alibabacloud-cloudfw20171207 5.0.3__py3-none-any.whl → 6.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of alibabacloud-cloudfw20171207 might be problematic. Click here for more details.
- alibabacloud_cloudfw20171207/__init__.py +1 -1
- alibabacloud_cloudfw20171207/client.py +16 -4
- alibabacloud_cloudfw20171207/models.py +214 -61
- {alibabacloud_cloudfw20171207-5.0.3.dist-info → alibabacloud_cloudfw20171207-6.0.0.dist-info}/METADATA +2 -2
- alibabacloud_cloudfw20171207-6.0.0.dist-info/RECORD +8 -0
- alibabacloud_cloudfw20171207-5.0.3.dist-info/RECORD +0 -8
- {alibabacloud_cloudfw20171207-5.0.3.dist-info → alibabacloud_cloudfw20171207-6.0.0.dist-info}/LICENSE +0 -0
- {alibabacloud_cloudfw20171207-5.0.3.dist-info → alibabacloud_cloudfw20171207-6.0.0.dist-info}/WHEEL +0 -0
- {alibabacloud_cloudfw20171207-5.0.3.dist-info → alibabacloud_cloudfw20171207-6.0.0.dist-info}/top_level.txt +0 -0
|
@@ -1 +1 @@
|
|
|
1
|
-
__version__ = '
|
|
1
|
+
__version__ = '6.0.0'
|
|
@@ -1595,6 +1595,8 @@ class Client(OpenApiClient):
|
|
|
1595
1595
|
query['FirewallVSwitchCidrBlock'] = request.firewall_vswitch_cidr_block
|
|
1596
1596
|
if not UtilClient.is_unset(request.firewall_vpc_cidr_block):
|
|
1597
1597
|
query['FirewallVpcCidrBlock'] = request.firewall_vpc_cidr_block
|
|
1598
|
+
if not UtilClient.is_unset(request.firewall_vpc_standby_zone_id):
|
|
1599
|
+
query['FirewallVpcStandbyZoneId'] = request.firewall_vpc_standby_zone_id
|
|
1598
1600
|
if not UtilClient.is_unset(request.firewall_vpc_zone_id):
|
|
1599
1601
|
query['FirewallVpcZoneId'] = request.firewall_vpc_zone_id
|
|
1600
1602
|
if not UtilClient.is_unset(request.lang):
|
|
@@ -1654,6 +1656,8 @@ class Client(OpenApiClient):
|
|
|
1654
1656
|
query['FirewallVSwitchCidrBlock'] = request.firewall_vswitch_cidr_block
|
|
1655
1657
|
if not UtilClient.is_unset(request.firewall_vpc_cidr_block):
|
|
1656
1658
|
query['FirewallVpcCidrBlock'] = request.firewall_vpc_cidr_block
|
|
1659
|
+
if not UtilClient.is_unset(request.firewall_vpc_standby_zone_id):
|
|
1660
|
+
query['FirewallVpcStandbyZoneId'] = request.firewall_vpc_standby_zone_id
|
|
1657
1661
|
if not UtilClient.is_unset(request.firewall_vpc_zone_id):
|
|
1658
1662
|
query['FirewallVpcZoneId'] = request.firewall_vpc_zone_id
|
|
1659
1663
|
if not UtilClient.is_unset(request.lang):
|
|
@@ -4439,7 +4443,7 @@ class Client(OpenApiClient):
|
|
|
4439
4443
|
runtime: util_models.RuntimeOptions,
|
|
4440
4444
|
) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
|
|
4441
4445
|
"""
|
|
4442
|
-
@summary Queries the default
|
|
4446
|
+
@summary Queries the default intrusion prevention system (IPS) configurations.
|
|
4443
4447
|
|
|
4444
4448
|
@param request: DescribeDefaultIPSConfigRequest
|
|
4445
4449
|
@param runtime: runtime options for this request RuntimeOptions
|
|
@@ -4474,7 +4478,7 @@ class Client(OpenApiClient):
|
|
|
4474
4478
|
runtime: util_models.RuntimeOptions,
|
|
4475
4479
|
) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
|
|
4476
4480
|
"""
|
|
4477
|
-
@summary Queries the default
|
|
4481
|
+
@summary Queries the default intrusion prevention system (IPS) configurations.
|
|
4478
4482
|
|
|
4479
4483
|
@param request: DescribeDefaultIPSConfigRequest
|
|
4480
4484
|
@param runtime: runtime options for this request RuntimeOptions
|
|
@@ -4508,7 +4512,7 @@ class Client(OpenApiClient):
|
|
|
4508
4512
|
request: cloudfw_20171207_models.DescribeDefaultIPSConfigRequest,
|
|
4509
4513
|
) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
|
|
4510
4514
|
"""
|
|
4511
|
-
@summary Queries the default
|
|
4515
|
+
@summary Queries the default intrusion prevention system (IPS) configurations.
|
|
4512
4516
|
|
|
4513
4517
|
@param request: DescribeDefaultIPSConfigRequest
|
|
4514
4518
|
@return: DescribeDefaultIPSConfigResponse
|
|
@@ -4521,7 +4525,7 @@ class Client(OpenApiClient):
|
|
|
4521
4525
|
request: cloudfw_20171207_models.DescribeDefaultIPSConfigRequest,
|
|
4522
4526
|
) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
|
|
4523
4527
|
"""
|
|
4524
|
-
@summary Queries the default
|
|
4528
|
+
@summary Queries the default intrusion prevention system (IPS) configurations.
|
|
4525
4529
|
|
|
4526
4530
|
@param request: DescribeDefaultIPSConfigRequest
|
|
4527
4531
|
@return: DescribeDefaultIPSConfigResponse
|
|
@@ -8217,6 +8221,8 @@ class Client(OpenApiClient):
|
|
|
8217
8221
|
query['CurrentPage'] = request.current_page
|
|
8218
8222
|
if not UtilClient.is_unset(request.firewall_configure_status):
|
|
8219
8223
|
query['FirewallConfigureStatus'] = request.firewall_configure_status
|
|
8224
|
+
if not UtilClient.is_unset(request.firewall_id):
|
|
8225
|
+
query['FirewallId'] = request.firewall_id
|
|
8220
8226
|
if not UtilClient.is_unset(request.lang):
|
|
8221
8227
|
query['Lang'] = request.lang
|
|
8222
8228
|
if not UtilClient.is_unset(request.page_size):
|
|
@@ -8262,6 +8268,8 @@ class Client(OpenApiClient):
|
|
|
8262
8268
|
query['CurrentPage'] = request.current_page
|
|
8263
8269
|
if not UtilClient.is_unset(request.firewall_configure_status):
|
|
8264
8270
|
query['FirewallConfigureStatus'] = request.firewall_configure_status
|
|
8271
|
+
if not UtilClient.is_unset(request.firewall_id):
|
|
8272
|
+
query['FirewallId'] = request.firewall_id
|
|
8265
8273
|
if not UtilClient.is_unset(request.lang):
|
|
8266
8274
|
query['Lang'] = request.lang
|
|
8267
8275
|
if not UtilClient.is_unset(request.page_size):
|
|
@@ -11037,6 +11045,8 @@ class Client(OpenApiClient):
|
|
|
11037
11045
|
"""
|
|
11038
11046
|
UtilClient.validate_model(request)
|
|
11039
11047
|
query = {}
|
|
11048
|
+
if not UtilClient.is_unset(request.eips):
|
|
11049
|
+
query['Eips'] = request.eips
|
|
11040
11050
|
if not UtilClient.is_unset(request.internet_switch):
|
|
11041
11051
|
query['InternetSwitch'] = request.internet_switch
|
|
11042
11052
|
if not UtilClient.is_unset(request.lang):
|
|
@@ -11080,6 +11090,8 @@ class Client(OpenApiClient):
|
|
|
11080
11090
|
"""
|
|
11081
11091
|
UtilClient.validate_model(request)
|
|
11082
11092
|
query = {}
|
|
11093
|
+
if not UtilClient.is_unset(request.eips):
|
|
11094
|
+
query['Eips'] = request.eips
|
|
11083
11095
|
if not UtilClient.is_unset(request.internet_switch):
|
|
11084
11096
|
query['InternetSwitch'] = request.internet_switch
|
|
11085
11097
|
if not UtilClient.is_unset(request.lang):
|
|
@@ -2483,6 +2483,7 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
|
|
|
2483
2483
|
firewall_switch: str = None,
|
|
2484
2484
|
firewall_vswitch_cidr_block: str = None,
|
|
2485
2485
|
firewall_vpc_cidr_block: str = None,
|
|
2486
|
+
firewall_vpc_standby_zone_id: str = None,
|
|
2486
2487
|
firewall_vpc_zone_id: str = None,
|
|
2487
2488
|
lang: str = None,
|
|
2488
2489
|
member_uid: str = None,
|
|
@@ -2514,6 +2515,10 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
|
|
|
2514
2515
|
#
|
|
2515
2516
|
# > This parameter takes effect only when you create a VPC firewall for the first time in the current CEN instance and region.
|
|
2516
2517
|
self.firewall_vpc_cidr_block = firewall_vpc_cidr_block
|
|
2518
|
+
# The ID of the backup availability zone to which the firewall belongs. The firewall will automatically switch to the backup availability zone to continue running only if the primary availability zone service is unavailable.
|
|
2519
|
+
# If this parameter is not filled, the backup availability zone for the firewall will be automatically assigned.
|
|
2520
|
+
# > This parameter is only effective when creating a VPC firewall for the first time in this CEN region.
|
|
2521
|
+
self.firewall_vpc_standby_zone_id = firewall_vpc_standby_zone_id
|
|
2517
2522
|
# The ID of the zone to which the vSwitch belongs. If your service is latency-sensitive, you can specify the same zone for the vSwitch of the firewall and the vSwitch of your business VPC to minimize latency.
|
|
2518
2523
|
#
|
|
2519
2524
|
# If you do not specify a value, a zone is automatically assigned for the vSwitch.
|
|
@@ -2561,6 +2566,8 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
|
|
|
2561
2566
|
result['FirewallVSwitchCidrBlock'] = self.firewall_vswitch_cidr_block
|
|
2562
2567
|
if self.firewall_vpc_cidr_block is not None:
|
|
2563
2568
|
result['FirewallVpcCidrBlock'] = self.firewall_vpc_cidr_block
|
|
2569
|
+
if self.firewall_vpc_standby_zone_id is not None:
|
|
2570
|
+
result['FirewallVpcStandbyZoneId'] = self.firewall_vpc_standby_zone_id
|
|
2564
2571
|
if self.firewall_vpc_zone_id is not None:
|
|
2565
2572
|
result['FirewallVpcZoneId'] = self.firewall_vpc_zone_id
|
|
2566
2573
|
if self.lang is not None:
|
|
@@ -2587,6 +2594,8 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
|
|
|
2587
2594
|
self.firewall_vswitch_cidr_block = m.get('FirewallVSwitchCidrBlock')
|
|
2588
2595
|
if m.get('FirewallVpcCidrBlock') is not None:
|
|
2589
2596
|
self.firewall_vpc_cidr_block = m.get('FirewallVpcCidrBlock')
|
|
2597
|
+
if m.get('FirewallVpcStandbyZoneId') is not None:
|
|
2598
|
+
self.firewall_vpc_standby_zone_id = m.get('FirewallVpcStandbyZoneId')
|
|
2590
2599
|
if m.get('FirewallVpcZoneId') is not None:
|
|
2591
2600
|
self.firewall_vpc_zone_id = m.get('FirewallVpcZoneId')
|
|
2592
2601
|
if m.get('Lang') is not None:
|
|
@@ -5062,7 +5071,9 @@ class DescribeAddressBookResponseBodyAclsAddresses(TeaModel):
|
|
|
5062
5071
|
address: str = None,
|
|
5063
5072
|
note: str = None,
|
|
5064
5073
|
):
|
|
5074
|
+
# Address information in the address book.
|
|
5065
5075
|
self.address = address
|
|
5076
|
+
# Single address description.
|
|
5066
5077
|
self.note = note
|
|
5067
5078
|
|
|
5068
5079
|
def validate(self):
|
|
@@ -5143,6 +5154,7 @@ class DescribeAddressBookResponseBodyAcls(TeaModel):
|
|
|
5143
5154
|
self.address_list = address_list
|
|
5144
5155
|
# The number of addresses in the address book.
|
|
5145
5156
|
self.address_list_count = address_list_count
|
|
5157
|
+
# A list of addresses in the address book, each with a single address description.
|
|
5146
5158
|
self.addresses = addresses
|
|
5147
5159
|
# Indicates whether the public IP addresses of ECS instances are automatically added to the address book if the instances match the specified tags. The setting takes effect on both newly purchased ECS instances whose tag settings are complete and ECS instances whose tag settings are modified. Valid values:
|
|
5148
5160
|
#
|
|
@@ -7083,7 +7095,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
|
|
|
7083
7095
|
self,
|
|
7084
7096
|
basic_rules: int = None,
|
|
7085
7097
|
cti_rules: int = None,
|
|
7086
|
-
free_trail_status: str = None,
|
|
7087
7098
|
max_sdl: int = None,
|
|
7088
7099
|
patch_rules: int = None,
|
|
7089
7100
|
request_id: str = None,
|
|
@@ -7100,7 +7111,7 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
|
|
|
7100
7111
|
# * **1**: yes
|
|
7101
7112
|
# * **0**: no
|
|
7102
7113
|
self.cti_rules = cti_rules
|
|
7103
|
-
|
|
7114
|
+
# The maximum amount of traffic that can be processed by the sensitive data leak detection feature each day.
|
|
7104
7115
|
self.max_sdl = max_sdl
|
|
7105
7116
|
# Indicates whether virtual patching is enabled. Valid values:
|
|
7106
7117
|
#
|
|
@@ -7134,8 +7145,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
|
|
|
7134
7145
|
result['BasicRules'] = self.basic_rules
|
|
7135
7146
|
if self.cti_rules is not None:
|
|
7136
7147
|
result['CtiRules'] = self.cti_rules
|
|
7137
|
-
if self.free_trail_status is not None:
|
|
7138
|
-
result['FreeTrailStatus'] = self.free_trail_status
|
|
7139
7148
|
if self.max_sdl is not None:
|
|
7140
7149
|
result['MaxSdl'] = self.max_sdl
|
|
7141
7150
|
if self.patch_rules is not None:
|
|
@@ -7154,8 +7163,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
|
|
|
7154
7163
|
self.basic_rules = m.get('BasicRules')
|
|
7155
7164
|
if m.get('CtiRules') is not None:
|
|
7156
7165
|
self.cti_rules = m.get('CtiRules')
|
|
7157
|
-
if m.get('FreeTrailStatus') is not None:
|
|
7158
|
-
self.free_trail_status = m.get('FreeTrailStatus')
|
|
7159
7166
|
if m.get('MaxSdl') is not None:
|
|
7160
7167
|
self.max_sdl = m.get('MaxSdl')
|
|
7161
7168
|
if m.get('PatchRules') is not None:
|
|
@@ -12665,7 +12672,9 @@ class DescribePostpayTrafficTotalResponseBody(TeaModel):
|
|
|
12665
12672
|
self.total_nat_assets = total_nat_assets
|
|
12666
12673
|
# The total traffic for NAT firewalls. If you use Cloud Firewall that uses the subscription billing method, this parameter indicates the total volume of burstable protected traffic on the NAT boundary. Unit: bytes.
|
|
12667
12674
|
self.total_nat_traffic = total_nat_traffic
|
|
12675
|
+
# Data Leak Detection Total Fee Flow.
|
|
12668
12676
|
self.total_sdl_bill_traffic = total_sdl_bill_traffic
|
|
12677
|
+
# Data Leak Detection Total free usage traffic.
|
|
12669
12678
|
self.total_sdl_free_traffic = total_sdl_free_traffic
|
|
12670
12679
|
# The total volume of traffic. If you use Cloud Firewall that uses the subscription billing method, this parameter indicates the total volume of burstable protected traffic. Unit: bytes.
|
|
12671
12680
|
self.total_traffic = total_traffic
|
|
@@ -14031,6 +14040,7 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
|
|
|
14031
14040
|
def __init__(
|
|
14032
14041
|
self,
|
|
14033
14042
|
type: str = None,
|
|
14043
|
+
update_time: int = None,
|
|
14034
14044
|
version: str = None,
|
|
14035
14045
|
):
|
|
14036
14046
|
# The type.
|
|
@@ -14063,6 +14073,7 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
|
|
|
14063
14073
|
#
|
|
14064
14074
|
# <!-- -->
|
|
14065
14075
|
self.type = type
|
|
14076
|
+
self.update_time = update_time
|
|
14066
14077
|
# The version number.
|
|
14067
14078
|
self.version = version
|
|
14068
14079
|
|
|
@@ -14077,6 +14088,8 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
|
|
|
14077
14088
|
result = dict()
|
|
14078
14089
|
if self.type is not None:
|
|
14079
14090
|
result['Type'] = self.type
|
|
14091
|
+
if self.update_time is not None:
|
|
14092
|
+
result['UpdateTime'] = self.update_time
|
|
14080
14093
|
if self.version is not None:
|
|
14081
14094
|
result['Version'] = self.version
|
|
14082
14095
|
return result
|
|
@@ -14085,6 +14098,8 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
|
|
|
14085
14098
|
m = m or dict()
|
|
14086
14099
|
if m.get('Type') is not None:
|
|
14087
14100
|
self.type = m.get('Type')
|
|
14101
|
+
if m.get('UpdateTime') is not None:
|
|
14102
|
+
self.update_time = m.get('UpdateTime')
|
|
14088
14103
|
if m.get('Version') is not None:
|
|
14089
14104
|
self.version = m.get('Version')
|
|
14090
14105
|
return self
|
|
@@ -14842,7 +14857,9 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
|
|
|
14842
14857
|
request_id: str = None,
|
|
14843
14858
|
route_mode: str = None,
|
|
14844
14859
|
tr_attachment_master_cidr: str = None,
|
|
14860
|
+
tr_attachment_master_zone: str = None,
|
|
14845
14861
|
tr_attachment_slave_cidr: str = None,
|
|
14862
|
+
tr_attachment_slave_zone: str = None,
|
|
14846
14863
|
transit_router_id: str = None,
|
|
14847
14864
|
):
|
|
14848
14865
|
# The ID of the Cloud Enterprise Network (CEN) instance.
|
|
@@ -14892,8 +14909,10 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
|
|
|
14892
14909
|
self.route_mode = route_mode
|
|
14893
14910
|
# The primary subnet CIDR block that the VPC uses to connect to the transit router in automatic mode.
|
|
14894
14911
|
self.tr_attachment_master_cidr = tr_attachment_master_cidr
|
|
14912
|
+
self.tr_attachment_master_zone = tr_attachment_master_zone
|
|
14895
14913
|
# The secondary subnet CIDR block that the VPC uses to connect to the transit router in automatic mode.
|
|
14896
14914
|
self.tr_attachment_slave_cidr = tr_attachment_slave_cidr
|
|
14915
|
+
self.tr_attachment_slave_zone = tr_attachment_slave_zone
|
|
14897
14916
|
# The ID of the transit router.
|
|
14898
14917
|
self.transit_router_id = transit_router_id
|
|
14899
14918
|
|
|
@@ -14936,8 +14955,12 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
|
|
|
14936
14955
|
result['RouteMode'] = self.route_mode
|
|
14937
14956
|
if self.tr_attachment_master_cidr is not None:
|
|
14938
14957
|
result['TrAttachmentMasterCidr'] = self.tr_attachment_master_cidr
|
|
14958
|
+
if self.tr_attachment_master_zone is not None:
|
|
14959
|
+
result['TrAttachmentMasterZone'] = self.tr_attachment_master_zone
|
|
14939
14960
|
if self.tr_attachment_slave_cidr is not None:
|
|
14940
14961
|
result['TrAttachmentSlaveCidr'] = self.tr_attachment_slave_cidr
|
|
14962
|
+
if self.tr_attachment_slave_zone is not None:
|
|
14963
|
+
result['TrAttachmentSlaveZone'] = self.tr_attachment_slave_zone
|
|
14941
14964
|
if self.transit_router_id is not None:
|
|
14942
14965
|
result['TransitRouterId'] = self.transit_router_id
|
|
14943
14966
|
return result
|
|
@@ -14974,8 +14997,12 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
|
|
|
14974
14997
|
self.route_mode = m.get('RouteMode')
|
|
14975
14998
|
if m.get('TrAttachmentMasterCidr') is not None:
|
|
14976
14999
|
self.tr_attachment_master_cidr = m.get('TrAttachmentMasterCidr')
|
|
15000
|
+
if m.get('TrAttachmentMasterZone') is not None:
|
|
15001
|
+
self.tr_attachment_master_zone = m.get('TrAttachmentMasterZone')
|
|
14977
15002
|
if m.get('TrAttachmentSlaveCidr') is not None:
|
|
14978
15003
|
self.tr_attachment_slave_cidr = m.get('TrAttachmentSlaveCidr')
|
|
15004
|
+
if m.get('TrAttachmentSlaveZone') is not None:
|
|
15005
|
+
self.tr_attachment_slave_zone = m.get('TrAttachmentSlaveZone')
|
|
14979
15006
|
if m.get('TransitRouterId') is not None:
|
|
14980
15007
|
self.transit_router_id = m.get('TransitRouterId')
|
|
14981
15008
|
return self
|
|
@@ -15137,6 +15164,33 @@ class DescribeTrFirewallsV2ListRequest(TeaModel):
|
|
|
15137
15164
|
return self
|
|
15138
15165
|
|
|
15139
15166
|
|
|
15167
|
+
class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig(TeaModel):
|
|
15168
|
+
def __init__(
|
|
15169
|
+
self,
|
|
15170
|
+
strict_mode: int = None,
|
|
15171
|
+
):
|
|
15172
|
+
self.strict_mode = strict_mode
|
|
15173
|
+
|
|
15174
|
+
def validate(self):
|
|
15175
|
+
pass
|
|
15176
|
+
|
|
15177
|
+
def to_map(self):
|
|
15178
|
+
_map = super().to_map()
|
|
15179
|
+
if _map is not None:
|
|
15180
|
+
return _map
|
|
15181
|
+
|
|
15182
|
+
result = dict()
|
|
15183
|
+
if self.strict_mode is not None:
|
|
15184
|
+
result['StrictMode'] = self.strict_mode
|
|
15185
|
+
return result
|
|
15186
|
+
|
|
15187
|
+
def from_map(self, m: dict = None):
|
|
15188
|
+
m = m or dict()
|
|
15189
|
+
if m.get('StrictMode') is not None:
|
|
15190
|
+
self.strict_mode = m.get('StrictMode')
|
|
15191
|
+
return self
|
|
15192
|
+
|
|
15193
|
+
|
|
15140
15194
|
class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsIpsConfig(TeaModel):
|
|
15141
15195
|
def __init__(
|
|
15142
15196
|
self,
|
|
@@ -15328,6 +15382,7 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsUnprotectedResource(Tea
|
|
|
15328
15382
|
class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
|
|
15329
15383
|
def __init__(
|
|
15330
15384
|
self,
|
|
15385
|
+
acl_config: DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig = None,
|
|
15331
15386
|
cen_id: str = None,
|
|
15332
15387
|
cen_name: str = None,
|
|
15333
15388
|
cloud_firewall_vpc_order_type: str = None,
|
|
@@ -15345,6 +15400,7 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
|
|
|
15345
15400
|
unprotected_resource: DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsUnprotectedResource = None,
|
|
15346
15401
|
vpc_firewall_name: str = None,
|
|
15347
15402
|
):
|
|
15403
|
+
self.acl_config = acl_config
|
|
15348
15404
|
# The ID of the CEN instance.
|
|
15349
15405
|
self.cen_id = cen_id
|
|
15350
15406
|
# The name of the CEN instance.
|
|
@@ -15405,6 +15461,8 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
|
|
|
15405
15461
|
self.vpc_firewall_name = vpc_firewall_name
|
|
15406
15462
|
|
|
15407
15463
|
def validate(self):
|
|
15464
|
+
if self.acl_config:
|
|
15465
|
+
self.acl_config.validate()
|
|
15408
15466
|
if self.ips_config:
|
|
15409
15467
|
self.ips_config.validate()
|
|
15410
15468
|
if self.protected_resource:
|
|
@@ -15418,6 +15476,8 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
|
|
|
15418
15476
|
return _map
|
|
15419
15477
|
|
|
15420
15478
|
result = dict()
|
|
15479
|
+
if self.acl_config is not None:
|
|
15480
|
+
result['AclConfig'] = self.acl_config.to_map()
|
|
15421
15481
|
if self.cen_id is not None:
|
|
15422
15482
|
result['CenId'] = self.cen_id
|
|
15423
15483
|
if self.cen_name is not None:
|
|
@@ -15454,6 +15514,9 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
|
|
|
15454
15514
|
|
|
15455
15515
|
def from_map(self, m: dict = None):
|
|
15456
15516
|
m = m or dict()
|
|
15517
|
+
if m.get('AclConfig') is not None:
|
|
15518
|
+
temp_model = DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig()
|
|
15519
|
+
self.acl_config = temp_model.from_map(m['AclConfig'])
|
|
15457
15520
|
if m.get('CenId') is not None:
|
|
15458
15521
|
self.cen_id = m.get('CenId')
|
|
15459
15522
|
if m.get('CenName') is not None:
|
|
@@ -16017,6 +16080,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
|
|
|
16017
16080
|
# * **abnormal**: An exception occurs in Cloud Firewall.
|
|
16018
16081
|
# * **free**: Cloud Firewall is invalid.
|
|
16019
16082
|
self.instance_status = instance_status
|
|
16083
|
+
# The peak Internet traffic that can be protected.
|
|
16020
16084
|
self.internet_bandwidth = internet_bandwidth
|
|
16021
16085
|
# The number of public IP addresses that can be protected.
|
|
16022
16086
|
#
|
|
@@ -16038,6 +16102,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
|
|
|
16038
16102
|
#
|
|
16039
16103
|
# > This parameter takes effect only for Cloud Firewall that uses the subscription billing method.
|
|
16040
16104
|
self.max_overflow = max_overflow
|
|
16105
|
+
# The peak traffic of NAT private network that can be protected.
|
|
16041
16106
|
self.nat_bandwidth = nat_bandwidth
|
|
16042
16107
|
# The request ID.
|
|
16043
16108
|
self.request_id = request_id
|
|
@@ -16057,6 +16122,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
|
|
|
16057
16122
|
# * **4**: Ultimate Edition.
|
|
16058
16123
|
# * **10**: Cloud Firewall that uses the pay-as-you-go billing method.
|
|
16059
16124
|
self.version = version
|
|
16125
|
+
# The peak cross-VPC traffic that can be protected.
|
|
16060
16126
|
self.vpc_bandwidth = vpc_bandwidth
|
|
16061
16127
|
# The number of virtual private clouds (VPCs) that can be protected.
|
|
16062
16128
|
#
|
|
@@ -16421,6 +16487,7 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
|
|
|
16421
16487
|
self,
|
|
16422
16488
|
current_page: str = None,
|
|
16423
16489
|
firewall_configure_status: str = None,
|
|
16490
|
+
firewall_id: str = None,
|
|
16424
16491
|
lang: str = None,
|
|
16425
16492
|
page_size: str = None,
|
|
16426
16493
|
):
|
|
@@ -16432,6 +16499,7 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
|
|
|
16432
16499
|
# * **configured**: VPC firewalls are configured.
|
|
16433
16500
|
# * If you do not specify this parameter, the access control policies of all VPC firewalls are queried.
|
|
16434
16501
|
self.firewall_configure_status = firewall_configure_status
|
|
16502
|
+
self.firewall_id = firewall_id
|
|
16435
16503
|
# The language of the content within the response. Valid values:
|
|
16436
16504
|
#
|
|
16437
16505
|
# * **zh**: Chinese (default)
|
|
@@ -16453,6 +16521,8 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
|
|
|
16453
16521
|
result['CurrentPage'] = self.current_page
|
|
16454
16522
|
if self.firewall_configure_status is not None:
|
|
16455
16523
|
result['FirewallConfigureStatus'] = self.firewall_configure_status
|
|
16524
|
+
if self.firewall_id is not None:
|
|
16525
|
+
result['FirewallId'] = self.firewall_id
|
|
16456
16526
|
if self.lang is not None:
|
|
16457
16527
|
result['Lang'] = self.lang
|
|
16458
16528
|
if self.page_size is not None:
|
|
@@ -16465,6 +16535,8 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
|
|
|
16465
16535
|
self.current_page = m.get('CurrentPage')
|
|
16466
16536
|
if m.get('FirewallConfigureStatus') is not None:
|
|
16467
16537
|
self.firewall_configure_status = m.get('FirewallConfigureStatus')
|
|
16538
|
+
if m.get('FirewallId') is not None:
|
|
16539
|
+
self.firewall_id = m.get('FirewallId')
|
|
16468
16540
|
if m.get('Lang') is not None:
|
|
16469
16541
|
self.lang = m.get('Lang')
|
|
16470
16542
|
if m.get('PageSize') is not None:
|
|
@@ -16472,15 +16544,44 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
|
|
|
16472
16544
|
return self
|
|
16473
16545
|
|
|
16474
16546
|
|
|
16547
|
+
class DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig(TeaModel):
|
|
16548
|
+
def __init__(
|
|
16549
|
+
self,
|
|
16550
|
+
strict_mode: int = None,
|
|
16551
|
+
):
|
|
16552
|
+
self.strict_mode = strict_mode
|
|
16553
|
+
|
|
16554
|
+
def validate(self):
|
|
16555
|
+
pass
|
|
16556
|
+
|
|
16557
|
+
def to_map(self):
|
|
16558
|
+
_map = super().to_map()
|
|
16559
|
+
if _map is not None:
|
|
16560
|
+
return _map
|
|
16561
|
+
|
|
16562
|
+
result = dict()
|
|
16563
|
+
if self.strict_mode is not None:
|
|
16564
|
+
result['StrictMode'] = self.strict_mode
|
|
16565
|
+
return result
|
|
16566
|
+
|
|
16567
|
+
def from_map(self, m: dict = None):
|
|
16568
|
+
m = m or dict()
|
|
16569
|
+
if m.get('StrictMode') is not None:
|
|
16570
|
+
self.strict_mode = m.get('StrictMode')
|
|
16571
|
+
return self
|
|
16572
|
+
|
|
16573
|
+
|
|
16475
16574
|
class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
|
|
16476
16575
|
def __init__(
|
|
16477
16576
|
self,
|
|
16577
|
+
acl_config: DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig = None,
|
|
16478
16578
|
acl_group_id: str = None,
|
|
16479
16579
|
acl_group_name: str = None,
|
|
16480
16580
|
acl_rule_count: int = None,
|
|
16481
16581
|
is_default: bool = None,
|
|
16482
16582
|
member_uid: str = None,
|
|
16483
16583
|
):
|
|
16584
|
+
self.acl_config = acl_config
|
|
16484
16585
|
# The ID of the policy group.
|
|
16485
16586
|
#
|
|
16486
16587
|
# Valid values:
|
|
@@ -16508,7 +16609,8 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
|
|
|
16508
16609
|
self.member_uid = member_uid
|
|
16509
16610
|
|
|
16510
16611
|
def validate(self):
|
|
16511
|
-
|
|
16612
|
+
if self.acl_config:
|
|
16613
|
+
self.acl_config.validate()
|
|
16512
16614
|
|
|
16513
16615
|
def to_map(self):
|
|
16514
16616
|
_map = super().to_map()
|
|
@@ -16516,6 +16618,8 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
|
|
|
16516
16618
|
return _map
|
|
16517
16619
|
|
|
16518
16620
|
result = dict()
|
|
16621
|
+
if self.acl_config is not None:
|
|
16622
|
+
result['AclConfig'] = self.acl_config.to_map()
|
|
16519
16623
|
if self.acl_group_id is not None:
|
|
16520
16624
|
result['AclGroupId'] = self.acl_group_id
|
|
16521
16625
|
if self.acl_group_name is not None:
|
|
@@ -16530,6 +16634,9 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
|
|
|
16530
16634
|
|
|
16531
16635
|
def from_map(self, m: dict = None):
|
|
16532
16636
|
m = m or dict()
|
|
16637
|
+
if m.get('AclConfig') is not None:
|
|
16638
|
+
temp_model = DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig()
|
|
16639
|
+
self.acl_config = temp_model.from_map(m['AclConfig'])
|
|
16533
16640
|
if m.get('AclGroupId') is not None:
|
|
16534
16641
|
self.acl_group_id = m.get('AclGroupId')
|
|
16535
16642
|
if m.get('AclGroupName') is not None:
|
|
@@ -16687,10 +16794,12 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16687
16794
|
def __init__(
|
|
16688
16795
|
self,
|
|
16689
16796
|
allow_configuration: int = None,
|
|
16797
|
+
standby_zone_id: str = None,
|
|
16690
16798
|
vpc_cidr: str = None,
|
|
16691
16799
|
vpc_id: str = None,
|
|
16692
16800
|
vswitch_cidr: str = None,
|
|
16693
16801
|
vswitch_id: str = None,
|
|
16802
|
+
vswitch_zone_id: str = None,
|
|
16694
16803
|
zone_id: str = None,
|
|
16695
16804
|
):
|
|
16696
16805
|
# Indicates whether you can specify a CIDR block when you create a VPC firewall for a Basic Edition transit router of a CEN instance. Valid values:
|
|
@@ -16698,6 +16807,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16698
16807
|
# * **1**: yes
|
|
16699
16808
|
# * **0**: no
|
|
16700
16809
|
self.allow_configuration = allow_configuration
|
|
16810
|
+
# Firewall backup availability zone ID.
|
|
16811
|
+
self.standby_zone_id = standby_zone_id
|
|
16701
16812
|
# The CIDR block of the VPC.
|
|
16702
16813
|
self.vpc_cidr = vpc_cidr
|
|
16703
16814
|
# The VPC ID.
|
|
@@ -16706,6 +16817,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16706
16817
|
self.vswitch_cidr = vswitch_cidr
|
|
16707
16818
|
# The vSwitch ID.
|
|
16708
16819
|
self.vswitch_id = vswitch_id
|
|
16820
|
+
# The availability zone ID of the virtual switch.
|
|
16821
|
+
self.vswitch_zone_id = vswitch_zone_id
|
|
16709
16822
|
# The zone ID.
|
|
16710
16823
|
self.zone_id = zone_id
|
|
16711
16824
|
|
|
@@ -16720,6 +16833,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16720
16833
|
result = dict()
|
|
16721
16834
|
if self.allow_configuration is not None:
|
|
16722
16835
|
result['AllowConfiguration'] = self.allow_configuration
|
|
16836
|
+
if self.standby_zone_id is not None:
|
|
16837
|
+
result['StandbyZoneId'] = self.standby_zone_id
|
|
16723
16838
|
if self.vpc_cidr is not None:
|
|
16724
16839
|
result['VpcCidr'] = self.vpc_cidr
|
|
16725
16840
|
if self.vpc_id is not None:
|
|
@@ -16728,6 +16843,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16728
16843
|
result['VswitchCidr'] = self.vswitch_cidr
|
|
16729
16844
|
if self.vswitch_id is not None:
|
|
16730
16845
|
result['VswitchId'] = self.vswitch_id
|
|
16846
|
+
if self.vswitch_zone_id is not None:
|
|
16847
|
+
result['VswitchZoneId'] = self.vswitch_zone_id
|
|
16731
16848
|
if self.zone_id is not None:
|
|
16732
16849
|
result['ZoneId'] = self.zone_id
|
|
16733
16850
|
return result
|
|
@@ -16736,6 +16853,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16736
16853
|
m = m or dict()
|
|
16737
16854
|
if m.get('AllowConfiguration') is not None:
|
|
16738
16855
|
self.allow_configuration = m.get('AllowConfiguration')
|
|
16856
|
+
if m.get('StandbyZoneId') is not None:
|
|
16857
|
+
self.standby_zone_id = m.get('StandbyZoneId')
|
|
16739
16858
|
if m.get('VpcCidr') is not None:
|
|
16740
16859
|
self.vpc_cidr = m.get('VpcCidr')
|
|
16741
16860
|
if m.get('VpcId') is not None:
|
|
@@ -16744,6 +16863,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
|
|
|
16744
16863
|
self.vswitch_cidr = m.get('VswitchCidr')
|
|
16745
16864
|
if m.get('VswitchId') is not None:
|
|
16746
16865
|
self.vswitch_id = m.get('VswitchId')
|
|
16866
|
+
if m.get('VswitchZoneId') is not None:
|
|
16867
|
+
self.vswitch_zone_id = m.get('VswitchZoneId')
|
|
16747
16868
|
if m.get('ZoneId') is not None:
|
|
16748
16869
|
self.zone_id = m.get('ZoneId')
|
|
16749
16870
|
return self
|
|
@@ -17054,7 +17175,7 @@ class DescribeVpcFirewallCenDetailResponseBody(TeaModel):
|
|
|
17054
17175
|
# * **closed**: disabled
|
|
17055
17176
|
# * **notconfigured**: not configured
|
|
17056
17177
|
self.firewall_switch_status = firewall_switch_status
|
|
17057
|
-
# The VPC
|
|
17178
|
+
# The firewall VPC.
|
|
17058
17179
|
self.firewall_vpc = firewall_vpc
|
|
17059
17180
|
# The details about the VPC.
|
|
17060
17181
|
self.local_vpc = local_vpc
|
|
@@ -17290,6 +17411,33 @@ class DescribeVpcFirewallCenListRequest(TeaModel):
|
|
|
17290
17411
|
return self
|
|
17291
17412
|
|
|
17292
17413
|
|
|
17414
|
+
class DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig(TeaModel):
|
|
17415
|
+
def __init__(
|
|
17416
|
+
self,
|
|
17417
|
+
strict_mode: int = None,
|
|
17418
|
+
):
|
|
17419
|
+
self.strict_mode = strict_mode
|
|
17420
|
+
|
|
17421
|
+
def validate(self):
|
|
17422
|
+
pass
|
|
17423
|
+
|
|
17424
|
+
def to_map(self):
|
|
17425
|
+
_map = super().to_map()
|
|
17426
|
+
if _map is not None:
|
|
17427
|
+
return _map
|
|
17428
|
+
|
|
17429
|
+
result = dict()
|
|
17430
|
+
if self.strict_mode is not None:
|
|
17431
|
+
result['StrictMode'] = self.strict_mode
|
|
17432
|
+
return result
|
|
17433
|
+
|
|
17434
|
+
def from_map(self, m: dict = None):
|
|
17435
|
+
m = m or dict()
|
|
17436
|
+
if m.get('StrictMode') is not None:
|
|
17437
|
+
self.strict_mode = m.get('StrictMode')
|
|
17438
|
+
return self
|
|
17439
|
+
|
|
17440
|
+
|
|
17293
17441
|
class DescribeVpcFirewallCenListResponseBodyVpcFirewallsIpsConfig(TeaModel):
|
|
17294
17442
|
def __init__(
|
|
17295
17443
|
self,
|
|
@@ -17573,6 +17721,7 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewallsLocalVpc(TeaModel):
|
|
|
17573
17721
|
class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
|
|
17574
17722
|
def __init__(
|
|
17575
17723
|
self,
|
|
17724
|
+
acl_config: DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig = None,
|
|
17576
17725
|
cen_id: str = None,
|
|
17577
17726
|
cen_name: str = None,
|
|
17578
17727
|
connect_type: str = None,
|
|
@@ -17586,6 +17735,7 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
|
|
|
17586
17735
|
vpc_firewall_id: str = None,
|
|
17587
17736
|
vpc_firewall_name: str = None,
|
|
17588
17737
|
):
|
|
17738
|
+
self.acl_config = acl_config
|
|
17589
17739
|
# The ID of the CEN instance.
|
|
17590
17740
|
self.cen_id = cen_id
|
|
17591
17741
|
# The name of the CEN instance.
|
|
@@ -17629,6 +17779,8 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
|
|
|
17629
17779
|
self.vpc_firewall_name = vpc_firewall_name
|
|
17630
17780
|
|
|
17631
17781
|
def validate(self):
|
|
17782
|
+
if self.acl_config:
|
|
17783
|
+
self.acl_config.validate()
|
|
17632
17784
|
if self.ips_config:
|
|
17633
17785
|
self.ips_config.validate()
|
|
17634
17786
|
if self.local_vpc:
|
|
@@ -17640,6 +17792,8 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
|
|
|
17640
17792
|
return _map
|
|
17641
17793
|
|
|
17642
17794
|
result = dict()
|
|
17795
|
+
if self.acl_config is not None:
|
|
17796
|
+
result['AclConfig'] = self.acl_config.to_map()
|
|
17643
17797
|
if self.cen_id is not None:
|
|
17644
17798
|
result['CenId'] = self.cen_id
|
|
17645
17799
|
if self.cen_name is not None:
|
|
@@ -17668,6 +17822,9 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
|
|
|
17668
17822
|
|
|
17669
17823
|
def from_map(self, m: dict = None):
|
|
17670
17824
|
m = m or dict()
|
|
17825
|
+
if m.get('AclConfig') is not None:
|
|
17826
|
+
temp_model = DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig()
|
|
17827
|
+
self.acl_config = temp_model.from_map(m['AclConfig'])
|
|
17671
17828
|
if m.get('CenId') is not None:
|
|
17672
17829
|
self.cen_id = m.get('CenId')
|
|
17673
17830
|
if m.get('CenName') is not None:
|
|
@@ -19331,6 +19488,34 @@ class DescribeVpcFirewallListRequest(TeaModel):
|
|
|
19331
19488
|
return self
|
|
19332
19489
|
|
|
19333
19490
|
|
|
19491
|
+
class DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig(TeaModel):
|
|
19492
|
+
def __init__(
|
|
19493
|
+
self,
|
|
19494
|
+
strict_mode: int = None,
|
|
19495
|
+
):
|
|
19496
|
+
# This parameter is required.
|
|
19497
|
+
self.strict_mode = strict_mode
|
|
19498
|
+
|
|
19499
|
+
def validate(self):
|
|
19500
|
+
pass
|
|
19501
|
+
|
|
19502
|
+
def to_map(self):
|
|
19503
|
+
_map = super().to_map()
|
|
19504
|
+
if _map is not None:
|
|
19505
|
+
return _map
|
|
19506
|
+
|
|
19507
|
+
result = dict()
|
|
19508
|
+
if self.strict_mode is not None:
|
|
19509
|
+
result['StrictMode'] = self.strict_mode
|
|
19510
|
+
return result
|
|
19511
|
+
|
|
19512
|
+
def from_map(self, m: dict = None):
|
|
19513
|
+
m = m or dict()
|
|
19514
|
+
if m.get('StrictMode') is not None:
|
|
19515
|
+
self.strict_mode = m.get('StrictMode')
|
|
19516
|
+
return self
|
|
19517
|
+
|
|
19518
|
+
|
|
19334
19519
|
class DescribeVpcFirewallListResponseBodyVpcFirewallsIpsConfig(TeaModel):
|
|
19335
19520
|
def __init__(
|
|
19336
19521
|
self,
|
|
@@ -19694,6 +19879,7 @@ class DescribeVpcFirewallListResponseBodyVpcFirewallsPeerVpc(TeaModel):
|
|
|
19694
19879
|
class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
|
|
19695
19880
|
def __init__(
|
|
19696
19881
|
self,
|
|
19882
|
+
acl_config: DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig = None,
|
|
19697
19883
|
bandwidth: int = None,
|
|
19698
19884
|
connect_sub_type: str = None,
|
|
19699
19885
|
connect_type: str = None,
|
|
@@ -19707,6 +19893,7 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
|
|
|
19707
19893
|
vpc_firewall_id: str = None,
|
|
19708
19894
|
vpc_firewall_name: str = None,
|
|
19709
19895
|
):
|
|
19896
|
+
self.acl_config = acl_config
|
|
19710
19897
|
# The bandwidth of the Express Connect circuit. Unit: Mbit/s.
|
|
19711
19898
|
self.bandwidth = bandwidth
|
|
19712
19899
|
# The sub-type of the connection. Valid values:
|
|
@@ -19747,6 +19934,8 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
|
|
|
19747
19934
|
self.vpc_firewall_name = vpc_firewall_name
|
|
19748
19935
|
|
|
19749
19936
|
def validate(self):
|
|
19937
|
+
if self.acl_config:
|
|
19938
|
+
self.acl_config.validate()
|
|
19750
19939
|
if self.ips_config:
|
|
19751
19940
|
self.ips_config.validate()
|
|
19752
19941
|
if self.local_vpc:
|
|
@@ -19760,6 +19949,8 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
|
|
|
19760
19949
|
return _map
|
|
19761
19950
|
|
|
19762
19951
|
result = dict()
|
|
19952
|
+
if self.acl_config is not None:
|
|
19953
|
+
result['AclConfig'] = self.acl_config.to_map()
|
|
19763
19954
|
if self.bandwidth is not None:
|
|
19764
19955
|
result['Bandwidth'] = self.bandwidth
|
|
19765
19956
|
if self.connect_sub_type is not None:
|
|
@@ -19788,6 +19979,9 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
|
|
|
19788
19979
|
|
|
19789
19980
|
def from_map(self, m: dict = None):
|
|
19790
19981
|
m = m or dict()
|
|
19982
|
+
if m.get('AclConfig') is not None:
|
|
19983
|
+
temp_model = DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig()
|
|
19984
|
+
self.acl_config = temp_model.from_map(m['AclConfig'])
|
|
19791
19985
|
if m.get('Bandwidth') is not None:
|
|
19792
19986
|
self.bandwidth = m.get('Bandwidth')
|
|
19793
19987
|
if m.get('ConnectSubType') is not None:
|
|
@@ -21267,8 +21461,6 @@ class ModifyControlPolicyRequest(TeaModel):
|
|
|
21267
21461
|
# * **accept**: allows the traffic.
|
|
21268
21462
|
# * **drop**: denies the traffic.
|
|
21269
21463
|
# * **log**: monitors the traffic.
|
|
21270
|
-
#
|
|
21271
|
-
# This parameter is required.
|
|
21272
21464
|
self.acl_action = acl_action
|
|
21273
21465
|
# The UUID of the access control policy.
|
|
21274
21466
|
#
|
|
@@ -21302,8 +21494,6 @@ class ModifyControlPolicyRequest(TeaModel):
|
|
|
21302
21494
|
# > You must specify one of the ApplicationNameList and ApplicationName parameters. If you configure both ApplicationNameList and ApplicationName, only the value of ApplicationNameList is used.
|
|
21303
21495
|
self.application_name_list = application_name_list
|
|
21304
21496
|
# The description of the access control policy.
|
|
21305
|
-
#
|
|
21306
|
-
# This parameter is required.
|
|
21307
21497
|
self.description = description
|
|
21308
21498
|
# The destination port in the access control policy.
|
|
21309
21499
|
self.dest_port = dest_port
|
|
@@ -21320,8 +21510,6 @@ class ModifyControlPolicyRequest(TeaModel):
|
|
|
21320
21510
|
# * If **DestinationType** is set to group, the value of **Destination** is an address book. Example: db_group.
|
|
21321
21511
|
# * If **DestinationType** is set to domain, the value of **Destination** is a domain name. Example: \\*.aliyuncs.com.
|
|
21322
21512
|
# * If **DestinationType** is set to location, the value of **Destination** is a location. For more information about the location codes, see the "AddControlPolicy" topic. Example: ["BJ11", "ZB"].
|
|
21323
|
-
#
|
|
21324
|
-
# This parameter is required.
|
|
21325
21513
|
self.destination = destination
|
|
21326
21514
|
# The type of the destination address in the access control policy. Valid values:
|
|
21327
21515
|
#
|
|
@@ -21329,15 +21517,11 @@ class ModifyControlPolicyRequest(TeaModel):
|
|
|
21329
21517
|
# * **group**: address book
|
|
21330
21518
|
# * **domain**: domain name
|
|
21331
21519
|
# * **location**: location
|
|
21332
|
-
#
|
|
21333
|
-
# This parameter is required.
|
|
21334
21520
|
self.destination_type = destination_type
|
|
21335
21521
|
# The direction of the traffic to which the access control policy applies. Valid values:
|
|
21336
21522
|
#
|
|
21337
21523
|
# * **in**: inbound traffic
|
|
21338
21524
|
# * **out**: outbound traffic
|
|
21339
|
-
#
|
|
21340
|
-
# This parameter is required.
|
|
21341
21525
|
self.direction = direction
|
|
21342
21526
|
# The domain name resolution method of the access control policy. By default, an access control policy is enabled after the policy is created. Valid values:
|
|
21343
21527
|
#
|
|
@@ -21364,8 +21548,6 @@ class ModifyControlPolicyRequest(TeaModel):
|
|
|
21364
21548
|
# > The value **ANY** indicates all types of applications.
|
|
21365
21549
|
#
|
|
21366
21550
|
# > If the traffic direction is outbound and the destination address is a threat intelligence address book of the domain name type or a cloud service address book, you can set Proto to TCP or ANY. If you set Proto to TCP, you can set ApplicationName to HTTP, HTTPS, SMTP, SMTPS, and SSL. If you set Proto to ANY, you can set ApplicationName to ANY.
|
|
21367
|
-
#
|
|
21368
|
-
# This parameter is required.
|
|
21369
21551
|
self.proto = proto
|
|
21370
21552
|
# The status of the access control policy. Valid values:
|
|
21371
21553
|
#
|
|
@@ -21404,16 +21586,12 @@ class ModifyControlPolicyRequest(TeaModel):
|
|
|
21404
21586
|
# * If **SourceType** is set to net, the value of **Source** is a CIDR block. Example: 1.2.XX.XX/24.
|
|
21405
21587
|
# * If **SourceType** is set to group, the value of **Source** is an address book. Example: db_group.
|
|
21406
21588
|
# * If **SourceType** is set to location, the value of **Source** is a location. For more information about the location codes, see the "AddControlPolicy" topic. Example: ["BJ11", "ZB"]
|
|
21407
|
-
#
|
|
21408
|
-
# This parameter is required.
|
|
21409
21589
|
self.source = source
|
|
21410
21590
|
# The type of the source address in the access control policy. Valid values:
|
|
21411
21591
|
#
|
|
21412
21592
|
# * **net**: CIDR block
|
|
21413
21593
|
# * **group**: address book
|
|
21414
21594
|
# * **location**: location
|
|
21415
|
-
#
|
|
21416
|
-
# This parameter is required.
|
|
21417
21595
|
self.source_type = source_type
|
|
21418
21596
|
# The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
|
|
21419
21597
|
#
|
|
@@ -21739,33 +21917,30 @@ class ModifyControlPolicyPositionResponse(TeaModel):
|
|
|
21739
21917
|
class ModifyDefaultIPSConfigRequest(TeaModel):
|
|
21740
21918
|
def __init__(
|
|
21741
21919
|
self,
|
|
21742
|
-
basic_rules:
|
|
21743
|
-
cti_rules:
|
|
21920
|
+
basic_rules: int = None,
|
|
21921
|
+
cti_rules: int = None,
|
|
21744
21922
|
lang: str = None,
|
|
21745
21923
|
max_sdl: int = None,
|
|
21746
|
-
patch_rules:
|
|
21747
|
-
rule_class:
|
|
21748
|
-
run_mode:
|
|
21924
|
+
patch_rules: int = None,
|
|
21925
|
+
rule_class: int = None,
|
|
21926
|
+
run_mode: int = None,
|
|
21749
21927
|
):
|
|
21750
21928
|
# Specifies whether to enable basic protection. Valid values:
|
|
21751
21929
|
#
|
|
21752
21930
|
# * **1**: yes
|
|
21753
21931
|
# * **0**: no
|
|
21754
|
-
#
|
|
21755
|
-
# This parameter is required.
|
|
21756
21932
|
self.basic_rules = basic_rules
|
|
21757
21933
|
# Specifies whether to enable threat intelligence. Valid values:
|
|
21758
21934
|
#
|
|
21759
21935
|
# * **1**: yes
|
|
21760
21936
|
# * **0**: no
|
|
21761
|
-
#
|
|
21762
|
-
# This parameter is required.
|
|
21763
21937
|
self.cti_rules = cti_rules
|
|
21764
21938
|
# The language of the content within the request and response. Valid values:
|
|
21765
21939
|
#
|
|
21766
21940
|
# * **zh** (default)
|
|
21767
21941
|
# * **en**\
|
|
21768
21942
|
self.lang = lang
|
|
21943
|
+
# The maximum amount of traffic that can be processed by the sensitive data leak detection feature each day.
|
|
21769
21944
|
self.max_sdl = max_sdl
|
|
21770
21945
|
# Specifies whether to enable virtual patching. Valid values:
|
|
21771
21946
|
#
|
|
@@ -22211,8 +22386,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
|
|
|
22211
22386
|
# * **accept**: allows the traffic.
|
|
22212
22387
|
# * **drop**: denies the traffic.
|
|
22213
22388
|
# * **log**: monitors the traffic.
|
|
22214
|
-
#
|
|
22215
|
-
# This parameter is required.
|
|
22216
22389
|
self.acl_action = acl_action
|
|
22217
22390
|
# The UUID of the access control policy.
|
|
22218
22391
|
#
|
|
@@ -22225,8 +22398,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
|
|
|
22225
22398
|
# The description of the access control policy. Fuzzy match is supported.
|
|
22226
22399
|
#
|
|
22227
22400
|
# > If you do not specify this parameter, the descriptions of all policies are queried.
|
|
22228
|
-
#
|
|
22229
|
-
# This parameter is required.
|
|
22230
22401
|
self.description = description
|
|
22231
22402
|
# The destination port in the access control policy.
|
|
22232
22403
|
#
|
|
@@ -22245,8 +22416,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
|
|
|
22245
22416
|
# * If **DestinationType** is set to group, the value of **Destination** is an address book. Example: db_group
|
|
22246
22417
|
# * If **DestinationType** is set to domain, the value of **Destination** is a domain name. Example: \\*.aliyuncs.com
|
|
22247
22418
|
# * If **DestinationType** is set to location, the value of **Destination** is a location. For more information about the location codes, see the "AddControlPolicy" topic. Example: ["BJ11", "ZB"]
|
|
22248
|
-
#
|
|
22249
|
-
# This parameter is required.
|
|
22250
22419
|
self.destination = destination
|
|
22251
22420
|
# The type of the destination address in the access control policy. Valid values:
|
|
22252
22421
|
#
|
|
@@ -22254,8 +22423,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
|
|
|
22254
22423
|
# * **group**: address book
|
|
22255
22424
|
# * **domain**: domain name
|
|
22256
22425
|
# * **location**: destination location
|
|
22257
|
-
#
|
|
22258
|
-
# This parameter is required.
|
|
22259
22426
|
self.destination_type = destination_type
|
|
22260
22427
|
# The direction of the traffic to which the access control policy applies. Valid value:
|
|
22261
22428
|
#
|
|
@@ -22290,8 +22457,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
|
|
|
22290
22457
|
# > The value **ANY** indicates all types of applications.
|
|
22291
22458
|
#
|
|
22292
22459
|
# > If the destination address type is a threat intelligence address book of the domain name type or a cloud service address book, you can set Proto to TCP. If you set Proto to TCP, you can set application types to HTTP, HTTPS, SMTP, SMTPS, and SSL.
|
|
22293
|
-
#
|
|
22294
|
-
# This parameter is required.
|
|
22295
22460
|
self.proto = proto
|
|
22296
22461
|
# The status of the access control policy. Valid values:
|
|
22297
22462
|
#
|
|
@@ -22329,15 +22494,11 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
|
|
|
22329
22494
|
#
|
|
22330
22495
|
# * If **SourceType** is set to `net`, the value of this parameter is a CIDR block. Example: 10.2.XX.XX/24.
|
|
22331
22496
|
# * If **SourceType** is set to `group`, the value of this parameter is an address book name. Example: db_group.
|
|
22332
|
-
#
|
|
22333
|
-
# This parameter is required.
|
|
22334
22497
|
self.source = source
|
|
22335
22498
|
# The type of the source address in the access control policy. Valid values:
|
|
22336
22499
|
#
|
|
22337
22500
|
# * **net**: CIDR block
|
|
22338
22501
|
# * **group**: address book
|
|
22339
|
-
#
|
|
22340
|
-
# This parameter is required.
|
|
22341
22502
|
self.source_type = source_type
|
|
22342
22503
|
# The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
|
|
22343
22504
|
#
|
|
@@ -22831,10 +22992,12 @@ class ModifyObjectGroupOperationResponse(TeaModel):
|
|
|
22831
22992
|
class ModifyPolicyAdvancedConfigRequest(TeaModel):
|
|
22832
22993
|
def __init__(
|
|
22833
22994
|
self,
|
|
22995
|
+
eips: List[str] = None,
|
|
22834
22996
|
internet_switch: str = None,
|
|
22835
22997
|
lang: str = None,
|
|
22836
22998
|
source_ip: str = None,
|
|
22837
22999
|
):
|
|
23000
|
+
self.eips = eips
|
|
22838
23001
|
# Specifies whether to enable the strict mode for the access control policy. Valid values:
|
|
22839
23002
|
#
|
|
22840
23003
|
# * **on**: enables the strict mode.
|
|
@@ -22859,6 +23022,8 @@ class ModifyPolicyAdvancedConfigRequest(TeaModel):
|
|
|
22859
23022
|
return _map
|
|
22860
23023
|
|
|
22861
23024
|
result = dict()
|
|
23025
|
+
if self.eips is not None:
|
|
23026
|
+
result['Eips'] = self.eips
|
|
22862
23027
|
if self.internet_switch is not None:
|
|
22863
23028
|
result['InternetSwitch'] = self.internet_switch
|
|
22864
23029
|
if self.lang is not None:
|
|
@@ -22869,6 +23034,8 @@ class ModifyPolicyAdvancedConfigRequest(TeaModel):
|
|
|
22869
23034
|
|
|
22870
23035
|
def from_map(self, m: dict = None):
|
|
22871
23036
|
m = m or dict()
|
|
23037
|
+
if m.get('Eips') is not None:
|
|
23038
|
+
self.eips = m.get('Eips')
|
|
22872
23039
|
if m.get('InternetSwitch') is not None:
|
|
22873
23040
|
self.internet_switch = m.get('InternetSwitch')
|
|
22874
23041
|
if m.get('Lang') is not None:
|
|
@@ -23947,8 +24114,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
23947
24114
|
# * **accept**: allows the traffic.
|
|
23948
24115
|
# * **drop**: blocks the traffic.
|
|
23949
24116
|
# * **log**: monitors the traffic.
|
|
23950
|
-
#
|
|
23951
|
-
# This parameter is required.
|
|
23952
24117
|
self.acl_action = acl_action
|
|
23953
24118
|
# The unique ID of the access control policy.
|
|
23954
24119
|
#
|
|
@@ -23979,8 +24144,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
23979
24144
|
# The application names.
|
|
23980
24145
|
self.application_name_list = application_name_list
|
|
23981
24146
|
# The description of the access control policy.
|
|
23982
|
-
#
|
|
23983
|
-
# This parameter is required.
|
|
23984
24147
|
self.description = description
|
|
23985
24148
|
# The destination port in the access control policy.
|
|
23986
24149
|
self.dest_port = dest_port
|
|
@@ -24004,8 +24167,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
24004
24167
|
# * If **DestinationType** is set to `domain`, the value of this parameter must be a domain name.
|
|
24005
24168
|
#
|
|
24006
24169
|
# Example: \\*.aliyuncs.com
|
|
24007
|
-
#
|
|
24008
|
-
# This parameter is required.
|
|
24009
24170
|
self.destination = destination
|
|
24010
24171
|
# The type of the destination address in the access control policy.
|
|
24011
24172
|
#
|
|
@@ -24014,8 +24175,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
24014
24175
|
# * **net**: CIDR block
|
|
24015
24176
|
# * **group**: address book
|
|
24016
24177
|
# * **domain**: domain name
|
|
24017
|
-
#
|
|
24018
|
-
# This parameter is required.
|
|
24019
24178
|
self.destination_type = destination_type
|
|
24020
24179
|
# The domain name resolution method of the access control policy. By default, an access control policy is enabled after the policy is created. Valid values:
|
|
24021
24180
|
#
|
|
@@ -24042,8 +24201,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
24042
24201
|
# * TCP
|
|
24043
24202
|
# * UDP
|
|
24044
24203
|
# * ICMP
|
|
24045
|
-
#
|
|
24046
|
-
# This parameter is required.
|
|
24047
24204
|
self.proto = proto
|
|
24048
24205
|
# Specifies whether to enable the access control policy. By default, an access control policy is enabled after the policy is created. Valid values:
|
|
24049
24206
|
#
|
|
@@ -24088,8 +24245,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
24088
24245
|
# * If **SourceType** is set to `group`, the value of this parameter must be an address book name.
|
|
24089
24246
|
#
|
|
24090
24247
|
# Example: db_group
|
|
24091
|
-
#
|
|
24092
|
-
# This parameter is required.
|
|
24093
24248
|
self.source = source
|
|
24094
24249
|
# The type of the source address in the access control policy.
|
|
24095
24250
|
#
|
|
@@ -24097,8 +24252,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
|
|
|
24097
24252
|
#
|
|
24098
24253
|
# * **net**: CIDR block
|
|
24099
24254
|
# * **group**: address book
|
|
24100
|
-
#
|
|
24101
|
-
# This parameter is required.
|
|
24102
24255
|
self.source_type = source_type
|
|
24103
24256
|
# The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
|
|
24104
24257
|
#
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: alibabacloud-cloudfw20171207
|
|
3
|
-
Version:
|
|
3
|
+
Version: 6.0.0
|
|
4
4
|
Summary: Alibaba Cloud Cloudfw (20171207) SDK Library for Python
|
|
5
5
|
Home-page: https://github.com/aliyun/alibabacloud-python-sdk
|
|
6
6
|
Author: Alibaba Cloud SDK
|
|
@@ -23,7 +23,7 @@ Description-Content-Type: text/markdown
|
|
|
23
23
|
License-File: LICENSE
|
|
24
24
|
Requires-Dist: alibabacloud-endpoint-util (<1.0.0,>=0.0.3)
|
|
25
25
|
Requires-Dist: alibabacloud-openapi-util (<1.0.0,>=0.2.2)
|
|
26
|
-
Requires-Dist: alibabacloud-tea-openapi (<1.0.0,>=0.3.
|
|
26
|
+
Requires-Dist: alibabacloud-tea-openapi (<1.0.0,>=0.3.14)
|
|
27
27
|
Requires-Dist: alibabacloud-tea-util (<1.0.0,>=0.3.13)
|
|
28
28
|
|
|
29
29
|
English | [简体中文](README-CN.md)
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
alibabacloud_cloudfw20171207/__init__.py,sha256=Rkd1gANO4By6zNziV5IlrYVUm6VSKASr3_tojR5k-FE,21
|
|
2
|
+
alibabacloud_cloudfw20171207/client.py,sha256=0yZv5yok8YohvYFK5-fF4OSBIsm76PCl8ybYOFX3i6g,668072
|
|
3
|
+
alibabacloud_cloudfw20171207/models.py,sha256=RFcR4gc6J_izCQ4ktBzupxH6jrTmEpfzvmvixtO5BNU,964464
|
|
4
|
+
alibabacloud_cloudfw20171207-6.0.0.dist-info/LICENSE,sha256=0CFItL6bHvxqS44T6vlLoW2R4Zaic304OO3WxN0oXF0,600
|
|
5
|
+
alibabacloud_cloudfw20171207-6.0.0.dist-info/METADATA,sha256=YcGZgZVj2Nk29FMnTJyEjyerubcOUBNiBcOjHpM69hc,2340
|
|
6
|
+
alibabacloud_cloudfw20171207-6.0.0.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
|
|
7
|
+
alibabacloud_cloudfw20171207-6.0.0.dist-info/top_level.txt,sha256=rry_3PsvxYDan1V9ajGHg5R6j3f8NFiQdy-iZOzl8F4,29
|
|
8
|
+
alibabacloud_cloudfw20171207-6.0.0.dist-info/RECORD,,
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
alibabacloud_cloudfw20171207/__init__.py,sha256=09bPQIE5xdwmGSNTeDXCpFQGPQ3KBQfG1VKKsSIakYw,21
|
|
2
|
-
alibabacloud_cloudfw20171207/client.py,sha256=NRPrGadm7VUbpJdVD5hLjH7bKU03N_fF1hqJ7VhMO8M,667378
|
|
3
|
-
alibabacloud_cloudfw20171207/models.py,sha256=M04IHdKQ-1iH3kfCYU3bWEXYd2pNiV2aQYNOCqHrwQs,957635
|
|
4
|
-
alibabacloud_cloudfw20171207-5.0.3.dist-info/LICENSE,sha256=0CFItL6bHvxqS44T6vlLoW2R4Zaic304OO3WxN0oXF0,600
|
|
5
|
-
alibabacloud_cloudfw20171207-5.0.3.dist-info/METADATA,sha256=x1IHqFJVyctZqlpRyxSQstiZRiRbBL0LhqVnF5ldq9k,2340
|
|
6
|
-
alibabacloud_cloudfw20171207-5.0.3.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
|
|
7
|
-
alibabacloud_cloudfw20171207-5.0.3.dist-info/top_level.txt,sha256=rry_3PsvxYDan1V9ajGHg5R6j3f8NFiQdy-iZOzl8F4,29
|
|
8
|
-
alibabacloud_cloudfw20171207-5.0.3.dist-info/RECORD,,
|
|
File without changes
|
{alibabacloud_cloudfw20171207-5.0.3.dist-info → alibabacloud_cloudfw20171207-6.0.0.dist-info}/WHEEL
RENAMED
|
File without changes
|
|
File without changes
|