tccli 3.0.1337.1__py2.py3-none-any.whl → 3.0.1339.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/apm/v20210622/api.json +10 -0
- tccli/services/asr/v20190614/api.json +1 -1
- tccli/services/ccc/v20200210/api.json +100 -1
- tccli/services/cdb/v20170320/api.json +37 -37
- tccli/services/cdb/v20170320/examples.json +7 -7
- tccli/services/cdn/v20180606/api.json +2 -2
- tccli/services/cdwdoris/v20211228/api.json +2 -2
- tccli/services/cfs/v20190719/api.json +15 -3
- tccli/services/cfw/v20190904/examples.json +12 -0
- tccli/services/ckafka/v20190819/api.json +19 -0
- tccli/services/cls/v20201016/api.json +2 -2
- tccli/services/csip/csip_client.py +791 -102
- tccli/services/csip/v20221121/api.json +6108 -3458
- tccli/services/csip/v20221121/examples.json +104 -0
- tccli/services/dts/v20211206/api.json +11 -0
- tccli/services/es/v20180416/api.json +55 -0
- tccli/services/es/v20250101/api.json +21 -0
- tccli/services/ess/ess_client.py +159 -0
- tccli/services/ess/v20201111/api.json +284 -4
- tccli/services/ess/v20201111/examples.json +28 -4
- tccli/services/essbasic/essbasic_client.py +171 -12
- tccli/services/essbasic/v20210526/api.json +256 -5
- tccli/services/essbasic/v20210526/examples.json +25 -1
- tccli/services/gwlb/v20240906/api.json +1 -1
- tccli/services/gwlb/v20240906/examples.json +1 -1
- tccli/services/hunyuan/v20230901/api.json +3 -3
- tccli/services/ioa/v20220601/api.json +55 -0
- tccli/services/ioa/v20220601/examples.json +1 -1
- tccli/services/iotexplorer/iotexplorer_client.py +57 -4
- tccli/services/iotexplorer/v20190423/api.json +145 -19
- tccli/services/iotexplorer/v20190423/examples.json +8 -0
- tccli/services/live/live_client.py +208 -49
- tccli/services/live/v20180801/api.json +498 -73
- tccli/services/live/v20180801/examples.json +35 -11
- tccli/services/lkeap/lkeap_client.py +0 -53
- tccli/services/lkeap/v20240522/api.json +0 -90
- tccli/services/lkeap/v20240522/examples.json +0 -8
- tccli/services/ocr/v20181119/api.json +21 -1
- tccli/services/ocr/v20181119/examples.json +1 -1
- tccli/services/ssl/ssl_client.py +212 -0
- tccli/services/ssl/v20191205/api.json +625 -10
- tccli/services/ssl/v20191205/examples.json +38 -0
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tdmq/v20200217/api.json +56 -47
- tccli/services/tdmq/v20200217/examples.json +8 -8
- tccli/services/trocket/trocket_client.py +104 -51
- tccli/services/trocket/v20230308/api.json +238 -61
- tccli/services/trocket/v20230308/examples.json +20 -12
- tccli/services/trtc/v20190722/api.json +3 -3
- tccli/services/tse/v20201207/api.json +19 -0
- tccli/services/tsf/v20180326/api.json +1 -1
- tccli/services/wedata/v20210820/api.json +607 -3
- tccli/services/wedata/v20210820/examples.json +18 -8
- tccli/services/wedata/wedata_client.py +106 -0
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/RECORD +60 -60
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/license_files/LICENSE +0 -0
@@ -1735,7 +1735,7 @@ def doCreateSealByImage(args, parsed_globals):
|
|
1735
1735
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1736
1736
|
|
1737
1737
|
|
1738
|
-
def
|
1738
|
+
def doDescribeBatchOrganizationRegistrationTasks(args, parsed_globals):
|
1739
1739
|
g_param = parse_global_arg(parsed_globals)
|
1740
1740
|
|
1741
1741
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1764,11 +1764,11 @@ def doCreateSignUrl(args, parsed_globals):
|
|
1764
1764
|
client = mod.EssbasicClient(cred, g_param[OptionsDefine.Region], profile)
|
1765
1765
|
client._sdkVersion += ("_CLI_" + __version__)
|
1766
1766
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1767
|
-
model = models.
|
1767
|
+
model = models.DescribeBatchOrganizationRegistrationTasksRequest()
|
1768
1768
|
model.from_json_string(json.dumps(args))
|
1769
1769
|
start_time = time.time()
|
1770
1770
|
while True:
|
1771
|
-
rsp = client.
|
1771
|
+
rsp = client.DescribeBatchOrganizationRegistrationTasks(model)
|
1772
1772
|
result = rsp.to_json_string()
|
1773
1773
|
try:
|
1774
1774
|
json_obj = json.loads(result)
|
@@ -2307,6 +2307,58 @@ def doChannelCreateDynamicFlowApprover(args, parsed_globals):
|
|
2307
2307
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2308
2308
|
|
2309
2309
|
|
2310
|
+
def doModifyOrganizationDefaultSeal(args, parsed_globals):
|
2311
|
+
g_param = parse_global_arg(parsed_globals)
|
2312
|
+
|
2313
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2314
|
+
cred = credential.CVMRoleCredential()
|
2315
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2316
|
+
cred = credential.STSAssumeRoleCredential(
|
2317
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2318
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2319
|
+
)
|
2320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2321
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2322
|
+
else:
|
2323
|
+
cred = credential.Credential(
|
2324
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2325
|
+
)
|
2326
|
+
http_profile = HttpProfile(
|
2327
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2328
|
+
reqMethod="POST",
|
2329
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2330
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2331
|
+
)
|
2332
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2333
|
+
if g_param[OptionsDefine.Language]:
|
2334
|
+
profile.language = g_param[OptionsDefine.Language]
|
2335
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2336
|
+
client = mod.EssbasicClient(cred, g_param[OptionsDefine.Region], profile)
|
2337
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2338
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2339
|
+
model = models.ModifyOrganizationDefaultSealRequest()
|
2340
|
+
model.from_json_string(json.dumps(args))
|
2341
|
+
start_time = time.time()
|
2342
|
+
while True:
|
2343
|
+
rsp = client.ModifyOrganizationDefaultSeal(model)
|
2344
|
+
result = rsp.to_json_string()
|
2345
|
+
try:
|
2346
|
+
json_obj = json.loads(result)
|
2347
|
+
except TypeError as e:
|
2348
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2349
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2350
|
+
break
|
2351
|
+
cur_time = time.time()
|
2352
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2353
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2354
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2355
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2356
|
+
else:
|
2357
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2358
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2359
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2360
|
+
|
2361
|
+
|
2310
2362
|
def doCreateLegalSealQrCode(args, parsed_globals):
|
2311
2363
|
g_param = parse_global_arg(parsed_globals)
|
2312
2364
|
|
@@ -4439,7 +4491,7 @@ def doGenerateOrganizationSeal(args, parsed_globals):
|
|
4439
4491
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4440
4492
|
|
4441
4493
|
|
4442
|
-
def
|
4494
|
+
def doModifyPartnerAutoSignAuthUrl(args, parsed_globals):
|
4443
4495
|
g_param = parse_global_arg(parsed_globals)
|
4444
4496
|
|
4445
4497
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4468,11 +4520,11 @@ def doDescribeFileIdsByCustomIds(args, parsed_globals):
|
|
4468
4520
|
client = mod.EssbasicClient(cred, g_param[OptionsDefine.Region], profile)
|
4469
4521
|
client._sdkVersion += ("_CLI_" + __version__)
|
4470
4522
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4471
|
-
model = models.
|
4523
|
+
model = models.ModifyPartnerAutoSignAuthUrlRequest()
|
4472
4524
|
model.from_json_string(json.dumps(args))
|
4473
4525
|
start_time = time.time()
|
4474
4526
|
while True:
|
4475
|
-
rsp = client.
|
4527
|
+
rsp = client.ModifyPartnerAutoSignAuthUrl(model)
|
4476
4528
|
result = rsp.to_json_string()
|
4477
4529
|
try:
|
4478
4530
|
json_obj = json.loads(result)
|
@@ -5219,7 +5271,7 @@ def doChannelCreateFlowGroupByFiles(args, parsed_globals):
|
|
5219
5271
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5220
5272
|
|
5221
5273
|
|
5222
|
-
def
|
5274
|
+
def doCreateModifyAdminAuthorizationUrl(args, parsed_globals):
|
5223
5275
|
g_param = parse_global_arg(parsed_globals)
|
5224
5276
|
|
5225
5277
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -5248,11 +5300,11 @@ def doModifyOrganizationDefaultSeal(args, parsed_globals):
|
|
5248
5300
|
client = mod.EssbasicClient(cred, g_param[OptionsDefine.Region], profile)
|
5249
5301
|
client._sdkVersion += ("_CLI_" + __version__)
|
5250
5302
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5251
|
-
model = models.
|
5303
|
+
model = models.CreateModifyAdminAuthorizationUrlRequest()
|
5252
5304
|
model.from_json_string(json.dumps(args))
|
5253
5305
|
start_time = time.time()
|
5254
5306
|
while True:
|
5255
|
-
rsp = client.
|
5307
|
+
rsp = client.CreateModifyAdminAuthorizationUrl(model)
|
5256
5308
|
result = rsp.to_json_string()
|
5257
5309
|
try:
|
5258
5310
|
json_obj = json.loads(result)
|
@@ -5479,6 +5531,58 @@ def doCancelFlow(args, parsed_globals):
|
|
5479
5531
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5480
5532
|
|
5481
5533
|
|
5534
|
+
def doCreateSignUrl(args, parsed_globals):
|
5535
|
+
g_param = parse_global_arg(parsed_globals)
|
5536
|
+
|
5537
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5538
|
+
cred = credential.CVMRoleCredential()
|
5539
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5540
|
+
cred = credential.STSAssumeRoleCredential(
|
5541
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5542
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5543
|
+
)
|
5544
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5545
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5546
|
+
else:
|
5547
|
+
cred = credential.Credential(
|
5548
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5549
|
+
)
|
5550
|
+
http_profile = HttpProfile(
|
5551
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5552
|
+
reqMethod="POST",
|
5553
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5554
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5555
|
+
)
|
5556
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5557
|
+
if g_param[OptionsDefine.Language]:
|
5558
|
+
profile.language = g_param[OptionsDefine.Language]
|
5559
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5560
|
+
client = mod.EssbasicClient(cred, g_param[OptionsDefine.Region], profile)
|
5561
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5562
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5563
|
+
model = models.CreateSignUrlRequest()
|
5564
|
+
model.from_json_string(json.dumps(args))
|
5565
|
+
start_time = time.time()
|
5566
|
+
while True:
|
5567
|
+
rsp = client.CreateSignUrl(model)
|
5568
|
+
result = rsp.to_json_string()
|
5569
|
+
try:
|
5570
|
+
json_obj = json.loads(result)
|
5571
|
+
except TypeError as e:
|
5572
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5573
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5574
|
+
break
|
5575
|
+
cur_time = time.time()
|
5576
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5577
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5578
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5579
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5580
|
+
else:
|
5581
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5582
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5583
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5584
|
+
|
5585
|
+
|
5482
5586
|
def doCreateH5FaceIdUrl(args, parsed_globals):
|
5483
5587
|
g_param = parse_global_arg(parsed_globals)
|
5484
5588
|
|
@@ -6571,6 +6675,58 @@ def doChannelDescribeEmployees(args, parsed_globals):
|
|
6571
6675
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6572
6676
|
|
6573
6677
|
|
6678
|
+
def doDescribeFileIdsByCustomIds(args, parsed_globals):
|
6679
|
+
g_param = parse_global_arg(parsed_globals)
|
6680
|
+
|
6681
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
6682
|
+
cred = credential.CVMRoleCredential()
|
6683
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
6684
|
+
cred = credential.STSAssumeRoleCredential(
|
6685
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
6686
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
6687
|
+
)
|
6688
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
6689
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
6690
|
+
else:
|
6691
|
+
cred = credential.Credential(
|
6692
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
6693
|
+
)
|
6694
|
+
http_profile = HttpProfile(
|
6695
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
6696
|
+
reqMethod="POST",
|
6697
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
6698
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
6699
|
+
)
|
6700
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
6701
|
+
if g_param[OptionsDefine.Language]:
|
6702
|
+
profile.language = g_param[OptionsDefine.Language]
|
6703
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
6704
|
+
client = mod.EssbasicClient(cred, g_param[OptionsDefine.Region], profile)
|
6705
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
6706
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
6707
|
+
model = models.DescribeFileIdsByCustomIdsRequest()
|
6708
|
+
model.from_json_string(json.dumps(args))
|
6709
|
+
start_time = time.time()
|
6710
|
+
while True:
|
6711
|
+
rsp = client.DescribeFileIdsByCustomIds(model)
|
6712
|
+
result = rsp.to_json_string()
|
6713
|
+
try:
|
6714
|
+
json_obj = json.loads(result)
|
6715
|
+
except TypeError as e:
|
6716
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
6717
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
6718
|
+
break
|
6719
|
+
cur_time = time.time()
|
6720
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
6721
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
6722
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
6723
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
6724
|
+
else:
|
6725
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
6726
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
6727
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
6728
|
+
|
6729
|
+
|
6574
6730
|
def doCreateUserAndSeal(args, parsed_globals):
|
6575
6731
|
g_param = parse_global_arg(parsed_globals)
|
6576
6732
|
|
@@ -7501,7 +7657,7 @@ ACTION_MAP = {
|
|
7501
7657
|
"CreateSubOrganization": doCreateSubOrganization,
|
7502
7658
|
"ChannelCreateFlowByFiles": doChannelCreateFlowByFiles,
|
7503
7659
|
"CreateSealByImage": doCreateSealByImage,
|
7504
|
-
"
|
7660
|
+
"DescribeBatchOrganizationRegistrationTasks": doDescribeBatchOrganizationRegistrationTasks,
|
7505
7661
|
"ChannelCreateConvertTaskApi": doChannelCreateConvertTaskApi,
|
7506
7662
|
"ChannelCancelFlow": doChannelCancelFlow,
|
7507
7663
|
"CreateSeal": doCreateSeal,
|
@@ -7512,6 +7668,7 @@ ACTION_MAP = {
|
|
7512
7668
|
"CheckVerifyCodeMatchFlowId": doCheckVerifyCodeMatchFlowId,
|
7513
7669
|
"ChannelCreateOrganizationModifyQrCode": doChannelCreateOrganizationModifyQrCode,
|
7514
7670
|
"ChannelCreateDynamicFlowApprover": doChannelCreateDynamicFlowApprover,
|
7671
|
+
"ModifyOrganizationDefaultSeal": doModifyOrganizationDefaultSeal,
|
7515
7672
|
"CreateLegalSealQrCode": doCreateLegalSealQrCode,
|
7516
7673
|
"ChannelVerifyPdf": doChannelVerifyPdf,
|
7517
7674
|
"GetDownloadFlowUrl": doGetDownloadFlowUrl,
|
@@ -7553,7 +7710,7 @@ ACTION_MAP = {
|
|
7553
7710
|
"ChannelCreateUserAutoSignSealUrl": doChannelCreateUserAutoSignSealUrl,
|
7554
7711
|
"CreateChannelSubOrganizationActive": doCreateChannelSubOrganizationActive,
|
7555
7712
|
"GenerateOrganizationSeal": doGenerateOrganizationSeal,
|
7556
|
-
"
|
7713
|
+
"ModifyPartnerAutoSignAuthUrl": doModifyPartnerAutoSignAuthUrl,
|
7557
7714
|
"DescribeTemplates": doDescribeTemplates,
|
7558
7715
|
"ChannelCancelUserAutoSignEnableUrl": doChannelCancelUserAutoSignEnableUrl,
|
7559
7716
|
"UploadFiles": doUploadFiles,
|
@@ -7568,11 +7725,12 @@ ACTION_MAP = {
|
|
7568
7725
|
"CreateFaceIdSign": doCreateFaceIdSign,
|
7569
7726
|
"DescribeUserFlowType": doDescribeUserFlowType,
|
7570
7727
|
"ChannelCreateFlowGroupByFiles": doChannelCreateFlowGroupByFiles,
|
7571
|
-
"
|
7728
|
+
"CreateModifyAdminAuthorizationUrl": doCreateModifyAdminAuthorizationUrl,
|
7572
7729
|
"DescribeFlowDetailInfo": doDescribeFlowDetailInfo,
|
7573
7730
|
"ChannelDescribeBillUsageDetail": doChannelDescribeBillUsageDetail,
|
7574
7731
|
"DeleteOrganizationAuthorizations": doDeleteOrganizationAuthorizations,
|
7575
7732
|
"CancelFlow": doCancelFlow,
|
7733
|
+
"CreateSignUrl": doCreateSignUrl,
|
7576
7734
|
"CreateH5FaceIdUrl": doCreateH5FaceIdUrl,
|
7577
7735
|
"DescribeFlowApprovers": doDescribeFlowApprovers,
|
7578
7736
|
"DeleteSeal": doDeleteSeal,
|
@@ -7594,6 +7752,7 @@ ACTION_MAP = {
|
|
7594
7752
|
"ChannelDescribeUserAutoSignStatus": doChannelDescribeUserAutoSignStatus,
|
7595
7753
|
"ChannelCreateReleaseFlow": doChannelCreateReleaseFlow,
|
7596
7754
|
"ChannelDescribeEmployees": doChannelDescribeEmployees,
|
7755
|
+
"DescribeFileIdsByCustomIds": doDescribeFileIdsByCustomIds,
|
7597
7756
|
"CreateUserAndSeal": doCreateUserAndSeal,
|
7598
7757
|
"ArchiveDynamicFlow": doArchiveDynamicFlow,
|
7599
7758
|
"DescribeFlow": doDescribeFlow,
|