tccli 3.0.948.1__py2.py3-none-any.whl → 3.0.949.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/vpc/v20170312/CreateNetworkAclEntries.md +30 -0
  3. tccli/examples/vpc/v20170312/DeleteNetworkAclEntries.md +22 -0
  4. tccli/examples/waf/v20180125/AddAntiFakeUrl.md +46 -0
  5. tccli/examples/waf/v20180125/AddAntiInfoLeakRules.md +26 -0
  6. tccli/examples/waf/v20180125/DeleteAntiFakeUrl.md +21 -0
  7. tccli/examples/waf/v20180125/DeleteAntiInfoLeakRule.md +21 -0
  8. tccli/examples/waf/v20180125/DeleteCCRule.md +23 -0
  9. tccli/examples/waf/v20180125/DescribeAntiFakeRules.md +28 -0
  10. tccli/examples/waf/v20180125/DescribeAntiFakeUrl.md +57 -0
  11. tccli/examples/waf/v20180125/DescribeAntiInfoLeakRules.md +40 -0
  12. tccli/examples/waf/v20180125/DescribeAntiInfoLeakageRules.md +38 -0
  13. tccli/examples/waf/v20180125/DescribeBatchIpAccessControl.md +42 -0
  14. tccli/examples/waf/v20180125/DescribeCCRule.md +71 -0
  15. tccli/examples/waf/v20180125/DescribeCCRuleList.md +36 -0
  16. tccli/examples/waf/v20180125/DescribeSession.md +51 -0
  17. tccli/examples/waf/v20180125/ModifyAntiFakeUrl.md +24 -0
  18. tccli/examples/waf/v20180125/ModifyAntiFakeUrlStatus.md +22 -0
  19. tccli/examples/waf/v20180125/ModifyAntiInfoLeakRuleStatus.md +22 -0
  20. tccli/examples/waf/v20180125/ModifyAntiInfoLeakRules.md +26 -0
  21. tccli/examples/waf/v20180125/ModifyCustomWhiteRuleStatus.md +26 -0
  22. tccli/examples/waf/v20180125/UpsertCCRule.md +95 -0
  23. tccli/examples/waf/v20180125/UpsertSession.md +25 -0
  24. tccli/services/vpc/v20170312/api.json +86 -0
  25. tccli/services/vpc/v20170312/examples.json +16 -0
  26. tccli/services/vpc/vpc_client.py +195 -89
  27. tccli/services/waf/v20180125/api.json +2671 -582
  28. tccli/services/waf/v20180125/examples.json +202 -0
  29. tccli/services/waf/waf_client.py +1365 -305
  30. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/METADATA +2 -2
  31. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/RECORD +34 -12
  32. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/WHEEL +0 -0
  33. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/entry_points.txt +0 -0
  34. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/license_files/LICENSE +0 -0
@@ -1421,7 +1421,7 @@ def doEnableSnapshotPolicies(args, parsed_globals):
1421
1421
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
1422
 
1423
1423
 
1424
- def doDescribeNetDetects(args, parsed_globals):
1424
+ def doDeleteNetworkAclEntries(args, parsed_globals):
1425
1425
  g_param = parse_global_arg(parsed_globals)
1426
1426
 
1427
1427
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1450,11 +1450,11 @@ def doDescribeNetDetects(args, parsed_globals):
1450
1450
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
1451
1451
  client._sdkVersion += ("_CLI_" + __version__)
1452
1452
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.DescribeNetDetectsRequest()
1453
+ model = models.DeleteNetworkAclEntriesRequest()
1454
1454
  model.from_json_string(json.dumps(args))
1455
1455
  start_time = time.time()
1456
1456
  while True:
1457
- rsp = client.DescribeNetDetects(model)
1457
+ rsp = client.DeleteNetworkAclEntries(model)
1458
1458
  result = rsp.to_json_string()
1459
1459
  try:
1460
1460
  json_obj = json.loads(result)
@@ -2357,7 +2357,7 @@ def doDescribeSecurityGroupPolicies(args, parsed_globals):
2357
2357
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
2358
 
2359
2359
 
2360
- def doModifyDirectConnectGatewayAttribute(args, parsed_globals):
2360
+ def doUnlockCcns(args, parsed_globals):
2361
2361
  g_param = parse_global_arg(parsed_globals)
2362
2362
 
2363
2363
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2386,11 +2386,11 @@ def doModifyDirectConnectGatewayAttribute(args, parsed_globals):
2386
2386
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
2387
2387
  client._sdkVersion += ("_CLI_" + __version__)
2388
2388
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
- model = models.ModifyDirectConnectGatewayAttributeRequest()
2389
+ model = models.UnlockCcnsRequest()
2390
2390
  model.from_json_string(json.dumps(args))
2391
2391
  start_time = time.time()
2392
2392
  while True:
2393
- rsp = client.ModifyDirectConnectGatewayAttribute(model)
2393
+ rsp = client.UnlockCcns(model)
2394
2394
  result = rsp.to_json_string()
2395
2395
  try:
2396
2396
  json_obj = json.loads(result)
@@ -4801,6 +4801,58 @@ def doDescribeIp6Translators(args, parsed_globals):
4801
4801
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4802
4802
 
4803
4803
 
4804
+ def doCreateNetworkInterface(args, parsed_globals):
4805
+ g_param = parse_global_arg(parsed_globals)
4806
+
4807
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4808
+ cred = credential.CVMRoleCredential()
4809
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4810
+ cred = credential.STSAssumeRoleCredential(
4811
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4812
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4813
+ )
4814
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4816
+ else:
4817
+ cred = credential.Credential(
4818
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4819
+ )
4820
+ http_profile = HttpProfile(
4821
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4822
+ reqMethod="POST",
4823
+ endpoint=g_param[OptionsDefine.Endpoint],
4824
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4825
+ )
4826
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4827
+ if g_param[OptionsDefine.Language]:
4828
+ profile.language = g_param[OptionsDefine.Language]
4829
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4830
+ client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
4831
+ client._sdkVersion += ("_CLI_" + __version__)
4832
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4833
+ model = models.CreateNetworkInterfaceRequest()
4834
+ model.from_json_string(json.dumps(args))
4835
+ start_time = time.time()
4836
+ while True:
4837
+ rsp = client.CreateNetworkInterface(model)
4838
+ result = rsp.to_json_string()
4839
+ try:
4840
+ json_obj = json.loads(result)
4841
+ except TypeError as e:
4842
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4843
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4844
+ break
4845
+ cur_time = time.time()
4846
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4847
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4848
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4849
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4850
+ else:
4851
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4852
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4853
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4854
+
4855
+
4804
4856
  def doDescribeDirectConnectGateways(args, parsed_globals):
4805
4857
  g_param = parse_global_arg(parsed_globals)
4806
4858
 
@@ -6361,7 +6413,7 @@ def doDescribeDirectConnectGatewayCcnRoutes(args, parsed_globals):
6361
6413
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6362
6414
 
6363
6415
 
6364
- def doCreateNetworkInterface(args, parsed_globals):
6416
+ def doDescribeNetDetects(args, parsed_globals):
6365
6417
  g_param = parse_global_arg(parsed_globals)
6366
6418
 
6367
6419
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -6390,11 +6442,11 @@ def doCreateNetworkInterface(args, parsed_globals):
6390
6442
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
6391
6443
  client._sdkVersion += ("_CLI_" + __version__)
6392
6444
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
6393
- model = models.CreateNetworkInterfaceRequest()
6445
+ model = models.DescribeNetDetectsRequest()
6394
6446
  model.from_json_string(json.dumps(args))
6395
6447
  start_time = time.time()
6396
6448
  while True:
6397
- rsp = client.CreateNetworkInterface(model)
6449
+ rsp = client.DescribeNetDetects(model)
6398
6450
  result = rsp.to_json_string()
6399
6451
  try:
6400
6452
  json_obj = json.loads(result)
@@ -6465,6 +6517,58 @@ def doDeleteBandwidthPackage(args, parsed_globals):
6465
6517
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6466
6518
 
6467
6519
 
6520
+ def doCreateNetworkAclEntries(args, parsed_globals):
6521
+ g_param = parse_global_arg(parsed_globals)
6522
+
6523
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
6524
+ cred = credential.CVMRoleCredential()
6525
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
6526
+ cred = credential.STSAssumeRoleCredential(
6527
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
6528
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
6529
+ )
6530
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6531
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
6532
+ else:
6533
+ cred = credential.Credential(
6534
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
6535
+ )
6536
+ http_profile = HttpProfile(
6537
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
6538
+ reqMethod="POST",
6539
+ endpoint=g_param[OptionsDefine.Endpoint],
6540
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
6541
+ )
6542
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6543
+ if g_param[OptionsDefine.Language]:
6544
+ profile.language = g_param[OptionsDefine.Language]
6545
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
6546
+ client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
6547
+ client._sdkVersion += ("_CLI_" + __version__)
6548
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
6549
+ model = models.CreateNetworkAclEntriesRequest()
6550
+ model.from_json_string(json.dumps(args))
6551
+ start_time = time.time()
6552
+ while True:
6553
+ rsp = client.CreateNetworkAclEntries(model)
6554
+ result = rsp.to_json_string()
6555
+ try:
6556
+ json_obj = json.loads(result)
6557
+ except TypeError as e:
6558
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
6559
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
6560
+ break
6561
+ cur_time = time.time()
6562
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
6563
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
6564
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
6565
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
6566
+ else:
6567
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
6568
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
6569
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6570
+
6571
+
6468
6572
  def doDescribeNetDetectStates(args, parsed_globals):
6469
6573
  g_param = parse_global_arg(parsed_globals)
6470
6574
 
@@ -6777,6 +6881,58 @@ def doHaVipDisassociateAddressIp(args, parsed_globals):
6777
6881
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6778
6882
 
6779
6883
 
6884
+ def doDescribeHaVips(args, parsed_globals):
6885
+ g_param = parse_global_arg(parsed_globals)
6886
+
6887
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
6888
+ cred = credential.CVMRoleCredential()
6889
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
6890
+ cred = credential.STSAssumeRoleCredential(
6891
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
6892
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
6893
+ )
6894
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
6895
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
6896
+ else:
6897
+ cred = credential.Credential(
6898
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
6899
+ )
6900
+ http_profile = HttpProfile(
6901
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
6902
+ reqMethod="POST",
6903
+ endpoint=g_param[OptionsDefine.Endpoint],
6904
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
6905
+ )
6906
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
6907
+ if g_param[OptionsDefine.Language]:
6908
+ profile.language = g_param[OptionsDefine.Language]
6909
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
6910
+ client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
6911
+ client._sdkVersion += ("_CLI_" + __version__)
6912
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
6913
+ model = models.DescribeHaVipsRequest()
6914
+ model.from_json_string(json.dumps(args))
6915
+ start_time = time.time()
6916
+ while True:
6917
+ rsp = client.DescribeHaVips(model)
6918
+ result = rsp.to_json_string()
6919
+ try:
6920
+ json_obj = json.loads(result)
6921
+ except TypeError as e:
6922
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
6923
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
6924
+ break
6925
+ cur_time = time.time()
6926
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
6927
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
6928
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
6929
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
6930
+ else:
6931
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
6932
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
6933
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
6934
+
6935
+
6780
6936
  def doModifyVpnGatewayCcnRoutes(args, parsed_globals):
6781
6937
  g_param = parse_global_arg(parsed_globals)
6782
6938
 
@@ -9585,7 +9741,7 @@ def doCreateServiceTemplate(args, parsed_globals):
9585
9741
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9586
9742
 
9587
9743
 
9588
- def doDeleteVpc(args, parsed_globals):
9744
+ def doCreateSnapshotPolicies(args, parsed_globals):
9589
9745
  g_param = parse_global_arg(parsed_globals)
9590
9746
 
9591
9747
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9614,11 +9770,11 @@ def doDeleteVpc(args, parsed_globals):
9614
9770
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
9615
9771
  client._sdkVersion += ("_CLI_" + __version__)
9616
9772
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9617
- model = models.DeleteVpcRequest()
9773
+ model = models.CreateSnapshotPoliciesRequest()
9618
9774
  model.from_json_string(json.dumps(args))
9619
9775
  start_time = time.time()
9620
9776
  while True:
9621
- rsp = client.DeleteVpc(model)
9777
+ rsp = client.CreateSnapshotPolicies(model)
9622
9778
  result = rsp.to_json_string()
9623
9779
  try:
9624
9780
  json_obj = json.loads(result)
@@ -9689,7 +9845,7 @@ def doDeleteRoutes(args, parsed_globals):
9689
9845
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9690
9846
 
9691
9847
 
9692
- def doModifySecurityGroupPolicies(args, parsed_globals):
9848
+ def doModifyDirectConnectGatewayAttribute(args, parsed_globals):
9693
9849
  g_param = parse_global_arg(parsed_globals)
9694
9850
 
9695
9851
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9718,11 +9874,11 @@ def doModifySecurityGroupPolicies(args, parsed_globals):
9718
9874
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
9719
9875
  client._sdkVersion += ("_CLI_" + __version__)
9720
9876
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9721
- model = models.ModifySecurityGroupPoliciesRequest()
9877
+ model = models.ModifyDirectConnectGatewayAttributeRequest()
9722
9878
  model.from_json_string(json.dumps(args))
9723
9879
  start_time = time.time()
9724
9880
  while True:
9725
- rsp = client.ModifySecurityGroupPolicies(model)
9881
+ rsp = client.ModifyDirectConnectGatewayAttribute(model)
9726
9882
  result = rsp.to_json_string()
9727
9883
  try:
9728
9884
  json_obj = json.loads(result)
@@ -9741,7 +9897,7 @@ def doModifySecurityGroupPolicies(args, parsed_globals):
9741
9897
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9742
9898
 
9743
9899
 
9744
- def doDisableFlowLogs(args, parsed_globals):
9900
+ def doModifySubnetAttribute(args, parsed_globals):
9745
9901
  g_param = parse_global_arg(parsed_globals)
9746
9902
 
9747
9903
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9770,11 +9926,11 @@ def doDisableFlowLogs(args, parsed_globals):
9770
9926
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
9771
9927
  client._sdkVersion += ("_CLI_" + __version__)
9772
9928
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9773
- model = models.DisableFlowLogsRequest()
9929
+ model = models.ModifySubnetAttributeRequest()
9774
9930
  model.from_json_string(json.dumps(args))
9775
9931
  start_time = time.time()
9776
9932
  while True:
9777
- rsp = client.DisableFlowLogs(model)
9933
+ rsp = client.ModifySubnetAttribute(model)
9778
9934
  result = rsp.to_json_string()
9779
9935
  try:
9780
9936
  json_obj = json.loads(result)
@@ -10105,7 +10261,7 @@ def doReleaseIp6AddressesBandwidth(args, parsed_globals):
10105
10261
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
10106
10262
 
10107
10263
 
10108
- def doDescribeHaVips(args, parsed_globals):
10264
+ def doModifySecurityGroupPolicies(args, parsed_globals):
10109
10265
  g_param = parse_global_arg(parsed_globals)
10110
10266
 
10111
10267
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -10134,11 +10290,11 @@ def doDescribeHaVips(args, parsed_globals):
10134
10290
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
10135
10291
  client._sdkVersion += ("_CLI_" + __version__)
10136
10292
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
10137
- model = models.DescribeHaVipsRequest()
10293
+ model = models.ModifySecurityGroupPoliciesRequest()
10138
10294
  model.from_json_string(json.dumps(args))
10139
10295
  start_time = time.time()
10140
10296
  while True:
10141
- rsp = client.DescribeHaVips(model)
10297
+ rsp = client.ModifySecurityGroupPolicies(model)
10142
10298
  result = rsp.to_json_string()
10143
10299
  try:
10144
10300
  json_obj = json.loads(result)
@@ -10573,7 +10729,7 @@ def doDescribeVpnGateways(args, parsed_globals):
10573
10729
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
10574
10730
 
10575
10731
 
10576
- def doModifySubnetAttribute(args, parsed_globals):
10732
+ def doDisableFlowLogs(args, parsed_globals):
10577
10733
  g_param = parse_global_arg(parsed_globals)
10578
10734
 
10579
10735
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -10602,11 +10758,11 @@ def doModifySubnetAttribute(args, parsed_globals):
10602
10758
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
10603
10759
  client._sdkVersion += ("_CLI_" + __version__)
10604
10760
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
10605
- model = models.ModifySubnetAttributeRequest()
10761
+ model = models.DisableFlowLogsRequest()
10606
10762
  model.from_json_string(json.dumps(args))
10607
10763
  start_time = time.time()
10608
10764
  while True:
10609
- rsp = client.ModifySubnetAttribute(model)
10765
+ rsp = client.DisableFlowLogs(model)
10610
10766
  result = rsp.to_json_string()
10611
10767
  try:
10612
10768
  json_obj = json.loads(result)
@@ -12185,58 +12341,6 @@ def doDeleteHaVip(args, parsed_globals):
12185
12341
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12186
12342
 
12187
12343
 
12188
- def doCreateSnapshotPolicies(args, parsed_globals):
12189
- g_param = parse_global_arg(parsed_globals)
12190
-
12191
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
12192
- cred = credential.CVMRoleCredential()
12193
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
12194
- cred = credential.STSAssumeRoleCredential(
12195
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
12196
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
12197
- )
12198
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
12199
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
12200
- else:
12201
- cred = credential.Credential(
12202
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
12203
- )
12204
- http_profile = HttpProfile(
12205
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
12206
- reqMethod="POST",
12207
- endpoint=g_param[OptionsDefine.Endpoint],
12208
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
12209
- )
12210
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
12211
- if g_param[OptionsDefine.Language]:
12212
- profile.language = g_param[OptionsDefine.Language]
12213
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
12214
- client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
12215
- client._sdkVersion += ("_CLI_" + __version__)
12216
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
12217
- model = models.CreateSnapshotPoliciesRequest()
12218
- model.from_json_string(json.dumps(args))
12219
- start_time = time.time()
12220
- while True:
12221
- rsp = client.CreateSnapshotPolicies(model)
12222
- result = rsp.to_json_string()
12223
- try:
12224
- json_obj = json.loads(result)
12225
- except TypeError as e:
12226
- json_obj = json.loads(result.decode('utf-8')) # python3.3
12227
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
12228
- break
12229
- cur_time = time.time()
12230
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
12231
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
12232
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
12233
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
12234
- else:
12235
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
12236
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
12237
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12238
-
12239
-
12240
12344
  def doDescribeProductQuota(args, parsed_globals):
12241
12345
  g_param = parse_global_arg(parsed_globals)
12242
12346
 
@@ -12653,7 +12757,7 @@ def doResetVpnGatewayInternetMaxBandwidth(args, parsed_globals):
12653
12757
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
12654
12758
 
12655
12759
 
12656
- def doUnlockCcns(args, parsed_globals):
12760
+ def doDeleteVpc(args, parsed_globals):
12657
12761
  g_param = parse_global_arg(parsed_globals)
12658
12762
 
12659
12763
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -12682,11 +12786,11 @@ def doUnlockCcns(args, parsed_globals):
12682
12786
  client = mod.VpcClient(cred, g_param[OptionsDefine.Region], profile)
12683
12787
  client._sdkVersion += ("_CLI_" + __version__)
12684
12788
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
12685
- model = models.UnlockCcnsRequest()
12789
+ model = models.DeleteVpcRequest()
12686
12790
  model.from_json_string(json.dumps(args))
12687
12791
  start_time = time.time()
12688
12792
  while True:
12689
- rsp = client.UnlockCcns(model)
12793
+ rsp = client.DeleteVpc(model)
12690
12794
  result = rsp.to_json_string()
12691
12795
  try:
12692
12796
  json_obj = json.loads(result)
@@ -16331,7 +16435,7 @@ ACTION_MAP = {
16331
16435
  "DeleteVpnGatewaySslServer": doDeleteVpnGatewaySslServer,
16332
16436
  "DescribeNetworkInterfaceLimit": doDescribeNetworkInterfaceLimit,
16333
16437
  "EnableSnapshotPolicies": doEnableSnapshotPolicies,
16334
- "DescribeNetDetects": doDescribeNetDetects,
16438
+ "DeleteNetworkAclEntries": doDeleteNetworkAclEntries,
16335
16439
  "AcceptVpcPeeringConnection": doAcceptVpcPeeringConnection,
16336
16440
  "ModifyCcnRegionBandwidthLimitsType": doModifyCcnRegionBandwidthLimitsType,
16337
16441
  "DescribeGatewayFlowMonitorDetail": doDescribeGatewayFlowMonitorDetail,
@@ -16349,7 +16453,7 @@ ACTION_MAP = {
16349
16453
  "DeleteLocalGateway": doDeleteLocalGateway,
16350
16454
  "CreateDirectConnectGateway": doCreateDirectConnectGateway,
16351
16455
  "DescribeSecurityGroupPolicies": doDescribeSecurityGroupPolicies,
16352
- "ModifyDirectConnectGatewayAttribute": doModifyDirectConnectGatewayAttribute,
16456
+ "UnlockCcns": doUnlockCcns,
16353
16457
  "ModifyNatGatewaySourceIpTranslationNatRule": doModifyNatGatewaySourceIpTranslationNatRule,
16354
16458
  "AssociateNatGatewayAddress": doAssociateNatGatewayAddress,
16355
16459
  "ModifyVpcEndPointAttribute": doModifyVpcEndPointAttribute,
@@ -16396,6 +16500,7 @@ ACTION_MAP = {
16396
16500
  "DescribeLocalGateway": doDescribeLocalGateway,
16397
16501
  "DisableVpnGatewaySslClientCert": doDisableVpnGatewaySslClientCert,
16398
16502
  "DescribeIp6Translators": doDescribeIp6Translators,
16503
+ "CreateNetworkInterface": doCreateNetworkInterface,
16399
16504
  "DescribeDirectConnectGateways": doDescribeDirectConnectGateways,
16400
16505
  "ModifyServiceTemplateGroupAttribute": doModifyServiceTemplateGroupAttribute,
16401
16506
  "CreateVpc": doCreateVpc,
@@ -16426,14 +16531,16 @@ ACTION_MAP = {
16426
16531
  "DeleteDirectConnectGateway": doDeleteDirectConnectGateway,
16427
16532
  "CreateVpnGatewayRoutes": doCreateVpnGatewayRoutes,
16428
16533
  "DescribeDirectConnectGatewayCcnRoutes": doDescribeDirectConnectGatewayCcnRoutes,
16429
- "CreateNetworkInterface": doCreateNetworkInterface,
16534
+ "DescribeNetDetects": doDescribeNetDetects,
16430
16535
  "DeleteBandwidthPackage": doDeleteBandwidthPackage,
16536
+ "CreateNetworkAclEntries": doCreateNetworkAclEntries,
16431
16537
  "DescribeNetDetectStates": doDescribeNetDetectStates,
16432
16538
  "DescribeCcns": doDescribeCcns,
16433
16539
  "DeleteIp6Translators": doDeleteIp6Translators,
16434
16540
  "DeleteCcn": doDeleteCcn,
16435
16541
  "ModifyNetworkAclEntries": doModifyNetworkAclEntries,
16436
16542
  "HaVipDisassociateAddressIp": doHaVipDisassociateAddressIp,
16543
+ "DescribeHaVips": doDescribeHaVips,
16437
16544
  "ModifyVpnGatewayCcnRoutes": doModifyVpnGatewayCcnRoutes,
16438
16545
  "DetachNetworkInterface": doDetachNetworkInterface,
16439
16546
  "RejectAttachCcnInstances": doRejectAttachCcnInstances,
@@ -16488,17 +16595,17 @@ ACTION_MAP = {
16488
16595
  "DeleteVpnGateway": doDeleteVpnGateway,
16489
16596
  "DescribeTenantCcns": doDescribeTenantCcns,
16490
16597
  "CreateServiceTemplate": doCreateServiceTemplate,
16491
- "DeleteVpc": doDeleteVpc,
16598
+ "CreateSnapshotPolicies": doCreateSnapshotPolicies,
16492
16599
  "DeleteRoutes": doDeleteRoutes,
16493
- "ModifySecurityGroupPolicies": doModifySecurityGroupPolicies,
16494
- "DisableFlowLogs": doDisableFlowLogs,
16600
+ "ModifyDirectConnectGatewayAttribute": doModifyDirectConnectGatewayAttribute,
16601
+ "ModifySubnetAttribute": doModifySubnetAttribute,
16495
16602
  "DescribeSgSnapshotFileContent": doDescribeSgSnapshotFileContent,
16496
16603
  "DescribeNetworkInterfaces": doDescribeNetworkInterfaces,
16497
16604
  "InquiryPriceRenewVpnGateway": doInquiryPriceRenewVpnGateway,
16498
16605
  "DisableCcnRoutes": doDisableCcnRoutes,
16499
16606
  "DescribeVpcEndPointServiceWhiteList": doDescribeVpcEndPointServiceWhiteList,
16500
16607
  "ReleaseIp6AddressesBandwidth": doReleaseIp6AddressesBandwidth,
16501
- "DescribeHaVips": doDescribeHaVips,
16608
+ "ModifySecurityGroupPolicies": doModifySecurityGroupPolicies,
16502
16609
  "ResetVpnConnection": doResetVpnConnection,
16503
16610
  "CreateCustomerGateway": doCreateCustomerGateway,
16504
16611
  "DescribeCrossBorderCompliance": doDescribeCrossBorderCompliance,
@@ -16507,7 +16614,7 @@ ACTION_MAP = {
16507
16614
  "AuditCrossBorderCompliance": doAuditCrossBorderCompliance,
16508
16615
  "ModifyNetworkInterfaceAttribute": doModifyNetworkInterfaceAttribute,
16509
16616
  "DescribeVpnGateways": doDescribeVpnGateways,
16510
- "ModifySubnetAttribute": doModifySubnetAttribute,
16617
+ "DisableFlowLogs": doDisableFlowLogs,
16511
16618
  "DownloadCustomerGatewayConfiguration": doDownloadCustomerGatewayConfiguration,
16512
16619
  "DescribeVpcInstances": doDescribeVpcInstances,
16513
16620
  "AssociateNetworkInterfaceSecurityGroups": doAssociateNetworkInterfaceSecurityGroups,
@@ -16538,7 +16645,6 @@ ACTION_MAP = {
16538
16645
  "ModifyCcnAttachedInstancesAttribute": doModifyCcnAttachedInstancesAttribute,
16539
16646
  "DownloadVpnGatewaySslClientCert": doDownloadVpnGatewaySslClientCert,
16540
16647
  "DeleteHaVip": doDeleteHaVip,
16541
- "CreateSnapshotPolicies": doCreateSnapshotPolicies,
16542
16648
  "DescribeProductQuota": doDescribeProductQuota,
16543
16649
  "DescribeVpcPeeringConnections": doDescribeVpcPeeringConnections,
16544
16650
  "InquiryPriceCreateVpnGateway": doInquiryPriceCreateVpnGateway,
@@ -16547,7 +16653,7 @@ ACTION_MAP = {
16547
16653
  "CreateVpnGatewaySslServer": doCreateVpnGatewaySslServer,
16548
16654
  "ModifyVpnGatewayAttribute": doModifyVpnGatewayAttribute,
16549
16655
  "ResetVpnGatewayInternetMaxBandwidth": doResetVpnGatewayInternetMaxBandwidth,
16550
- "UnlockCcns": doUnlockCcns,
16656
+ "DeleteVpc": doDeleteVpc,
16551
16657
  "DescribeSubnets": doDescribeSubnets,
16552
16658
  "CreateCcn": doCreateCcn,
16553
16659
  "ModifyCustomerGatewayAttribute": doModifyCustomerGatewayAttribute,