tccli 3.0.1099.1__py2.py3-none-any.whl → 3.0.1101.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/examples/cdb/v20170320/CloseSSL.md +21 -0
- tccli/examples/cdb/v20170320/DescribeSSLStatus.md +22 -0
- tccli/examples/cdb/v20170320/OpenSSL.md +21 -0
- tccli/examples/cls/v20201016/CreateCosRecharge.md +4 -4
- tccli/examples/cls/v20201016/CreateDashboardSubscribe.md +18 -0
- tccli/examples/cls/v20201016/DeleteConfigExtra.md +1 -1
- tccli/examples/cls/v20201016/DeleteDashboardSubscribe.md +18 -0
- tccli/examples/cls/v20201016/DescribeDashboardSubscribes.md +18 -0
- tccli/examples/cls/v20201016/ModifyCosRecharge.md +3 -3
- tccli/examples/cls/v20201016/ModifyDashboardSubscribe.md +18 -0
- tccli/examples/cls/v20201016/SearchDashboardSubscribe.md +35 -0
- tccli/examples/csip/v20221121/CreateRiskCenterScanTask.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterAssetViewCFGRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterAssetViewPortRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterAssetViewVULRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterAssetViewWeakPasswordRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterPortViewPortRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterServerRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterVULViewVULRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeRiskCenterWebsiteRiskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeScanTaskList.md +1 -0
- tccli/examples/csip/v20221121/DescribeTaskLogURL.md +1 -0
- tccli/examples/csip/v20221121/ModifyRiskCenterRiskStatus.md +1 -0
- tccli/examples/csip/v20221121/ModifyRiskCenterScanTask.md +1 -0
- tccli/examples/dlc/v20210125/CreateSparkSessionBatchSQL.md +1 -1
- tccli/examples/domain/v20180808/ModifyTemplate.md +73 -0
- tccli/examples/ess/v20201111/DescribeBatchOrganizationRegistrationUrls.md +27 -0
- tccli/examples/hunyuan/v20230901/ChatCompletions.md +141 -1
- tccli/examples/hunyuan/v20230901/ChatPro.md +2 -2
- tccli/examples/lke/v20231130/GetEmbedding.md +1 -1
- tccli/examples/lke/v20231130/GetMsgRecord.md +4 -1
- tccli/examples/ocr/v20181119/RecognizeGeneralTextImageWarn.md +83 -0
- tccli/examples/postgres/v20170312/ModifyAccountRemark.md +1 -1
- tccli/examples/rum/v20210622/CreateWhitelist.md +2 -2
- tccli/examples/rum/v20210622/DescribeRumGroupLog.md +3 -3
- tccli/examples/rum/v20210622/DescribeRumLogExport.md +6 -6
- tccli/examples/rum/v20210622/DescribeRumStatsLogList.md +2 -2
- tccli/examples/teo/v20220901/CreatePlan.md +47 -0
- tccli/examples/teo/v20220901/DescribeRulesSetting.md +6 -159
- tccli/examples/teo/v20220901/DestroyPlan.md +20 -0
- tccli/examples/teo/v20220901/IncreasePlanQuota.md +46 -0
- tccli/examples/teo/v20220901/ModifyPlan.md +21 -0
- tccli/examples/teo/v20220901/RenewPlan.md +23 -0
- tccli/examples/teo/v20220901/UpgradePlan.md +23 -0
- tccli/examples/tione/v20191022/UpdateCodeRepository.md +1 -1
- tccli/examples/tke/v20180525/CheckInstancesUpgradeAble.md +15 -7
- tccli/examples/tke/v20180525/CreateCluster.md +58 -142
- tccli/examples/tke/v20180525/DescribeClusterNodePools.md +1 -0
- tccli/examples/tke/v20180525/GetUpgradeInstanceProgress.md +18 -19
- tccli/examples/tke/v20180525/ModifyClusterAuthenticationOptions.md +3 -0
- tccli/examples/tke/v20180525/ModifyNodePoolInstanceTypes.md +1 -1
- tccli/examples/tms/v20201229/AnswerQuestion.md +21 -0
- tccli/examples/tsf/v20180326/CreateCluster.md +2 -2
- tccli/examples/vpc/v20170312/DeleteVpnGateway.md +1 -2
- tccli/examples/vpc/v20170312/DescribeVpnGatewayRoutes.md +2 -1
- tccli/examples/vpc/v20170312/DescribeVpnGatewaySslServers.md +23 -33
- tccli/examples/vpc/v20170312/InquiryPriceCreateVpnGateway.md +11 -3
- tccli/examples/vpc/v20170312/InquiryPriceResetVpnGatewayInternetMaxBandwidth.md +14 -7
- tccli/examples/vpc/v20170312/ModifyVpnGatewayCcnRoutes.md +1 -1
- tccli/examples/vpc/v20170312/ModifyVpnGatewayRoutes.md +8 -4
- tccli/examples/wedata/v20210820/DescribeProject.md +58 -1
- tccli/services/aiart/v20221229/api.json +5 -5
- tccli/services/cdb/cdb_client.py +163 -4
- tccli/services/cdb/v20170320/api.json +169 -0
- tccli/services/cdb/v20170320/examples.json +24 -0
- tccli/services/clb/v20180317/api.json +18 -0
- tccli/services/cls/cls_client.py +337 -72
- tccli/services/cls/v20201016/api.json +461 -50
- tccli/services/cls/v20201016/examples.json +45 -5
- tccli/services/csip/v20221121/api.json +157 -4
- tccli/services/csip/v20221121/examples.json +13 -13
- tccli/services/cvm/v20170312/api.json +3 -3
- tccli/services/cwp/cwp_client.py +0 -53
- tccli/services/cwp/v20180228/api.json +0 -194
- tccli/services/cwp/v20180228/examples.json +0 -8
- tccli/services/cynosdb/v20190107/api.json +1 -1
- tccli/services/dlc/v20210125/api.json +14 -4
- tccli/services/dlc/v20210125/examples.json +1 -1
- tccli/services/domain/domain_client.py +53 -0
- tccli/services/domain/v20180808/api.json +62 -0
- tccli/services/domain/v20180808/examples.json +8 -0
- tccli/services/dts/v20211206/api.json +1 -1
- tccli/services/ess/ess_client.py +57 -4
- tccli/services/ess/v20201111/api.json +88 -0
- tccli/services/ess/v20201111/examples.json +8 -0
- tccli/services/essbasic/v20210526/api.json +1 -1
- tccli/services/hunyuan/v20230901/api.json +10 -10
- tccli/services/hunyuan/v20230901/examples.json +26 -2
- tccli/services/ims/v20201229/api.json +2 -1
- tccli/services/iotvideo/v20211125/api.json +15 -0
- tccli/services/lke/lke_client.py +114 -8
- tccli/services/lke/v20231130/api.json +492 -0
- tccli/services/lke/v20231130/examples.json +18 -2
- tccli/services/nlp/v20190408/api.json +13 -0
- tccli/services/ocr/ocr_client.py +53 -0
- tccli/services/ocr/v20181119/api.json +156 -0
- tccli/services/ocr/v20181119/examples.json +8 -0
- tccli/services/postgres/v20170312/examples.json +1 -1
- tccli/services/rce/v20201103/api.json +9 -9
- tccli/services/rum/v20210622/api.json +43 -41
- tccli/services/rum/v20210622/examples.json +7 -7
- tccli/services/ssl/v20191205/api.json +2 -2
- tccli/services/tdmq/v20200217/api.json +6 -6
- tccli/services/teo/teo_client.py +338 -20
- tccli/services/teo/v20220901/api.json +376 -2
- tccli/services/teo/v20220901/examples.json +61 -1
- tccli/services/tione/v20191022/api.json +6 -7
- tccli/services/tione/v20191022/examples.json +1 -1
- tccli/services/tione/v20211111/api.json +2 -0
- tccli/services/tke/v20180525/api.json +77 -93
- tccli/services/tke/v20180525/examples.json +7 -7
- tccli/services/tms/tms_client.py +53 -0
- tccli/services/tms/v20201229/api.json +44 -0
- tccli/services/tms/v20201229/examples.json +8 -0
- tccli/services/tse/v20201207/api.json +49 -1
- tccli/services/tsf/v20180326/api.json +80 -42
- tccli/services/tsf/v20180326/examples.json +1 -1
- tccli/services/vpc/v20170312/api.json +39 -23
- tccli/services/vpc/v20170312/examples.json +14 -14
- tccli/services/wedata/v20210820/api.json +465 -0
- tccli/services/wedata/v20210820/examples.json +1 -1
- {tccli-3.0.1099.1.dist-info → tccli-3.0.1101.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1099.1.dist-info → tccli-3.0.1101.1.dist-info}/RECORD +127 -109
- {tccli-3.0.1099.1.dist-info → tccli-3.0.1101.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1099.1.dist-info → tccli-3.0.1101.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1099.1.dist-info → tccli-3.0.1101.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/teo/teo_client.py
CHANGED
@@ -19,6 +19,58 @@ from tencentcloud.teo.v20220106 import models as models_v20220106
|
|
19
19
|
from jmespath import search
|
20
20
|
import time
|
21
21
|
|
22
|
+
def doDestroyPlan(args, parsed_globals):
|
23
|
+
g_param = parse_global_arg(parsed_globals)
|
24
|
+
|
25
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
26
|
+
cred = credential.CVMRoleCredential()
|
27
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
28
|
+
cred = credential.STSAssumeRoleCredential(
|
29
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
30
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
31
|
+
)
|
32
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
33
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
34
|
+
else:
|
35
|
+
cred = credential.Credential(
|
36
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
37
|
+
)
|
38
|
+
http_profile = HttpProfile(
|
39
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
40
|
+
reqMethod="POST",
|
41
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
42
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
43
|
+
)
|
44
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
45
|
+
if g_param[OptionsDefine.Language]:
|
46
|
+
profile.language = g_param[OptionsDefine.Language]
|
47
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
48
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
49
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
50
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
51
|
+
model = models.DestroyPlanRequest()
|
52
|
+
model.from_json_string(json.dumps(args))
|
53
|
+
start_time = time.time()
|
54
|
+
while True:
|
55
|
+
rsp = client.DestroyPlan(model)
|
56
|
+
result = rsp.to_json_string()
|
57
|
+
try:
|
58
|
+
json_obj = json.loads(result)
|
59
|
+
except TypeError as e:
|
60
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
61
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
62
|
+
break
|
63
|
+
cur_time = time.time()
|
64
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
65
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
66
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
67
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
68
|
+
else:
|
69
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
70
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
71
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
72
|
+
|
73
|
+
|
22
74
|
def doCreatePurgeTask(args, parsed_globals):
|
23
75
|
g_param = parse_global_arg(parsed_globals)
|
24
76
|
|
@@ -799,6 +851,58 @@ def doDescribeEnvironments(args, parsed_globals):
|
|
799
851
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
800
852
|
|
801
853
|
|
854
|
+
def doIncreasePlanQuota(args, parsed_globals):
|
855
|
+
g_param = parse_global_arg(parsed_globals)
|
856
|
+
|
857
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
858
|
+
cred = credential.CVMRoleCredential()
|
859
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
860
|
+
cred = credential.STSAssumeRoleCredential(
|
861
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
862
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
863
|
+
)
|
864
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
865
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
866
|
+
else:
|
867
|
+
cred = credential.Credential(
|
868
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
869
|
+
)
|
870
|
+
http_profile = HttpProfile(
|
871
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
872
|
+
reqMethod="POST",
|
873
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
874
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
875
|
+
)
|
876
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
877
|
+
if g_param[OptionsDefine.Language]:
|
878
|
+
profile.language = g_param[OptionsDefine.Language]
|
879
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
880
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
881
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
882
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
883
|
+
model = models.IncreasePlanQuotaRequest()
|
884
|
+
model.from_json_string(json.dumps(args))
|
885
|
+
start_time = time.time()
|
886
|
+
while True:
|
887
|
+
rsp = client.IncreasePlanQuota(model)
|
888
|
+
result = rsp.to_json_string()
|
889
|
+
try:
|
890
|
+
json_obj = json.loads(result)
|
891
|
+
except TypeError as e:
|
892
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
893
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
894
|
+
break
|
895
|
+
cur_time = time.time()
|
896
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
897
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
898
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
899
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
900
|
+
else:
|
901
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
902
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
903
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
904
|
+
|
905
|
+
|
802
906
|
def doDeleteApplicationProxyRule(args, parsed_globals):
|
803
907
|
g_param = parse_global_arg(parsed_globals)
|
804
908
|
|
@@ -1163,7 +1267,7 @@ def doCreateAccelerationDomain(args, parsed_globals):
|
|
1163
1267
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1164
1268
|
|
1165
1269
|
|
1166
|
-
def
|
1270
|
+
def doModifyZoneSetting(args, parsed_globals):
|
1167
1271
|
g_param = parse_global_arg(parsed_globals)
|
1168
1272
|
|
1169
1273
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1192,11 +1296,11 @@ def doDescribeConfigGroupVersionDetail(args, parsed_globals):
|
|
1192
1296
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1193
1297
|
client._sdkVersion += ("_CLI_" + __version__)
|
1194
1298
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1195
|
-
model = models.
|
1299
|
+
model = models.ModifyZoneSettingRequest()
|
1196
1300
|
model.from_json_string(json.dumps(args))
|
1197
1301
|
start_time = time.time()
|
1198
1302
|
while True:
|
1199
|
-
rsp = client.
|
1303
|
+
rsp = client.ModifyZoneSetting(model)
|
1200
1304
|
result = rsp.to_json_string()
|
1201
1305
|
try:
|
1202
1306
|
json_obj = json.loads(result)
|
@@ -1683,7 +1787,7 @@ def doModifyL4Proxy(args, parsed_globals):
|
|
1683
1787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1684
1788
|
|
1685
1789
|
|
1686
|
-
def
|
1790
|
+
def doModifyL4ProxyRules(args, parsed_globals):
|
1687
1791
|
g_param = parse_global_arg(parsed_globals)
|
1688
1792
|
|
1689
1793
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1712,11 +1816,63 @@ def doCreateAliasDomain(args, parsed_globals):
|
|
1712
1816
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1713
1817
|
client._sdkVersion += ("_CLI_" + __version__)
|
1714
1818
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1715
|
-
model = models.
|
1819
|
+
model = models.ModifyL4ProxyRulesRequest()
|
1716
1820
|
model.from_json_string(json.dumps(args))
|
1717
1821
|
start_time = time.time()
|
1718
1822
|
while True:
|
1719
|
-
rsp = client.
|
1823
|
+
rsp = client.ModifyL4ProxyRules(model)
|
1824
|
+
result = rsp.to_json_string()
|
1825
|
+
try:
|
1826
|
+
json_obj = json.loads(result)
|
1827
|
+
except TypeError as e:
|
1828
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1829
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1830
|
+
break
|
1831
|
+
cur_time = time.time()
|
1832
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1833
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1834
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1835
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1836
|
+
else:
|
1837
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1838
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1839
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1840
|
+
|
1841
|
+
|
1842
|
+
def doDeleteRealtimeLogDeliveryTask(args, parsed_globals):
|
1843
|
+
g_param = parse_global_arg(parsed_globals)
|
1844
|
+
|
1845
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1846
|
+
cred = credential.CVMRoleCredential()
|
1847
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1848
|
+
cred = credential.STSAssumeRoleCredential(
|
1849
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1850
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1851
|
+
)
|
1852
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1853
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1854
|
+
else:
|
1855
|
+
cred = credential.Credential(
|
1856
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1857
|
+
)
|
1858
|
+
http_profile = HttpProfile(
|
1859
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1860
|
+
reqMethod="POST",
|
1861
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1862
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1863
|
+
)
|
1864
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1865
|
+
if g_param[OptionsDefine.Language]:
|
1866
|
+
profile.language = g_param[OptionsDefine.Language]
|
1867
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1868
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1869
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1870
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1871
|
+
model = models.DeleteRealtimeLogDeliveryTaskRequest()
|
1872
|
+
model.from_json_string(json.dumps(args))
|
1873
|
+
start_time = time.time()
|
1874
|
+
while True:
|
1875
|
+
rsp = client.DeleteRealtimeLogDeliveryTask(model)
|
1720
1876
|
result = rsp.to_json_string()
|
1721
1877
|
try:
|
1722
1878
|
json_obj = json.loads(result)
|
@@ -1839,7 +1995,7 @@ def doDescribeConfigGroupVersions(args, parsed_globals):
|
|
1839
1995
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1840
1996
|
|
1841
1997
|
|
1842
|
-
def
|
1998
|
+
def doDescribeConfigGroupVersionDetail(args, parsed_globals):
|
1843
1999
|
g_param = parse_global_arg(parsed_globals)
|
1844
2000
|
|
1845
2001
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1868,11 +2024,11 @@ def doModifyZoneSetting(args, parsed_globals):
|
|
1868
2024
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1869
2025
|
client._sdkVersion += ("_CLI_" + __version__)
|
1870
2026
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1871
|
-
model = models.
|
2027
|
+
model = models.DescribeConfigGroupVersionDetailRequest()
|
1872
2028
|
model.from_json_string(json.dumps(args))
|
1873
2029
|
start_time = time.time()
|
1874
2030
|
while True:
|
1875
|
-
rsp = client.
|
2031
|
+
rsp = client.DescribeConfigGroupVersionDetail(model)
|
1876
2032
|
result = rsp.to_json_string()
|
1877
2033
|
try:
|
1878
2034
|
json_obj = json.loads(result)
|
@@ -1891,7 +2047,7 @@ def doModifyZoneSetting(args, parsed_globals):
|
|
1891
2047
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1892
2048
|
|
1893
2049
|
|
1894
|
-
def
|
2050
|
+
def doCreateAliasDomain(args, parsed_globals):
|
1895
2051
|
g_param = parse_global_arg(parsed_globals)
|
1896
2052
|
|
1897
2053
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1920,11 +2076,11 @@ def doModifyL4ProxyRules(args, parsed_globals):
|
|
1920
2076
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
1921
2077
|
client._sdkVersion += ("_CLI_" + __version__)
|
1922
2078
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1923
|
-
model = models.
|
2079
|
+
model = models.CreateAliasDomainRequest()
|
1924
2080
|
model.from_json_string(json.dumps(args))
|
1925
2081
|
start_time = time.time()
|
1926
2082
|
while True:
|
1927
|
-
rsp = client.
|
2083
|
+
rsp = client.CreateAliasDomain(model)
|
1928
2084
|
result = rsp.to_json_string()
|
1929
2085
|
try:
|
1930
2086
|
json_obj = json.loads(result)
|
@@ -2307,6 +2463,58 @@ def doModifySecurityPolicy(args, parsed_globals):
|
|
2307
2463
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2308
2464
|
|
2309
2465
|
|
2466
|
+
def doModifyPlan(args, parsed_globals):
|
2467
|
+
g_param = parse_global_arg(parsed_globals)
|
2468
|
+
|
2469
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2470
|
+
cred = credential.CVMRoleCredential()
|
2471
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2472
|
+
cred = credential.STSAssumeRoleCredential(
|
2473
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2474
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2475
|
+
)
|
2476
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2477
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2478
|
+
else:
|
2479
|
+
cred = credential.Credential(
|
2480
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2481
|
+
)
|
2482
|
+
http_profile = HttpProfile(
|
2483
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2484
|
+
reqMethod="POST",
|
2485
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2486
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2487
|
+
)
|
2488
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2489
|
+
if g_param[OptionsDefine.Language]:
|
2490
|
+
profile.language = g_param[OptionsDefine.Language]
|
2491
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2492
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
2493
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2494
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2495
|
+
model = models.ModifyPlanRequest()
|
2496
|
+
model.from_json_string(json.dumps(args))
|
2497
|
+
start_time = time.time()
|
2498
|
+
while True:
|
2499
|
+
rsp = client.ModifyPlan(model)
|
2500
|
+
result = rsp.to_json_string()
|
2501
|
+
try:
|
2502
|
+
json_obj = json.loads(result)
|
2503
|
+
except TypeError as e:
|
2504
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2505
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2506
|
+
break
|
2507
|
+
cur_time = time.time()
|
2508
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2509
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2510
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2511
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2512
|
+
else:
|
2513
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2514
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2515
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2516
|
+
|
2517
|
+
|
2310
2518
|
def doBindZoneToPlan(args, parsed_globals):
|
2311
2519
|
g_param = parse_global_arg(parsed_globals)
|
2312
2520
|
|
@@ -2619,6 +2827,58 @@ def doModifyApplicationProxyStatus(args, parsed_globals):
|
|
2619
2827
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2620
2828
|
|
2621
2829
|
|
2830
|
+
def doCreatePlan(args, parsed_globals):
|
2831
|
+
g_param = parse_global_arg(parsed_globals)
|
2832
|
+
|
2833
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2834
|
+
cred = credential.CVMRoleCredential()
|
2835
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2836
|
+
cred = credential.STSAssumeRoleCredential(
|
2837
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2838
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2839
|
+
)
|
2840
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2841
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2842
|
+
else:
|
2843
|
+
cred = credential.Credential(
|
2844
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2845
|
+
)
|
2846
|
+
http_profile = HttpProfile(
|
2847
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2848
|
+
reqMethod="POST",
|
2849
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2850
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2851
|
+
)
|
2852
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2853
|
+
if g_param[OptionsDefine.Language]:
|
2854
|
+
profile.language = g_param[OptionsDefine.Language]
|
2855
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2856
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
2857
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2858
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2859
|
+
model = models.CreatePlanRequest()
|
2860
|
+
model.from_json_string(json.dumps(args))
|
2861
|
+
start_time = time.time()
|
2862
|
+
while True:
|
2863
|
+
rsp = client.CreatePlan(model)
|
2864
|
+
result = rsp.to_json_string()
|
2865
|
+
try:
|
2866
|
+
json_obj = json.loads(result)
|
2867
|
+
except TypeError as e:
|
2868
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2869
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2870
|
+
break
|
2871
|
+
cur_time = time.time()
|
2872
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2873
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2874
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2875
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2876
|
+
else:
|
2877
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2878
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2879
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2880
|
+
|
2881
|
+
|
2622
2882
|
def doDescribeTimingL7AnalysisData(args, parsed_globals):
|
2623
2883
|
g_param = parse_global_arg(parsed_globals)
|
2624
2884
|
|
@@ -3191,7 +3451,7 @@ def doModifySecurityIPGroup(args, parsed_globals):
|
|
3191
3451
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3192
3452
|
|
3193
3453
|
|
3194
|
-
def
|
3454
|
+
def doUpgradePlan(args, parsed_globals):
|
3195
3455
|
g_param = parse_global_arg(parsed_globals)
|
3196
3456
|
|
3197
3457
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3220,11 +3480,11 @@ def doDeleteRealtimeLogDeliveryTask(args, parsed_globals):
|
|
3220
3480
|
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
3221
3481
|
client._sdkVersion += ("_CLI_" + __version__)
|
3222
3482
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3223
|
-
model = models.
|
3483
|
+
model = models.UpgradePlanRequest()
|
3224
3484
|
model.from_json_string(json.dumps(args))
|
3225
3485
|
start_time = time.time()
|
3226
3486
|
while True:
|
3227
|
-
rsp = client.
|
3487
|
+
rsp = client.UpgradePlan(model)
|
3228
3488
|
result = rsp.to_json_string()
|
3229
3489
|
try:
|
3230
3490
|
json_obj = json.loads(result)
|
@@ -4439,6 +4699,58 @@ def doModifyL4ProxyRulesStatus(args, parsed_globals):
|
|
4439
4699
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4440
4700
|
|
4441
4701
|
|
4702
|
+
def doRenewPlan(args, parsed_globals):
|
4703
|
+
g_param = parse_global_arg(parsed_globals)
|
4704
|
+
|
4705
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4706
|
+
cred = credential.CVMRoleCredential()
|
4707
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4708
|
+
cred = credential.STSAssumeRoleCredential(
|
4709
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4710
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4711
|
+
)
|
4712
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4713
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4714
|
+
else:
|
4715
|
+
cred = credential.Credential(
|
4716
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4717
|
+
)
|
4718
|
+
http_profile = HttpProfile(
|
4719
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4720
|
+
reqMethod="POST",
|
4721
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4722
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4723
|
+
)
|
4724
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4725
|
+
if g_param[OptionsDefine.Language]:
|
4726
|
+
profile.language = g_param[OptionsDefine.Language]
|
4727
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4728
|
+
client = mod.TeoClient(cred, g_param[OptionsDefine.Region], profile)
|
4729
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4730
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4731
|
+
model = models.RenewPlanRequest()
|
4732
|
+
model.from_json_string(json.dumps(args))
|
4733
|
+
start_time = time.time()
|
4734
|
+
while True:
|
4735
|
+
rsp = client.RenewPlan(model)
|
4736
|
+
result = rsp.to_json_string()
|
4737
|
+
try:
|
4738
|
+
json_obj = json.loads(result)
|
4739
|
+
except TypeError as e:
|
4740
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4741
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4742
|
+
break
|
4743
|
+
cur_time = time.time()
|
4744
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4745
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4746
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4747
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4748
|
+
else:
|
4749
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4750
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4751
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4752
|
+
|
4753
|
+
|
4442
4754
|
def doDescribeZoneSetting(args, parsed_globals):
|
4443
4755
|
g_param = parse_global_arg(parsed_globals)
|
4444
4756
|
|
@@ -4972,6 +5284,7 @@ MODELS_MAP = {
|
|
4972
5284
|
}
|
4973
5285
|
|
4974
5286
|
ACTION_MAP = {
|
5287
|
+
"DestroyPlan": doDestroyPlan,
|
4975
5288
|
"CreatePurgeTask": doCreatePurgeTask,
|
4976
5289
|
"DownloadL4Logs": doDownloadL4Logs,
|
4977
5290
|
"DescribePrefetchTasks": doDescribePrefetchTasks,
|
@@ -4987,6 +5300,7 @@ ACTION_MAP = {
|
|
4987
5300
|
"ModifyL4ProxyStatus": doModifyL4ProxyStatus,
|
4988
5301
|
"DownloadL7Logs": doDownloadL7Logs,
|
4989
5302
|
"DescribeEnvironments": doDescribeEnvironments,
|
5303
|
+
"IncreasePlanQuota": doIncreasePlanQuota,
|
4990
5304
|
"DeleteApplicationProxyRule": doDeleteApplicationProxyRule,
|
4991
5305
|
"CheckCnameStatus": doCheckCnameStatus,
|
4992
5306
|
"ModifyZone": doModifyZone,
|
@@ -4994,7 +5308,7 @@ ACTION_MAP = {
|
|
4994
5308
|
"DeleteAliasDomain": doDeleteAliasDomain,
|
4995
5309
|
"DescribeOverviewL7Data": doDescribeOverviewL7Data,
|
4996
5310
|
"CreateAccelerationDomain": doCreateAccelerationDomain,
|
4997
|
-
"
|
5311
|
+
"ModifyZoneSetting": doModifyZoneSetting,
|
4998
5312
|
"BindSecurityTemplateToEntity": doBindSecurityTemplateToEntity,
|
4999
5313
|
"ModifyApplicationProxyRuleStatus": doModifyApplicationProxyRuleStatus,
|
5000
5314
|
"CreatePlanForZone": doCreatePlanForZone,
|
@@ -5004,11 +5318,12 @@ ACTION_MAP = {
|
|
5004
5318
|
"DeleteAccelerationDomains": doDeleteAccelerationDomains,
|
5005
5319
|
"CreateRealtimeLogDeliveryTask": doCreateRealtimeLogDeliveryTask,
|
5006
5320
|
"ModifyL4Proxy": doModifyL4Proxy,
|
5007
|
-
"
|
5321
|
+
"ModifyL4ProxyRules": doModifyL4ProxyRules,
|
5322
|
+
"DeleteRealtimeLogDeliveryTask": doDeleteRealtimeLogDeliveryTask,
|
5008
5323
|
"DescribeTimingL7CacheData": doDescribeTimingL7CacheData,
|
5009
5324
|
"DescribeConfigGroupVersions": doDescribeConfigGroupVersions,
|
5010
|
-
"
|
5011
|
-
"
|
5325
|
+
"DescribeConfigGroupVersionDetail": doDescribeConfigGroupVersionDetail,
|
5326
|
+
"CreateAliasDomain": doCreateAliasDomain,
|
5012
5327
|
"ModifyAliasDomainStatus": doModifyAliasDomainStatus,
|
5013
5328
|
"CreateL4ProxyRules": doCreateL4ProxyRules,
|
5014
5329
|
"DescribeTopL7CacheData": doDescribeTopL7CacheData,
|
@@ -5016,12 +5331,14 @@ ACTION_MAP = {
|
|
5016
5331
|
"ModifyRule": doModifyRule,
|
5017
5332
|
"DescribeTopL7AnalysisData": doDescribeTopL7AnalysisData,
|
5018
5333
|
"ModifySecurityPolicy": doModifySecurityPolicy,
|
5334
|
+
"ModifyPlan": doModifyPlan,
|
5019
5335
|
"BindZoneToPlan": doBindZoneToPlan,
|
5020
5336
|
"DescribeDDoSAttackEvent": doDescribeDDoSAttackEvent,
|
5021
5337
|
"DeleteL4ProxyRules": doDeleteL4ProxyRules,
|
5022
5338
|
"ModifyAccelerationDomain": doModifyAccelerationDomain,
|
5023
5339
|
"CreateL4Proxy": doCreateL4Proxy,
|
5024
5340
|
"ModifyApplicationProxyStatus": doModifyApplicationProxyStatus,
|
5341
|
+
"CreatePlan": doCreatePlan,
|
5025
5342
|
"DescribeTimingL7AnalysisData": doDescribeTimingL7AnalysisData,
|
5026
5343
|
"DescribeApplicationProxies": doDescribeApplicationProxies,
|
5027
5344
|
"CreateSharedCNAME": doCreateSharedCNAME,
|
@@ -5033,7 +5350,7 @@ ACTION_MAP = {
|
|
5033
5350
|
"DescribeRulesSetting": doDescribeRulesSetting,
|
5034
5351
|
"ModifyAccelerationDomainStatuses": doModifyAccelerationDomainStatuses,
|
5035
5352
|
"ModifySecurityIPGroup": doModifySecurityIPGroup,
|
5036
|
-
"
|
5353
|
+
"UpgradePlan": doUpgradePlan,
|
5037
5354
|
"DescribeDDoSAttackTopData": doDescribeDDoSAttackTopData,
|
5038
5355
|
"ModifyZoneStatus": doModifyZoneStatus,
|
5039
5356
|
"DescribePurgeTasks": doDescribePurgeTasks,
|
@@ -5057,6 +5374,7 @@ ACTION_MAP = {
|
|
5057
5374
|
"ModifyRealtimeLogDeliveryTask": doModifyRealtimeLogDeliveryTask,
|
5058
5375
|
"DescribeOriginProtection": doDescribeOriginProtection,
|
5059
5376
|
"ModifyL4ProxyRulesStatus": doModifyL4ProxyRulesStatus,
|
5377
|
+
"RenewPlan": doRenewPlan,
|
5060
5378
|
"DescribeZoneSetting": doDescribeZoneSetting,
|
5061
5379
|
"DeleteSecurityIPGroup": doDeleteSecurityIPGroup,
|
5062
5380
|
"CreateApplicationProxyRule": doCreateApplicationProxyRule,
|