alibabacloud-cloudfw20171207 5.0.3__py3-none-any.whl → 6.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of alibabacloud-cloudfw20171207 might be problematic. Click here for more details.

@@ -1 +1 @@
1
- __version__ = '5.0.3'
1
+ __version__ = '6.0.0'
@@ -1595,6 +1595,8 @@ class Client(OpenApiClient):
1595
1595
  query['FirewallVSwitchCidrBlock'] = request.firewall_vswitch_cidr_block
1596
1596
  if not UtilClient.is_unset(request.firewall_vpc_cidr_block):
1597
1597
  query['FirewallVpcCidrBlock'] = request.firewall_vpc_cidr_block
1598
+ if not UtilClient.is_unset(request.firewall_vpc_standby_zone_id):
1599
+ query['FirewallVpcStandbyZoneId'] = request.firewall_vpc_standby_zone_id
1598
1600
  if not UtilClient.is_unset(request.firewall_vpc_zone_id):
1599
1601
  query['FirewallVpcZoneId'] = request.firewall_vpc_zone_id
1600
1602
  if not UtilClient.is_unset(request.lang):
@@ -1654,6 +1656,8 @@ class Client(OpenApiClient):
1654
1656
  query['FirewallVSwitchCidrBlock'] = request.firewall_vswitch_cidr_block
1655
1657
  if not UtilClient.is_unset(request.firewall_vpc_cidr_block):
1656
1658
  query['FirewallVpcCidrBlock'] = request.firewall_vpc_cidr_block
1659
+ if not UtilClient.is_unset(request.firewall_vpc_standby_zone_id):
1660
+ query['FirewallVpcStandbyZoneId'] = request.firewall_vpc_standby_zone_id
1657
1661
  if not UtilClient.is_unset(request.firewall_vpc_zone_id):
1658
1662
  query['FirewallVpcZoneId'] = request.firewall_vpc_zone_id
1659
1663
  if not UtilClient.is_unset(request.lang):
@@ -4439,7 +4443,7 @@ class Client(OpenApiClient):
4439
4443
  runtime: util_models.RuntimeOptions,
4440
4444
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4441
4445
  """
4442
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4446
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4443
4447
 
4444
4448
  @param request: DescribeDefaultIPSConfigRequest
4445
4449
  @param runtime: runtime options for this request RuntimeOptions
@@ -4474,7 +4478,7 @@ class Client(OpenApiClient):
4474
4478
  runtime: util_models.RuntimeOptions,
4475
4479
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4476
4480
  """
4477
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4481
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4478
4482
 
4479
4483
  @param request: DescribeDefaultIPSConfigRequest
4480
4484
  @param runtime: runtime options for this request RuntimeOptions
@@ -4508,7 +4512,7 @@ class Client(OpenApiClient):
4508
4512
  request: cloudfw_20171207_models.DescribeDefaultIPSConfigRequest,
4509
4513
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4510
4514
  """
4511
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4515
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4512
4516
 
4513
4517
  @param request: DescribeDefaultIPSConfigRequest
4514
4518
  @return: DescribeDefaultIPSConfigResponse
@@ -4521,7 +4525,7 @@ class Client(OpenApiClient):
4521
4525
  request: cloudfw_20171207_models.DescribeDefaultIPSConfigRequest,
4522
4526
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4523
4527
  """
4524
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4528
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4525
4529
 
4526
4530
  @param request: DescribeDefaultIPSConfigRequest
4527
4531
  @return: DescribeDefaultIPSConfigResponse
@@ -8217,6 +8221,8 @@ class Client(OpenApiClient):
8217
8221
  query['CurrentPage'] = request.current_page
8218
8222
  if not UtilClient.is_unset(request.firewall_configure_status):
8219
8223
  query['FirewallConfigureStatus'] = request.firewall_configure_status
8224
+ if not UtilClient.is_unset(request.firewall_id):
8225
+ query['FirewallId'] = request.firewall_id
8220
8226
  if not UtilClient.is_unset(request.lang):
8221
8227
  query['Lang'] = request.lang
8222
8228
  if not UtilClient.is_unset(request.page_size):
@@ -8262,6 +8268,8 @@ class Client(OpenApiClient):
8262
8268
  query['CurrentPage'] = request.current_page
8263
8269
  if not UtilClient.is_unset(request.firewall_configure_status):
8264
8270
  query['FirewallConfigureStatus'] = request.firewall_configure_status
8271
+ if not UtilClient.is_unset(request.firewall_id):
8272
+ query['FirewallId'] = request.firewall_id
8265
8273
  if not UtilClient.is_unset(request.lang):
8266
8274
  query['Lang'] = request.lang
8267
8275
  if not UtilClient.is_unset(request.page_size):
@@ -11037,6 +11045,8 @@ class Client(OpenApiClient):
11037
11045
  """
11038
11046
  UtilClient.validate_model(request)
11039
11047
  query = {}
11048
+ if not UtilClient.is_unset(request.eips):
11049
+ query['Eips'] = request.eips
11040
11050
  if not UtilClient.is_unset(request.internet_switch):
11041
11051
  query['InternetSwitch'] = request.internet_switch
11042
11052
  if not UtilClient.is_unset(request.lang):
@@ -11080,6 +11090,8 @@ class Client(OpenApiClient):
11080
11090
  """
11081
11091
  UtilClient.validate_model(request)
11082
11092
  query = {}
11093
+ if not UtilClient.is_unset(request.eips):
11094
+ query['Eips'] = request.eips
11083
11095
  if not UtilClient.is_unset(request.internet_switch):
11084
11096
  query['InternetSwitch'] = request.internet_switch
11085
11097
  if not UtilClient.is_unset(request.lang):
@@ -2483,6 +2483,7 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2483
2483
  firewall_switch: str = None,
2484
2484
  firewall_vswitch_cidr_block: str = None,
2485
2485
  firewall_vpc_cidr_block: str = None,
2486
+ firewall_vpc_standby_zone_id: str = None,
2486
2487
  firewall_vpc_zone_id: str = None,
2487
2488
  lang: str = None,
2488
2489
  member_uid: str = None,
@@ -2514,6 +2515,10 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2514
2515
  #
2515
2516
  # > This parameter takes effect only when you create a VPC firewall for the first time in the current CEN instance and region.
2516
2517
  self.firewall_vpc_cidr_block = firewall_vpc_cidr_block
2518
+ # The ID of the backup availability zone to which the firewall belongs. The firewall will automatically switch to the backup availability zone to continue running only if the primary availability zone service is unavailable.
2519
+ # If this parameter is not filled, the backup availability zone for the firewall will be automatically assigned.
2520
+ # > This parameter is only effective when creating a VPC firewall for the first time in this CEN region.
2521
+ self.firewall_vpc_standby_zone_id = firewall_vpc_standby_zone_id
2517
2522
  # The ID of the zone to which the vSwitch belongs. If your service is latency-sensitive, you can specify the same zone for the vSwitch of the firewall and the vSwitch of your business VPC to minimize latency.
2518
2523
  #
2519
2524
  # If you do not specify a value, a zone is automatically assigned for the vSwitch.
@@ -2561,6 +2566,8 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2561
2566
  result['FirewallVSwitchCidrBlock'] = self.firewall_vswitch_cidr_block
2562
2567
  if self.firewall_vpc_cidr_block is not None:
2563
2568
  result['FirewallVpcCidrBlock'] = self.firewall_vpc_cidr_block
2569
+ if self.firewall_vpc_standby_zone_id is not None:
2570
+ result['FirewallVpcStandbyZoneId'] = self.firewall_vpc_standby_zone_id
2564
2571
  if self.firewall_vpc_zone_id is not None:
2565
2572
  result['FirewallVpcZoneId'] = self.firewall_vpc_zone_id
2566
2573
  if self.lang is not None:
@@ -2587,6 +2594,8 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2587
2594
  self.firewall_vswitch_cidr_block = m.get('FirewallVSwitchCidrBlock')
2588
2595
  if m.get('FirewallVpcCidrBlock') is not None:
2589
2596
  self.firewall_vpc_cidr_block = m.get('FirewallVpcCidrBlock')
2597
+ if m.get('FirewallVpcStandbyZoneId') is not None:
2598
+ self.firewall_vpc_standby_zone_id = m.get('FirewallVpcStandbyZoneId')
2590
2599
  if m.get('FirewallVpcZoneId') is not None:
2591
2600
  self.firewall_vpc_zone_id = m.get('FirewallVpcZoneId')
2592
2601
  if m.get('Lang') is not None:
@@ -5062,7 +5071,9 @@ class DescribeAddressBookResponseBodyAclsAddresses(TeaModel):
5062
5071
  address: str = None,
5063
5072
  note: str = None,
5064
5073
  ):
5074
+ # Address information in the address book.
5065
5075
  self.address = address
5076
+ # Single address description.
5066
5077
  self.note = note
5067
5078
 
5068
5079
  def validate(self):
@@ -5143,6 +5154,7 @@ class DescribeAddressBookResponseBodyAcls(TeaModel):
5143
5154
  self.address_list = address_list
5144
5155
  # The number of addresses in the address book.
5145
5156
  self.address_list_count = address_list_count
5157
+ # A list of addresses in the address book, each with a single address description.
5146
5158
  self.addresses = addresses
5147
5159
  # Indicates whether the public IP addresses of ECS instances are automatically added to the address book if the instances match the specified tags. The setting takes effect on both newly purchased ECS instances whose tag settings are complete and ECS instances whose tag settings are modified. Valid values:
5148
5160
  #
@@ -7083,7 +7095,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7083
7095
  self,
7084
7096
  basic_rules: int = None,
7085
7097
  cti_rules: int = None,
7086
- free_trail_status: str = None,
7087
7098
  max_sdl: int = None,
7088
7099
  patch_rules: int = None,
7089
7100
  request_id: str = None,
@@ -7100,7 +7111,7 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7100
7111
  # * **1**: yes
7101
7112
  # * **0**: no
7102
7113
  self.cti_rules = cti_rules
7103
- self.free_trail_status = free_trail_status
7114
+ # The maximum amount of traffic that can be processed by the sensitive data leak detection feature each day.
7104
7115
  self.max_sdl = max_sdl
7105
7116
  # Indicates whether virtual patching is enabled. Valid values:
7106
7117
  #
@@ -7134,8 +7145,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7134
7145
  result['BasicRules'] = self.basic_rules
7135
7146
  if self.cti_rules is not None:
7136
7147
  result['CtiRules'] = self.cti_rules
7137
- if self.free_trail_status is not None:
7138
- result['FreeTrailStatus'] = self.free_trail_status
7139
7148
  if self.max_sdl is not None:
7140
7149
  result['MaxSdl'] = self.max_sdl
7141
7150
  if self.patch_rules is not None:
@@ -7154,8 +7163,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7154
7163
  self.basic_rules = m.get('BasicRules')
7155
7164
  if m.get('CtiRules') is not None:
7156
7165
  self.cti_rules = m.get('CtiRules')
7157
- if m.get('FreeTrailStatus') is not None:
7158
- self.free_trail_status = m.get('FreeTrailStatus')
7159
7166
  if m.get('MaxSdl') is not None:
7160
7167
  self.max_sdl = m.get('MaxSdl')
7161
7168
  if m.get('PatchRules') is not None:
@@ -12665,7 +12672,9 @@ class DescribePostpayTrafficTotalResponseBody(TeaModel):
12665
12672
  self.total_nat_assets = total_nat_assets
12666
12673
  # The total traffic for NAT firewalls. If you use Cloud Firewall that uses the subscription billing method, this parameter indicates the total volume of burstable protected traffic on the NAT boundary. Unit: bytes.
12667
12674
  self.total_nat_traffic = total_nat_traffic
12675
+ # Data Leak Detection Total Fee Flow.
12668
12676
  self.total_sdl_bill_traffic = total_sdl_bill_traffic
12677
+ # Data Leak Detection Total free usage traffic.
12669
12678
  self.total_sdl_free_traffic = total_sdl_free_traffic
12670
12679
  # The total volume of traffic. If you use Cloud Firewall that uses the subscription billing method, this parameter indicates the total volume of burstable protected traffic. Unit: bytes.
12671
12680
  self.total_traffic = total_traffic
@@ -14031,6 +14040,7 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14031
14040
  def __init__(
14032
14041
  self,
14033
14042
  type: str = None,
14043
+ update_time: int = None,
14034
14044
  version: str = None,
14035
14045
  ):
14036
14046
  # The type.
@@ -14063,6 +14073,7 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14063
14073
  #
14064
14074
  # <!-- -->
14065
14075
  self.type = type
14076
+ self.update_time = update_time
14066
14077
  # The version number.
14067
14078
  self.version = version
14068
14079
 
@@ -14077,6 +14088,8 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14077
14088
  result = dict()
14078
14089
  if self.type is not None:
14079
14090
  result['Type'] = self.type
14091
+ if self.update_time is not None:
14092
+ result['UpdateTime'] = self.update_time
14080
14093
  if self.version is not None:
14081
14094
  result['Version'] = self.version
14082
14095
  return result
@@ -14085,6 +14098,8 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14085
14098
  m = m or dict()
14086
14099
  if m.get('Type') is not None:
14087
14100
  self.type = m.get('Type')
14101
+ if m.get('UpdateTime') is not None:
14102
+ self.update_time = m.get('UpdateTime')
14088
14103
  if m.get('Version') is not None:
14089
14104
  self.version = m.get('Version')
14090
14105
  return self
@@ -14842,7 +14857,9 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14842
14857
  request_id: str = None,
14843
14858
  route_mode: str = None,
14844
14859
  tr_attachment_master_cidr: str = None,
14860
+ tr_attachment_master_zone: str = None,
14845
14861
  tr_attachment_slave_cidr: str = None,
14862
+ tr_attachment_slave_zone: str = None,
14846
14863
  transit_router_id: str = None,
14847
14864
  ):
14848
14865
  # The ID of the Cloud Enterprise Network (CEN) instance.
@@ -14892,8 +14909,10 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14892
14909
  self.route_mode = route_mode
14893
14910
  # The primary subnet CIDR block that the VPC uses to connect to the transit router in automatic mode.
14894
14911
  self.tr_attachment_master_cidr = tr_attachment_master_cidr
14912
+ self.tr_attachment_master_zone = tr_attachment_master_zone
14895
14913
  # The secondary subnet CIDR block that the VPC uses to connect to the transit router in automatic mode.
14896
14914
  self.tr_attachment_slave_cidr = tr_attachment_slave_cidr
14915
+ self.tr_attachment_slave_zone = tr_attachment_slave_zone
14897
14916
  # The ID of the transit router.
14898
14917
  self.transit_router_id = transit_router_id
14899
14918
 
@@ -14936,8 +14955,12 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14936
14955
  result['RouteMode'] = self.route_mode
14937
14956
  if self.tr_attachment_master_cidr is not None:
14938
14957
  result['TrAttachmentMasterCidr'] = self.tr_attachment_master_cidr
14958
+ if self.tr_attachment_master_zone is not None:
14959
+ result['TrAttachmentMasterZone'] = self.tr_attachment_master_zone
14939
14960
  if self.tr_attachment_slave_cidr is not None:
14940
14961
  result['TrAttachmentSlaveCidr'] = self.tr_attachment_slave_cidr
14962
+ if self.tr_attachment_slave_zone is not None:
14963
+ result['TrAttachmentSlaveZone'] = self.tr_attachment_slave_zone
14941
14964
  if self.transit_router_id is not None:
14942
14965
  result['TransitRouterId'] = self.transit_router_id
14943
14966
  return result
@@ -14974,8 +14997,12 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14974
14997
  self.route_mode = m.get('RouteMode')
14975
14998
  if m.get('TrAttachmentMasterCidr') is not None:
14976
14999
  self.tr_attachment_master_cidr = m.get('TrAttachmentMasterCidr')
15000
+ if m.get('TrAttachmentMasterZone') is not None:
15001
+ self.tr_attachment_master_zone = m.get('TrAttachmentMasterZone')
14977
15002
  if m.get('TrAttachmentSlaveCidr') is not None:
14978
15003
  self.tr_attachment_slave_cidr = m.get('TrAttachmentSlaveCidr')
15004
+ if m.get('TrAttachmentSlaveZone') is not None:
15005
+ self.tr_attachment_slave_zone = m.get('TrAttachmentSlaveZone')
14979
15006
  if m.get('TransitRouterId') is not None:
14980
15007
  self.transit_router_id = m.get('TransitRouterId')
14981
15008
  return self
@@ -15137,6 +15164,33 @@ class DescribeTrFirewallsV2ListRequest(TeaModel):
15137
15164
  return self
15138
15165
 
15139
15166
 
15167
+ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig(TeaModel):
15168
+ def __init__(
15169
+ self,
15170
+ strict_mode: int = None,
15171
+ ):
15172
+ self.strict_mode = strict_mode
15173
+
15174
+ def validate(self):
15175
+ pass
15176
+
15177
+ def to_map(self):
15178
+ _map = super().to_map()
15179
+ if _map is not None:
15180
+ return _map
15181
+
15182
+ result = dict()
15183
+ if self.strict_mode is not None:
15184
+ result['StrictMode'] = self.strict_mode
15185
+ return result
15186
+
15187
+ def from_map(self, m: dict = None):
15188
+ m = m or dict()
15189
+ if m.get('StrictMode') is not None:
15190
+ self.strict_mode = m.get('StrictMode')
15191
+ return self
15192
+
15193
+
15140
15194
  class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsIpsConfig(TeaModel):
15141
15195
  def __init__(
15142
15196
  self,
@@ -15328,6 +15382,7 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsUnprotectedResource(Tea
15328
15382
  class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15329
15383
  def __init__(
15330
15384
  self,
15385
+ acl_config: DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig = None,
15331
15386
  cen_id: str = None,
15332
15387
  cen_name: str = None,
15333
15388
  cloud_firewall_vpc_order_type: str = None,
@@ -15345,6 +15400,7 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15345
15400
  unprotected_resource: DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsUnprotectedResource = None,
15346
15401
  vpc_firewall_name: str = None,
15347
15402
  ):
15403
+ self.acl_config = acl_config
15348
15404
  # The ID of the CEN instance.
15349
15405
  self.cen_id = cen_id
15350
15406
  # The name of the CEN instance.
@@ -15405,6 +15461,8 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15405
15461
  self.vpc_firewall_name = vpc_firewall_name
15406
15462
 
15407
15463
  def validate(self):
15464
+ if self.acl_config:
15465
+ self.acl_config.validate()
15408
15466
  if self.ips_config:
15409
15467
  self.ips_config.validate()
15410
15468
  if self.protected_resource:
@@ -15418,6 +15476,8 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15418
15476
  return _map
15419
15477
 
15420
15478
  result = dict()
15479
+ if self.acl_config is not None:
15480
+ result['AclConfig'] = self.acl_config.to_map()
15421
15481
  if self.cen_id is not None:
15422
15482
  result['CenId'] = self.cen_id
15423
15483
  if self.cen_name is not None:
@@ -15454,6 +15514,9 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15454
15514
 
15455
15515
  def from_map(self, m: dict = None):
15456
15516
  m = m or dict()
15517
+ if m.get('AclConfig') is not None:
15518
+ temp_model = DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig()
15519
+ self.acl_config = temp_model.from_map(m['AclConfig'])
15457
15520
  if m.get('CenId') is not None:
15458
15521
  self.cen_id = m.get('CenId')
15459
15522
  if m.get('CenName') is not None:
@@ -16017,6 +16080,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
16017
16080
  # * **abnormal**: An exception occurs in Cloud Firewall.
16018
16081
  # * **free**: Cloud Firewall is invalid.
16019
16082
  self.instance_status = instance_status
16083
+ # The peak Internet traffic that can be protected.
16020
16084
  self.internet_bandwidth = internet_bandwidth
16021
16085
  # The number of public IP addresses that can be protected.
16022
16086
  #
@@ -16038,6 +16102,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
16038
16102
  #
16039
16103
  # > This parameter takes effect only for Cloud Firewall that uses the subscription billing method.
16040
16104
  self.max_overflow = max_overflow
16105
+ # The peak traffic of NAT private network that can be protected.
16041
16106
  self.nat_bandwidth = nat_bandwidth
16042
16107
  # The request ID.
16043
16108
  self.request_id = request_id
@@ -16057,6 +16122,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
16057
16122
  # * **4**: Ultimate Edition.
16058
16123
  # * **10**: Cloud Firewall that uses the pay-as-you-go billing method.
16059
16124
  self.version = version
16125
+ # The peak cross-VPC traffic that can be protected.
16060
16126
  self.vpc_bandwidth = vpc_bandwidth
16061
16127
  # The number of virtual private clouds (VPCs) that can be protected.
16062
16128
  #
@@ -16421,6 +16487,7 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16421
16487
  self,
16422
16488
  current_page: str = None,
16423
16489
  firewall_configure_status: str = None,
16490
+ firewall_id: str = None,
16424
16491
  lang: str = None,
16425
16492
  page_size: str = None,
16426
16493
  ):
@@ -16432,6 +16499,7 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16432
16499
  # * **configured**: VPC firewalls are configured.
16433
16500
  # * If you do not specify this parameter, the access control policies of all VPC firewalls are queried.
16434
16501
  self.firewall_configure_status = firewall_configure_status
16502
+ self.firewall_id = firewall_id
16435
16503
  # The language of the content within the response. Valid values:
16436
16504
  #
16437
16505
  # * **zh**: Chinese (default)
@@ -16453,6 +16521,8 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16453
16521
  result['CurrentPage'] = self.current_page
16454
16522
  if self.firewall_configure_status is not None:
16455
16523
  result['FirewallConfigureStatus'] = self.firewall_configure_status
16524
+ if self.firewall_id is not None:
16525
+ result['FirewallId'] = self.firewall_id
16456
16526
  if self.lang is not None:
16457
16527
  result['Lang'] = self.lang
16458
16528
  if self.page_size is not None:
@@ -16465,6 +16535,8 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16465
16535
  self.current_page = m.get('CurrentPage')
16466
16536
  if m.get('FirewallConfigureStatus') is not None:
16467
16537
  self.firewall_configure_status = m.get('FirewallConfigureStatus')
16538
+ if m.get('FirewallId') is not None:
16539
+ self.firewall_id = m.get('FirewallId')
16468
16540
  if m.get('Lang') is not None:
16469
16541
  self.lang = m.get('Lang')
16470
16542
  if m.get('PageSize') is not None:
@@ -16472,15 +16544,44 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16472
16544
  return self
16473
16545
 
16474
16546
 
16547
+ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig(TeaModel):
16548
+ def __init__(
16549
+ self,
16550
+ strict_mode: int = None,
16551
+ ):
16552
+ self.strict_mode = strict_mode
16553
+
16554
+ def validate(self):
16555
+ pass
16556
+
16557
+ def to_map(self):
16558
+ _map = super().to_map()
16559
+ if _map is not None:
16560
+ return _map
16561
+
16562
+ result = dict()
16563
+ if self.strict_mode is not None:
16564
+ result['StrictMode'] = self.strict_mode
16565
+ return result
16566
+
16567
+ def from_map(self, m: dict = None):
16568
+ m = m or dict()
16569
+ if m.get('StrictMode') is not None:
16570
+ self.strict_mode = m.get('StrictMode')
16571
+ return self
16572
+
16573
+
16475
16574
  class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16476
16575
  def __init__(
16477
16576
  self,
16577
+ acl_config: DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig = None,
16478
16578
  acl_group_id: str = None,
16479
16579
  acl_group_name: str = None,
16480
16580
  acl_rule_count: int = None,
16481
16581
  is_default: bool = None,
16482
16582
  member_uid: str = None,
16483
16583
  ):
16584
+ self.acl_config = acl_config
16484
16585
  # The ID of the policy group.
16485
16586
  #
16486
16587
  # Valid values:
@@ -16508,7 +16609,8 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16508
16609
  self.member_uid = member_uid
16509
16610
 
16510
16611
  def validate(self):
16511
- pass
16612
+ if self.acl_config:
16613
+ self.acl_config.validate()
16512
16614
 
16513
16615
  def to_map(self):
16514
16616
  _map = super().to_map()
@@ -16516,6 +16618,8 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16516
16618
  return _map
16517
16619
 
16518
16620
  result = dict()
16621
+ if self.acl_config is not None:
16622
+ result['AclConfig'] = self.acl_config.to_map()
16519
16623
  if self.acl_group_id is not None:
16520
16624
  result['AclGroupId'] = self.acl_group_id
16521
16625
  if self.acl_group_name is not None:
@@ -16530,6 +16634,9 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16530
16634
 
16531
16635
  def from_map(self, m: dict = None):
16532
16636
  m = m or dict()
16637
+ if m.get('AclConfig') is not None:
16638
+ temp_model = DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig()
16639
+ self.acl_config = temp_model.from_map(m['AclConfig'])
16533
16640
  if m.get('AclGroupId') is not None:
16534
16641
  self.acl_group_id = m.get('AclGroupId')
16535
16642
  if m.get('AclGroupName') is not None:
@@ -16687,10 +16794,12 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16687
16794
  def __init__(
16688
16795
  self,
16689
16796
  allow_configuration: int = None,
16797
+ standby_zone_id: str = None,
16690
16798
  vpc_cidr: str = None,
16691
16799
  vpc_id: str = None,
16692
16800
  vswitch_cidr: str = None,
16693
16801
  vswitch_id: str = None,
16802
+ vswitch_zone_id: str = None,
16694
16803
  zone_id: str = None,
16695
16804
  ):
16696
16805
  # Indicates whether you can specify a CIDR block when you create a VPC firewall for a Basic Edition transit router of a CEN instance. Valid values:
@@ -16698,6 +16807,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16698
16807
  # * **1**: yes
16699
16808
  # * **0**: no
16700
16809
  self.allow_configuration = allow_configuration
16810
+ # Firewall backup availability zone ID.
16811
+ self.standby_zone_id = standby_zone_id
16701
16812
  # The CIDR block of the VPC.
16702
16813
  self.vpc_cidr = vpc_cidr
16703
16814
  # The VPC ID.
@@ -16706,6 +16817,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16706
16817
  self.vswitch_cidr = vswitch_cidr
16707
16818
  # The vSwitch ID.
16708
16819
  self.vswitch_id = vswitch_id
16820
+ # The availability zone ID of the virtual switch.
16821
+ self.vswitch_zone_id = vswitch_zone_id
16709
16822
  # The zone ID.
16710
16823
  self.zone_id = zone_id
16711
16824
 
@@ -16720,6 +16833,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16720
16833
  result = dict()
16721
16834
  if self.allow_configuration is not None:
16722
16835
  result['AllowConfiguration'] = self.allow_configuration
16836
+ if self.standby_zone_id is not None:
16837
+ result['StandbyZoneId'] = self.standby_zone_id
16723
16838
  if self.vpc_cidr is not None:
16724
16839
  result['VpcCidr'] = self.vpc_cidr
16725
16840
  if self.vpc_id is not None:
@@ -16728,6 +16843,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16728
16843
  result['VswitchCidr'] = self.vswitch_cidr
16729
16844
  if self.vswitch_id is not None:
16730
16845
  result['VswitchId'] = self.vswitch_id
16846
+ if self.vswitch_zone_id is not None:
16847
+ result['VswitchZoneId'] = self.vswitch_zone_id
16731
16848
  if self.zone_id is not None:
16732
16849
  result['ZoneId'] = self.zone_id
16733
16850
  return result
@@ -16736,6 +16853,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16736
16853
  m = m or dict()
16737
16854
  if m.get('AllowConfiguration') is not None:
16738
16855
  self.allow_configuration = m.get('AllowConfiguration')
16856
+ if m.get('StandbyZoneId') is not None:
16857
+ self.standby_zone_id = m.get('StandbyZoneId')
16739
16858
  if m.get('VpcCidr') is not None:
16740
16859
  self.vpc_cidr = m.get('VpcCidr')
16741
16860
  if m.get('VpcId') is not None:
@@ -16744,6 +16863,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16744
16863
  self.vswitch_cidr = m.get('VswitchCidr')
16745
16864
  if m.get('VswitchId') is not None:
16746
16865
  self.vswitch_id = m.get('VswitchId')
16866
+ if m.get('VswitchZoneId') is not None:
16867
+ self.vswitch_zone_id = m.get('VswitchZoneId')
16747
16868
  if m.get('ZoneId') is not None:
16748
16869
  self.zone_id = m.get('ZoneId')
16749
16870
  return self
@@ -17054,7 +17175,7 @@ class DescribeVpcFirewallCenDetailResponseBody(TeaModel):
17054
17175
  # * **closed**: disabled
17055
17176
  # * **notconfigured**: not configured
17056
17177
  self.firewall_switch_status = firewall_switch_status
17057
- # The VPC that is automatically created for the firewall.
17178
+ # The firewall VPC.
17058
17179
  self.firewall_vpc = firewall_vpc
17059
17180
  # The details about the VPC.
17060
17181
  self.local_vpc = local_vpc
@@ -17290,6 +17411,33 @@ class DescribeVpcFirewallCenListRequest(TeaModel):
17290
17411
  return self
17291
17412
 
17292
17413
 
17414
+ class DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig(TeaModel):
17415
+ def __init__(
17416
+ self,
17417
+ strict_mode: int = None,
17418
+ ):
17419
+ self.strict_mode = strict_mode
17420
+
17421
+ def validate(self):
17422
+ pass
17423
+
17424
+ def to_map(self):
17425
+ _map = super().to_map()
17426
+ if _map is not None:
17427
+ return _map
17428
+
17429
+ result = dict()
17430
+ if self.strict_mode is not None:
17431
+ result['StrictMode'] = self.strict_mode
17432
+ return result
17433
+
17434
+ def from_map(self, m: dict = None):
17435
+ m = m or dict()
17436
+ if m.get('StrictMode') is not None:
17437
+ self.strict_mode = m.get('StrictMode')
17438
+ return self
17439
+
17440
+
17293
17441
  class DescribeVpcFirewallCenListResponseBodyVpcFirewallsIpsConfig(TeaModel):
17294
17442
  def __init__(
17295
17443
  self,
@@ -17573,6 +17721,7 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewallsLocalVpc(TeaModel):
17573
17721
  class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17574
17722
  def __init__(
17575
17723
  self,
17724
+ acl_config: DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig = None,
17576
17725
  cen_id: str = None,
17577
17726
  cen_name: str = None,
17578
17727
  connect_type: str = None,
@@ -17586,6 +17735,7 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17586
17735
  vpc_firewall_id: str = None,
17587
17736
  vpc_firewall_name: str = None,
17588
17737
  ):
17738
+ self.acl_config = acl_config
17589
17739
  # The ID of the CEN instance.
17590
17740
  self.cen_id = cen_id
17591
17741
  # The name of the CEN instance.
@@ -17629,6 +17779,8 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17629
17779
  self.vpc_firewall_name = vpc_firewall_name
17630
17780
 
17631
17781
  def validate(self):
17782
+ if self.acl_config:
17783
+ self.acl_config.validate()
17632
17784
  if self.ips_config:
17633
17785
  self.ips_config.validate()
17634
17786
  if self.local_vpc:
@@ -17640,6 +17792,8 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17640
17792
  return _map
17641
17793
 
17642
17794
  result = dict()
17795
+ if self.acl_config is not None:
17796
+ result['AclConfig'] = self.acl_config.to_map()
17643
17797
  if self.cen_id is not None:
17644
17798
  result['CenId'] = self.cen_id
17645
17799
  if self.cen_name is not None:
@@ -17668,6 +17822,9 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17668
17822
 
17669
17823
  def from_map(self, m: dict = None):
17670
17824
  m = m or dict()
17825
+ if m.get('AclConfig') is not None:
17826
+ temp_model = DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig()
17827
+ self.acl_config = temp_model.from_map(m['AclConfig'])
17671
17828
  if m.get('CenId') is not None:
17672
17829
  self.cen_id = m.get('CenId')
17673
17830
  if m.get('CenName') is not None:
@@ -19331,6 +19488,34 @@ class DescribeVpcFirewallListRequest(TeaModel):
19331
19488
  return self
19332
19489
 
19333
19490
 
19491
+ class DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig(TeaModel):
19492
+ def __init__(
19493
+ self,
19494
+ strict_mode: int = None,
19495
+ ):
19496
+ # This parameter is required.
19497
+ self.strict_mode = strict_mode
19498
+
19499
+ def validate(self):
19500
+ pass
19501
+
19502
+ def to_map(self):
19503
+ _map = super().to_map()
19504
+ if _map is not None:
19505
+ return _map
19506
+
19507
+ result = dict()
19508
+ if self.strict_mode is not None:
19509
+ result['StrictMode'] = self.strict_mode
19510
+ return result
19511
+
19512
+ def from_map(self, m: dict = None):
19513
+ m = m or dict()
19514
+ if m.get('StrictMode') is not None:
19515
+ self.strict_mode = m.get('StrictMode')
19516
+ return self
19517
+
19518
+
19334
19519
  class DescribeVpcFirewallListResponseBodyVpcFirewallsIpsConfig(TeaModel):
19335
19520
  def __init__(
19336
19521
  self,
@@ -19694,6 +19879,7 @@ class DescribeVpcFirewallListResponseBodyVpcFirewallsPeerVpc(TeaModel):
19694
19879
  class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19695
19880
  def __init__(
19696
19881
  self,
19882
+ acl_config: DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig = None,
19697
19883
  bandwidth: int = None,
19698
19884
  connect_sub_type: str = None,
19699
19885
  connect_type: str = None,
@@ -19707,6 +19893,7 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19707
19893
  vpc_firewall_id: str = None,
19708
19894
  vpc_firewall_name: str = None,
19709
19895
  ):
19896
+ self.acl_config = acl_config
19710
19897
  # The bandwidth of the Express Connect circuit. Unit: Mbit/s.
19711
19898
  self.bandwidth = bandwidth
19712
19899
  # The sub-type of the connection. Valid values:
@@ -19747,6 +19934,8 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19747
19934
  self.vpc_firewall_name = vpc_firewall_name
19748
19935
 
19749
19936
  def validate(self):
19937
+ if self.acl_config:
19938
+ self.acl_config.validate()
19750
19939
  if self.ips_config:
19751
19940
  self.ips_config.validate()
19752
19941
  if self.local_vpc:
@@ -19760,6 +19949,8 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19760
19949
  return _map
19761
19950
 
19762
19951
  result = dict()
19952
+ if self.acl_config is not None:
19953
+ result['AclConfig'] = self.acl_config.to_map()
19763
19954
  if self.bandwidth is not None:
19764
19955
  result['Bandwidth'] = self.bandwidth
19765
19956
  if self.connect_sub_type is not None:
@@ -19788,6 +19979,9 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19788
19979
 
19789
19980
  def from_map(self, m: dict = None):
19790
19981
  m = m or dict()
19982
+ if m.get('AclConfig') is not None:
19983
+ temp_model = DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig()
19984
+ self.acl_config = temp_model.from_map(m['AclConfig'])
19791
19985
  if m.get('Bandwidth') is not None:
19792
19986
  self.bandwidth = m.get('Bandwidth')
19793
19987
  if m.get('ConnectSubType') is not None:
@@ -21267,8 +21461,6 @@ class ModifyControlPolicyRequest(TeaModel):
21267
21461
  # * **accept**: allows the traffic.
21268
21462
  # * **drop**: denies the traffic.
21269
21463
  # * **log**: monitors the traffic.
21270
- #
21271
- # This parameter is required.
21272
21464
  self.acl_action = acl_action
21273
21465
  # The UUID of the access control policy.
21274
21466
  #
@@ -21302,8 +21494,6 @@ class ModifyControlPolicyRequest(TeaModel):
21302
21494
  # > You must specify one of the ApplicationNameList and ApplicationName parameters. If you configure both ApplicationNameList and ApplicationName, only the value of ApplicationNameList is used.
21303
21495
  self.application_name_list = application_name_list
21304
21496
  # The description of the access control policy.
21305
- #
21306
- # This parameter is required.
21307
21497
  self.description = description
21308
21498
  # The destination port in the access control policy.
21309
21499
  self.dest_port = dest_port
@@ -21320,8 +21510,6 @@ class ModifyControlPolicyRequest(TeaModel):
21320
21510
  # * If **DestinationType** is set to group, the value of **Destination** is an address book. Example: db_group.
21321
21511
  # * If **DestinationType** is set to domain, the value of **Destination** is a domain name. Example: \\*.aliyuncs.com.
21322
21512
  # * If **DestinationType** is set to location, the value of **Destination** is a location. For more information about the location codes, see the "AddControlPolicy" topic. Example: ["BJ11", "ZB"].
21323
- #
21324
- # This parameter is required.
21325
21513
  self.destination = destination
21326
21514
  # The type of the destination address in the access control policy. Valid values:
21327
21515
  #
@@ -21329,15 +21517,11 @@ class ModifyControlPolicyRequest(TeaModel):
21329
21517
  # * **group**: address book
21330
21518
  # * **domain**: domain name
21331
21519
  # * **location**: location
21332
- #
21333
- # This parameter is required.
21334
21520
  self.destination_type = destination_type
21335
21521
  # The direction of the traffic to which the access control policy applies. Valid values:
21336
21522
  #
21337
21523
  # * **in**: inbound traffic
21338
21524
  # * **out**: outbound traffic
21339
- #
21340
- # This parameter is required.
21341
21525
  self.direction = direction
21342
21526
  # The domain name resolution method of the access control policy. By default, an access control policy is enabled after the policy is created. Valid values:
21343
21527
  #
@@ -21364,8 +21548,6 @@ class ModifyControlPolicyRequest(TeaModel):
21364
21548
  # > The value **ANY** indicates all types of applications.
21365
21549
  #
21366
21550
  # > If the traffic direction is outbound and the destination address is a threat intelligence address book of the domain name type or a cloud service address book, you can set Proto to TCP or ANY. If you set Proto to TCP, you can set ApplicationName to HTTP, HTTPS, SMTP, SMTPS, and SSL. If you set Proto to ANY, you can set ApplicationName to ANY.
21367
- #
21368
- # This parameter is required.
21369
21551
  self.proto = proto
21370
21552
  # The status of the access control policy. Valid values:
21371
21553
  #
@@ -21404,16 +21586,12 @@ class ModifyControlPolicyRequest(TeaModel):
21404
21586
  # * If **SourceType** is set to net, the value of **Source** is a CIDR block. Example: 1.2.XX.XX/24.
21405
21587
  # * If **SourceType** is set to group, the value of **Source** is an address book. Example: db_group.
21406
21588
  # * If **SourceType** is set to location, the value of **Source** is a location. For more information about the location codes, see the "AddControlPolicy" topic. Example: ["BJ11", "ZB"]
21407
- #
21408
- # This parameter is required.
21409
21589
  self.source = source
21410
21590
  # The type of the source address in the access control policy. Valid values:
21411
21591
  #
21412
21592
  # * **net**: CIDR block
21413
21593
  # * **group**: address book
21414
21594
  # * **location**: location
21415
- #
21416
- # This parameter is required.
21417
21595
  self.source_type = source_type
21418
21596
  # The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
21419
21597
  #
@@ -21739,33 +21917,30 @@ class ModifyControlPolicyPositionResponse(TeaModel):
21739
21917
  class ModifyDefaultIPSConfigRequest(TeaModel):
21740
21918
  def __init__(
21741
21919
  self,
21742
- basic_rules: str = None,
21743
- cti_rules: str = None,
21920
+ basic_rules: int = None,
21921
+ cti_rules: int = None,
21744
21922
  lang: str = None,
21745
21923
  max_sdl: int = None,
21746
- patch_rules: str = None,
21747
- rule_class: str = None,
21748
- run_mode: str = None,
21924
+ patch_rules: int = None,
21925
+ rule_class: int = None,
21926
+ run_mode: int = None,
21749
21927
  ):
21750
21928
  # Specifies whether to enable basic protection. Valid values:
21751
21929
  #
21752
21930
  # * **1**: yes
21753
21931
  # * **0**: no
21754
- #
21755
- # This parameter is required.
21756
21932
  self.basic_rules = basic_rules
21757
21933
  # Specifies whether to enable threat intelligence. Valid values:
21758
21934
  #
21759
21935
  # * **1**: yes
21760
21936
  # * **0**: no
21761
- #
21762
- # This parameter is required.
21763
21937
  self.cti_rules = cti_rules
21764
21938
  # The language of the content within the request and response. Valid values:
21765
21939
  #
21766
21940
  # * **zh** (default)
21767
21941
  # * **en**\
21768
21942
  self.lang = lang
21943
+ # The maximum amount of traffic that can be processed by the sensitive data leak detection feature each day.
21769
21944
  self.max_sdl = max_sdl
21770
21945
  # Specifies whether to enable virtual patching. Valid values:
21771
21946
  #
@@ -22211,8 +22386,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
22211
22386
  # * **accept**: allows the traffic.
22212
22387
  # * **drop**: denies the traffic.
22213
22388
  # * **log**: monitors the traffic.
22214
- #
22215
- # This parameter is required.
22216
22389
  self.acl_action = acl_action
22217
22390
  # The UUID of the access control policy.
22218
22391
  #
@@ -22225,8 +22398,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
22225
22398
  # The description of the access control policy. Fuzzy match is supported.
22226
22399
  #
22227
22400
  # > If you do not specify this parameter, the descriptions of all policies are queried.
22228
- #
22229
- # This parameter is required.
22230
22401
  self.description = description
22231
22402
  # The destination port in the access control policy.
22232
22403
  #
@@ -22245,8 +22416,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
22245
22416
  # * If **DestinationType** is set to group, the value of **Destination** is an address book. Example: db_group
22246
22417
  # * If **DestinationType** is set to domain, the value of **Destination** is a domain name. Example: \\*.aliyuncs.com
22247
22418
  # * If **DestinationType** is set to location, the value of **Destination** is a location. For more information about the location codes, see the "AddControlPolicy" topic. Example: ["BJ11", "ZB"]
22248
- #
22249
- # This parameter is required.
22250
22419
  self.destination = destination
22251
22420
  # The type of the destination address in the access control policy. Valid values:
22252
22421
  #
@@ -22254,8 +22423,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
22254
22423
  # * **group**: address book
22255
22424
  # * **domain**: domain name
22256
22425
  # * **location**: destination location
22257
- #
22258
- # This parameter is required.
22259
22426
  self.destination_type = destination_type
22260
22427
  # The direction of the traffic to which the access control policy applies. Valid value:
22261
22428
  #
@@ -22290,8 +22457,6 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
22290
22457
  # > The value **ANY** indicates all types of applications.
22291
22458
  #
22292
22459
  # > If the destination address type is a threat intelligence address book of the domain name type or a cloud service address book, you can set Proto to TCP. If you set Proto to TCP, you can set application types to HTTP, HTTPS, SMTP, SMTPS, and SSL.
22293
- #
22294
- # This parameter is required.
22295
22460
  self.proto = proto
22296
22461
  # The status of the access control policy. Valid values:
22297
22462
  #
@@ -22329,15 +22494,11 @@ class ModifyNatFirewallControlPolicyRequest(TeaModel):
22329
22494
  #
22330
22495
  # * If **SourceType** is set to `net`, the value of this parameter is a CIDR block. Example: 10.2.XX.XX/24.
22331
22496
  # * If **SourceType** is set to `group`, the value of this parameter is an address book name. Example: db_group.
22332
- #
22333
- # This parameter is required.
22334
22497
  self.source = source
22335
22498
  # The type of the source address in the access control policy. Valid values:
22336
22499
  #
22337
22500
  # * **net**: CIDR block
22338
22501
  # * **group**: address book
22339
- #
22340
- # This parameter is required.
22341
22502
  self.source_type = source_type
22342
22503
  # The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
22343
22504
  #
@@ -22831,10 +22992,12 @@ class ModifyObjectGroupOperationResponse(TeaModel):
22831
22992
  class ModifyPolicyAdvancedConfigRequest(TeaModel):
22832
22993
  def __init__(
22833
22994
  self,
22995
+ eips: List[str] = None,
22834
22996
  internet_switch: str = None,
22835
22997
  lang: str = None,
22836
22998
  source_ip: str = None,
22837
22999
  ):
23000
+ self.eips = eips
22838
23001
  # Specifies whether to enable the strict mode for the access control policy. Valid values:
22839
23002
  #
22840
23003
  # * **on**: enables the strict mode.
@@ -22859,6 +23022,8 @@ class ModifyPolicyAdvancedConfigRequest(TeaModel):
22859
23022
  return _map
22860
23023
 
22861
23024
  result = dict()
23025
+ if self.eips is not None:
23026
+ result['Eips'] = self.eips
22862
23027
  if self.internet_switch is not None:
22863
23028
  result['InternetSwitch'] = self.internet_switch
22864
23029
  if self.lang is not None:
@@ -22869,6 +23034,8 @@ class ModifyPolicyAdvancedConfigRequest(TeaModel):
22869
23034
 
22870
23035
  def from_map(self, m: dict = None):
22871
23036
  m = m or dict()
23037
+ if m.get('Eips') is not None:
23038
+ self.eips = m.get('Eips')
22872
23039
  if m.get('InternetSwitch') is not None:
22873
23040
  self.internet_switch = m.get('InternetSwitch')
22874
23041
  if m.get('Lang') is not None:
@@ -23947,8 +24114,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
23947
24114
  # * **accept**: allows the traffic.
23948
24115
  # * **drop**: blocks the traffic.
23949
24116
  # * **log**: monitors the traffic.
23950
- #
23951
- # This parameter is required.
23952
24117
  self.acl_action = acl_action
23953
24118
  # The unique ID of the access control policy.
23954
24119
  #
@@ -23979,8 +24144,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
23979
24144
  # The application names.
23980
24145
  self.application_name_list = application_name_list
23981
24146
  # The description of the access control policy.
23982
- #
23983
- # This parameter is required.
23984
24147
  self.description = description
23985
24148
  # The destination port in the access control policy.
23986
24149
  self.dest_port = dest_port
@@ -24004,8 +24167,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
24004
24167
  # * If **DestinationType** is set to `domain`, the value of this parameter must be a domain name.
24005
24168
  #
24006
24169
  # Example: \\*.aliyuncs.com
24007
- #
24008
- # This parameter is required.
24009
24170
  self.destination = destination
24010
24171
  # The type of the destination address in the access control policy.
24011
24172
  #
@@ -24014,8 +24175,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
24014
24175
  # * **net**: CIDR block
24015
24176
  # * **group**: address book
24016
24177
  # * **domain**: domain name
24017
- #
24018
- # This parameter is required.
24019
24178
  self.destination_type = destination_type
24020
24179
  # The domain name resolution method of the access control policy. By default, an access control policy is enabled after the policy is created. Valid values:
24021
24180
  #
@@ -24042,8 +24201,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
24042
24201
  # * TCP
24043
24202
  # * UDP
24044
24203
  # * ICMP
24045
- #
24046
- # This parameter is required.
24047
24204
  self.proto = proto
24048
24205
  # Specifies whether to enable the access control policy. By default, an access control policy is enabled after the policy is created. Valid values:
24049
24206
  #
@@ -24088,8 +24245,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
24088
24245
  # * If **SourceType** is set to `group`, the value of this parameter must be an address book name.
24089
24246
  #
24090
24247
  # Example: db_group
24091
- #
24092
- # This parameter is required.
24093
24248
  self.source = source
24094
24249
  # The type of the source address in the access control policy.
24095
24250
  #
@@ -24097,8 +24252,6 @@ class ModifyVpcFirewallControlPolicyRequest(TeaModel):
24097
24252
  #
24098
24253
  # * **net**: CIDR block
24099
24254
  # * **group**: address book
24100
- #
24101
- # This parameter is required.
24102
24255
  self.source_type = source_type
24103
24256
  # The time when the access control policy starts to take effect. The value is a UNIX timestamp. Unit: seconds. The value must be on the hour or on the half hour, and at least 30 minutes earlier than the value of EndTime.
24104
24257
  #
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: alibabacloud-cloudfw20171207
3
- Version: 5.0.3
3
+ Version: 6.0.0
4
4
  Summary: Alibaba Cloud Cloudfw (20171207) SDK Library for Python
5
5
  Home-page: https://github.com/aliyun/alibabacloud-python-sdk
6
6
  Author: Alibaba Cloud SDK
@@ -23,7 +23,7 @@ Description-Content-Type: text/markdown
23
23
  License-File: LICENSE
24
24
  Requires-Dist: alibabacloud-endpoint-util (<1.0.0,>=0.0.3)
25
25
  Requires-Dist: alibabacloud-openapi-util (<1.0.0,>=0.2.2)
26
- Requires-Dist: alibabacloud-tea-openapi (<1.0.0,>=0.3.12)
26
+ Requires-Dist: alibabacloud-tea-openapi (<1.0.0,>=0.3.14)
27
27
  Requires-Dist: alibabacloud-tea-util (<1.0.0,>=0.3.13)
28
28
 
29
29
  English | [简体中文](README-CN.md)
@@ -0,0 +1,8 @@
1
+ alibabacloud_cloudfw20171207/__init__.py,sha256=Rkd1gANO4By6zNziV5IlrYVUm6VSKASr3_tojR5k-FE,21
2
+ alibabacloud_cloudfw20171207/client.py,sha256=0yZv5yok8YohvYFK5-fF4OSBIsm76PCl8ybYOFX3i6g,668072
3
+ alibabacloud_cloudfw20171207/models.py,sha256=RFcR4gc6J_izCQ4ktBzupxH6jrTmEpfzvmvixtO5BNU,964464
4
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/LICENSE,sha256=0CFItL6bHvxqS44T6vlLoW2R4Zaic304OO3WxN0oXF0,600
5
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/METADATA,sha256=YcGZgZVj2Nk29FMnTJyEjyerubcOUBNiBcOjHpM69hc,2340
6
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
7
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/top_level.txt,sha256=rry_3PsvxYDan1V9ajGHg5R6j3f8NFiQdy-iZOzl8F4,29
8
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/RECORD,,
@@ -1,8 +0,0 @@
1
- alibabacloud_cloudfw20171207/__init__.py,sha256=09bPQIE5xdwmGSNTeDXCpFQGPQ3KBQfG1VKKsSIakYw,21
2
- alibabacloud_cloudfw20171207/client.py,sha256=NRPrGadm7VUbpJdVD5hLjH7bKU03N_fF1hqJ7VhMO8M,667378
3
- alibabacloud_cloudfw20171207/models.py,sha256=M04IHdKQ-1iH3kfCYU3bWEXYd2pNiV2aQYNOCqHrwQs,957635
4
- alibabacloud_cloudfw20171207-5.0.3.dist-info/LICENSE,sha256=0CFItL6bHvxqS44T6vlLoW2R4Zaic304OO3WxN0oXF0,600
5
- alibabacloud_cloudfw20171207-5.0.3.dist-info/METADATA,sha256=x1IHqFJVyctZqlpRyxSQstiZRiRbBL0LhqVnF5ldq9k,2340
6
- alibabacloud_cloudfw20171207-5.0.3.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
7
- alibabacloud_cloudfw20171207-5.0.3.dist-info/top_level.txt,sha256=rry_3PsvxYDan1V9ajGHg5R6j3f8NFiQdy-iZOzl8F4,29
8
- alibabacloud_cloudfw20171207-5.0.3.dist-info/RECORD,,