alibabacloud-cloudfw20171207 5.0.4__py3-none-any.whl → 6.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of alibabacloud-cloudfw20171207 might be problematic. Click here for more details.

@@ -1 +1 @@
1
- __version__ = '5.0.4'
1
+ __version__ = '6.0.0'
@@ -1595,6 +1595,8 @@ class Client(OpenApiClient):
1595
1595
  query['FirewallVSwitchCidrBlock'] = request.firewall_vswitch_cidr_block
1596
1596
  if not UtilClient.is_unset(request.firewall_vpc_cidr_block):
1597
1597
  query['FirewallVpcCidrBlock'] = request.firewall_vpc_cidr_block
1598
+ if not UtilClient.is_unset(request.firewall_vpc_standby_zone_id):
1599
+ query['FirewallVpcStandbyZoneId'] = request.firewall_vpc_standby_zone_id
1598
1600
  if not UtilClient.is_unset(request.firewall_vpc_zone_id):
1599
1601
  query['FirewallVpcZoneId'] = request.firewall_vpc_zone_id
1600
1602
  if not UtilClient.is_unset(request.lang):
@@ -1654,6 +1656,8 @@ class Client(OpenApiClient):
1654
1656
  query['FirewallVSwitchCidrBlock'] = request.firewall_vswitch_cidr_block
1655
1657
  if not UtilClient.is_unset(request.firewall_vpc_cidr_block):
1656
1658
  query['FirewallVpcCidrBlock'] = request.firewall_vpc_cidr_block
1659
+ if not UtilClient.is_unset(request.firewall_vpc_standby_zone_id):
1660
+ query['FirewallVpcStandbyZoneId'] = request.firewall_vpc_standby_zone_id
1657
1661
  if not UtilClient.is_unset(request.firewall_vpc_zone_id):
1658
1662
  query['FirewallVpcZoneId'] = request.firewall_vpc_zone_id
1659
1663
  if not UtilClient.is_unset(request.lang):
@@ -4439,7 +4443,7 @@ class Client(OpenApiClient):
4439
4443
  runtime: util_models.RuntimeOptions,
4440
4444
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4441
4445
  """
4442
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4446
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4443
4447
 
4444
4448
  @param request: DescribeDefaultIPSConfigRequest
4445
4449
  @param runtime: runtime options for this request RuntimeOptions
@@ -4474,7 +4478,7 @@ class Client(OpenApiClient):
4474
4478
  runtime: util_models.RuntimeOptions,
4475
4479
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4476
4480
  """
4477
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4481
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4478
4482
 
4479
4483
  @param request: DescribeDefaultIPSConfigRequest
4480
4484
  @param runtime: runtime options for this request RuntimeOptions
@@ -4508,7 +4512,7 @@ class Client(OpenApiClient):
4508
4512
  request: cloudfw_20171207_models.DescribeDefaultIPSConfigRequest,
4509
4513
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4510
4514
  """
4511
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4515
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4512
4516
 
4513
4517
  @param request: DescribeDefaultIPSConfigRequest
4514
4518
  @return: DescribeDefaultIPSConfigResponse
@@ -4521,7 +4525,7 @@ class Client(OpenApiClient):
4521
4525
  request: cloudfw_20171207_models.DescribeDefaultIPSConfigRequest,
4522
4526
  ) -> cloudfw_20171207_models.DescribeDefaultIPSConfigResponse:
4523
4527
  """
4524
- @summary Queries the default configurations of the intrusion prevention system (IPS).
4528
+ @summary Queries the default intrusion prevention system (IPS) configurations.
4525
4529
 
4526
4530
  @param request: DescribeDefaultIPSConfigRequest
4527
4531
  @return: DescribeDefaultIPSConfigResponse
@@ -8217,6 +8221,8 @@ class Client(OpenApiClient):
8217
8221
  query['CurrentPage'] = request.current_page
8218
8222
  if not UtilClient.is_unset(request.firewall_configure_status):
8219
8223
  query['FirewallConfigureStatus'] = request.firewall_configure_status
8224
+ if not UtilClient.is_unset(request.firewall_id):
8225
+ query['FirewallId'] = request.firewall_id
8220
8226
  if not UtilClient.is_unset(request.lang):
8221
8227
  query['Lang'] = request.lang
8222
8228
  if not UtilClient.is_unset(request.page_size):
@@ -8262,6 +8268,8 @@ class Client(OpenApiClient):
8262
8268
  query['CurrentPage'] = request.current_page
8263
8269
  if not UtilClient.is_unset(request.firewall_configure_status):
8264
8270
  query['FirewallConfigureStatus'] = request.firewall_configure_status
8271
+ if not UtilClient.is_unset(request.firewall_id):
8272
+ query['FirewallId'] = request.firewall_id
8265
8273
  if not UtilClient.is_unset(request.lang):
8266
8274
  query['Lang'] = request.lang
8267
8275
  if not UtilClient.is_unset(request.page_size):
@@ -11037,6 +11045,8 @@ class Client(OpenApiClient):
11037
11045
  """
11038
11046
  UtilClient.validate_model(request)
11039
11047
  query = {}
11048
+ if not UtilClient.is_unset(request.eips):
11049
+ query['Eips'] = request.eips
11040
11050
  if not UtilClient.is_unset(request.internet_switch):
11041
11051
  query['InternetSwitch'] = request.internet_switch
11042
11052
  if not UtilClient.is_unset(request.lang):
@@ -11080,6 +11090,8 @@ class Client(OpenApiClient):
11080
11090
  """
11081
11091
  UtilClient.validate_model(request)
11082
11092
  query = {}
11093
+ if not UtilClient.is_unset(request.eips):
11094
+ query['Eips'] = request.eips
11083
11095
  if not UtilClient.is_unset(request.internet_switch):
11084
11096
  query['InternetSwitch'] = request.internet_switch
11085
11097
  if not UtilClient.is_unset(request.lang):
@@ -2483,6 +2483,7 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2483
2483
  firewall_switch: str = None,
2484
2484
  firewall_vswitch_cidr_block: str = None,
2485
2485
  firewall_vpc_cidr_block: str = None,
2486
+ firewall_vpc_standby_zone_id: str = None,
2486
2487
  firewall_vpc_zone_id: str = None,
2487
2488
  lang: str = None,
2488
2489
  member_uid: str = None,
@@ -2514,6 +2515,10 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2514
2515
  #
2515
2516
  # > This parameter takes effect only when you create a VPC firewall for the first time in the current CEN instance and region.
2516
2517
  self.firewall_vpc_cidr_block = firewall_vpc_cidr_block
2518
+ # The ID of the backup availability zone to which the firewall belongs. The firewall will automatically switch to the backup availability zone to continue running only if the primary availability zone service is unavailable.
2519
+ # If this parameter is not filled, the backup availability zone for the firewall will be automatically assigned.
2520
+ # > This parameter is only effective when creating a VPC firewall for the first time in this CEN region.
2521
+ self.firewall_vpc_standby_zone_id = firewall_vpc_standby_zone_id
2517
2522
  # The ID of the zone to which the vSwitch belongs. If your service is latency-sensitive, you can specify the same zone for the vSwitch of the firewall and the vSwitch of your business VPC to minimize latency.
2518
2523
  #
2519
2524
  # If you do not specify a value, a zone is automatically assigned for the vSwitch.
@@ -2561,6 +2566,8 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2561
2566
  result['FirewallVSwitchCidrBlock'] = self.firewall_vswitch_cidr_block
2562
2567
  if self.firewall_vpc_cidr_block is not None:
2563
2568
  result['FirewallVpcCidrBlock'] = self.firewall_vpc_cidr_block
2569
+ if self.firewall_vpc_standby_zone_id is not None:
2570
+ result['FirewallVpcStandbyZoneId'] = self.firewall_vpc_standby_zone_id
2564
2571
  if self.firewall_vpc_zone_id is not None:
2565
2572
  result['FirewallVpcZoneId'] = self.firewall_vpc_zone_id
2566
2573
  if self.lang is not None:
@@ -2587,6 +2594,8 @@ class CreateVpcFirewallCenConfigureRequest(TeaModel):
2587
2594
  self.firewall_vswitch_cidr_block = m.get('FirewallVSwitchCidrBlock')
2588
2595
  if m.get('FirewallVpcCidrBlock') is not None:
2589
2596
  self.firewall_vpc_cidr_block = m.get('FirewallVpcCidrBlock')
2597
+ if m.get('FirewallVpcStandbyZoneId') is not None:
2598
+ self.firewall_vpc_standby_zone_id = m.get('FirewallVpcStandbyZoneId')
2590
2599
  if m.get('FirewallVpcZoneId') is not None:
2591
2600
  self.firewall_vpc_zone_id = m.get('FirewallVpcZoneId')
2592
2601
  if m.get('Lang') is not None:
@@ -5062,7 +5071,9 @@ class DescribeAddressBookResponseBodyAclsAddresses(TeaModel):
5062
5071
  address: str = None,
5063
5072
  note: str = None,
5064
5073
  ):
5074
+ # Address information in the address book.
5065
5075
  self.address = address
5076
+ # Single address description.
5066
5077
  self.note = note
5067
5078
 
5068
5079
  def validate(self):
@@ -5143,6 +5154,7 @@ class DescribeAddressBookResponseBodyAcls(TeaModel):
5143
5154
  self.address_list = address_list
5144
5155
  # The number of addresses in the address book.
5145
5156
  self.address_list_count = address_list_count
5157
+ # A list of addresses in the address book, each with a single address description.
5146
5158
  self.addresses = addresses
5147
5159
  # Indicates whether the public IP addresses of ECS instances are automatically added to the address book if the instances match the specified tags. The setting takes effect on both newly purchased ECS instances whose tag settings are complete and ECS instances whose tag settings are modified. Valid values:
5148
5160
  #
@@ -7083,7 +7095,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7083
7095
  self,
7084
7096
  basic_rules: int = None,
7085
7097
  cti_rules: int = None,
7086
- free_trail_status: str = None,
7087
7098
  max_sdl: int = None,
7088
7099
  patch_rules: int = None,
7089
7100
  request_id: str = None,
@@ -7100,7 +7111,7 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7100
7111
  # * **1**: yes
7101
7112
  # * **0**: no
7102
7113
  self.cti_rules = cti_rules
7103
- self.free_trail_status = free_trail_status
7114
+ # The maximum amount of traffic that can be processed by the sensitive data leak detection feature each day.
7104
7115
  self.max_sdl = max_sdl
7105
7116
  # Indicates whether virtual patching is enabled. Valid values:
7106
7117
  #
@@ -7134,8 +7145,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7134
7145
  result['BasicRules'] = self.basic_rules
7135
7146
  if self.cti_rules is not None:
7136
7147
  result['CtiRules'] = self.cti_rules
7137
- if self.free_trail_status is not None:
7138
- result['FreeTrailStatus'] = self.free_trail_status
7139
7148
  if self.max_sdl is not None:
7140
7149
  result['MaxSdl'] = self.max_sdl
7141
7150
  if self.patch_rules is not None:
@@ -7154,8 +7163,6 @@ class DescribeDefaultIPSConfigResponseBody(TeaModel):
7154
7163
  self.basic_rules = m.get('BasicRules')
7155
7164
  if m.get('CtiRules') is not None:
7156
7165
  self.cti_rules = m.get('CtiRules')
7157
- if m.get('FreeTrailStatus') is not None:
7158
- self.free_trail_status = m.get('FreeTrailStatus')
7159
7166
  if m.get('MaxSdl') is not None:
7160
7167
  self.max_sdl = m.get('MaxSdl')
7161
7168
  if m.get('PatchRules') is not None:
@@ -12665,7 +12672,9 @@ class DescribePostpayTrafficTotalResponseBody(TeaModel):
12665
12672
  self.total_nat_assets = total_nat_assets
12666
12673
  # The total traffic for NAT firewalls. If you use Cloud Firewall that uses the subscription billing method, this parameter indicates the total volume of burstable protected traffic on the NAT boundary. Unit: bytes.
12667
12674
  self.total_nat_traffic = total_nat_traffic
12675
+ # Data Leak Detection Total Fee Flow.
12668
12676
  self.total_sdl_bill_traffic = total_sdl_bill_traffic
12677
+ # Data Leak Detection Total free usage traffic.
12669
12678
  self.total_sdl_free_traffic = total_sdl_free_traffic
12670
12679
  # The total volume of traffic. If you use Cloud Firewall that uses the subscription billing method, this parameter indicates the total volume of burstable protected traffic. Unit: bytes.
12671
12680
  self.total_traffic = total_traffic
@@ -14031,6 +14040,7 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14031
14040
  def __init__(
14032
14041
  self,
14033
14042
  type: str = None,
14043
+ update_time: int = None,
14034
14044
  version: str = None,
14035
14045
  ):
14036
14046
  # The type.
@@ -14063,6 +14073,7 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14063
14073
  #
14064
14074
  # <!-- -->
14065
14075
  self.type = type
14076
+ self.update_time = update_time
14066
14077
  # The version number.
14067
14078
  self.version = version
14068
14079
 
@@ -14077,6 +14088,8 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14077
14088
  result = dict()
14078
14089
  if self.type is not None:
14079
14090
  result['Type'] = self.type
14091
+ if self.update_time is not None:
14092
+ result['UpdateTime'] = self.update_time
14080
14093
  if self.version is not None:
14081
14094
  result['Version'] = self.version
14082
14095
  return result
@@ -14085,6 +14098,8 @@ class DescribeSignatureLibVersionResponseBodyVersion(TeaModel):
14085
14098
  m = m or dict()
14086
14099
  if m.get('Type') is not None:
14087
14100
  self.type = m.get('Type')
14101
+ if m.get('UpdateTime') is not None:
14102
+ self.update_time = m.get('UpdateTime')
14088
14103
  if m.get('Version') is not None:
14089
14104
  self.version = m.get('Version')
14090
14105
  return self
@@ -14842,7 +14857,9 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14842
14857
  request_id: str = None,
14843
14858
  route_mode: str = None,
14844
14859
  tr_attachment_master_cidr: str = None,
14860
+ tr_attachment_master_zone: str = None,
14845
14861
  tr_attachment_slave_cidr: str = None,
14862
+ tr_attachment_slave_zone: str = None,
14846
14863
  transit_router_id: str = None,
14847
14864
  ):
14848
14865
  # The ID of the Cloud Enterprise Network (CEN) instance.
@@ -14892,8 +14909,10 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14892
14909
  self.route_mode = route_mode
14893
14910
  # The primary subnet CIDR block that the VPC uses to connect to the transit router in automatic mode.
14894
14911
  self.tr_attachment_master_cidr = tr_attachment_master_cidr
14912
+ self.tr_attachment_master_zone = tr_attachment_master_zone
14895
14913
  # The secondary subnet CIDR block that the VPC uses to connect to the transit router in automatic mode.
14896
14914
  self.tr_attachment_slave_cidr = tr_attachment_slave_cidr
14915
+ self.tr_attachment_slave_zone = tr_attachment_slave_zone
14897
14916
  # The ID of the transit router.
14898
14917
  self.transit_router_id = transit_router_id
14899
14918
 
@@ -14936,8 +14955,12 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14936
14955
  result['RouteMode'] = self.route_mode
14937
14956
  if self.tr_attachment_master_cidr is not None:
14938
14957
  result['TrAttachmentMasterCidr'] = self.tr_attachment_master_cidr
14958
+ if self.tr_attachment_master_zone is not None:
14959
+ result['TrAttachmentMasterZone'] = self.tr_attachment_master_zone
14939
14960
  if self.tr_attachment_slave_cidr is not None:
14940
14961
  result['TrAttachmentSlaveCidr'] = self.tr_attachment_slave_cidr
14962
+ if self.tr_attachment_slave_zone is not None:
14963
+ result['TrAttachmentSlaveZone'] = self.tr_attachment_slave_zone
14941
14964
  if self.transit_router_id is not None:
14942
14965
  result['TransitRouterId'] = self.transit_router_id
14943
14966
  return result
@@ -14974,8 +14997,12 @@ class DescribeTrFirewallsV2DetailResponseBody(TeaModel):
14974
14997
  self.route_mode = m.get('RouteMode')
14975
14998
  if m.get('TrAttachmentMasterCidr') is not None:
14976
14999
  self.tr_attachment_master_cidr = m.get('TrAttachmentMasterCidr')
15000
+ if m.get('TrAttachmentMasterZone') is not None:
15001
+ self.tr_attachment_master_zone = m.get('TrAttachmentMasterZone')
14977
15002
  if m.get('TrAttachmentSlaveCidr') is not None:
14978
15003
  self.tr_attachment_slave_cidr = m.get('TrAttachmentSlaveCidr')
15004
+ if m.get('TrAttachmentSlaveZone') is not None:
15005
+ self.tr_attachment_slave_zone = m.get('TrAttachmentSlaveZone')
14979
15006
  if m.get('TransitRouterId') is not None:
14980
15007
  self.transit_router_id = m.get('TransitRouterId')
14981
15008
  return self
@@ -15137,6 +15164,33 @@ class DescribeTrFirewallsV2ListRequest(TeaModel):
15137
15164
  return self
15138
15165
 
15139
15166
 
15167
+ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig(TeaModel):
15168
+ def __init__(
15169
+ self,
15170
+ strict_mode: int = None,
15171
+ ):
15172
+ self.strict_mode = strict_mode
15173
+
15174
+ def validate(self):
15175
+ pass
15176
+
15177
+ def to_map(self):
15178
+ _map = super().to_map()
15179
+ if _map is not None:
15180
+ return _map
15181
+
15182
+ result = dict()
15183
+ if self.strict_mode is not None:
15184
+ result['StrictMode'] = self.strict_mode
15185
+ return result
15186
+
15187
+ def from_map(self, m: dict = None):
15188
+ m = m or dict()
15189
+ if m.get('StrictMode') is not None:
15190
+ self.strict_mode = m.get('StrictMode')
15191
+ return self
15192
+
15193
+
15140
15194
  class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsIpsConfig(TeaModel):
15141
15195
  def __init__(
15142
15196
  self,
@@ -15328,6 +15382,7 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsUnprotectedResource(Tea
15328
15382
  class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15329
15383
  def __init__(
15330
15384
  self,
15385
+ acl_config: DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig = None,
15331
15386
  cen_id: str = None,
15332
15387
  cen_name: str = None,
15333
15388
  cloud_firewall_vpc_order_type: str = None,
@@ -15345,6 +15400,7 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15345
15400
  unprotected_resource: DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsUnprotectedResource = None,
15346
15401
  vpc_firewall_name: str = None,
15347
15402
  ):
15403
+ self.acl_config = acl_config
15348
15404
  # The ID of the CEN instance.
15349
15405
  self.cen_id = cen_id
15350
15406
  # The name of the CEN instance.
@@ -15405,6 +15461,8 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15405
15461
  self.vpc_firewall_name = vpc_firewall_name
15406
15462
 
15407
15463
  def validate(self):
15464
+ if self.acl_config:
15465
+ self.acl_config.validate()
15408
15466
  if self.ips_config:
15409
15467
  self.ips_config.validate()
15410
15468
  if self.protected_resource:
@@ -15418,6 +15476,8 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15418
15476
  return _map
15419
15477
 
15420
15478
  result = dict()
15479
+ if self.acl_config is not None:
15480
+ result['AclConfig'] = self.acl_config.to_map()
15421
15481
  if self.cen_id is not None:
15422
15482
  result['CenId'] = self.cen_id
15423
15483
  if self.cen_name is not None:
@@ -15454,6 +15514,9 @@ class DescribeTrFirewallsV2ListResponseBodyVpcTrFirewalls(TeaModel):
15454
15514
 
15455
15515
  def from_map(self, m: dict = None):
15456
15516
  m = m or dict()
15517
+ if m.get('AclConfig') is not None:
15518
+ temp_model = DescribeTrFirewallsV2ListResponseBodyVpcTrFirewallsAclConfig()
15519
+ self.acl_config = temp_model.from_map(m['AclConfig'])
15457
15520
  if m.get('CenId') is not None:
15458
15521
  self.cen_id = m.get('CenId')
15459
15522
  if m.get('CenName') is not None:
@@ -16017,6 +16080,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
16017
16080
  # * **abnormal**: An exception occurs in Cloud Firewall.
16018
16081
  # * **free**: Cloud Firewall is invalid.
16019
16082
  self.instance_status = instance_status
16083
+ # The peak Internet traffic that can be protected.
16020
16084
  self.internet_bandwidth = internet_bandwidth
16021
16085
  # The number of public IP addresses that can be protected.
16022
16086
  #
@@ -16038,6 +16102,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
16038
16102
  #
16039
16103
  # > This parameter takes effect only for Cloud Firewall that uses the subscription billing method.
16040
16104
  self.max_overflow = max_overflow
16105
+ # The peak traffic of NAT private network that can be protected.
16041
16106
  self.nat_bandwidth = nat_bandwidth
16042
16107
  # The request ID.
16043
16108
  self.request_id = request_id
@@ -16057,6 +16122,7 @@ class DescribeUserBuyVersionResponseBody(TeaModel):
16057
16122
  # * **4**: Ultimate Edition.
16058
16123
  # * **10**: Cloud Firewall that uses the pay-as-you-go billing method.
16059
16124
  self.version = version
16125
+ # The peak cross-VPC traffic that can be protected.
16060
16126
  self.vpc_bandwidth = vpc_bandwidth
16061
16127
  # The number of virtual private clouds (VPCs) that can be protected.
16062
16128
  #
@@ -16421,6 +16487,7 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16421
16487
  self,
16422
16488
  current_page: str = None,
16423
16489
  firewall_configure_status: str = None,
16490
+ firewall_id: str = None,
16424
16491
  lang: str = None,
16425
16492
  page_size: str = None,
16426
16493
  ):
@@ -16432,6 +16499,7 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16432
16499
  # * **configured**: VPC firewalls are configured.
16433
16500
  # * If you do not specify this parameter, the access control policies of all VPC firewalls are queried.
16434
16501
  self.firewall_configure_status = firewall_configure_status
16502
+ self.firewall_id = firewall_id
16435
16503
  # The language of the content within the response. Valid values:
16436
16504
  #
16437
16505
  # * **zh**: Chinese (default)
@@ -16453,6 +16521,8 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16453
16521
  result['CurrentPage'] = self.current_page
16454
16522
  if self.firewall_configure_status is not None:
16455
16523
  result['FirewallConfigureStatus'] = self.firewall_configure_status
16524
+ if self.firewall_id is not None:
16525
+ result['FirewallId'] = self.firewall_id
16456
16526
  if self.lang is not None:
16457
16527
  result['Lang'] = self.lang
16458
16528
  if self.page_size is not None:
@@ -16465,6 +16535,8 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16465
16535
  self.current_page = m.get('CurrentPage')
16466
16536
  if m.get('FirewallConfigureStatus') is not None:
16467
16537
  self.firewall_configure_status = m.get('FirewallConfigureStatus')
16538
+ if m.get('FirewallId') is not None:
16539
+ self.firewall_id = m.get('FirewallId')
16468
16540
  if m.get('Lang') is not None:
16469
16541
  self.lang = m.get('Lang')
16470
16542
  if m.get('PageSize') is not None:
@@ -16472,15 +16544,44 @@ class DescribeVpcFirewallAclGroupListRequest(TeaModel):
16472
16544
  return self
16473
16545
 
16474
16546
 
16547
+ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig(TeaModel):
16548
+ def __init__(
16549
+ self,
16550
+ strict_mode: int = None,
16551
+ ):
16552
+ self.strict_mode = strict_mode
16553
+
16554
+ def validate(self):
16555
+ pass
16556
+
16557
+ def to_map(self):
16558
+ _map = super().to_map()
16559
+ if _map is not None:
16560
+ return _map
16561
+
16562
+ result = dict()
16563
+ if self.strict_mode is not None:
16564
+ result['StrictMode'] = self.strict_mode
16565
+ return result
16566
+
16567
+ def from_map(self, m: dict = None):
16568
+ m = m or dict()
16569
+ if m.get('StrictMode') is not None:
16570
+ self.strict_mode = m.get('StrictMode')
16571
+ return self
16572
+
16573
+
16475
16574
  class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16476
16575
  def __init__(
16477
16576
  self,
16577
+ acl_config: DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig = None,
16478
16578
  acl_group_id: str = None,
16479
16579
  acl_group_name: str = None,
16480
16580
  acl_rule_count: int = None,
16481
16581
  is_default: bool = None,
16482
16582
  member_uid: str = None,
16483
16583
  ):
16584
+ self.acl_config = acl_config
16484
16585
  # The ID of the policy group.
16485
16586
  #
16486
16587
  # Valid values:
@@ -16508,7 +16609,8 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16508
16609
  self.member_uid = member_uid
16509
16610
 
16510
16611
  def validate(self):
16511
- pass
16612
+ if self.acl_config:
16613
+ self.acl_config.validate()
16512
16614
 
16513
16615
  def to_map(self):
16514
16616
  _map = super().to_map()
@@ -16516,6 +16618,8 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16516
16618
  return _map
16517
16619
 
16518
16620
  result = dict()
16621
+ if self.acl_config is not None:
16622
+ result['AclConfig'] = self.acl_config.to_map()
16519
16623
  if self.acl_group_id is not None:
16520
16624
  result['AclGroupId'] = self.acl_group_id
16521
16625
  if self.acl_group_name is not None:
@@ -16530,6 +16634,9 @@ class DescribeVpcFirewallAclGroupListResponseBodyAclGroupList(TeaModel):
16530
16634
 
16531
16635
  def from_map(self, m: dict = None):
16532
16636
  m = m or dict()
16637
+ if m.get('AclConfig') is not None:
16638
+ temp_model = DescribeVpcFirewallAclGroupListResponseBodyAclGroupListAclConfig()
16639
+ self.acl_config = temp_model.from_map(m['AclConfig'])
16533
16640
  if m.get('AclGroupId') is not None:
16534
16641
  self.acl_group_id = m.get('AclGroupId')
16535
16642
  if m.get('AclGroupName') is not None:
@@ -16687,10 +16794,12 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16687
16794
  def __init__(
16688
16795
  self,
16689
16796
  allow_configuration: int = None,
16797
+ standby_zone_id: str = None,
16690
16798
  vpc_cidr: str = None,
16691
16799
  vpc_id: str = None,
16692
16800
  vswitch_cidr: str = None,
16693
16801
  vswitch_id: str = None,
16802
+ vswitch_zone_id: str = None,
16694
16803
  zone_id: str = None,
16695
16804
  ):
16696
16805
  # Indicates whether you can specify a CIDR block when you create a VPC firewall for a Basic Edition transit router of a CEN instance. Valid values:
@@ -16698,6 +16807,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16698
16807
  # * **1**: yes
16699
16808
  # * **0**: no
16700
16809
  self.allow_configuration = allow_configuration
16810
+ # Firewall backup availability zone ID.
16811
+ self.standby_zone_id = standby_zone_id
16701
16812
  # The CIDR block of the VPC.
16702
16813
  self.vpc_cidr = vpc_cidr
16703
16814
  # The VPC ID.
@@ -16706,6 +16817,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16706
16817
  self.vswitch_cidr = vswitch_cidr
16707
16818
  # The vSwitch ID.
16708
16819
  self.vswitch_id = vswitch_id
16820
+ # The availability zone ID of the virtual switch.
16821
+ self.vswitch_zone_id = vswitch_zone_id
16709
16822
  # The zone ID.
16710
16823
  self.zone_id = zone_id
16711
16824
 
@@ -16720,6 +16833,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16720
16833
  result = dict()
16721
16834
  if self.allow_configuration is not None:
16722
16835
  result['AllowConfiguration'] = self.allow_configuration
16836
+ if self.standby_zone_id is not None:
16837
+ result['StandbyZoneId'] = self.standby_zone_id
16723
16838
  if self.vpc_cidr is not None:
16724
16839
  result['VpcCidr'] = self.vpc_cidr
16725
16840
  if self.vpc_id is not None:
@@ -16728,6 +16843,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16728
16843
  result['VswitchCidr'] = self.vswitch_cidr
16729
16844
  if self.vswitch_id is not None:
16730
16845
  result['VswitchId'] = self.vswitch_id
16846
+ if self.vswitch_zone_id is not None:
16847
+ result['VswitchZoneId'] = self.vswitch_zone_id
16731
16848
  if self.zone_id is not None:
16732
16849
  result['ZoneId'] = self.zone_id
16733
16850
  return result
@@ -16736,6 +16853,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16736
16853
  m = m or dict()
16737
16854
  if m.get('AllowConfiguration') is not None:
16738
16855
  self.allow_configuration = m.get('AllowConfiguration')
16856
+ if m.get('StandbyZoneId') is not None:
16857
+ self.standby_zone_id = m.get('StandbyZoneId')
16739
16858
  if m.get('VpcCidr') is not None:
16740
16859
  self.vpc_cidr = m.get('VpcCidr')
16741
16860
  if m.get('VpcId') is not None:
@@ -16744,6 +16863,8 @@ class DescribeVpcFirewallCenDetailResponseBodyFirewallVpc(TeaModel):
16744
16863
  self.vswitch_cidr = m.get('VswitchCidr')
16745
16864
  if m.get('VswitchId') is not None:
16746
16865
  self.vswitch_id = m.get('VswitchId')
16866
+ if m.get('VswitchZoneId') is not None:
16867
+ self.vswitch_zone_id = m.get('VswitchZoneId')
16747
16868
  if m.get('ZoneId') is not None:
16748
16869
  self.zone_id = m.get('ZoneId')
16749
16870
  return self
@@ -17054,7 +17175,7 @@ class DescribeVpcFirewallCenDetailResponseBody(TeaModel):
17054
17175
  # * **closed**: disabled
17055
17176
  # * **notconfigured**: not configured
17056
17177
  self.firewall_switch_status = firewall_switch_status
17057
- # The VPC that is automatically created for the firewall.
17178
+ # The firewall VPC.
17058
17179
  self.firewall_vpc = firewall_vpc
17059
17180
  # The details about the VPC.
17060
17181
  self.local_vpc = local_vpc
@@ -17290,6 +17411,33 @@ class DescribeVpcFirewallCenListRequest(TeaModel):
17290
17411
  return self
17291
17412
 
17292
17413
 
17414
+ class DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig(TeaModel):
17415
+ def __init__(
17416
+ self,
17417
+ strict_mode: int = None,
17418
+ ):
17419
+ self.strict_mode = strict_mode
17420
+
17421
+ def validate(self):
17422
+ pass
17423
+
17424
+ def to_map(self):
17425
+ _map = super().to_map()
17426
+ if _map is not None:
17427
+ return _map
17428
+
17429
+ result = dict()
17430
+ if self.strict_mode is not None:
17431
+ result['StrictMode'] = self.strict_mode
17432
+ return result
17433
+
17434
+ def from_map(self, m: dict = None):
17435
+ m = m or dict()
17436
+ if m.get('StrictMode') is not None:
17437
+ self.strict_mode = m.get('StrictMode')
17438
+ return self
17439
+
17440
+
17293
17441
  class DescribeVpcFirewallCenListResponseBodyVpcFirewallsIpsConfig(TeaModel):
17294
17442
  def __init__(
17295
17443
  self,
@@ -17573,6 +17721,7 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewallsLocalVpc(TeaModel):
17573
17721
  class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17574
17722
  def __init__(
17575
17723
  self,
17724
+ acl_config: DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig = None,
17576
17725
  cen_id: str = None,
17577
17726
  cen_name: str = None,
17578
17727
  connect_type: str = None,
@@ -17586,6 +17735,7 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17586
17735
  vpc_firewall_id: str = None,
17587
17736
  vpc_firewall_name: str = None,
17588
17737
  ):
17738
+ self.acl_config = acl_config
17589
17739
  # The ID of the CEN instance.
17590
17740
  self.cen_id = cen_id
17591
17741
  # The name of the CEN instance.
@@ -17629,6 +17779,8 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17629
17779
  self.vpc_firewall_name = vpc_firewall_name
17630
17780
 
17631
17781
  def validate(self):
17782
+ if self.acl_config:
17783
+ self.acl_config.validate()
17632
17784
  if self.ips_config:
17633
17785
  self.ips_config.validate()
17634
17786
  if self.local_vpc:
@@ -17640,6 +17792,8 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17640
17792
  return _map
17641
17793
 
17642
17794
  result = dict()
17795
+ if self.acl_config is not None:
17796
+ result['AclConfig'] = self.acl_config.to_map()
17643
17797
  if self.cen_id is not None:
17644
17798
  result['CenId'] = self.cen_id
17645
17799
  if self.cen_name is not None:
@@ -17668,6 +17822,9 @@ class DescribeVpcFirewallCenListResponseBodyVpcFirewalls(TeaModel):
17668
17822
 
17669
17823
  def from_map(self, m: dict = None):
17670
17824
  m = m or dict()
17825
+ if m.get('AclConfig') is not None:
17826
+ temp_model = DescribeVpcFirewallCenListResponseBodyVpcFirewallsAclConfig()
17827
+ self.acl_config = temp_model.from_map(m['AclConfig'])
17671
17828
  if m.get('CenId') is not None:
17672
17829
  self.cen_id = m.get('CenId')
17673
17830
  if m.get('CenName') is not None:
@@ -19331,6 +19488,34 @@ class DescribeVpcFirewallListRequest(TeaModel):
19331
19488
  return self
19332
19489
 
19333
19490
 
19491
+ class DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig(TeaModel):
19492
+ def __init__(
19493
+ self,
19494
+ strict_mode: int = None,
19495
+ ):
19496
+ # This parameter is required.
19497
+ self.strict_mode = strict_mode
19498
+
19499
+ def validate(self):
19500
+ pass
19501
+
19502
+ def to_map(self):
19503
+ _map = super().to_map()
19504
+ if _map is not None:
19505
+ return _map
19506
+
19507
+ result = dict()
19508
+ if self.strict_mode is not None:
19509
+ result['StrictMode'] = self.strict_mode
19510
+ return result
19511
+
19512
+ def from_map(self, m: dict = None):
19513
+ m = m or dict()
19514
+ if m.get('StrictMode') is not None:
19515
+ self.strict_mode = m.get('StrictMode')
19516
+ return self
19517
+
19518
+
19334
19519
  class DescribeVpcFirewallListResponseBodyVpcFirewallsIpsConfig(TeaModel):
19335
19520
  def __init__(
19336
19521
  self,
@@ -19694,6 +19879,7 @@ class DescribeVpcFirewallListResponseBodyVpcFirewallsPeerVpc(TeaModel):
19694
19879
  class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19695
19880
  def __init__(
19696
19881
  self,
19882
+ acl_config: DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig = None,
19697
19883
  bandwidth: int = None,
19698
19884
  connect_sub_type: str = None,
19699
19885
  connect_type: str = None,
@@ -19707,6 +19893,7 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19707
19893
  vpc_firewall_id: str = None,
19708
19894
  vpc_firewall_name: str = None,
19709
19895
  ):
19896
+ self.acl_config = acl_config
19710
19897
  # The bandwidth of the Express Connect circuit. Unit: Mbit/s.
19711
19898
  self.bandwidth = bandwidth
19712
19899
  # The sub-type of the connection. Valid values:
@@ -19747,6 +19934,8 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19747
19934
  self.vpc_firewall_name = vpc_firewall_name
19748
19935
 
19749
19936
  def validate(self):
19937
+ if self.acl_config:
19938
+ self.acl_config.validate()
19750
19939
  if self.ips_config:
19751
19940
  self.ips_config.validate()
19752
19941
  if self.local_vpc:
@@ -19760,6 +19949,8 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19760
19949
  return _map
19761
19950
 
19762
19951
  result = dict()
19952
+ if self.acl_config is not None:
19953
+ result['AclConfig'] = self.acl_config.to_map()
19763
19954
  if self.bandwidth is not None:
19764
19955
  result['Bandwidth'] = self.bandwidth
19765
19956
  if self.connect_sub_type is not None:
@@ -19788,6 +19979,9 @@ class DescribeVpcFirewallListResponseBodyVpcFirewalls(TeaModel):
19788
19979
 
19789
19980
  def from_map(self, m: dict = None):
19790
19981
  m = m or dict()
19982
+ if m.get('AclConfig') is not None:
19983
+ temp_model = DescribeVpcFirewallListResponseBodyVpcFirewallsAclConfig()
19984
+ self.acl_config = temp_model.from_map(m['AclConfig'])
19791
19985
  if m.get('Bandwidth') is not None:
19792
19986
  self.bandwidth = m.get('Bandwidth')
19793
19987
  if m.get('ConnectSubType') is not None:
@@ -21723,33 +21917,30 @@ class ModifyControlPolicyPositionResponse(TeaModel):
21723
21917
  class ModifyDefaultIPSConfigRequest(TeaModel):
21724
21918
  def __init__(
21725
21919
  self,
21726
- basic_rules: str = None,
21727
- cti_rules: str = None,
21920
+ basic_rules: int = None,
21921
+ cti_rules: int = None,
21728
21922
  lang: str = None,
21729
21923
  max_sdl: int = None,
21730
- patch_rules: str = None,
21731
- rule_class: str = None,
21732
- run_mode: str = None,
21924
+ patch_rules: int = None,
21925
+ rule_class: int = None,
21926
+ run_mode: int = None,
21733
21927
  ):
21734
21928
  # Specifies whether to enable basic protection. Valid values:
21735
21929
  #
21736
21930
  # * **1**: yes
21737
21931
  # * **0**: no
21738
- #
21739
- # This parameter is required.
21740
21932
  self.basic_rules = basic_rules
21741
21933
  # Specifies whether to enable threat intelligence. Valid values:
21742
21934
  #
21743
21935
  # * **1**: yes
21744
21936
  # * **0**: no
21745
- #
21746
- # This parameter is required.
21747
21937
  self.cti_rules = cti_rules
21748
21938
  # The language of the content within the request and response. Valid values:
21749
21939
  #
21750
21940
  # * **zh** (default)
21751
21941
  # * **en**\
21752
21942
  self.lang = lang
21943
+ # The maximum amount of traffic that can be processed by the sensitive data leak detection feature each day.
21753
21944
  self.max_sdl = max_sdl
21754
21945
  # Specifies whether to enable virtual patching. Valid values:
21755
21946
  #
@@ -22801,10 +22992,12 @@ class ModifyObjectGroupOperationResponse(TeaModel):
22801
22992
  class ModifyPolicyAdvancedConfigRequest(TeaModel):
22802
22993
  def __init__(
22803
22994
  self,
22995
+ eips: List[str] = None,
22804
22996
  internet_switch: str = None,
22805
22997
  lang: str = None,
22806
22998
  source_ip: str = None,
22807
22999
  ):
23000
+ self.eips = eips
22808
23001
  # Specifies whether to enable the strict mode for the access control policy. Valid values:
22809
23002
  #
22810
23003
  # * **on**: enables the strict mode.
@@ -22829,6 +23022,8 @@ class ModifyPolicyAdvancedConfigRequest(TeaModel):
22829
23022
  return _map
22830
23023
 
22831
23024
  result = dict()
23025
+ if self.eips is not None:
23026
+ result['Eips'] = self.eips
22832
23027
  if self.internet_switch is not None:
22833
23028
  result['InternetSwitch'] = self.internet_switch
22834
23029
  if self.lang is not None:
@@ -22839,6 +23034,8 @@ class ModifyPolicyAdvancedConfigRequest(TeaModel):
22839
23034
 
22840
23035
  def from_map(self, m: dict = None):
22841
23036
  m = m or dict()
23037
+ if m.get('Eips') is not None:
23038
+ self.eips = m.get('Eips')
22842
23039
  if m.get('InternetSwitch') is not None:
22843
23040
  self.internet_switch = m.get('InternetSwitch')
22844
23041
  if m.get('Lang') is not None:
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: alibabacloud-cloudfw20171207
3
- Version: 5.0.4
3
+ Version: 6.0.0
4
4
  Summary: Alibaba Cloud Cloudfw (20171207) SDK Library for Python
5
5
  Home-page: https://github.com/aliyun/alibabacloud-python-sdk
6
6
  Author: Alibaba Cloud SDK
@@ -23,7 +23,7 @@ Description-Content-Type: text/markdown
23
23
  License-File: LICENSE
24
24
  Requires-Dist: alibabacloud-endpoint-util (<1.0.0,>=0.0.3)
25
25
  Requires-Dist: alibabacloud-openapi-util (<1.0.0,>=0.2.2)
26
- Requires-Dist: alibabacloud-tea-openapi (<1.0.0,>=0.3.12)
26
+ Requires-Dist: alibabacloud-tea-openapi (<1.0.0,>=0.3.14)
27
27
  Requires-Dist: alibabacloud-tea-util (<1.0.0,>=0.3.13)
28
28
 
29
29
  English | [简体中文](README-CN.md)
@@ -0,0 +1,8 @@
1
+ alibabacloud_cloudfw20171207/__init__.py,sha256=Rkd1gANO4By6zNziV5IlrYVUm6VSKASr3_tojR5k-FE,21
2
+ alibabacloud_cloudfw20171207/client.py,sha256=0yZv5yok8YohvYFK5-fF4OSBIsm76PCl8ybYOFX3i6g,668072
3
+ alibabacloud_cloudfw20171207/models.py,sha256=RFcR4gc6J_izCQ4ktBzupxH6jrTmEpfzvmvixtO5BNU,964464
4
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/LICENSE,sha256=0CFItL6bHvxqS44T6vlLoW2R4Zaic304OO3WxN0oXF0,600
5
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/METADATA,sha256=YcGZgZVj2Nk29FMnTJyEjyerubcOUBNiBcOjHpM69hc,2340
6
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
7
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/top_level.txt,sha256=rry_3PsvxYDan1V9ajGHg5R6j3f8NFiQdy-iZOzl8F4,29
8
+ alibabacloud_cloudfw20171207-6.0.0.dist-info/RECORD,,
@@ -1,8 +0,0 @@
1
- alibabacloud_cloudfw20171207/__init__.py,sha256=DlEj85tsqFMfrW0l_6GZjQSt1NWv481x92v8Ff4wvzs,21
2
- alibabacloud_cloudfw20171207/client.py,sha256=NRPrGadm7VUbpJdVD5hLjH7bKU03N_fF1hqJ7VhMO8M,667378
3
- alibabacloud_cloudfw20171207/models.py,sha256=1jWi4WdXUlD5Y8KYfm-mVZo-7GtoDxAEjK0M6EpMoEY,956557
4
- alibabacloud_cloudfw20171207-5.0.4.dist-info/LICENSE,sha256=0CFItL6bHvxqS44T6vlLoW2R4Zaic304OO3WxN0oXF0,600
5
- alibabacloud_cloudfw20171207-5.0.4.dist-info/METADATA,sha256=dWY4bF55xi7xvzktQs_eQTJ0v5VQtmJ8LsoocEggcKg,2340
6
- alibabacloud_cloudfw20171207-5.0.4.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
7
- alibabacloud_cloudfw20171207-5.0.4.dist-info/top_level.txt,sha256=rry_3PsvxYDan1V9ajGHg5R6j3f8NFiQdy-iZOzl8F4,29
8
- alibabacloud_cloudfw20171207-5.0.4.dist-info/RECORD,,