tccli-intl-en 3.1.8.1__py2.py3-none-any.whl → 3.1.13.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +6 -0
- tccli/services/ai3d/__init__.py +4 -0
- tccli/services/ai3d/ai3d_client.py +266 -0
- tccli/services/ai3d/v20250513/api.json +264 -0
- tccli/services/ai3d/v20250513/examples.json +20 -0
- tccli/services/cvm/v20170312/api.json +3 -3
- tccli/services/cvm/v20170312/examples.json +31 -31
- tccli/services/faceid/v20180301/api.json +2 -2
- tccli/services/hunyuan/__init__.py +4 -0
- tccli/services/hunyuan/hunyuan_client.py +266 -0
- tccli/services/hunyuan/v20230901/api.json +270 -0
- tccli/services/hunyuan/v20230901/examples.json +20 -0
- tccli/services/mdl/mdl_client.py +192 -24
- tccli/services/mdl/v20200326/api.json +418 -5
- tccli/services/mdl/v20200326/examples.json +24 -0
- tccli/services/monitor/v20180724/api.json +3 -3
- tccli/services/mps/mps_client.py +56 -0
- tccli/services/mps/v20190612/api.json +208 -9
- tccli/services/mps/v20190612/examples.json +36 -22
- tccli/services/teo/teo_client.py +225 -57
- tccli/services/teo/v20220901/api.json +251 -7
- tccli/services/teo/v20220901/examples.json +36 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/METADATA +2 -2
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/RECORD +29 -21
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/LICENSE +0 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/WHEEL +0 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/entry_points.txt +0 -0
- {tccli_intl_en-3.1.8.1.dist-info → tccli_intl_en-3.1.13.1.dist-info}/top_level.txt +0 -0
tccli/services/teo/teo_client.py
CHANGED
|
@@ -1999,7 +1999,7 @@ def doDownloadL7Logs(args, parsed_globals):
|
|
|
1999
1999
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2000
2000
|
|
|
2001
2001
|
|
|
2002
|
-
def
|
|
2002
|
+
def doCreateContentIdentifier(args, parsed_globals):
|
|
2003
2003
|
g_param = parse_global_arg(parsed_globals)
|
|
2004
2004
|
|
|
2005
2005
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -2031,11 +2031,11 @@ def doDescribeEnvironments(args, parsed_globals):
|
|
|
2031
2031
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2032
2032
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
2033
2033
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2034
|
-
model = models.
|
|
2034
|
+
model = models.CreateContentIdentifierRequest()
|
|
2035
2035
|
model.from_json_string(json.dumps(args))
|
|
2036
2036
|
start_time = time.time()
|
|
2037
2037
|
while True:
|
|
2038
|
-
rsp = client.
|
|
2038
|
+
rsp = client.CreateContentIdentifier(model)
|
|
2039
2039
|
result = rsp.to_json_string()
|
|
2040
2040
|
try:
|
|
2041
2041
|
json_obj = json.loads(result)
|
|
@@ -4089,6 +4089,61 @@ def doModifyL4Proxy(args, parsed_globals):
|
|
|
4089
4089
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4090
4090
|
|
|
4091
4091
|
|
|
4092
|
+
def doCheckFreeCertificateVerification(args, parsed_globals):
|
|
4093
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4094
|
+
|
|
4095
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4096
|
+
cred = credential.CVMRoleCredential()
|
|
4097
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4098
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4099
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4100
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4101
|
+
)
|
|
4102
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4104
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4105
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4106
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4107
|
+
else:
|
|
4108
|
+
cred = credential.Credential(
|
|
4109
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4110
|
+
)
|
|
4111
|
+
http_profile = HttpProfile(
|
|
4112
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4113
|
+
reqMethod="POST",
|
|
4114
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4115
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4116
|
+
)
|
|
4117
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4118
|
+
if g_param[OptionsDefine.Language]:
|
|
4119
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4120
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4121
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4122
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4123
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4124
|
+
model = models.CheckFreeCertificateVerificationRequest()
|
|
4125
|
+
model.from_json_string(json.dumps(args))
|
|
4126
|
+
start_time = time.time()
|
|
4127
|
+
while True:
|
|
4128
|
+
rsp = client.CheckFreeCertificateVerification(model)
|
|
4129
|
+
result = rsp.to_json_string()
|
|
4130
|
+
try:
|
|
4131
|
+
json_obj = json.loads(result)
|
|
4132
|
+
except TypeError as e:
|
|
4133
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4134
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4135
|
+
break
|
|
4136
|
+
cur_time = time.time()
|
|
4137
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4138
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4139
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4140
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4141
|
+
else:
|
|
4142
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4143
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4144
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4145
|
+
|
|
4146
|
+
|
|
4092
4147
|
def doModifyL4ProxyRules(args, parsed_globals):
|
|
4093
4148
|
g_param = parse_global_arg(parsed_globals)
|
|
4094
4149
|
|
|
@@ -11404,7 +11459,7 @@ def doDescribeZoneConfigImportResult(args, parsed_globals):
|
|
|
11404
11459
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11405
11460
|
|
|
11406
11461
|
|
|
11407
|
-
def
|
|
11462
|
+
def doCreateSecurityAPIService(args, parsed_globals):
|
|
11408
11463
|
g_param = parse_global_arg(parsed_globals)
|
|
11409
11464
|
|
|
11410
11465
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11436,11 +11491,11 @@ def doCreateContentIdentifier(args, parsed_globals):
|
|
|
11436
11491
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11437
11492
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11438
11493
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11439
|
-
model = models.
|
|
11494
|
+
model = models.CreateSecurityAPIServiceRequest()
|
|
11440
11495
|
model.from_json_string(json.dumps(args))
|
|
11441
11496
|
start_time = time.time()
|
|
11442
11497
|
while True:
|
|
11443
|
-
rsp = client.
|
|
11498
|
+
rsp = client.CreateSecurityAPIService(model)
|
|
11444
11499
|
result = rsp.to_json_string()
|
|
11445
11500
|
try:
|
|
11446
11501
|
json_obj = json.loads(result)
|
|
@@ -11844,6 +11899,116 @@ def doDeleteZone(args, parsed_globals):
|
|
|
11844
11899
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11845
11900
|
|
|
11846
11901
|
|
|
11902
|
+
def doDescribeTimingL7OriginPullData(args, parsed_globals):
|
|
11903
|
+
g_param = parse_global_arg(parsed_globals)
|
|
11904
|
+
|
|
11905
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
11906
|
+
cred = credential.CVMRoleCredential()
|
|
11907
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
11908
|
+
cred = credential.STSAssumeRoleCredential(
|
|
11909
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11910
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11911
|
+
)
|
|
11912
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11913
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11914
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11915
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11916
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11917
|
+
else:
|
|
11918
|
+
cred = credential.Credential(
|
|
11919
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
11920
|
+
)
|
|
11921
|
+
http_profile = HttpProfile(
|
|
11922
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
11923
|
+
reqMethod="POST",
|
|
11924
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
11925
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
11926
|
+
)
|
|
11927
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
11928
|
+
if g_param[OptionsDefine.Language]:
|
|
11929
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
11930
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
11931
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11932
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
11933
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11934
|
+
model = models.DescribeTimingL7OriginPullDataRequest()
|
|
11935
|
+
model.from_json_string(json.dumps(args))
|
|
11936
|
+
start_time = time.time()
|
|
11937
|
+
while True:
|
|
11938
|
+
rsp = client.DescribeTimingL7OriginPullData(model)
|
|
11939
|
+
result = rsp.to_json_string()
|
|
11940
|
+
try:
|
|
11941
|
+
json_obj = json.loads(result)
|
|
11942
|
+
except TypeError as e:
|
|
11943
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
11944
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
11945
|
+
break
|
|
11946
|
+
cur_time = time.time()
|
|
11947
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
11948
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
11949
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
11950
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
11951
|
+
else:
|
|
11952
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
11953
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
11954
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11955
|
+
|
|
11956
|
+
|
|
11957
|
+
def doApplyFreeCertificate(args, parsed_globals):
|
|
11958
|
+
g_param = parse_global_arg(parsed_globals)
|
|
11959
|
+
|
|
11960
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
11961
|
+
cred = credential.CVMRoleCredential()
|
|
11962
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
11963
|
+
cred = credential.STSAssumeRoleCredential(
|
|
11964
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
11965
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
11966
|
+
)
|
|
11967
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
11968
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
11969
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
11970
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
11971
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
11972
|
+
else:
|
|
11973
|
+
cred = credential.Credential(
|
|
11974
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
11975
|
+
)
|
|
11976
|
+
http_profile = HttpProfile(
|
|
11977
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
11978
|
+
reqMethod="POST",
|
|
11979
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
11980
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
11981
|
+
)
|
|
11982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
11983
|
+
if g_param[OptionsDefine.Language]:
|
|
11984
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
11985
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
11986
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11987
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
11988
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11989
|
+
model = models.ApplyFreeCertificateRequest()
|
|
11990
|
+
model.from_json_string(json.dumps(args))
|
|
11991
|
+
start_time = time.time()
|
|
11992
|
+
while True:
|
|
11993
|
+
rsp = client.ApplyFreeCertificate(model)
|
|
11994
|
+
result = rsp.to_json_string()
|
|
11995
|
+
try:
|
|
11996
|
+
json_obj = json.loads(result)
|
|
11997
|
+
except TypeError as e:
|
|
11998
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
11999
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
12000
|
+
break
|
|
12001
|
+
cur_time = time.time()
|
|
12002
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
12003
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
12004
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
12005
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
12006
|
+
else:
|
|
12007
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
12008
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
12009
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12010
|
+
|
|
12011
|
+
|
|
11847
12012
|
def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
11848
12013
|
g_param = parse_global_arg(parsed_globals)
|
|
11849
12014
|
|
|
@@ -11899,7 +12064,7 @@ def doDescribeDDosAttackEvent(args, parsed_globals):
|
|
|
11899
12064
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11900
12065
|
|
|
11901
12066
|
|
|
11902
|
-
def
|
|
12067
|
+
def doDescribeEnvironments(args, parsed_globals):
|
|
11903
12068
|
g_param = parse_global_arg(parsed_globals)
|
|
11904
12069
|
|
|
11905
12070
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11931,11 +12096,11 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11931
12096
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11932
12097
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11933
12098
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11934
|
-
model = models.
|
|
12099
|
+
model = models.DescribeEnvironmentsRequest()
|
|
11935
12100
|
model.from_json_string(json.dumps(args))
|
|
11936
12101
|
start_time = time.time()
|
|
11937
12102
|
while True:
|
|
11938
|
-
rsp = client.
|
|
12103
|
+
rsp = client.DescribeEnvironments(model)
|
|
11939
12104
|
result = rsp.to_json_string()
|
|
11940
12105
|
try:
|
|
11941
12106
|
json_obj = json.loads(result)
|
|
@@ -11954,7 +12119,7 @@ def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
|
11954
12119
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
11955
12120
|
|
|
11956
12121
|
|
|
11957
|
-
def
|
|
12122
|
+
def doDescribeSecurityIPGroupInfo(args, parsed_globals):
|
|
11958
12123
|
g_param = parse_global_arg(parsed_globals)
|
|
11959
12124
|
|
|
11960
12125
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -11986,11 +12151,11 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
11986
12151
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
11987
12152
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
11988
12153
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
11989
|
-
model = models.
|
|
12154
|
+
model = models.DescribeSecurityIPGroupInfoRequest()
|
|
11990
12155
|
model.from_json_string(json.dumps(args))
|
|
11991
12156
|
start_time = time.time()
|
|
11992
12157
|
while True:
|
|
11993
|
-
rsp = client.
|
|
12158
|
+
rsp = client.DescribeSecurityIPGroupInfo(model)
|
|
11994
12159
|
result = rsp.to_json_string()
|
|
11995
12160
|
try:
|
|
11996
12161
|
json_obj = json.loads(result)
|
|
@@ -12009,7 +12174,7 @@ def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
|
12009
12174
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12010
12175
|
|
|
12011
12176
|
|
|
12012
|
-
def
|
|
12177
|
+
def doModifyLoadBalancingStatus(args, parsed_globals):
|
|
12013
12178
|
g_param = parse_global_arg(parsed_globals)
|
|
12014
12179
|
|
|
12015
12180
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12041,11 +12206,11 @@ def doCreatePlan(args, parsed_globals):
|
|
|
12041
12206
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12042
12207
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12043
12208
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12044
|
-
model = models.
|
|
12209
|
+
model = models.ModifyLoadBalancingStatusRequest()
|
|
12045
12210
|
model.from_json_string(json.dumps(args))
|
|
12046
12211
|
start_time = time.time()
|
|
12047
12212
|
while True:
|
|
12048
|
-
rsp = client.
|
|
12213
|
+
rsp = client.ModifyLoadBalancingStatus(model)
|
|
12049
12214
|
result = rsp.to_json_string()
|
|
12050
12215
|
try:
|
|
12051
12216
|
json_obj = json.loads(result)
|
|
@@ -12064,7 +12229,7 @@ def doCreatePlan(args, parsed_globals):
|
|
|
12064
12229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12065
12230
|
|
|
12066
12231
|
|
|
12067
|
-
def
|
|
12232
|
+
def doCreatePlan(args, parsed_globals):
|
|
12068
12233
|
g_param = parse_global_arg(parsed_globals)
|
|
12069
12234
|
|
|
12070
12235
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12096,11 +12261,11 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
12096
12261
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12097
12262
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12098
12263
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12099
|
-
model = models.
|
|
12264
|
+
model = models.CreatePlanRequest()
|
|
12100
12265
|
model.from_json_string(json.dumps(args))
|
|
12101
12266
|
start_time = time.time()
|
|
12102
12267
|
while True:
|
|
12103
|
-
rsp = client.
|
|
12268
|
+
rsp = client.CreatePlan(model)
|
|
12104
12269
|
result = rsp.to_json_string()
|
|
12105
12270
|
try:
|
|
12106
12271
|
json_obj = json.loads(result)
|
|
@@ -12119,7 +12284,7 @@ def doDescribeDnsRecords(args, parsed_globals):
|
|
|
12119
12284
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12120
12285
|
|
|
12121
12286
|
|
|
12122
|
-
def
|
|
12287
|
+
def doDescribeDnsRecords(args, parsed_globals):
|
|
12123
12288
|
g_param = parse_global_arg(parsed_globals)
|
|
12124
12289
|
|
|
12125
12290
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12151,11 +12316,11 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
12151
12316
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12152
12317
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12153
12318
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12154
|
-
model = models.
|
|
12319
|
+
model = models.DescribeDnsRecordsRequest()
|
|
12155
12320
|
model.from_json_string(json.dumps(args))
|
|
12156
12321
|
start_time = time.time()
|
|
12157
12322
|
while True:
|
|
12158
|
-
rsp = client.
|
|
12323
|
+
rsp = client.DescribeDnsRecords(model)
|
|
12159
12324
|
result = rsp.to_json_string()
|
|
12160
12325
|
try:
|
|
12161
12326
|
json_obj = json.loads(result)
|
|
@@ -12174,7 +12339,7 @@ def doModifyDDoSProtection(args, parsed_globals):
|
|
|
12174
12339
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12175
12340
|
|
|
12176
12341
|
|
|
12177
|
-
def
|
|
12342
|
+
def doModifyDDoSProtection(args, parsed_globals):
|
|
12178
12343
|
g_param = parse_global_arg(parsed_globals)
|
|
12179
12344
|
|
|
12180
12345
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12206,11 +12371,11 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
12206
12371
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12207
12372
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12208
12373
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12209
|
-
model = models.
|
|
12374
|
+
model = models.ModifyDDoSProtectionRequest()
|
|
12210
12375
|
model.from_json_string(json.dumps(args))
|
|
12211
12376
|
start_time = time.time()
|
|
12212
12377
|
while True:
|
|
12213
|
-
rsp = client.
|
|
12378
|
+
rsp = client.ModifyDDoSProtection(model)
|
|
12214
12379
|
result = rsp.to_json_string()
|
|
12215
12380
|
try:
|
|
12216
12381
|
json_obj = json.loads(result)
|
|
@@ -12229,7 +12394,7 @@ def doDescribeSecurityAPIService(args, parsed_globals):
|
|
|
12229
12394
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12230
12395
|
|
|
12231
12396
|
|
|
12232
|
-
def
|
|
12397
|
+
def doDescribeSecurityAPIService(args, parsed_globals):
|
|
12233
12398
|
g_param = parse_global_arg(parsed_globals)
|
|
12234
12399
|
|
|
12235
12400
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12261,11 +12426,11 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
12261
12426
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12262
12427
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12263
12428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12264
|
-
model = models.
|
|
12429
|
+
model = models.DescribeSecurityAPIServiceRequest()
|
|
12265
12430
|
model.from_json_string(json.dumps(args))
|
|
12266
12431
|
start_time = time.time()
|
|
12267
12432
|
while True:
|
|
12268
|
-
rsp = client.
|
|
12433
|
+
rsp = client.DescribeSecurityAPIService(model)
|
|
12269
12434
|
result = rsp.to_json_string()
|
|
12270
12435
|
try:
|
|
12271
12436
|
json_obj = json.loads(result)
|
|
@@ -12284,7 +12449,7 @@ def doImportZoneConfig(args, parsed_globals):
|
|
|
12284
12449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12285
12450
|
|
|
12286
12451
|
|
|
12287
|
-
def
|
|
12452
|
+
def doImportZoneConfig(args, parsed_globals):
|
|
12288
12453
|
g_param = parse_global_arg(parsed_globals)
|
|
12289
12454
|
|
|
12290
12455
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12316,11 +12481,11 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
12316
12481
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12317
12482
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12318
12483
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12319
|
-
model = models.
|
|
12484
|
+
model = models.ImportZoneConfigRequest()
|
|
12320
12485
|
model.from_json_string(json.dumps(args))
|
|
12321
12486
|
start_time = time.time()
|
|
12322
12487
|
while True:
|
|
12323
|
-
rsp = client.
|
|
12488
|
+
rsp = client.ImportZoneConfig(model)
|
|
12324
12489
|
result = rsp.to_json_string()
|
|
12325
12490
|
try:
|
|
12326
12491
|
json_obj = json.loads(result)
|
|
@@ -12339,7 +12504,7 @@ def doDescribeDDosAttackData(args, parsed_globals):
|
|
|
12339
12504
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12340
12505
|
|
|
12341
12506
|
|
|
12342
|
-
def
|
|
12507
|
+
def doDescribeDDosAttackData(args, parsed_globals):
|
|
12343
12508
|
g_param = parse_global_arg(parsed_globals)
|
|
12344
12509
|
|
|
12345
12510
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12371,11 +12536,11 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
12371
12536
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12372
12537
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12373
12538
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12374
|
-
model = models.
|
|
12539
|
+
model = models.DescribeDDosAttackDataRequest()
|
|
12375
12540
|
model.from_json_string(json.dumps(args))
|
|
12376
12541
|
start_time = time.time()
|
|
12377
12542
|
while True:
|
|
12378
|
-
rsp = client.
|
|
12543
|
+
rsp = client.DescribeDDosAttackData(model)
|
|
12379
12544
|
result = rsp.to_json_string()
|
|
12380
12545
|
try:
|
|
12381
12546
|
json_obj = json.loads(result)
|
|
@@ -12394,7 +12559,7 @@ def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
|
12394
12559
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12395
12560
|
|
|
12396
12561
|
|
|
12397
|
-
def
|
|
12562
|
+
def doCreateMultiPathGatewaySecretKey(args, parsed_globals):
|
|
12398
12563
|
g_param = parse_global_arg(parsed_globals)
|
|
12399
12564
|
|
|
12400
12565
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12426,11 +12591,11 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
12426
12591
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12427
12592
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12428
12593
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12429
|
-
model = models.
|
|
12594
|
+
model = models.CreateMultiPathGatewaySecretKeyRequest()
|
|
12430
12595
|
model.from_json_string(json.dumps(args))
|
|
12431
12596
|
start_time = time.time()
|
|
12432
12597
|
while True:
|
|
12433
|
-
rsp = client.
|
|
12598
|
+
rsp = client.CreateMultiPathGatewaySecretKey(model)
|
|
12434
12599
|
result = rsp.to_json_string()
|
|
12435
12600
|
try:
|
|
12436
12601
|
json_obj = json.loads(result)
|
|
@@ -12449,7 +12614,7 @@ def doModifyCustomErrorPage(args, parsed_globals):
|
|
|
12449
12614
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12450
12615
|
|
|
12451
12616
|
|
|
12452
|
-
def
|
|
12617
|
+
def doModifyCustomErrorPage(args, parsed_globals):
|
|
12453
12618
|
g_param = parse_global_arg(parsed_globals)
|
|
12454
12619
|
|
|
12455
12620
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12481,11 +12646,11 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
12481
12646
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12482
12647
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12483
12648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12484
|
-
model = models.
|
|
12649
|
+
model = models.ModifyCustomErrorPageRequest()
|
|
12485
12650
|
model.from_json_string(json.dumps(args))
|
|
12486
12651
|
start_time = time.time()
|
|
12487
12652
|
while True:
|
|
12488
|
-
rsp = client.
|
|
12653
|
+
rsp = client.ModifyCustomErrorPage(model)
|
|
12489
12654
|
result = rsp.to_json_string()
|
|
12490
12655
|
try:
|
|
12491
12656
|
json_obj = json.loads(result)
|
|
@@ -12504,7 +12669,7 @@ def doDescribeL4ProxyRules(args, parsed_globals):
|
|
|
12504
12669
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12505
12670
|
|
|
12506
12671
|
|
|
12507
|
-
def
|
|
12672
|
+
def doDescribeL4ProxyRules(args, parsed_globals):
|
|
12508
12673
|
g_param = parse_global_arg(parsed_globals)
|
|
12509
12674
|
|
|
12510
12675
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12536,11 +12701,11 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
12536
12701
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12537
12702
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12538
12703
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12539
|
-
model = models.
|
|
12704
|
+
model = models.DescribeL4ProxyRulesRequest()
|
|
12540
12705
|
model.from_json_string(json.dumps(args))
|
|
12541
12706
|
start_time = time.time()
|
|
12542
12707
|
while True:
|
|
12543
|
-
rsp = client.
|
|
12708
|
+
rsp = client.DescribeL4ProxyRules(model)
|
|
12544
12709
|
result = rsp.to_json_string()
|
|
12545
12710
|
try:
|
|
12546
12711
|
json_obj = json.loads(result)
|
|
@@ -12559,7 +12724,7 @@ def doDescribeDDoSAttackData(args, parsed_globals):
|
|
|
12559
12724
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12560
12725
|
|
|
12561
12726
|
|
|
12562
|
-
def
|
|
12727
|
+
def doDescribeDDoSAttackData(args, parsed_globals):
|
|
12563
12728
|
g_param = parse_global_arg(parsed_globals)
|
|
12564
12729
|
|
|
12565
12730
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12591,11 +12756,11 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
12591
12756
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12592
12757
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12593
12758
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12594
|
-
model = models.
|
|
12759
|
+
model = models.DescribeDDoSAttackDataRequest()
|
|
12595
12760
|
model.from_json_string(json.dumps(args))
|
|
12596
12761
|
start_time = time.time()
|
|
12597
12762
|
while True:
|
|
12598
|
-
rsp = client.
|
|
12763
|
+
rsp = client.DescribeDDoSAttackData(model)
|
|
12599
12764
|
result = rsp.to_json_string()
|
|
12600
12765
|
try:
|
|
12601
12766
|
json_obj = json.loads(result)
|
|
@@ -12614,7 +12779,7 @@ def doDeleteSharedCNAME(args, parsed_globals):
|
|
|
12614
12779
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12615
12780
|
|
|
12616
12781
|
|
|
12617
|
-
def
|
|
12782
|
+
def doDeleteSharedCNAME(args, parsed_globals):
|
|
12618
12783
|
g_param = parse_global_arg(parsed_globals)
|
|
12619
12784
|
|
|
12620
12785
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12646,11 +12811,11 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
12646
12811
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12647
12812
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12648
12813
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12649
|
-
model = models.
|
|
12814
|
+
model = models.DeleteSharedCNAMERequest()
|
|
12650
12815
|
model.from_json_string(json.dumps(args))
|
|
12651
12816
|
start_time = time.time()
|
|
12652
12817
|
while True:
|
|
12653
|
-
rsp = client.
|
|
12818
|
+
rsp = client.DeleteSharedCNAME(model)
|
|
12654
12819
|
result = rsp.to_json_string()
|
|
12655
12820
|
try:
|
|
12656
12821
|
json_obj = json.loads(result)
|
|
@@ -12669,7 +12834,7 @@ def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
|
12669
12834
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12670
12835
|
|
|
12671
12836
|
|
|
12672
|
-
def
|
|
12837
|
+
def doDescribeWebManagedRulesData(args, parsed_globals):
|
|
12673
12838
|
g_param = parse_global_arg(parsed_globals)
|
|
12674
12839
|
|
|
12675
12840
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12701,11 +12866,11 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
12701
12866
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12702
12867
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12703
12868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12704
|
-
model = models.
|
|
12869
|
+
model = models.DescribeWebManagedRulesDataRequest()
|
|
12705
12870
|
model.from_json_string(json.dumps(args))
|
|
12706
12871
|
start_time = time.time()
|
|
12707
12872
|
while True:
|
|
12708
|
-
rsp = client.
|
|
12873
|
+
rsp = client.DescribeWebManagedRulesData(model)
|
|
12709
12874
|
result = rsp.to_json_string()
|
|
12710
12875
|
try:
|
|
12711
12876
|
json_obj = json.loads(result)
|
|
@@ -12724,7 +12889,7 @@ def doImportDnsRecords(args, parsed_globals):
|
|
|
12724
12889
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
12725
12890
|
|
|
12726
12891
|
|
|
12727
|
-
def
|
|
12892
|
+
def doImportDnsRecords(args, parsed_globals):
|
|
12728
12893
|
g_param = parse_global_arg(parsed_globals)
|
|
12729
12894
|
|
|
12730
12895
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -12756,11 +12921,11 @@ def doCreateSecurityAPIService(args, parsed_globals):
|
|
|
12756
12921
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
|
12757
12922
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
12758
12923
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
12759
|
-
model = models.
|
|
12924
|
+
model = models.ImportDnsRecordsRequest()
|
|
12760
12925
|
model.from_json_string(json.dumps(args))
|
|
12761
12926
|
start_time = time.time()
|
|
12762
12927
|
while True:
|
|
12763
|
-
rsp = client.
|
|
12928
|
+
rsp = client.ImportDnsRecords(model)
|
|
12764
12929
|
result = rsp.to_json_string()
|
|
12765
12930
|
try:
|
|
12766
12931
|
json_obj = json.loads(result)
|
|
@@ -13323,7 +13488,7 @@ ACTION_MAP = {
|
|
|
13323
13488
|
"DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
|
|
13324
13489
|
"ModifyL4ProxyStatus": doModifyL4ProxyStatus,
|
|
13325
13490
|
"DownloadL7Logs": doDownloadL7Logs,
|
|
13326
|
-
"
|
|
13491
|
+
"CreateContentIdentifier": doCreateContentIdentifier,
|
|
13327
13492
|
"DescribeOriginACL": doDescribeOriginACL,
|
|
13328
13493
|
"DeleteApplicationProxyRule": doDeleteApplicationProxyRule,
|
|
13329
13494
|
"CheckCnameStatus": doCheckCnameStatus,
|
|
@@ -13361,6 +13526,7 @@ ACTION_MAP = {
|
|
|
13361
13526
|
"RefreshMultiPathGatewaySecretKey": doRefreshMultiPathGatewaySecretKey,
|
|
13362
13527
|
"CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
|
|
13363
13528
|
"ModifyL4Proxy": doModifyL4Proxy,
|
|
13529
|
+
"CheckFreeCertificateVerification": doCheckFreeCertificateVerification,
|
|
13364
13530
|
"ModifyL4ProxyRules": doModifyL4ProxyRules,
|
|
13365
13531
|
"DescribeIdentifications": doDescribeIdentifications,
|
|
13366
13532
|
"DescribeDDosAttackEventDetail": doDescribeDDosAttackEventDetail,
|
|
@@ -13494,7 +13660,7 @@ ACTION_MAP = {
|
|
|
13494
13660
|
"DescribeZoneSetting": doDescribeZoneSetting,
|
|
13495
13661
|
"DescribeSecurityAPIResource": doDescribeSecurityAPIResource,
|
|
13496
13662
|
"DescribeZoneConfigImportResult": doDescribeZoneConfigImportResult,
|
|
13497
|
-
"
|
|
13663
|
+
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
|
13498
13664
|
"DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
|
|
13499
13665
|
"CreateApplicationProxyRule": doCreateApplicationProxyRule,
|
|
13500
13666
|
"ModifySecurityJSInjectionRule": doModifySecurityJSInjectionRule,
|
|
@@ -13502,7 +13668,10 @@ ACTION_MAP = {
|
|
|
13502
13668
|
"DescribeFunctions": doDescribeFunctions,
|
|
13503
13669
|
"ReclaimZone": doReclaimZone,
|
|
13504
13670
|
"DeleteZone": doDeleteZone,
|
|
13671
|
+
"DescribeTimingL7OriginPullData": doDescribeTimingL7OriginPullData,
|
|
13672
|
+
"ApplyFreeCertificate": doApplyFreeCertificate,
|
|
13505
13673
|
"DescribeDDosAttackEvent": doDescribeDDosAttackEvent,
|
|
13674
|
+
"DescribeEnvironments": doDescribeEnvironments,
|
|
13506
13675
|
"DescribeSecurityIPGroupInfo": doDescribeSecurityIPGroupInfo,
|
|
13507
13676
|
"ModifyLoadBalancingStatus": doModifyLoadBalancingStatus,
|
|
13508
13677
|
"CreatePlan": doCreatePlan,
|
|
@@ -13518,7 +13687,6 @@ ACTION_MAP = {
|
|
|
13518
13687
|
"DeleteSharedCNAME": doDeleteSharedCNAME,
|
|
13519
13688
|
"DescribeWebManagedRulesData": doDescribeWebManagedRulesData,
|
|
13520
13689
|
"ImportDnsRecords": doImportDnsRecords,
|
|
13521
|
-
"CreateSecurityAPIService": doCreateSecurityAPIService,
|
|
13522
13690
|
"DescribeSecurityPolicyManagedRulesId": doDescribeSecurityPolicyManagedRulesId,
|
|
13523
13691
|
"DescribeAliasDomains": doDescribeAliasDomains,
|
|
13524
13692
|
"DescribeOriginGroupDetail": doDescribeOriginGroupDetail,
|