Adds a policy to an existing ACL.
Operation description
When you call this operation, note that:
This operation is intended for API providers.
An added policy immediately takes effect on all APIs that are bound to the access control list (ACL).
A maximum of 100 policies can be added to an ACL.
Try it now
Test
RAM authorization
|
Action |
Access level |
Resource type |
Condition key |
Dependent action |
|
apigateway:AddIpControlPolicyItem |
create |
*IpControl
|
None | None |
Request parameters
|
Parameter |
Type |
Required |
Description |
Example |
| IpControlId |
string |
Yes |
The ID of the ACL. The ID is unique. |
7ea91319a34d48a09b5c9c871d9768b1 |
| AppId |
string |
No |
The restriction policy on app IDs for a specific policy. You can restrict app IDs only for whitelists. The IpControlType values of whitelists are ALLOW.
|
1111111 |
| CidrIp |
string |
Yes |
The IP addresses or CIDR blocks involved in the policy. Separate multiple IP addresses or CIDR blocks with semicolons (;). You can specify a maximum of 10 IP addresses or CIDR blocks. |
113.125.1.101;101.11.1.1 |
Response elements
|
Element |
Type |
Description |
Example |
|
object |
|||
| PolicyItemId |
string |
The ID of the policy. The ID is unique. |
P151617000829241 |
| RequestId |
string |
The ID of the request. |
CEF72CEB-54B6-4AE8-B225-F876FF7BZ004 |
Examples
Success response
JSON format
{
"PolicyItemId": "P151617000829241",
"RequestId": "CEF72CEB-54B6-4AE8-B225-F876FF7BZ004"
}
Error codes
See Error Codes for a complete list.
Release notes
See Release Notes for a complete list.