['AppType'] = request.app_type req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListPredefinedScopes', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListPredefinedScopesResponse(), self.call_api(params, req, runtime) ) def list_predefined_scopes(self, request): runtime = util_models.RuntimeOptions() return self.list_predefined_scopes_with_options(request, runtime) def list_samlproviders_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListSAMLProviders', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListSAMLProvidersResponse(), self.call_api(params, req, runtime) ) def list_samlproviders(self, request): runtime = util_models.RuntimeOptions() return self.list_samlproviders_with_options(request, runtime) def list_tag_resources_with_options(self, request, runtime): """ ### You must specify at least one of the following parameters or parameter pairs in a request to determine a query object: * `ResourceId.N` * `Tag.N.Key` * `Tag.N.Key` and `Tag.N.Value` @param request: ListTagResourcesRequest @param runtime: runtime options for this request RuntimeOptions @return: ListTagResourcesResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.next_token): query['NextToken'] = request.next_token if not UtilClient.is_unset(request.page_size): query['PageSize'] = request.page_size if not UtilClient.is_unset(request.resource_id): query['ResourceId'] = request.resource_id if not UtilClient.is_unset(request.resource_principal_name): query['ResourcePrincipalName'] = request.resource_principal_name if not UtilClient.is_unset(request.resource_type): query['ResourceType'] = request.resource_type if not UtilClient.is_unset(request.tag): query['Tag'] = request.tag req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListTagResources', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListTagResourcesResponse(), self.call_api(params, req, runtime) ) def list_tag_resources(self, request): """ ### You must specify at least one of the following parameters or parameter pairs in a request to determine a query object: * `ResourceId.N` * `Tag.N.Key` * `Tag.N.Key` and `Tag.N.Value` @param request: ListTagResourcesRequest @return: ListTagResourcesResponse """ runtime = util_models.RuntimeOptions() return self.list_tag_resources_with_options(request, runtime) def list_user_basic_infos_with_options(self, request, runtime): """ You can call the following API operations to query the information about all RAM users: * ListUsers: queries the details of all RAM users. * ListUserBasicInfos: queries the basic information about all RAM users. The basic information includes only the logon names (`UserPrincipalName`), display names (`DisplayName`), and user IDs (`UserId`). @param request: ListUserBasicInfosRequest @param runtime: runtime options for this request RuntimeOptions @return: ListUserBasicInfosResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items if not UtilClient.is_unset(request.tag): query['Tag'] = request.tag req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListUserBasicInfos', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListUserBasicInfosResponse(), self.call_api(params, req, runtime) ) def list_user_basic_infos(self, request): """ You can call the following API operations to query the information about all RAM users: * ListUsers: queries the details of all RAM users. * ListUserBasicInfos: queries the basic information about all RAM users. The basic information includes only the logon names (`UserPrincipalName`), display names (`DisplayName`), and user IDs (`UserId`). @param request: ListUserBasicInfosRequest @return: ListUserBasicInfosResponse """ runtime = util_models.RuntimeOptions() return self.list_user_basic_infos_with_options(request, runtime) def list_users_with_options(self, request, runtime): """ ### [](#) You can call the following API operations to query the details of all RAM users: * ListUsers: queries the details of all RAM users. * ListUserBasicInfos: queries the basic information about all RAM users. The basic information includes only the logon names (`UserPrincipalName`), display names (`DisplayName`), and user IDs (`UserId`). @param request: ListUsersRequest @param runtime: runtime options for this request RuntimeOptions @return: ListUsersResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items if not UtilClient.is_unset(request.tag): query['Tag'] = request.tag req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListUsers', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListUsersResponse(), self.call_api(params, req, runtime) ) def list_users(self, request): """ ### [](#) You can call the following API operations to query the details of all RAM users: * ListUsers: queries the details of all RAM users. * ListUserBasicInfos: queries the basic information about all RAM users. The basic information includes only the logon names (`UserPrincipalName`), display names (`DisplayName`), and user IDs (`UserId`). @param request: ListUsersRequest @return: ListUsersResponse """ runtime = util_models.RuntimeOptions() return self.list_users_with_options(request, runtime) def list_users_for_group_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListUsersForGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListUsersForGroupResponse(), self.call_api(params, req, runtime) ) def list_users_for_group(self, request): runtime = util_models.RuntimeOptions() return self.list_users_for_group_with_options(request, runtime) def list_virtual_mfadevices_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.marker): query['Marker'] = request.marker if not UtilClient.is_unset(request.max_items): query['MaxItems'] = request.max_items req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='ListVirtualMFADevices', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.ListVirtualMFADevicesResponse(), self.call_api(params, req, runtime) ) def list_virtual_mfadevices(self, request): runtime = util_models.RuntimeOptions() return self.list_virtual_mfadevices_with_options(request, runtime) def remove_client_id_from_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to remove the client ID `498469743454717****` from the OIDC IdP named `TestOIDCProvider`. @param request: RemoveClientIdFromOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: RemoveClientIdFromOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.client_id): query['ClientId'] = request.client_id if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='RemoveClientIdFromOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.RemoveClientIdFromOIDCProviderResponse(), self.call_api(params, req, runtime) ) def remove_client_id_from_oidcprovider(self, request): """ ### This topic provides an example on how to remove the client ID `498469743454717****` from the OIDC IdP named `TestOIDCProvider`. @param request: RemoveClientIdFromOIDCProviderRequest @return: RemoveClientIdFromOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.remove_client_id_from_oidcprovider_with_options(request, runtime) def remove_fingerprint_from_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to remove the fingerprint `6938fd4d98bab03faadb97b34396831e3780****` from the OIDC IdP named `TestOIDCProvider`. @param request: RemoveFingerprintFromOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: RemoveFingerprintFromOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.fingerprint): query['Fingerprint'] = request.fingerprint if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='RemoveFingerprintFromOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.RemoveFingerprintFromOIDCProviderResponse(), self.call_api(params, req, runtime) ) def remove_fingerprint_from_oidcprovider(self, request): """ ### This topic provides an example on how to remove the fingerprint `6938fd4d98bab03faadb97b34396831e3780****` from the OIDC IdP named `TestOIDCProvider`. @param request: RemoveFingerprintFromOIDCProviderRequest @return: RemoveFingerprintFromOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.remove_fingerprint_from_oidcprovider_with_options(request, runtime) def remove_user_from_group_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='RemoveUserFromGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.RemoveUserFromGroupResponse(), self.call_api(params, req, runtime) ) def remove_user_from_group(self, request): runtime = util_models.RuntimeOptions() return self.remove_user_from_group_with_options(request, runtime) def set_default_domain_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.default_domain_name): query['DefaultDomainName'] = request.default_domain_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='SetDefaultDomain', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.SetDefaultDomainResponse(), self.call_api(params, req, runtime) ) def set_default_domain(self, request): runtime = util_models.RuntimeOptions() return self.set_default_domain_with_options(request, runtime) def set_password_policy_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.hard_expire): query['HardExpire'] = request.hard_expire if not UtilClient.is_unset(request.max_login_attemps): query['MaxLoginAttemps'] = request.max_login_attemps if not UtilClient.is_unset(request.max_password_age): query['MaxPasswordAge'] = request.max_password_age if not UtilClient.is_unset(request.minimum_password_different_character): query['MinimumPasswordDifferentCharacter'] = request.minimum_password_different_character if not UtilClient.is_unset(request.minimum_password_length): query['MinimumPasswordLength'] = request.minimum_password_length if not UtilClient.is_unset(request.password_not_contain_user_name): query['PasswordNotContainUserName'] = request.password_not_contain_user_name if not UtilClient.is_unset(request.password_reuse_prevention): query['PasswordReusePrevention'] = request.password_reuse_prevention if not UtilClient.is_unset(request.require_lowercase_characters): query['RequireLowercaseCharacters'] = request.require_lowercase_characters if not UtilClient.is_unset(request.require_numbers): query['RequireNumbers'] = request.require_numbers if not UtilClient.is_unset(request.require_symbols): query['RequireSymbols'] = request.require_symbols if not UtilClient.is_unset(request.require_uppercase_characters): query['RequireUppercaseCharacters'] = request.require_uppercase_characters req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='SetPasswordPolicy', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.SetPasswordPolicyResponse(), self.call_api(params, req, runtime) ) def set_password_policy(self, request): runtime = util_models.RuntimeOptions() return self.set_password_policy_with_options(request, runtime) def set_security_preference_with_options(self, tmp_req, runtime): """ ### This topic provides an example on how to enable multi-factor authentication (MFA) only for RAM users who initiated unusual logons. @param tmp_req: SetSecurityPreferenceRequest @param runtime: runtime options for this request RuntimeOptions @return: SetSecurityPreferenceResponse """ UtilClient.validate_model(tmp_req) request = ims_20190815_models.SetSecurityPreferenceShrinkRequest() OpenApiUtilClient.convert(tmp_req, request) if not UtilClient.is_unset(tmp_req.verification_types): request.verification_types_shrink = OpenApiUtilClient.array_to_string_with_specified_style(tmp_req.verification_types, 'VerificationTypes', 'json') query = {} if not UtilClient.is_unset(request.allow_user_to_change_password): query['AllowUserToChangePassword'] = request.allow_user_to_change_password if not UtilClient.is_unset(request.allow_user_to_manage_access_keys): query['AllowUserToManageAccessKeys'] = request.allow_user_to_manage_access_keys if not UtilClient.is_unset(request.allow_user_to_manage_mfadevices): query['AllowUserToManageMFADevices'] = request.allow_user_to_manage_mfadevices if not UtilClient.is_unset(request.allow_user_to_manage_personal_ding_talk): query['AllowUserToManagePersonalDingTalk'] = request.allow_user_to_manage_personal_ding_talk if not UtilClient.is_unset(request.enable_save_mfaticket): query['EnableSaveMFATicket'] = request.enable_save_mfaticket if not UtilClient.is_unset(request.login_network_masks): query['LoginNetworkMasks'] = request.login_network_masks if not UtilClient.is_unset(request.login_session_duration): query['LoginSessionDuration'] = request.login_session_duration if not UtilClient.is_unset(request.mfaoperation_for_login): query['MFAOperationForLogin'] = request.mfaoperation_for_login if not UtilClient.is_unset(request.operation_for_risk_login): query['OperationForRiskLogin'] = request.operation_for_risk_login if not UtilClient.is_unset(request.verification_types_shrink): query['VerificationTypes'] = request.verification_types_shrink req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='SetSecurityPreference', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.SetSecurityPreferenceResponse(), self.call_api(params, req, runtime) ) def set_security_preference(self, request): """ ### This topic provides an example on how to enable multi-factor authentication (MFA) only for RAM users who initiated unusual logons. @param request: SetSecurityPreferenceRequest @return: SetSecurityPreferenceResponse """ runtime = util_models.RuntimeOptions() return self.set_security_preference_with_options(request, runtime) def set_user_sso_settings_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.auxiliary_domain): query['AuxiliaryDomain'] = request.auxiliary_domain if not UtilClient.is_unset(request.metadata_document): query['MetadataDocument'] = request.metadata_document if not UtilClient.is_unset(request.sso_enabled): query['SsoEnabled'] = request.sso_enabled req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='SetUserSsoSettings', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.SetUserSsoSettingsResponse(), self.call_api(params, req, runtime) ) def set_user_sso_settings(self, request): runtime = util_models.RuntimeOptions() return self.set_user_sso_settings_with_options(request, runtime) def tag_resources_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.resource_id): query['ResourceId'] = request.resource_id if not UtilClient.is_unset(request.resource_principal_name): query['ResourcePrincipalName'] = request.resource_principal_name if not UtilClient.is_unset(request.resource_type): query['ResourceType'] = request.resource_type if not UtilClient.is_unset(request.tag): query['Tag'] = request.tag req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='TagResources', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.TagResourcesResponse(), self.call_api(params, req, runtime) ) def tag_resources(self, request): runtime = util_models.RuntimeOptions() return self.tag_resources_with_options(request, runtime) def unbind_mfadevice_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UnbindMFADevice', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UnbindMFADeviceResponse(), self.call_api(params, req, runtime) ) def unbind_mfadevice(self, request): runtime = util_models.RuntimeOptions() return self.unbind_mfadevice_with_options(request, runtime) def untag_resources_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.all): query['All'] = request.all if not UtilClient.is_unset(request.resource_id): query['ResourceId'] = request.resource_id if not UtilClient.is_unset(request.resource_principal_name): query['ResourcePrincipalName'] = request.resource_principal_name if not UtilClient.is_unset(request.resource_type): query['ResourceType'] = request.resource_type if not UtilClient.is_unset(request.tag_key): query['TagKey'] = request.tag_key req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UntagResources', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UntagResourcesResponse(), self.call_api(params, req, runtime) ) def untag_resources(self, request): runtime = util_models.RuntimeOptions() return self.untag_resources_with_options(request, runtime) def update_access_key_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.status): query['Status'] = request.status if not UtilClient.is_unset(request.user_access_key_id): query['UserAccessKeyId'] = request.user_access_key_id if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateAccessKey', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateAccessKeyResponse(), self.call_api(params, req, runtime) ) def update_access_key(self, request): runtime = util_models.RuntimeOptions() return self.update_access_key_with_options(request, runtime) def update_application_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.app_id): query['AppId'] = request.app_id if not UtilClient.is_unset(request.new_access_token_validity): query['NewAccessTokenValidity'] = request.new_access_token_validity if not UtilClient.is_unset(request.new_display_name): query['NewDisplayName'] = request.new_display_name if not UtilClient.is_unset(request.new_is_multi_tenant): query['NewIsMultiTenant'] = request.new_is_multi_tenant if not UtilClient.is_unset(request.new_predefined_scopes): query['NewPredefinedScopes'] = request.new_predefined_scopes if not UtilClient.is_unset(request.new_redirect_uris): query['NewRedirectUris'] = request.new_redirect_uris if not UtilClient.is_unset(request.new_refresh_token_validity): query['NewRefreshTokenValidity'] = request.new_refresh_token_validity if not UtilClient.is_unset(request.new_required_scopes): query['NewRequiredScopes'] = request.new_required_scopes if not UtilClient.is_unset(request.new_secret_required): query['NewSecretRequired'] = request.new_secret_required req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateApplication', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateApplicationResponse(), self.call_api(params, req, runtime) ) def update_application(self, request): runtime = util_models.RuntimeOptions() return self.update_application_with_options(request, runtime) def update_group_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.group_name): query['GroupName'] = request.group_name if not UtilClient.is_unset(request.new_comments): query['NewComments'] = request.new_comments if not UtilClient.is_unset(request.new_display_name): query['NewDisplayName'] = request.new_display_name if not UtilClient.is_unset(request.new_group_name): query['NewGroupName'] = request.new_group_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateGroup', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateGroupResponse(), self.call_api(params, req, runtime) ) def update_group(self, request): runtime = util_models.RuntimeOptions() return self.update_group_with_options(request, runtime) def update_login_profile_with_options(self, request, runtime): UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.mfabind_required): query['MFABindRequired'] = request.mfabind_required if not UtilClient.is_unset(request.password): query['Password'] = request.password if not UtilClient.is_unset(request.password_reset_required): query['PasswordResetRequired'] = request.password_reset_required if not UtilClient.is_unset(request.status): query['Status'] = request.status if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateLoginProfile', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateLoginProfileResponse(), self.call_api(params, req, runtime) ) def update_login_profile(self, request): runtime = util_models.RuntimeOptions() return self.update_login_profile_with_options(request, runtime) def update_oidcprovider_with_options(self, request, runtime): """ ### This topic provides an example on how to change the description of the OIDC IdP named `TestOIDCProvider` to `This is a new OIDC Provider.` @param request: UpdateOIDCProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: UpdateOIDCProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.client_ids): query['ClientIds'] = request.client_ids if not UtilClient.is_unset(request.issuance_limit_time): query['IssuanceLimitTime'] = request.issuance_limit_time if not UtilClient.is_unset(request.new_description): query['NewDescription'] = request.new_description if not UtilClient.is_unset(request.oidcprovider_name): query['OIDCProviderName'] = request.oidcprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateOIDCProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateOIDCProviderResponse(), self.call_api(params, req, runtime) ) def update_oidcprovider(self, request): """ ### This topic provides an example on how to change the description of the OIDC IdP named `TestOIDCProvider` to `This is a new OIDC Provider.` @param request: UpdateOIDCProviderRequest @return: UpdateOIDCProviderResponse """ runtime = util_models.RuntimeOptions() return self.update_oidcprovider_with_options(request, runtime) def update_samlprovider_with_options(self, request, runtime): """ This topic provides an example on how to change the description of an IdP named `test-provider` to `This is a new provider.` @param request: UpdateSAMLProviderRequest @param runtime: runtime options for this request RuntimeOptions @return: UpdateSAMLProviderResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.new_description): query['NewDescription'] = request.new_description if not UtilClient.is_unset(request.new_encoded_samlmetadata_document): query['NewEncodedSAMLMetadataDocument'] = request.new_encoded_samlmetadata_document if not UtilClient.is_unset(request.samlprovider_name): query['SAMLProviderName'] = request.samlprovider_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateSAMLProvider', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateSAMLProviderResponse(), self.call_api(params, req, runtime) ) def update_samlprovider(self, request): """ This topic provides an example on how to change the description of an IdP named `test-provider` to `This is a new provider.` @param request: UpdateSAMLProviderRequest @return: UpdateSAMLProviderResponse """ runtime = util_models.RuntimeOptions() return self.update_samlprovider_with_options(request, runtime) def update_user_with_options(self, request, runtime): """ This topic provides an example to show how to modify the name of a RAM user from `test@example.onaliyun.com` to `new@example.onaliyun.com`. @param request: UpdateUserRequest @param runtime: runtime options for this request RuntimeOptions @return: UpdateUserResponse """ UtilClient.validate_model(request) query = {} if not UtilClient.is_unset(request.new_comments): query['NewComments'] = request.new_comments if not UtilClient.is_unset(request.new_display_name): query['NewDisplayName'] = request.new_display_name if not UtilClient.is_unset(request.new_email): query['NewEmail'] = request.new_email if not UtilClient.is_unset(request.new_mobile_phone): query['NewMobilePhone'] = request.new_mobile_phone if not UtilClient.is_unset(request.new_user_principal_name): query['NewUserPrincipalName'] = request.new_user_principal_name if not UtilClient.is_unset(request.user_id): query['UserId'] = request.user_id if not UtilClient.is_unset(request.user_principal_name): query['UserPrincipalName'] = request.user_principal_name req = open_api_models.OpenApiRequest( query=OpenApiUtilClient.query(query) ) params = open_api_models.Params( action='UpdateUser', version='2019-08-15', protocol='HTTPS', pathname='/', method='POST', auth_type='AK', style='RPC', req_body_type='formData', body_type='json' ) return TeaCore.from_map( ims_20190815_models.UpdateUserResponse(), self.call_api(params, req, runtime) ) def update_user(self, request): """ This topic provides an example to show how to modify the name of a RAM user from `test@example.onaliyun.com` to `new@example.onaliyun.com`. @param request: UpdateUserRequest @return: UpdateUserResponse """ runtime = util_models.RuntimeOptions() return self.update_user_with_options(request, runtime)