tccli 3.0.1228.1__py2.py3-none-any.whl → 3.0.1230.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/services/aiart/aiart_client.py +57 -4
- tccli/services/aiart/v20221229/api.json +101 -3
- tccli/services/aiart/v20221229/examples.json +8 -0
- tccli/services/batch/v20170312/api.json +15 -8
- tccli/services/cam/v20190116/api.json +25 -25
- tccli/services/cam/v20190116/examples.json +8 -8
- tccli/services/cdb/v20170320/api.json +8 -8
- tccli/services/cfw/v20190904/api.json +1 -1
- tccli/services/ckafka/v20190819/api.json +1 -1
- tccli/services/ckafka/v20190819/examples.json +14 -14
- tccli/services/clb/v20180317/api.json +1 -1
- tccli/services/cloudaudit/v20190319/api.json +15 -15
- tccli/services/cloudaudit/v20190319/examples.json +3 -3
- tccli/services/config/v20220802/api.json +70 -68
- tccli/services/config/v20220802/examples.json +6 -6
- tccli/services/cwp/v20180228/api.json +1 -1
- tccli/services/cynosdb/cynosdb_client.py +175 -16
- tccli/services/cynosdb/v20190107/api.json +292 -18
- tccli/services/cynosdb/v20190107/examples.json +30 -0
- tccli/services/dbbrain/v20210527/api.json +3 -1
- tccli/services/emr/emr_client.py +110 -4
- tccli/services/emr/v20190103/api.json +645 -0
- tccli/services/emr/v20190103/examples.json +16 -0
- tccli/services/essbasic/v20210526/api.json +10 -0
- tccli/services/facefusion/v20181201/api.json +12 -6
- tccli/services/hai/v20230812/api.json +6 -6
- tccli/services/hai/v20230812/examples.json +2 -2
- tccli/services/iotexplorer/v20190423/api.json +10 -0
- tccli/services/ivld/v20210903/api.json +25 -25
- tccli/services/ivld/v20210903/examples.json +1 -1
- tccli/services/lcic/v20220817/api.json +2 -2
- tccli/services/lke/v20231130/api.json +4 -4
- tccli/services/mps/v20190612/api.json +54 -1
- tccli/services/mqtt/mqtt_client.py +118 -12
- tccli/services/mqtt/v20240516/api.json +312 -33
- tccli/services/mqtt/v20240516/examples.json +23 -13
- tccli/services/ocr/v20181119/api.json +119 -30
- tccli/services/ocr/v20181119/examples.json +6 -6
- tccli/services/postgres/v20170312/api.json +221 -219
- tccli/services/postgres/v20170312/examples.json +36 -36
- tccli/services/pts/v20210728/api.json +22 -12
- tccli/services/redis/v20180412/api.json +14 -14
- tccli/services/scf/v20180416/api.json +12 -0
- tccli/services/ssl/v20191205/api.json +246 -173
- tccli/services/ssl/v20191205/examples.json +69 -69
- tccli/services/sts/v20180813/api.json +17 -11
- tccli/services/sts/v20180813/examples.json +6 -6
- tccli/services/tcr/v20190924/api.json +17 -17
- tccli/services/tdmq/tdmq_client.py +4 -57
- tccli/services/tdmq/v20200217/api.json +121 -202
- tccli/services/tdmq/v20200217/examples.json +29 -49
- tccli/services/trtc/v20190722/api.json +5 -9
- tccli/services/vclm/v20240523/api.json +28 -18
- tccli/services/vclm/v20240523/examples.json +2 -2
- tccli/services/vod/v20180717/api.json +18 -18
- tccli/services/vpc/v20170312/api.json +658 -163
- tccli/services/vpc/v20170312/examples.json +70 -14
- tccli/services/vpc/vpc_client.py +475 -104
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1230.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1230.1.dist-info}/RECORD +64 -64
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1230.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1230.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1228.1.dist-info → tccli-3.0.1230.1.dist-info}/license_files/LICENSE +0 -0
@@ -16346,6 +16346,39 @@
|
|
16346
16346
|
"required": false,
|
16347
16347
|
"type": "object",
|
16348
16348
|
"value_allowed_null": true
|
16349
|
+
},
|
16350
|
+
{
|
16351
|
+
"disabled": false,
|
16352
|
+
"document": "色彩增强配置。\n注意:此字段可能返回 null,表示取不到有效值。",
|
16353
|
+
"example": "无",
|
16354
|
+
"member": "ColorEnhanceConfig",
|
16355
|
+
"name": "ColorEnhance",
|
16356
|
+
"output_required": false,
|
16357
|
+
"required": false,
|
16358
|
+
"type": "object",
|
16359
|
+
"value_allowed_null": true
|
16360
|
+
},
|
16361
|
+
{
|
16362
|
+
"disabled": false,
|
16363
|
+
"document": "细节增强配置。\n注意:此字段可能返回 null,表示取不到有效值。",
|
16364
|
+
"example": "无",
|
16365
|
+
"member": "SharpEnhanceConfig",
|
16366
|
+
"name": "SharpEnhance",
|
16367
|
+
"output_required": false,
|
16368
|
+
"required": false,
|
16369
|
+
"type": "object",
|
16370
|
+
"value_allowed_null": true
|
16371
|
+
},
|
16372
|
+
{
|
16373
|
+
"disabled": false,
|
16374
|
+
"document": "人脸增强配置。\n注意:此字段可能返回 null,表示取不到有效值。",
|
16375
|
+
"example": "无",
|
16376
|
+
"member": "FaceEnhanceConfig",
|
16377
|
+
"name": "FaceEnhance",
|
16378
|
+
"output_required": false,
|
16379
|
+
"required": false,
|
16380
|
+
"type": "object",
|
16381
|
+
"value_allowed_null": true
|
16349
16382
|
}
|
16350
16383
|
],
|
16351
16384
|
"usage": "both"
|
@@ -22592,7 +22625,7 @@
|
|
22592
22625
|
"members": [
|
22593
22626
|
{
|
22594
22627
|
"disabled": false,
|
22595
|
-
"document": "直播流处理结果类型,包含:\n<li>AiReviewResult:内容审核结果;</li>\n<li>AiRecognitionResult:内容识别结果;</li>\n<li>LiveRecordResult:直播录制结果;</li>\n<li>ProcessEof:直播流处理结束。</li>",
|
22628
|
+
"document": "直播流处理结果类型,包含:\n<li>AiReviewResult:内容审核结果;</li>\n<li>AiRecognitionResult:内容识别结果;</li>\n<li>LiveRecordResult:直播录制结果;</li>\n<li>AiQualityControlResult:媒体质检结果;</li>\n<li>ProcessEof:直播流处理结束。</li>",
|
22596
22629
|
"example": "ProcessEof",
|
22597
22630
|
"member": "string",
|
22598
22631
|
"name": "NotificationType",
|
@@ -22690,6 +22723,26 @@
|
|
22690
22723
|
"type": "string",
|
22691
22724
|
"value_allowed_null": false
|
22692
22725
|
},
|
22726
|
+
{
|
22727
|
+
"disabled": false,
|
22728
|
+
"document": "- 过期时间,事件通知签名过期 UNIX 时间戳。 - 来自媒体处理的消息通知默认过期时间是10分钟,如果一条消息通知中的 Timestamp 值所指定的时间已经过期,则可以判定这条通知无效,进而可以防止网络重放攻击。 - Timestamp 的格式为十进制 UNIX 时间戳,即从1970年01月01日(UTC/GMT 的午夜)开始所经过的秒数。\n注意:此字段可能返回 null,表示取不到有效值。",
|
22729
|
+
"example": "无",
|
22730
|
+
"member": "int64",
|
22731
|
+
"name": "Timestamp",
|
22732
|
+
"output_required": false,
|
22733
|
+
"type": "int",
|
22734
|
+
"value_allowed_null": true
|
22735
|
+
},
|
22736
|
+
{
|
22737
|
+
"disabled": false,
|
22738
|
+
"document": "事件通知安全签名 Sign = MD5(Timestamp + NotifyKey)。说明:媒体处理把Timestamp 和 TaskNotifyConfig 里面的NotifyKey 进行字符串拼接后通过 MD5 计算得出 Sign 值,并将其放在通知消息里,您的后台服务器在收到通知消息后可以根据同样的算法确认 Sign 是否正确,进而确认消息是否确实来自媒体处理后台。\n注意:此字段可能返回 null,表示取不到有效值。",
|
22739
|
+
"example": "无",
|
22740
|
+
"member": "string",
|
22741
|
+
"name": "Sign",
|
22742
|
+
"output_required": false,
|
22743
|
+
"type": "string",
|
22744
|
+
"value_allowed_null": true
|
22745
|
+
},
|
22693
22746
|
{
|
22694
22747
|
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
22695
22748
|
"member": "string",
|
@@ -17,7 +17,7 @@ from tencentcloud.mqtt.v20240516 import models as models_v20240516
|
|
17
17
|
from jmespath import search
|
18
18
|
import time
|
19
19
|
|
20
|
-
def
|
20
|
+
def doCreateTopic(args, parsed_globals):
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
22
22
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -46,11 +46,11 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
|
|
46
46
|
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
47
47
|
client._sdkVersion += ("_CLI_" + __version__)
|
48
48
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
49
|
-
model = models.
|
49
|
+
model = models.CreateTopicRequest()
|
50
50
|
model.from_json_string(json.dumps(args))
|
51
51
|
start_time = time.time()
|
52
52
|
while True:
|
53
|
-
rsp = client.
|
53
|
+
rsp = client.CreateTopic(model)
|
54
54
|
result = rsp.to_json_string()
|
55
55
|
try:
|
56
56
|
json_obj = json.loads(result)
|
@@ -69,7 +69,7 @@ def doModifyAuthorizationPolicy(args, parsed_globals):
|
|
69
69
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
70
70
|
|
71
71
|
|
72
|
-
def
|
72
|
+
def doActivateDeviceCertificate(args, parsed_globals):
|
73
73
|
g_param = parse_global_arg(parsed_globals)
|
74
74
|
|
75
75
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -98,11 +98,11 @@ def doDeleteAuthorizationPolicy(args, parsed_globals):
|
|
98
98
|
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
99
99
|
client._sdkVersion += ("_CLI_" + __version__)
|
100
100
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
101
|
-
model = models.
|
101
|
+
model = models.ActivateDeviceCertificateRequest()
|
102
102
|
model.from_json_string(json.dumps(args))
|
103
103
|
start_time = time.time()
|
104
104
|
while True:
|
105
|
-
rsp = client.
|
105
|
+
rsp = client.ActivateDeviceCertificate(model)
|
106
106
|
result = rsp.to_json_string()
|
107
107
|
try:
|
108
108
|
json_obj = json.loads(result)
|
@@ -381,7 +381,7 @@ def doRegisterDeviceCertificate(args, parsed_globals):
|
|
381
381
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
382
382
|
|
383
383
|
|
384
|
-
def
|
384
|
+
def doModifyAuthorizationPolicy(args, parsed_globals):
|
385
385
|
g_param = parse_global_arg(parsed_globals)
|
386
386
|
|
387
387
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -410,11 +410,11 @@ def doCreateTopic(args, parsed_globals):
|
|
410
410
|
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
411
411
|
client._sdkVersion += ("_CLI_" + __version__)
|
412
412
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
413
|
-
model = models.
|
413
|
+
model = models.ModifyAuthorizationPolicyRequest()
|
414
414
|
model.from_json_string(json.dumps(args))
|
415
415
|
start_time = time.time()
|
416
416
|
while True:
|
417
|
-
rsp = client.
|
417
|
+
rsp = client.ModifyAuthorizationPolicy(model)
|
418
418
|
result = rsp.to_json_string()
|
419
419
|
try:
|
420
420
|
json_obj = json.loads(result)
|
@@ -641,6 +641,58 @@ def doDescribeInstance(args, parsed_globals):
|
|
641
641
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
642
642
|
|
643
643
|
|
644
|
+
def doDeleteAuthorizationPolicy(args, parsed_globals):
|
645
|
+
g_param = parse_global_arg(parsed_globals)
|
646
|
+
|
647
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
648
|
+
cred = credential.CVMRoleCredential()
|
649
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
650
|
+
cred = credential.STSAssumeRoleCredential(
|
651
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
652
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
653
|
+
)
|
654
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
655
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
656
|
+
else:
|
657
|
+
cred = credential.Credential(
|
658
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
659
|
+
)
|
660
|
+
http_profile = HttpProfile(
|
661
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
662
|
+
reqMethod="POST",
|
663
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
664
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
665
|
+
)
|
666
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
667
|
+
if g_param[OptionsDefine.Language]:
|
668
|
+
profile.language = g_param[OptionsDefine.Language]
|
669
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
670
|
+
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
671
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
672
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
673
|
+
model = models.DeleteAuthorizationPolicyRequest()
|
674
|
+
model.from_json_string(json.dumps(args))
|
675
|
+
start_time = time.time()
|
676
|
+
while True:
|
677
|
+
rsp = client.DeleteAuthorizationPolicy(model)
|
678
|
+
result = rsp.to_json_string()
|
679
|
+
try:
|
680
|
+
json_obj = json.loads(result)
|
681
|
+
except TypeError as e:
|
682
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
683
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
684
|
+
break
|
685
|
+
cur_time = time.time()
|
686
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
687
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
688
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
689
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
690
|
+
else:
|
691
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
692
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
693
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
694
|
+
|
695
|
+
|
644
696
|
def doUpdateAuthorizationPolicyPriority(args, parsed_globals):
|
645
697
|
g_param = parse_global_arg(parsed_globals)
|
646
698
|
|
@@ -1005,6 +1057,58 @@ def doModifyJWKSAuthenticator(args, parsed_globals):
|
|
1005
1057
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1006
1058
|
|
1007
1059
|
|
1060
|
+
def doDescribeDeviceCertificates(args, parsed_globals):
|
1061
|
+
g_param = parse_global_arg(parsed_globals)
|
1062
|
+
|
1063
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1064
|
+
cred = credential.CVMRoleCredential()
|
1065
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1066
|
+
cred = credential.STSAssumeRoleCredential(
|
1067
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1068
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1069
|
+
)
|
1070
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1071
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1072
|
+
else:
|
1073
|
+
cred = credential.Credential(
|
1074
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1075
|
+
)
|
1076
|
+
http_profile = HttpProfile(
|
1077
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1078
|
+
reqMethod="POST",
|
1079
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1080
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1081
|
+
)
|
1082
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1083
|
+
if g_param[OptionsDefine.Language]:
|
1084
|
+
profile.language = g_param[OptionsDefine.Language]
|
1085
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1086
|
+
client = mod.MqttClient(cred, g_param[OptionsDefine.Region], profile)
|
1087
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1088
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1089
|
+
model = models.DescribeDeviceCertificatesRequest()
|
1090
|
+
model.from_json_string(json.dumps(args))
|
1091
|
+
start_time = time.time()
|
1092
|
+
while True:
|
1093
|
+
rsp = client.DescribeDeviceCertificates(model)
|
1094
|
+
result = rsp.to_json_string()
|
1095
|
+
try:
|
1096
|
+
json_obj = json.loads(result)
|
1097
|
+
except TypeError as e:
|
1098
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1099
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1100
|
+
break
|
1101
|
+
cur_time = time.time()
|
1102
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1103
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1104
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1105
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1106
|
+
else:
|
1107
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1108
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1109
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1110
|
+
|
1111
|
+
|
1008
1112
|
CLIENT_MAP = {
|
1009
1113
|
"v20240516": mqtt_client_v20240516,
|
1010
1114
|
|
@@ -1016,18 +1120,19 @@ MODELS_MAP = {
|
|
1016
1120
|
}
|
1017
1121
|
|
1018
1122
|
ACTION_MAP = {
|
1019
|
-
"
|
1020
|
-
"
|
1123
|
+
"CreateTopic": doCreateTopic,
|
1124
|
+
"ActivateDeviceCertificate": doActivateDeviceCertificate,
|
1021
1125
|
"DescribeAuthorizationPolicies": doDescribeAuthorizationPolicies,
|
1022
1126
|
"DescribeTopicList": doDescribeTopicList,
|
1023
1127
|
"ModifyTopic": doModifyTopic,
|
1024
1128
|
"CreateAuthorizationPolicy": doCreateAuthorizationPolicy,
|
1025
1129
|
"RegisterDeviceCertificate": doRegisterDeviceCertificate,
|
1026
|
-
"
|
1130
|
+
"ModifyAuthorizationPolicy": doModifyAuthorizationPolicy,
|
1027
1131
|
"CreateJWTAuthenticator": doCreateJWTAuthenticator,
|
1028
1132
|
"DeleteAuthenticator": doDeleteAuthenticator,
|
1029
1133
|
"DescribeAuthenticator": doDescribeAuthenticator,
|
1030
1134
|
"DescribeInstance": doDescribeInstance,
|
1135
|
+
"DeleteAuthorizationPolicy": doDeleteAuthorizationPolicy,
|
1031
1136
|
"UpdateAuthorizationPolicyPriority": doUpdateAuthorizationPolicyPriority,
|
1032
1137
|
"DescribeTopic": doDescribeTopic,
|
1033
1138
|
"DescribeInstanceList": doDescribeInstanceList,
|
@@ -1035,6 +1140,7 @@ ACTION_MAP = {
|
|
1035
1140
|
"ModifyJWTAuthenticator": doModifyJWTAuthenticator,
|
1036
1141
|
"DeleteTopic": doDeleteTopic,
|
1037
1142
|
"ModifyJWKSAuthenticator": doModifyJWKSAuthenticator,
|
1143
|
+
"DescribeDeviceCertificates": doDescribeDeviceCertificates,
|
1038
1144
|
|
1039
1145
|
}
|
1040
1146
|
|