alibabacloud-cloudfw20171207 3.0.0__tar.gz → 3.1.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of alibabacloud-cloudfw20171207 might be problematic. Click here for more details.
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/ChangeLog.md +3 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/PKG-INFO +1 -1
- alibabacloud_cloudfw20171207-3.1.0/alibabacloud_cloudfw20171207/__init__.py +1 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207/client.py +74 -4
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207/models.py +264 -20
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207.egg-info/PKG-INFO +1 -1
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/setup.py +1 -1
- alibabacloud_cloudfw20171207-3.0.0/alibabacloud_cloudfw20171207/__init__.py +0 -1
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/LICENSE +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/MANIFEST.in +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/README-CN.md +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/README.md +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207.egg-info/SOURCES.txt +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207.egg-info/dependency_links.txt +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207.egg-info/requires.txt +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/alibabacloud_cloudfw20171207.egg-info/top_level.txt +0 -0
- {alibabacloud_cloudfw20171207-3.0.0 → alibabacloud_cloudfw20171207-3.1.0}/setup.cfg +0 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
__version__ = '3.1.0'
|
|
@@ -615,7 +615,7 @@ class Client(OpenApiClient):
|
|
|
615
615
|
runtime: util_models.RuntimeOptions,
|
|
616
616
|
) -> cloudfw_20171207_models.CreateNatFirewallControlPolicyResponse:
|
|
617
617
|
"""
|
|
618
|
-
You can
|
|
618
|
+
You can call this operation to create a policy that allows, denies, or monitors the traffic that passes through the NAT firewall.
|
|
619
619
|
|
|
620
620
|
@param request: CreateNatFirewallControlPolicyRequest
|
|
621
621
|
@param runtime: runtime options for this request RuntimeOptions
|
|
@@ -696,7 +696,7 @@ class Client(OpenApiClient):
|
|
|
696
696
|
runtime: util_models.RuntimeOptions,
|
|
697
697
|
) -> cloudfw_20171207_models.CreateNatFirewallControlPolicyResponse:
|
|
698
698
|
"""
|
|
699
|
-
You can
|
|
699
|
+
You can call this operation to create a policy that allows, denies, or monitors the traffic that passes through the NAT firewall.
|
|
700
700
|
|
|
701
701
|
@param request: CreateNatFirewallControlPolicyRequest
|
|
702
702
|
@param runtime: runtime options for this request RuntimeOptions
|
|
@@ -776,7 +776,7 @@ class Client(OpenApiClient):
|
|
|
776
776
|
request: cloudfw_20171207_models.CreateNatFirewallControlPolicyRequest,
|
|
777
777
|
) -> cloudfw_20171207_models.CreateNatFirewallControlPolicyResponse:
|
|
778
778
|
"""
|
|
779
|
-
You can
|
|
779
|
+
You can call this operation to create a policy that allows, denies, or monitors the traffic that passes through the NAT firewall.
|
|
780
780
|
|
|
781
781
|
@param request: CreateNatFirewallControlPolicyRequest
|
|
782
782
|
@return: CreateNatFirewallControlPolicyResponse
|
|
@@ -789,7 +789,7 @@ class Client(OpenApiClient):
|
|
|
789
789
|
request: cloudfw_20171207_models.CreateNatFirewallControlPolicyRequest,
|
|
790
790
|
) -> cloudfw_20171207_models.CreateNatFirewallControlPolicyResponse:
|
|
791
791
|
"""
|
|
792
|
-
You can
|
|
792
|
+
You can call this operation to create a policy that allows, denies, or monitors the traffic that passes through the NAT firewall.
|
|
793
793
|
|
|
794
794
|
@param request: CreateNatFirewallControlPolicyRequest
|
|
795
795
|
@return: CreateNatFirewallControlPolicyResponse
|
|
@@ -9145,6 +9145,76 @@ class Client(OpenApiClient):
|
|
|
9145
9145
|
runtime = util_models.RuntimeOptions()
|
|
9146
9146
|
return await self.put_enable_fw_switch_with_options_async(request, runtime)
|
|
9147
9147
|
|
|
9148
|
+
def release_post_instance_with_options(
|
|
9149
|
+
self,
|
|
9150
|
+
request: cloudfw_20171207_models.ReleasePostInstanceRequest,
|
|
9151
|
+
runtime: util_models.RuntimeOptions,
|
|
9152
|
+
) -> cloudfw_20171207_models.ReleasePostInstanceResponse:
|
|
9153
|
+
UtilClient.validate_model(request)
|
|
9154
|
+
query = {}
|
|
9155
|
+
if not UtilClient.is_unset(request.instance_id):
|
|
9156
|
+
query['InstanceId'] = request.instance_id
|
|
9157
|
+
req = open_api_models.OpenApiRequest(
|
|
9158
|
+
query=OpenApiUtilClient.query(query)
|
|
9159
|
+
)
|
|
9160
|
+
params = open_api_models.Params(
|
|
9161
|
+
action='ReleasePostInstance',
|
|
9162
|
+
version='2017-12-07',
|
|
9163
|
+
protocol='HTTPS',
|
|
9164
|
+
pathname='/',
|
|
9165
|
+
method='POST',
|
|
9166
|
+
auth_type='AK',
|
|
9167
|
+
style='RPC',
|
|
9168
|
+
req_body_type='formData',
|
|
9169
|
+
body_type='json'
|
|
9170
|
+
)
|
|
9171
|
+
return TeaCore.from_map(
|
|
9172
|
+
cloudfw_20171207_models.ReleasePostInstanceResponse(),
|
|
9173
|
+
self.call_api(params, req, runtime)
|
|
9174
|
+
)
|
|
9175
|
+
|
|
9176
|
+
async def release_post_instance_with_options_async(
|
|
9177
|
+
self,
|
|
9178
|
+
request: cloudfw_20171207_models.ReleasePostInstanceRequest,
|
|
9179
|
+
runtime: util_models.RuntimeOptions,
|
|
9180
|
+
) -> cloudfw_20171207_models.ReleasePostInstanceResponse:
|
|
9181
|
+
UtilClient.validate_model(request)
|
|
9182
|
+
query = {}
|
|
9183
|
+
if not UtilClient.is_unset(request.instance_id):
|
|
9184
|
+
query['InstanceId'] = request.instance_id
|
|
9185
|
+
req = open_api_models.OpenApiRequest(
|
|
9186
|
+
query=OpenApiUtilClient.query(query)
|
|
9187
|
+
)
|
|
9188
|
+
params = open_api_models.Params(
|
|
9189
|
+
action='ReleasePostInstance',
|
|
9190
|
+
version='2017-12-07',
|
|
9191
|
+
protocol='HTTPS',
|
|
9192
|
+
pathname='/',
|
|
9193
|
+
method='POST',
|
|
9194
|
+
auth_type='AK',
|
|
9195
|
+
style='RPC',
|
|
9196
|
+
req_body_type='formData',
|
|
9197
|
+
body_type='json'
|
|
9198
|
+
)
|
|
9199
|
+
return TeaCore.from_map(
|
|
9200
|
+
cloudfw_20171207_models.ReleasePostInstanceResponse(),
|
|
9201
|
+
await self.call_api_async(params, req, runtime)
|
|
9202
|
+
)
|
|
9203
|
+
|
|
9204
|
+
def release_post_instance(
|
|
9205
|
+
self,
|
|
9206
|
+
request: cloudfw_20171207_models.ReleasePostInstanceRequest,
|
|
9207
|
+
) -> cloudfw_20171207_models.ReleasePostInstanceResponse:
|
|
9208
|
+
runtime = util_models.RuntimeOptions()
|
|
9209
|
+
return self.release_post_instance_with_options(request, runtime)
|
|
9210
|
+
|
|
9211
|
+
async def release_post_instance_async(
|
|
9212
|
+
self,
|
|
9213
|
+
request: cloudfw_20171207_models.ReleasePostInstanceRequest,
|
|
9214
|
+
) -> cloudfw_20171207_models.ReleasePostInstanceResponse:
|
|
9215
|
+
runtime = util_models.RuntimeOptions()
|
|
9216
|
+
return await self.release_post_instance_with_options_async(request, runtime)
|
|
9217
|
+
|
|
9148
9218
|
def reset_vpc_firewall_rule_hit_count_with_options(
|
|
9149
9219
|
self,
|
|
9150
9220
|
request: cloudfw_20171207_models.ResetVpcFirewallRuleHitCountRequest,
|
|
@@ -960,12 +960,15 @@ class CreateNatFirewallControlPolicyRequest(TeaModel):
|
|
|
960
960
|
#
|
|
961
961
|
# * **out**: outbound traffic
|
|
962
962
|
self.direction = direction
|
|
963
|
-
# The domain name resolution method of the access control policy. By default,
|
|
963
|
+
# The domain name resolution method of the access control policy. By default, the access control policy is enabled after the policy is created. Valid values:
|
|
964
964
|
#
|
|
965
|
-
# * **0**:
|
|
965
|
+
# * **0**: fully qualified domain name (FQDN)-based resolution
|
|
966
966
|
# * **1**: Domain Name System (DNS)-based dynamic resolution
|
|
967
967
|
# * **2**: FQDN and DNS-based dynamic resolution
|
|
968
968
|
self.domain_resolve_type = domain_resolve_type
|
|
969
|
+
# The time when the access control policy stops taking effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes later than the value of StartTime.
|
|
970
|
+
#
|
|
971
|
+
# > If RepeatType is set to Permanent, EndTime is left empty. If RepeatType is set to None, Daily, Weekly, or Monthly, this parameter must be specified.
|
|
969
972
|
self.end_time = end_time
|
|
970
973
|
# The IP version supported by the access control policy. Valid values:
|
|
971
974
|
#
|
|
@@ -980,7 +983,7 @@ class CreateNatFirewallControlPolicyRequest(TeaModel):
|
|
|
980
983
|
self.lang = lang
|
|
981
984
|
# The ID of the NAT gateway.
|
|
982
985
|
self.nat_gateway_id = nat_gateway_id
|
|
983
|
-
# The
|
|
986
|
+
# The priority of the access control policy. The priority value starts from 1. A small priority value indicates a high priority.
|
|
984
987
|
self.new_order = new_order
|
|
985
988
|
# The protocol type in the access control policy.
|
|
986
989
|
#
|
|
@@ -996,9 +999,32 @@ class CreateNatFirewallControlPolicyRequest(TeaModel):
|
|
|
996
999
|
# * **true**\
|
|
997
1000
|
# * **false**\
|
|
998
1001
|
self.release = release
|
|
1002
|
+
# The days of a week or of a month on which the access control policy takes effect.
|
|
1003
|
+
#
|
|
1004
|
+
# * If RepeatType is set to `Permanent`, `None`, or `Daily`, RepeatDays is left empty. Example: \[].
|
|
1005
|
+
# * If RepeatType is set to Weekly, RepeatDays must be specified. Example: \[0, 6].
|
|
1006
|
+
#
|
|
1007
|
+
# > If RepeatType is set to Weekly, the fields in the value of RepeatDays cannot be repeated.
|
|
1008
|
+
#
|
|
1009
|
+
# * If RepeatType is set to `Monthly`, RepeatDays must be specified. Example: \[1, 31].
|
|
1010
|
+
#
|
|
1011
|
+
# > If RepeatType is set to Monthly, the fields in the value of RepeatDays cannot be repeated.
|
|
999
1012
|
self.repeat_days = repeat_days
|
|
1013
|
+
# The point in time when the recurrence ends. Example: 23:30. The value must be on the hour or on the half hour, and at least 30 minutes later than the value of RepeatStartTime.
|
|
1014
|
+
#
|
|
1015
|
+
# > If RepeatType is set to Permanent or None, RepeatEndTime is left empty. If RepeatType is set to Daily, Weekly, or Monthly, this parameter must be specified.
|
|
1000
1016
|
self.repeat_end_time = repeat_end_time
|
|
1017
|
+
# The point in time when the recurrence starts. Example: 08:00. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of RepeatEndTime.
|
|
1018
|
+
#
|
|
1019
|
+
# > If RepeatType is set to Permanent or None, RepeatStartTime is left empty. If RepeatType is set to Daily, Weekly, or Monthly, this parameter must be specified.
|
|
1001
1020
|
self.repeat_start_time = repeat_start_time
|
|
1021
|
+
# The recurrence type for the access control policy to take effect. Valid values:
|
|
1022
|
+
#
|
|
1023
|
+
# * **Permanent** (default): The policy always takes effect.
|
|
1024
|
+
# * **None**: The policy takes effect for only once.
|
|
1025
|
+
# * **Daily**: The policy takes effect on a daily basis.
|
|
1026
|
+
# * **Weekly**: The policy takes effect on a weekly basis.
|
|
1027
|
+
# * **Monthly**: The policy takes effect on a monthly basis.
|
|
1002
1028
|
self.repeat_type = repeat_type
|
|
1003
1029
|
# The source address in the access control policy.
|
|
1004
1030
|
#
|
|
@@ -1019,6 +1045,9 @@ class CreateNatFirewallControlPolicyRequest(TeaModel):
|
|
|
1019
1045
|
# * **net**: source CIDR block
|
|
1020
1046
|
# * **group**: source address book
|
|
1021
1047
|
self.source_type = source_type
|
|
1048
|
+
# The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
|
|
1049
|
+
#
|
|
1050
|
+
# > If RepeatType is set to Permanent, StartTime is left empty. If RepeatType is set to None, Daily, Weekly, or Monthly, this parameter must be specified.
|
|
1022
1051
|
self.start_time = start_time
|
|
1023
1052
|
|
|
1024
1053
|
def validate(self):
|
|
@@ -1139,9 +1168,9 @@ class CreateNatFirewallControlPolicyResponseBody(TeaModel):
|
|
|
1139
1168
|
acl_uuid: str = None,
|
|
1140
1169
|
request_id: str = None,
|
|
1141
1170
|
):
|
|
1142
|
-
# The
|
|
1171
|
+
# The unique ID of the access control policy.
|
|
1143
1172
|
#
|
|
1144
|
-
# >
|
|
1173
|
+
# > To modify an access control policy, you must specify the unique ID of the policy. You can call the DescribeNatFirewallControlPolicy operation to obtain the ID.
|
|
1145
1174
|
self.acl_uuid = acl_uuid
|
|
1146
1175
|
# The request ID.
|
|
1147
1176
|
self.request_id = request_id
|
|
@@ -10085,8 +10114,14 @@ class DescribeTrFirewallPolicyBackUpAssociationListRequest(TeaModel):
|
|
|
10085
10114
|
lang: str = None,
|
|
10086
10115
|
tr_firewall_route_policy_id: str = None,
|
|
10087
10116
|
):
|
|
10117
|
+
# The instance ID of the VPC firewall.
|
|
10088
10118
|
self.firewall_id = firewall_id
|
|
10119
|
+
# The language of the content within the response. Valid values:
|
|
10120
|
+
#
|
|
10121
|
+
# * **zh** (default): Chinese
|
|
10122
|
+
# * **en**: English
|
|
10089
10123
|
self.lang = lang
|
|
10124
|
+
# The ID of the routing policy.
|
|
10090
10125
|
self.tr_firewall_route_policy_id = tr_firewall_route_policy_id
|
|
10091
10126
|
|
|
10092
10127
|
def validate(self):
|
|
@@ -10126,10 +10161,15 @@ class DescribeTrFirewallPolicyBackUpAssociationListResponseBodyPolicyAssociation
|
|
|
10126
10161
|
current_route_table_id: str = None,
|
|
10127
10162
|
original_route_table_id: str = None,
|
|
10128
10163
|
):
|
|
10164
|
+
# The ID of the traffic redirection instance.
|
|
10129
10165
|
self.candidate_id = candidate_id
|
|
10166
|
+
# The name of the traffic redirection instance.
|
|
10130
10167
|
self.candidate_name = candidate_name
|
|
10168
|
+
# The type of the traffic redirection instance.
|
|
10131
10169
|
self.candidate_type = candidate_type
|
|
10170
|
+
# The route table that is used after traffic redirection.
|
|
10132
10171
|
self.current_route_table_id = current_route_table_id
|
|
10172
|
+
# The ID of the route table.
|
|
10133
10173
|
self.original_route_table_id = original_route_table_id
|
|
10134
10174
|
|
|
10135
10175
|
def validate(self):
|
|
@@ -10174,7 +10214,9 @@ class DescribeTrFirewallPolicyBackUpAssociationListResponseBody(TeaModel):
|
|
|
10174
10214
|
policy_association_backup_configs: List[DescribeTrFirewallPolicyBackUpAssociationListResponseBodyPolicyAssociationBackupConfigs] = None,
|
|
10175
10215
|
request_id: str = None,
|
|
10176
10216
|
):
|
|
10217
|
+
# The route tables.
|
|
10177
10218
|
self.policy_association_backup_configs = policy_association_backup_configs
|
|
10219
|
+
# The request ID.
|
|
10178
10220
|
self.request_id = request_id
|
|
10179
10221
|
|
|
10180
10222
|
def validate(self):
|
|
@@ -13352,11 +13394,18 @@ class DescribeVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
13352
13394
|
#
|
|
13353
13395
|
# > If you do not specify this parameter, access control policies of all protocol types are queried.
|
|
13354
13396
|
self.proto = proto
|
|
13355
|
-
#
|
|
13397
|
+
# The status of the access control policy. Valid values:
|
|
13356
13398
|
#
|
|
13357
|
-
# * **true**:
|
|
13358
|
-
# * **false**:
|
|
13399
|
+
# * **true**: enabled
|
|
13400
|
+
# * **false**: disabled
|
|
13359
13401
|
self.release = release
|
|
13402
|
+
# The recurrence type for the access control policy to take effect. Valid values:
|
|
13403
|
+
#
|
|
13404
|
+
# * **Permanent** (default): The policy always takes effect.
|
|
13405
|
+
# * **None**: The policy takes effect for only once.
|
|
13406
|
+
# * **Daily**: The policy takes effect on a daily basis.
|
|
13407
|
+
# * **Weekly**: The policy takes effect on a weekly basis.
|
|
13408
|
+
# * **Monthly**: The policy takes effect on a monthly basis.
|
|
13360
13409
|
self.repeat_type = repeat_type
|
|
13361
13410
|
# The source address in the access control policy. Fuzzy match is supported.
|
|
13362
13411
|
#
|
|
@@ -13478,14 +13527,14 @@ class DescribeVpcFirewallControlPolicyResponseBodyPolicys(TeaModel):
|
|
|
13478
13527
|
# The action that Cloud Firewall performs on the traffic. Valid values:
|
|
13479
13528
|
#
|
|
13480
13529
|
# * **accept**: allows the traffic.
|
|
13481
|
-
# * **drop**:
|
|
13530
|
+
# * **drop**: denies the traffic.
|
|
13482
13531
|
# * **log**: monitors the traffic.
|
|
13483
13532
|
self.acl_action = acl_action
|
|
13484
|
-
# The
|
|
13533
|
+
# The UUID of the access control policy.
|
|
13485
13534
|
self.acl_uuid = acl_uuid
|
|
13486
13535
|
# The application ID in the access control policy.
|
|
13487
13536
|
self.application_id = application_id
|
|
13488
|
-
# The application
|
|
13537
|
+
# The application types supported by the access control policy. We recommend that you specify ApplicationNameList. Valid values:
|
|
13489
13538
|
#
|
|
13490
13539
|
# * **HTTP**\
|
|
13491
13540
|
# * **HTTPS**\
|
|
@@ -13502,7 +13551,9 @@ class DescribeVpcFirewallControlPolicyResponseBodyPolicys(TeaModel):
|
|
|
13502
13551
|
# * **SSL**\
|
|
13503
13552
|
# * **ANY**: all application types
|
|
13504
13553
|
self.application_name = application_name
|
|
13554
|
+
# The application types supported by the access control policy.
|
|
13505
13555
|
self.application_name_list = application_name_list
|
|
13556
|
+
# The time when the access control policy was created. The value is a UNIX timestamp. Unit: seconds.
|
|
13506
13557
|
self.create_time = create_time
|
|
13507
13558
|
# The description of the access control policy.
|
|
13508
13559
|
self.description = description
|
|
@@ -13510,7 +13561,7 @@ class DescribeVpcFirewallControlPolicyResponseBodyPolicys(TeaModel):
|
|
|
13510
13561
|
self.dest_port = dest_port
|
|
13511
13562
|
# The name of the destination port address book in the access control policy.
|
|
13512
13563
|
self.dest_port_group = dest_port_group
|
|
13513
|
-
#
|
|
13564
|
+
# The ports in the destination port address book of the access control policy.
|
|
13514
13565
|
self.dest_port_group_ports = dest_port_group_ports
|
|
13515
13566
|
# The type of the destination port in the access control policy. Valid values:
|
|
13516
13567
|
#
|
|
@@ -13523,7 +13574,7 @@ class DescribeVpcFirewallControlPolicyResponseBodyPolicys(TeaModel):
|
|
|
13523
13574
|
# * If **DestinationType** is set to `domain`, the value of this parameter is a domain name.
|
|
13524
13575
|
# * If **DestinationType** is set to `group`, the value of this parameter is an address book name.
|
|
13525
13576
|
self.destination = destination
|
|
13526
|
-
#
|
|
13577
|
+
# The CIDR blocks in the destination address book of the access control policy.
|
|
13527
13578
|
self.destination_group_cidrs = destination_group_cidrs
|
|
13528
13579
|
# The type of the destination address book in the access control policy. Valid values:
|
|
13529
13580
|
#
|
|
@@ -13536,12 +13587,17 @@ class DescribeVpcFirewallControlPolicyResponseBodyPolicys(TeaModel):
|
|
|
13536
13587
|
# * **group**: address book
|
|
13537
13588
|
# * **domain**: domain name
|
|
13538
13589
|
self.destination_type = destination_type
|
|
13590
|
+
# The time when the access control policy stops taking effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes later than the value of StartTime.
|
|
13591
|
+
#
|
|
13592
|
+
# > If RepeatType is set to Permanent, EndTime is left empty. If RepeatType is set to None, Daily, Weekly, or Monthly, EndTime must be specified.
|
|
13539
13593
|
self.end_time = end_time
|
|
13594
|
+
# The time when the access control policy was last hit. The value is a UNIX timestamp. Unit: seconds.
|
|
13540
13595
|
self.hit_last_time = hit_last_time
|
|
13541
13596
|
# The number of hits for the access control policy.
|
|
13542
13597
|
self.hit_times = hit_times
|
|
13543
13598
|
# The UID of the member that is managed by your Alibaba Cloud account.
|
|
13544
13599
|
self.member_uid = member_uid
|
|
13600
|
+
# The time when the access control policy was modified. The value is a UNIX timestamp. Unit: seconds.
|
|
13545
13601
|
self.modify_time = modify_time
|
|
13546
13602
|
# The priority of the access control policy.
|
|
13547
13603
|
#
|
|
@@ -13554,30 +13610,57 @@ class DescribeVpcFirewallControlPolicyResponseBodyPolicys(TeaModel):
|
|
|
13554
13610
|
# * **ICMP**\
|
|
13555
13611
|
# * **ANY**: all protocol types
|
|
13556
13612
|
self.proto = proto
|
|
13557
|
-
# Indicates whether the access control policy is enabled. By default, an access control policy is enabled after
|
|
13613
|
+
# Indicates whether the access control policy is enabled. By default, an access control policy is enabled after it is created. Valid values:
|
|
13558
13614
|
#
|
|
13559
|
-
# * **true
|
|
13560
|
-
# * **false
|
|
13615
|
+
# * **true**\
|
|
13616
|
+
# * **false**\
|
|
13561
13617
|
self.release = release
|
|
13618
|
+
# The days of a week or of a month on which the access control policy takes effect.
|
|
13619
|
+
#
|
|
13620
|
+
# * If RepeatType is set to `Permanent`, `None`, or `Daily`, RepeatDays is left empty. Example: \[].
|
|
13621
|
+
# * If RepeatType is set to Weekly, RepeatDays must be specified. Example: \[0, 6].
|
|
13622
|
+
#
|
|
13623
|
+
# > If RepeatType is set to Weekly, the fields in the value of RepeatDays cannot be repeated.
|
|
13624
|
+
#
|
|
13625
|
+
# * If RepeatType is set to `Monthly`, RepeatDays must be specified. Example: \[1, 31].
|
|
13626
|
+
#
|
|
13627
|
+
# > If RepeatType is set to Monthly, the fields in the value of RepeatDays cannot be repeated.
|
|
13562
13628
|
self.repeat_days = repeat_days
|
|
13629
|
+
# The point in time when the recurrence ends. Example: 23:30. The value must be on the hour or on the half hour, and at least 30 minutes later than the value of RepeatStartTime.
|
|
13630
|
+
#
|
|
13631
|
+
# > If RepeatType is set to Permanent or None, RepeatEndTime is left empty. If RepeatType is set to Daily, Weekly, or Monthly, RepeatEndTime must be specified.
|
|
13563
13632
|
self.repeat_end_time = repeat_end_time
|
|
13633
|
+
# The point in time when the recurrence starts. Example: 08:00. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of RepeatEndTime.
|
|
13634
|
+
#
|
|
13635
|
+
# > If RepeatType is set to Permanent or None, RepeatStartTime is left empty. If RepeatType is set to Daily, Weekly, or Monthly, this parameter must be specified.
|
|
13564
13636
|
self.repeat_start_time = repeat_start_time
|
|
13637
|
+
# The recurrence type for the access control policy to take effect. Valid values:
|
|
13638
|
+
#
|
|
13639
|
+
# * **Permanent** (default): The policy always takes effect.
|
|
13640
|
+
# * **None**: The policy takes effect for only once.
|
|
13641
|
+
# * **Daily**: The policy takes effect on a daily basis.
|
|
13642
|
+
# * **Weekly**: The policy takes effect on a weekly basis.
|
|
13643
|
+
# * **Monthly**: The policy takes effect on a monthly basis.
|
|
13565
13644
|
self.repeat_type = repeat_type
|
|
13566
13645
|
# The source address in the access control policy. Valid values:
|
|
13567
13646
|
#
|
|
13568
13647
|
# * If **SourceType** is set to `net`, the value of this parameter is a CIDR block.
|
|
13569
13648
|
# * If **SourceType** is set to `group`, the value of this parameter is an address book name.
|
|
13570
13649
|
self.source = source
|
|
13571
|
-
#
|
|
13650
|
+
# The CIDR blocks in the source address book of the access control policy.
|
|
13572
13651
|
self.source_group_cidrs = source_group_cidrs
|
|
13573
|
-
# The type of the source address in the access control policy. The value is fixed as **ip**. The value indicates an address book that includes one or more CIDR blocks.
|
|
13652
|
+
# The type of the source address book in the access control policy. The value is fixed as **ip**. The value indicates an address book that includes one or more CIDR blocks.
|
|
13574
13653
|
self.source_group_type = source_group_type
|
|
13575
13654
|
# The type of the source address in the access control policy. Valid values:
|
|
13576
13655
|
#
|
|
13577
13656
|
# * **net**: CIDR block
|
|
13578
13657
|
# * **group**: address book
|
|
13579
13658
|
self.source_type = source_type
|
|
13659
|
+
# The total quota consumed by the returned access control policies, which is the sum of the quota consumed by each policy. The quota that is consumed by an access control policy is calculated by using the following formula: Quota that is consumed by an access control policy = Number of source addresses × Number of destination addresses (number of CIDR blocks or domain names) × Number of applications × Number of port ranges.
|
|
13580
13660
|
self.spread_cnt = spread_cnt
|
|
13661
|
+
# The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
|
|
13662
|
+
#
|
|
13663
|
+
# > If RepeatType is set to Permanent, StartTime is left empty. If RepeatType is set to None, Daily, Weekly, or Monthly, StartTime must be specified.
|
|
13581
13664
|
self.start_time = start_time
|
|
13582
13665
|
|
|
13583
13666
|
def validate(self):
|
|
@@ -13735,7 +13818,7 @@ class DescribeVpcFirewallControlPolicyResponseBody(TeaModel):
|
|
|
13735
13818
|
request_id: str = None,
|
|
13736
13819
|
total_count: str = None,
|
|
13737
13820
|
):
|
|
13738
|
-
# The
|
|
13821
|
+
# The access control policies.
|
|
13739
13822
|
self.policys = policys
|
|
13740
13823
|
# The ID of the request.
|
|
13741
13824
|
self.request_id = request_id
|
|
@@ -16725,10 +16808,24 @@ class ModifyFirewallV2RoutePolicySwitchRequest(TeaModel):
|
|
|
16725
16808
|
tr_firewall_route_policy_id: str = None,
|
|
16726
16809
|
tr_firewall_route_policy_switch_status: str = None,
|
|
16727
16810
|
):
|
|
16811
|
+
# The instance ID of the virtual private cloud (VPC) firewall.
|
|
16728
16812
|
self.firewall_id = firewall_id
|
|
16813
|
+
# The language of the content within the response. Valid values:
|
|
16814
|
+
#
|
|
16815
|
+
# * **zh** (default): Chinese
|
|
16816
|
+
# * **en**: English
|
|
16729
16817
|
self.lang = lang
|
|
16818
|
+
# Specifies whether to restore the traffic redirection configurations. Valid values:
|
|
16819
|
+
#
|
|
16820
|
+
# * true: roll back
|
|
16821
|
+
# * false: withdraw
|
|
16730
16822
|
self.should_recover = should_recover
|
|
16823
|
+
# The ID of the routing policy.
|
|
16731
16824
|
self.tr_firewall_route_policy_id = tr_firewall_route_policy_id
|
|
16825
|
+
# The status of the routing policy. Valid values:
|
|
16826
|
+
#
|
|
16827
|
+
# * open: enabled
|
|
16828
|
+
# * close: disabled
|
|
16732
16829
|
self.tr_firewall_route_policy_switch_status = tr_firewall_route_policy_switch_status
|
|
16733
16830
|
|
|
16734
16831
|
def validate(self):
|
|
@@ -16772,6 +16869,7 @@ class ModifyFirewallV2RoutePolicySwitchResponseBody(TeaModel):
|
|
|
16772
16869
|
self,
|
|
16773
16870
|
request_id: str = None,
|
|
16774
16871
|
):
|
|
16872
|
+
# The request ID.
|
|
16775
16873
|
self.request_id = request_id
|
|
16776
16874
|
|
|
16777
16875
|
def validate(self):
|
|
@@ -18486,7 +18584,7 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
18486
18584
|
#
|
|
18487
18585
|
# If you want to modify the configurations of an access control policy, you must provide the unique ID of the policy. You can call the [DescribeVpcFirewallControlPolicy](~~159758~~) operation to query the ID.
|
|
18488
18586
|
self.acl_uuid = acl_uuid
|
|
18489
|
-
# The application type in the access control policy.
|
|
18587
|
+
# The application type used in the access control policy.
|
|
18490
18588
|
#
|
|
18491
18589
|
# Valid values:
|
|
18492
18590
|
#
|
|
@@ -18507,6 +18605,7 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
18507
18605
|
# * SSL
|
|
18508
18606
|
# * ANY: all application types
|
|
18509
18607
|
self.application_name = application_name
|
|
18608
|
+
# The application names.
|
|
18510
18609
|
self.application_name_list = application_name_list
|
|
18511
18610
|
# The description of the access control policy.
|
|
18512
18611
|
self.description = description
|
|
@@ -18541,6 +18640,9 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
18541
18640
|
# * **group**: address book
|
|
18542
18641
|
# * **domain**: domain name
|
|
18543
18642
|
self.destination_type = destination_type
|
|
18643
|
+
# The time when the access control policy stops taking effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes later than the value of StartTime.
|
|
18644
|
+
#
|
|
18645
|
+
# > If you set RepeatType to Permanent, leave this parameter empty. If you set RepeatType to None, Daily, Weekly, or Monthly, you must specify this parameter.
|
|
18544
18646
|
self.end_time = end_time
|
|
18545
18647
|
# The language of the content within the response.
|
|
18546
18648
|
#
|
|
@@ -18563,9 +18665,32 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
18563
18665
|
# * **true**: enables the access control policy.
|
|
18564
18666
|
# * **false**: disables the access control policy.
|
|
18565
18667
|
self.release = release
|
|
18668
|
+
# The days of a week or of a month on which the access control policy takes effect.
|
|
18669
|
+
#
|
|
18670
|
+
# * If you set RepeatType to `Permanent`, `None`, or `Daily`, the value of this parameter is an empty array. Example: \[].
|
|
18671
|
+
# * If you set RepeatType to Weekly, you must specify this parameter. Example: \[0, 6].
|
|
18672
|
+
#
|
|
18673
|
+
# > If you set RepeatType to Weekly, the fields in the value of this parameter cannot be repeated.
|
|
18674
|
+
#
|
|
18675
|
+
# * If you set RepeatType to `Monthly`, you must specify this parameter. Example: \[1, 31].
|
|
18676
|
+
#
|
|
18677
|
+
# > If you set RepeatType to Monthly, the fields in the value of this parameter cannot be repeated.
|
|
18566
18678
|
self.repeat_days = repeat_days
|
|
18679
|
+
# The point in time when the recurrence ends. Example: 23:30. The value must be on the hour or on the half hour, and at least 30 minutes later than the value of RepeatStartTime.
|
|
18680
|
+
#
|
|
18681
|
+
# > If you set RepeatType to Permanent or None, leave this parameter empty. If you set RepeatType to Daily, Weekly, or Monthly, you must specify this parameter.
|
|
18567
18682
|
self.repeat_end_time = repeat_end_time
|
|
18683
|
+
# The point in time when the recurrence starts. Example: 08:00. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of RepeatEndTime.
|
|
18684
|
+
#
|
|
18685
|
+
# > If you set RepeatType to Permanent or None, leave this parameter empty. If you set RepeatType to Daily, Weekly, or Monthly, you must specify this parameter.
|
|
18568
18686
|
self.repeat_start_time = repeat_start_time
|
|
18687
|
+
# The recurrence type for the access control policy to take effect. Valid values:
|
|
18688
|
+
#
|
|
18689
|
+
# * **Permanent** (default): The policy always takes effect.
|
|
18690
|
+
# * **None**: The policy takes effect for only once.
|
|
18691
|
+
# * **Daily**: The policy takes effect on a daily basis.
|
|
18692
|
+
# * **Weekly**: The policy takes effect on a weekly basis.
|
|
18693
|
+
# * **Monthly**: The policy takes effect on a monthly basis.
|
|
18569
18694
|
self.repeat_type = repeat_type
|
|
18570
18695
|
# The source address in the access control policy.
|
|
18571
18696
|
#
|
|
@@ -18586,6 +18711,9 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
18586
18711
|
# * **net**: CIDR block
|
|
18587
18712
|
# * **group**: address book
|
|
18588
18713
|
self.source_type = source_type
|
|
18714
|
+
# The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
|
|
18715
|
+
#
|
|
18716
|
+
# > If you set RepeatType to Permanent, leave this parameter empty. If you set RepeatType to None, Daily, Weekly, or Monthly, you must specify this parameter.
|
|
18589
18717
|
self.start_time = start_time
|
|
18590
18718
|
# The instance ID of the VPC firewall. You can call the [DescribeVpcFirewallAclGroupList](~~159760~~) operation to query the ID.
|
|
18591
18719
|
#
|
|
@@ -19790,6 +19918,122 @@ class PutEnableFwSwitchResponse(TeaModel):
|
|
|
19790
19918
|
return self
|
|
19791
19919
|
|
|
19792
19920
|
|
|
19921
|
+
class ReleasePostInstanceRequest(TeaModel):
|
|
19922
|
+
def __init__(
|
|
19923
|
+
self,
|
|
19924
|
+
instance_id: str = None,
|
|
19925
|
+
):
|
|
19926
|
+
self.instance_id = instance_id
|
|
19927
|
+
|
|
19928
|
+
def validate(self):
|
|
19929
|
+
pass
|
|
19930
|
+
|
|
19931
|
+
def to_map(self):
|
|
19932
|
+
_map = super().to_map()
|
|
19933
|
+
if _map is not None:
|
|
19934
|
+
return _map
|
|
19935
|
+
|
|
19936
|
+
result = dict()
|
|
19937
|
+
if self.instance_id is not None:
|
|
19938
|
+
result['InstanceId'] = self.instance_id
|
|
19939
|
+
return result
|
|
19940
|
+
|
|
19941
|
+
def from_map(self, m: dict = None):
|
|
19942
|
+
m = m or dict()
|
|
19943
|
+
if m.get('InstanceId') is not None:
|
|
19944
|
+
self.instance_id = m.get('InstanceId')
|
|
19945
|
+
return self
|
|
19946
|
+
|
|
19947
|
+
|
|
19948
|
+
class ReleasePostInstanceResponseBody(TeaModel):
|
|
19949
|
+
def __init__(
|
|
19950
|
+
self,
|
|
19951
|
+
http_status_code: int = None,
|
|
19952
|
+
release_status: bool = None,
|
|
19953
|
+
request_id: str = None,
|
|
19954
|
+
success: bool = None,
|
|
19955
|
+
):
|
|
19956
|
+
self.http_status_code = http_status_code
|
|
19957
|
+
self.release_status = release_status
|
|
19958
|
+
self.request_id = request_id
|
|
19959
|
+
self.success = success
|
|
19960
|
+
|
|
19961
|
+
def validate(self):
|
|
19962
|
+
pass
|
|
19963
|
+
|
|
19964
|
+
def to_map(self):
|
|
19965
|
+
_map = super().to_map()
|
|
19966
|
+
if _map is not None:
|
|
19967
|
+
return _map
|
|
19968
|
+
|
|
19969
|
+
result = dict()
|
|
19970
|
+
if self.http_status_code is not None:
|
|
19971
|
+
result['HttpStatusCode'] = self.http_status_code
|
|
19972
|
+
if self.release_status is not None:
|
|
19973
|
+
result['ReleaseStatus'] = self.release_status
|
|
19974
|
+
if self.request_id is not None:
|
|
19975
|
+
result['RequestId'] = self.request_id
|
|
19976
|
+
if self.success is not None:
|
|
19977
|
+
result['Success'] = self.success
|
|
19978
|
+
return result
|
|
19979
|
+
|
|
19980
|
+
def from_map(self, m: dict = None):
|
|
19981
|
+
m = m or dict()
|
|
19982
|
+
if m.get('HttpStatusCode') is not None:
|
|
19983
|
+
self.http_status_code = m.get('HttpStatusCode')
|
|
19984
|
+
if m.get('ReleaseStatus') is not None:
|
|
19985
|
+
self.release_status = m.get('ReleaseStatus')
|
|
19986
|
+
if m.get('RequestId') is not None:
|
|
19987
|
+
self.request_id = m.get('RequestId')
|
|
19988
|
+
if m.get('Success') is not None:
|
|
19989
|
+
self.success = m.get('Success')
|
|
19990
|
+
return self
|
|
19991
|
+
|
|
19992
|
+
|
|
19993
|
+
class ReleasePostInstanceResponse(TeaModel):
|
|
19994
|
+
def __init__(
|
|
19995
|
+
self,
|
|
19996
|
+
headers: Dict[str, str] = None,
|
|
19997
|
+
status_code: int = None,
|
|
19998
|
+
body: ReleasePostInstanceResponseBody = None,
|
|
19999
|
+
):
|
|
20000
|
+
self.headers = headers
|
|
20001
|
+
self.status_code = status_code
|
|
20002
|
+
self.body = body
|
|
20003
|
+
|
|
20004
|
+
def validate(self):
|
|
20005
|
+
self.validate_required(self.headers, 'headers')
|
|
20006
|
+
self.validate_required(self.status_code, 'status_code')
|
|
20007
|
+
self.validate_required(self.body, 'body')
|
|
20008
|
+
if self.body:
|
|
20009
|
+
self.body.validate()
|
|
20010
|
+
|
|
20011
|
+
def to_map(self):
|
|
20012
|
+
_map = super().to_map()
|
|
20013
|
+
if _map is not None:
|
|
20014
|
+
return _map
|
|
20015
|
+
|
|
20016
|
+
result = dict()
|
|
20017
|
+
if self.headers is not None:
|
|
20018
|
+
result['headers'] = self.headers
|
|
20019
|
+
if self.status_code is not None:
|
|
20020
|
+
result['statusCode'] = self.status_code
|
|
20021
|
+
if self.body is not None:
|
|
20022
|
+
result['body'] = self.body.to_map()
|
|
20023
|
+
return result
|
|
20024
|
+
|
|
20025
|
+
def from_map(self, m: dict = None):
|
|
20026
|
+
m = m or dict()
|
|
20027
|
+
if m.get('headers') is not None:
|
|
20028
|
+
self.headers = m.get('headers')
|
|
20029
|
+
if m.get('statusCode') is not None:
|
|
20030
|
+
self.status_code = m.get('statusCode')
|
|
20031
|
+
if m.get('body') is not None:
|
|
20032
|
+
temp_model = ReleasePostInstanceResponseBody()
|
|
20033
|
+
self.body = temp_model.from_map(m['body'])
|
|
20034
|
+
return self
|
|
20035
|
+
|
|
20036
|
+
|
|
19793
20037
|
class ResetVpcFirewallRuleHitCountRequest(TeaModel):
|
|
19794
20038
|
def __init__(
|
|
19795
20039
|
self,
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
__version__ = '3.0.0'
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|