catocli 2.0.3__py3-none-any.whl → 2.0.5__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of catocli might be problematic. Click here for more details.
- build/lib/catocli/Utils/clidriver.py +268 -0
- build/lib/catocli/Utils/profile_manager.py +188 -0
- build/lib/catocli/Utils/version_checker.py +192 -0
- build/lib/catocli/__init__.py +2 -0
- build/lib/catocli/__main__.py +12 -0
- build/lib/catocli/parsers/configure/__init__.py +115 -0
- build/lib/catocli/parsers/configure/configure.py +307 -0
- build/lib/catocli/parsers/custom/__init__.py +57 -0
- build/lib/catocli/parsers/custom/customLib.py +561 -0
- build/lib/catocli/parsers/custom/export_rules/__init__.py +42 -0
- build/lib/catocli/parsers/custom/export_rules/export_rules.py +234 -0
- build/lib/catocli/parsers/custom/export_sites/__init__.py +21 -0
- build/lib/catocli/parsers/custom/export_sites/export_sites.py +372 -0
- build/lib/catocli/parsers/custom/import_rules_to_tf/__init__.py +58 -0
- build/lib/catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +451 -0
- build/lib/catocli/parsers/custom/import_sites_to_tf/__init__.py +45 -0
- build/lib/catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +891 -0
- build/lib/catocli/parsers/mutation_accountManagement/__init__.py +48 -0
- build/lib/catocli/parsers/mutation_admin/__init__.py +48 -0
- build/lib/catocli/parsers/mutation_container/__init__.py +138 -0
- build/lib/catocli/parsers/mutation_hardware/__init__.py +22 -0
- build/lib/catocli/parsers/mutation_policy/__init__.py +1305 -0
- build/lib/catocli/parsers/mutation_sandbox/__init__.py +35 -0
- build/lib/catocli/parsers/mutation_site/__init__.py +373 -0
- build/lib/catocli/parsers/mutation_sites/__init__.py +373 -0
- build/lib/catocli/parsers/mutation_xdr/__init__.py +48 -0
- build/lib/catocli/parsers/parserApiClient.py +513 -0
- build/lib/catocli/parsers/query_accountBySubdomain/__init__.py +16 -0
- build/lib/catocli/parsers/query_accountManagement/__init__.py +16 -0
- build/lib/catocli/parsers/query_accountMetrics/__init__.py +16 -0
- build/lib/catocli/parsers/query_accountRoles/__init__.py +16 -0
- build/lib/catocli/parsers/query_accountSnapshot/__init__.py +16 -0
- build/lib/catocli/parsers/query_admin/__init__.py +16 -0
- build/lib/catocli/parsers/query_admins/__init__.py +16 -0
- build/lib/catocli/parsers/query_appStats/__init__.py +16 -0
- build/lib/catocli/parsers/query_appStatsTimeSeries/__init__.py +16 -0
- build/lib/catocli/parsers/query_auditFeed/__init__.py +16 -0
- build/lib/catocli/parsers/query_catalogs/__init__.py +16 -0
- build/lib/catocli/parsers/query_container/__init__.py +16 -0
- build/lib/catocli/parsers/query_devices/__init__.py +16 -0
- build/lib/catocli/parsers/query_entityLookup/__init__.py +16 -0
- build/lib/catocli/parsers/query_events/__init__.py +16 -0
- build/lib/catocli/parsers/query_eventsFeed/__init__.py +16 -0
- build/lib/catocli/parsers/query_eventsTimeSeries/__init__.py +16 -0
- build/lib/catocli/parsers/query_hardware/__init__.py +16 -0
- build/lib/catocli/parsers/query_hardwareManagement/__init__.py +16 -0
- build/lib/catocli/parsers/query_licensing/__init__.py +16 -0
- build/lib/catocli/parsers/query_policy/__init__.py +161 -0
- build/lib/catocli/parsers/query_sandbox/__init__.py +16 -0
- build/lib/catocli/parsers/query_site/__init__.py +100 -0
- build/lib/catocli/parsers/query_siteLocation/__init__.py +13 -0
- build/lib/catocli/parsers/query_subDomains/__init__.py +16 -0
- build/lib/catocli/parsers/query_xdr/__init__.py +35 -0
- build/lib/catocli/parsers/raw/__init__.py +12 -0
- build/lib/graphql_client/__init__.py +11 -0
- build/lib/graphql_client/api/__init__.py +3 -0
- build/lib/graphql_client/api/call_api.py +84 -0
- build/lib/graphql_client/api_client.py +192 -0
- build/lib/graphql_client/api_client_types.py +409 -0
- build/lib/graphql_client/configuration.py +232 -0
- build/lib/graphql_client/models/__init__.py +13 -0
- build/lib/graphql_client/models/no_schema.py +71 -0
- build/lib/schema/catolib.py +1141 -0
- build/lib/schema/importSchema.py +60 -0
- build/lib/schema/remove_policyid.py +89 -0
- build/lib/schema/remove_policyid_mutations.py +89 -0
- build/lib/scripts/catolib.py +62 -0
- build/lib/scripts/export_if_rules_to_json.py +188 -0
- build/lib/scripts/export_wf_rules_to_json.py +111 -0
- build/lib/scripts/import_wf_rules_to_tfstate.py +331 -0
- build/lib/vendor/certifi/__init__.py +4 -0
- build/lib/vendor/certifi/__main__.py +12 -0
- build/lib/vendor/certifi/core.py +114 -0
- build/lib/vendor/certifi/py.typed +0 -0
- build/lib/vendor/six.py +998 -0
- build/lib/vendor/urllib3/__init__.py +211 -0
- build/lib/vendor/urllib3/_base_connection.py +172 -0
- build/lib/vendor/urllib3/_collections.py +483 -0
- build/lib/vendor/urllib3/_request_methods.py +278 -0
- build/lib/vendor/urllib3/_version.py +16 -0
- build/lib/vendor/urllib3/connection.py +1033 -0
- build/lib/vendor/urllib3/connectionpool.py +1182 -0
- build/lib/vendor/urllib3/contrib/__init__.py +0 -0
- build/lib/vendor/urllib3/contrib/emscripten/__init__.py +18 -0
- build/lib/vendor/urllib3/contrib/emscripten/connection.py +254 -0
- build/lib/vendor/urllib3/contrib/emscripten/fetch.py +418 -0
- build/lib/vendor/urllib3/contrib/emscripten/request.py +22 -0
- build/lib/vendor/urllib3/contrib/emscripten/response.py +285 -0
- build/lib/vendor/urllib3/contrib/pyopenssl.py +552 -0
- build/lib/vendor/urllib3/contrib/socks.py +228 -0
- build/lib/vendor/urllib3/exceptions.py +321 -0
- build/lib/vendor/urllib3/fields.py +341 -0
- build/lib/vendor/urllib3/filepost.py +89 -0
- build/lib/vendor/urllib3/http2/__init__.py +53 -0
- build/lib/vendor/urllib3/http2/connection.py +356 -0
- build/lib/vendor/urllib3/http2/probe.py +87 -0
- build/lib/vendor/urllib3/poolmanager.py +637 -0
- build/lib/vendor/urllib3/py.typed +2 -0
- build/lib/vendor/urllib3/response.py +1265 -0
- build/lib/vendor/urllib3/util/__init__.py +42 -0
- build/lib/vendor/urllib3/util/connection.py +137 -0
- build/lib/vendor/urllib3/util/proxy.py +43 -0
- build/lib/vendor/urllib3/util/request.py +256 -0
- build/lib/vendor/urllib3/util/response.py +101 -0
- build/lib/vendor/urllib3/util/retry.py +533 -0
- build/lib/vendor/urllib3/util/ssl_.py +513 -0
- build/lib/vendor/urllib3/util/ssl_match_hostname.py +159 -0
- build/lib/vendor/urllib3/util/ssltransport.py +276 -0
- build/lib/vendor/urllib3/util/timeout.py +275 -0
- build/lib/vendor/urllib3/util/url.py +471 -0
- build/lib/vendor/urllib3/util/util.py +42 -0
- build/lib/vendor/urllib3/util/wait.py +124 -0
- catocli/Utils/clidriver.py +1 -4
- catocli/__init__.py +1 -1
- catocli/parsers/custom/export_rules/__init__.py +2 -0
- catocli/parsers/custom/export_rules/export_rules.py +29 -5
- catocli/parsers/custom/export_sites/__init__.py +1 -0
- catocli/parsers/custom/export_sites/export_sites.py +10 -3
- catocli/parsers/mutation_container/__init__.py +116 -0
- catocli/parsers/mutation_container_fqdn/README.md +7 -0
- catocli/parsers/mutation_container_fqdn_addValues/README.md +17 -0
- catocli/parsers/mutation_container_fqdn_createFromFile/README.md +17 -0
- catocli/parsers/mutation_container_fqdn_removeValues/README.md +17 -0
- catocli/parsers/mutation_container_fqdn_updateFromFile/README.md +17 -0
- catocli/parsers/mutation_container_ipAddressRange/README.md +7 -0
- catocli/parsers/mutation_container_ipAddressRange_addValues/README.md +17 -0
- catocli/parsers/mutation_container_ipAddressRange_createFromFile/README.md +17 -0
- catocli/parsers/mutation_container_ipAddressRange_removeValues/README.md +17 -0
- catocli/parsers/mutation_container_ipAddressRange_updateFromFile/README.md +17 -0
- catocli/parsers/mutation_policy_internetFirewall_addRule/README.md +1 -1
- catocli/parsers/mutation_policy_internetFirewall_updateRule/README.md +1 -1
- catocli/parsers/mutation_policy_wanFirewall_addRule/README.md +1 -1
- catocli/parsers/mutation_policy_wanFirewall_updateRule/README.md +1 -1
- catocli/parsers/parserApiClient.py +183 -7
- catocli/parsers/query_policy/README.md +0 -17
- catocli/parsers/query_policy/__init__.py +153 -8
- catocli/parsers/query_policy_appTenantRestriction/README.md +7 -0
- catocli/parsers/query_policy_appTenantRestriction_policy/README.md +17 -0
- catocli/parsers/query_policy_dynamicIpAllocation/README.md +7 -0
- catocli/parsers/query_policy_dynamicIpAllocation_policy/README.md +17 -0
- catocli/parsers/query_policy_internetFirewall/README.md +7 -0
- catocli/parsers/query_policy_internetFirewall_policy/README.md +17 -0
- catocli/parsers/query_policy_remotePortFwd/README.md +7 -0
- catocli/parsers/query_policy_remotePortFwd_policy/README.md +17 -0
- catocli/parsers/query_policy_socketLan/README.md +7 -0
- catocli/parsers/query_policy_socketLan_policy/README.md +17 -0
- catocli/parsers/query_policy_terminalServer/README.md +7 -0
- catocli/parsers/query_policy_terminalServer_policy/README.md +17 -0
- catocli/parsers/query_policy_wanFirewall/README.md +7 -0
- catocli/parsers/query_policy_wanFirewall_policy/README.md +17 -0
- catocli/parsers/query_policy_wanNetwork/README.md +7 -0
- catocli/parsers/query_policy_wanNetwork_policy/README.md +17 -0
- catocli/parsers/query_site/README.md +0 -16
- catocli/parsers/query_site/__init__.py +92 -8
- catocli/parsers/query_site_availableVersionList/README.md +17 -0
- catocli/parsers/query_site_bgpPeer/README.md +17 -0
- catocli/parsers/query_site_bgpPeerList/README.md +17 -0
- catocli/parsers/query_site_cloudInterconnectConnectionConnectivity/README.md +17 -0
- catocli/parsers/query_site_cloudInterconnectPhysicalConnection/README.md +17 -0
- catocli/parsers/query_site_cloudInterconnectPhysicalConnectionId/README.md +17 -0
- catocli/parsers/query_site_siteBgpStatus/README.md +17 -0
- {catocli-2.0.3.dist-info → catocli-2.0.5.dist-info}/METADATA +1 -1
- {catocli-2.0.3.dist-info → catocli-2.0.5.dist-info}/RECORD +291 -121
- {catocli-2.0.3.dist-info → catocli-2.0.5.dist-info}/top_level.txt +1 -0
- graphql_client/api/call_api.py +4 -3
- models/mutation.container.fqdn.addValues.json +866 -0
- models/mutation.container.fqdn.createFromFile.json +819 -0
- models/mutation.container.fqdn.removeValues.json +866 -0
- models/mutation.container.fqdn.updateFromFile.json +1045 -0
- models/mutation.container.ipAddressRange.addValues.json +1020 -0
- models/mutation.container.ipAddressRange.createFromFile.json +819 -0
- models/mutation.container.ipAddressRange.removeValues.json +1020 -0
- models/mutation.container.ipAddressRange.updateFromFile.json +1045 -0
- models/mutation.policy.appTenantRestriction.addRule.json +8 -8
- models/mutation.policy.appTenantRestriction.addSection.json +1 -1
- models/mutation.policy.appTenantRestriction.createPolicyRevision.json +2 -2
- models/mutation.policy.appTenantRestriction.discardPolicyRevision.json +2 -2
- models/mutation.policy.appTenantRestriction.moveRule.json +2 -2
- models/mutation.policy.appTenantRestriction.moveSection.json +1 -1
- models/mutation.policy.appTenantRestriction.publishPolicyRevision.json +2 -2
- models/mutation.policy.appTenantRestriction.removeRule.json +2 -2
- models/mutation.policy.appTenantRestriction.removeSection.json +1 -1
- models/mutation.policy.appTenantRestriction.updatePolicy.json +2 -2
- models/mutation.policy.appTenantRestriction.updateRule.json +8 -8
- models/mutation.policy.appTenantRestriction.updateSection.json +1 -1
- models/mutation.policy.dynamicIpAllocation.addRule.json +1 -1
- models/mutation.policy.dynamicIpAllocation.addSection.json +1 -1
- models/mutation.policy.dynamicIpAllocation.createPolicyRevision.json +1 -1
- models/mutation.policy.dynamicIpAllocation.discardPolicyRevision.json +1 -1
- models/mutation.policy.dynamicIpAllocation.moveRule.json +1 -1
- models/mutation.policy.dynamicIpAllocation.moveSection.json +1 -1
- models/mutation.policy.dynamicIpAllocation.publishPolicyRevision.json +1 -1
- models/mutation.policy.dynamicIpAllocation.removeRule.json +1 -1
- models/mutation.policy.dynamicIpAllocation.removeSection.json +1 -1
- models/mutation.policy.dynamicIpAllocation.updatePolicy.json +1 -1
- models/mutation.policy.dynamicIpAllocation.updateRule.json +1 -1
- models/mutation.policy.dynamicIpAllocation.updateSection.json +1 -1
- models/mutation.policy.internetFirewall.addRule.json +502 -55
- models/mutation.policy.internetFirewall.addSection.json +1 -1
- models/mutation.policy.internetFirewall.createPolicyRevision.json +127 -10
- models/mutation.policy.internetFirewall.discardPolicyRevision.json +127 -10
- models/mutation.policy.internetFirewall.moveRule.json +127 -10
- models/mutation.policy.internetFirewall.moveSection.json +1 -1
- models/mutation.policy.internetFirewall.publishPolicyRevision.json +127 -10
- models/mutation.policy.internetFirewall.removeRule.json +127 -10
- models/mutation.policy.internetFirewall.removeSection.json +1 -1
- models/mutation.policy.internetFirewall.updatePolicy.json +127 -10
- models/mutation.policy.internetFirewall.updateRule.json +493 -55
- models/mutation.policy.internetFirewall.updateSection.json +1 -1
- models/mutation.policy.remotePortFwd.addRule.json +5 -5
- models/mutation.policy.remotePortFwd.addSection.json +1 -1
- models/mutation.policy.remotePortFwd.createPolicyRevision.json +2 -2
- models/mutation.policy.remotePortFwd.discardPolicyRevision.json +2 -2
- models/mutation.policy.remotePortFwd.moveRule.json +2 -2
- models/mutation.policy.remotePortFwd.moveSection.json +1 -1
- models/mutation.policy.remotePortFwd.publishPolicyRevision.json +2 -2
- models/mutation.policy.remotePortFwd.removeRule.json +2 -2
- models/mutation.policy.remotePortFwd.removeSection.json +1 -1
- models/mutation.policy.remotePortFwd.updatePolicy.json +2 -2
- models/mutation.policy.remotePortFwd.updateRule.json +5 -5
- models/mutation.policy.remotePortFwd.updateSection.json +1 -1
- models/mutation.policy.socketLan.addRule.json +16 -16
- models/mutation.policy.socketLan.addSection.json +1 -1
- models/mutation.policy.socketLan.createPolicyRevision.json +4 -4
- models/mutation.policy.socketLan.discardPolicyRevision.json +4 -4
- models/mutation.policy.socketLan.moveRule.json +4 -4
- models/mutation.policy.socketLan.moveSection.json +1 -1
- models/mutation.policy.socketLan.publishPolicyRevision.json +4 -4
- models/mutation.policy.socketLan.removeRule.json +4 -4
- models/mutation.policy.socketLan.removeSection.json +1 -1
- models/mutation.policy.socketLan.updatePolicy.json +4 -4
- models/mutation.policy.socketLan.updateRule.json +16 -16
- models/mutation.policy.socketLan.updateSection.json +1 -1
- models/mutation.policy.terminalServer.addRule.json +1 -1
- models/mutation.policy.terminalServer.addSection.json +1 -1
- models/mutation.policy.terminalServer.createPolicyRevision.json +1 -1
- models/mutation.policy.terminalServer.discardPolicyRevision.json +1 -1
- models/mutation.policy.terminalServer.moveRule.json +1 -1
- models/mutation.policy.terminalServer.moveSection.json +1 -1
- models/mutation.policy.terminalServer.publishPolicyRevision.json +1 -1
- models/mutation.policy.terminalServer.removeRule.json +1 -1
- models/mutation.policy.terminalServer.removeSection.json +1 -1
- models/mutation.policy.terminalServer.updatePolicy.json +1 -1
- models/mutation.policy.terminalServer.updateRule.json +1 -1
- models/mutation.policy.terminalServer.updateSection.json +1 -1
- models/mutation.policy.wanFirewall.addRule.json +500 -53
- models/mutation.policy.wanFirewall.addSection.json +1 -1
- models/mutation.policy.wanFirewall.createPolicyRevision.json +128 -11
- models/mutation.policy.wanFirewall.discardPolicyRevision.json +128 -11
- models/mutation.policy.wanFirewall.moveRule.json +128 -11
- models/mutation.policy.wanFirewall.moveSection.json +1 -1
- models/mutation.policy.wanFirewall.publishPolicyRevision.json +128 -11
- models/mutation.policy.wanFirewall.removeRule.json +128 -11
- models/mutation.policy.wanFirewall.removeSection.json +1 -1
- models/mutation.policy.wanFirewall.updatePolicy.json +128 -11
- models/mutation.policy.wanFirewall.updateRule.json +491 -53
- models/mutation.policy.wanFirewall.updateSection.json +1 -1
- models/mutation.policy.wanNetwork.addRule.json +13 -13
- models/mutation.policy.wanNetwork.addSection.json +1 -1
- models/mutation.policy.wanNetwork.createPolicyRevision.json +1 -1
- models/mutation.policy.wanNetwork.discardPolicyRevision.json +1 -1
- models/mutation.policy.wanNetwork.moveRule.json +1 -1
- models/mutation.policy.wanNetwork.moveSection.json +1 -1
- models/mutation.policy.wanNetwork.publishPolicyRevision.json +1 -1
- models/mutation.policy.wanNetwork.removeRule.json +1 -1
- models/mutation.policy.wanNetwork.removeSection.json +1 -1
- models/mutation.policy.wanNetwork.updatePolicy.json +1 -1
- models/mutation.policy.wanNetwork.updateRule.json +13 -13
- models/mutation.policy.wanNetwork.updateSection.json +1 -1
- models/query.policy.appTenantRestriction.policy.json +3086 -0
- models/query.policy.dynamicIpAllocation.policy.json +1934 -0
- models/query.policy.internetFirewall.policy.json +7833 -0
- models/query.policy.json +233 -0
- models/query.policy.remotePortFwd.policy.json +2387 -0
- models/query.policy.socketLan.policy.json +7140 -0
- models/query.policy.terminalServer.policy.json +1632 -0
- models/query.policy.wanFirewall.policy.json +9212 -0
- models/query.policy.wanNetwork.policy.json +8010 -0
- models/query.site.availableVersionList.json +365 -0
- models/query.site.bgpPeer.json +1917 -0
- models/query.site.bgpPeerList.json +2076 -0
- models/query.site.cloudInterconnectConnectionConnectivity.json +298 -0
- models/query.site.cloudInterconnectPhysicalConnection.json +728 -0
- models/query.site.cloudInterconnectPhysicalConnectionId.json +660 -0
- models/query.site.siteBgpStatus.json +869 -0
- schema/catolib.py +13 -6
- schema/remove_policyid.py +89 -0
- schema/remove_policyid_mutations.py +89 -0
- {catocli-2.0.3.dist-info → catocli-2.0.5.dist-info}/LICENSE +0 -0
- {catocli-2.0.3.dist-info → catocli-2.0.5.dist-info}/WHEEL +0 -0
- {catocli-2.0.3.dist-info → catocli-2.0.5.dist-info}/entry_points.txt +0 -0
|
@@ -216,9 +216,114 @@
|
|
|
216
216
|
},
|
|
217
217
|
"varName": "action"
|
|
218
218
|
},
|
|
219
|
+
"activePeriod": {
|
|
220
|
+
"defaultValue": "{useEffectiveFrom: false, useExpiresAt: false}",
|
|
221
|
+
"description": "The time period during which the rule is active, outside this period, the rule is inactive",
|
|
222
|
+
"id_str": "addRule___input___rule___activePeriod",
|
|
223
|
+
"name": "activePeriod",
|
|
224
|
+
"path": "addRule.input.rule.activePeriod",
|
|
225
|
+
"requestStr": "$policyRuleActivePeriodInput:PolicyRuleActivePeriodInput! ",
|
|
226
|
+
"required": true,
|
|
227
|
+
"responseStr": "activePeriod:$policyRuleActivePeriodInput ",
|
|
228
|
+
"type": {
|
|
229
|
+
"definition": {
|
|
230
|
+
"description": "Input of the time period during which the rule is active, outside this period, the rule is inactive",
|
|
231
|
+
"enumValues": null,
|
|
232
|
+
"fields": null,
|
|
233
|
+
"inputFields": {
|
|
234
|
+
"effectiveFrom": {
|
|
235
|
+
"defaultValue": null,
|
|
236
|
+
"description": "The time the rule becomes active, if not used, default null",
|
|
237
|
+
"id_str": "addRule___input___rule___activePeriod___effectiveFrom",
|
|
238
|
+
"name": "effectiveFrom",
|
|
239
|
+
"path": "addRule.input.rule.activePeriod.effectiveFrom",
|
|
240
|
+
"requestStr": "$effectiveFrom:DateTime ",
|
|
241
|
+
"required": false,
|
|
242
|
+
"responseStr": "effectiveFrom:$effectiveFrom ",
|
|
243
|
+
"type": {
|
|
244
|
+
"kind": [
|
|
245
|
+
"SCALAR"
|
|
246
|
+
],
|
|
247
|
+
"name": "DateTime",
|
|
248
|
+
"non_null": false
|
|
249
|
+
},
|
|
250
|
+
"varName": "effectiveFrom"
|
|
251
|
+
},
|
|
252
|
+
"expiresAt": {
|
|
253
|
+
"defaultValue": null,
|
|
254
|
+
"description": "The time the rule expires, if not used, default null",
|
|
255
|
+
"id_str": "addRule___input___rule___activePeriod___expiresAt",
|
|
256
|
+
"name": "expiresAt",
|
|
257
|
+
"path": "addRule.input.rule.activePeriod.expiresAt",
|
|
258
|
+
"requestStr": "$expiresAt:DateTime ",
|
|
259
|
+
"required": false,
|
|
260
|
+
"responseStr": "expiresAt:$expiresAt ",
|
|
261
|
+
"type": {
|
|
262
|
+
"kind": [
|
|
263
|
+
"SCALAR"
|
|
264
|
+
],
|
|
265
|
+
"name": "DateTime",
|
|
266
|
+
"non_null": false
|
|
267
|
+
},
|
|
268
|
+
"varName": "expiresAt"
|
|
269
|
+
},
|
|
270
|
+
"useEffectiveFrom": {
|
|
271
|
+
"defaultValue": "false",
|
|
272
|
+
"description": null,
|
|
273
|
+
"id_str": "addRule___input___rule___activePeriod___useEffectiveFrom",
|
|
274
|
+
"name": "useEffectiveFrom",
|
|
275
|
+
"path": "addRule.input.rule.activePeriod.useEffectiveFrom",
|
|
276
|
+
"requestStr": "$useEffectiveFrom:Boolean! ",
|
|
277
|
+
"required": true,
|
|
278
|
+
"responseStr": "useEffectiveFrom:$useEffectiveFrom ",
|
|
279
|
+
"type": {
|
|
280
|
+
"kind": [
|
|
281
|
+
"NON_NULL",
|
|
282
|
+
"SCALAR"
|
|
283
|
+
],
|
|
284
|
+
"name": "Boolean",
|
|
285
|
+
"non_null": false
|
|
286
|
+
},
|
|
287
|
+
"varName": "useEffectiveFrom"
|
|
288
|
+
},
|
|
289
|
+
"useExpiresAt": {
|
|
290
|
+
"defaultValue": "false",
|
|
291
|
+
"description": null,
|
|
292
|
+
"id_str": "addRule___input___rule___activePeriod___useExpiresAt",
|
|
293
|
+
"name": "useExpiresAt",
|
|
294
|
+
"path": "addRule.input.rule.activePeriod.useExpiresAt",
|
|
295
|
+
"requestStr": "$useExpiresAt:Boolean! ",
|
|
296
|
+
"required": true,
|
|
297
|
+
"responseStr": "useExpiresAt:$useExpiresAt ",
|
|
298
|
+
"type": {
|
|
299
|
+
"kind": [
|
|
300
|
+
"NON_NULL",
|
|
301
|
+
"SCALAR"
|
|
302
|
+
],
|
|
303
|
+
"name": "Boolean",
|
|
304
|
+
"non_null": false
|
|
305
|
+
},
|
|
306
|
+
"varName": "useExpiresAt"
|
|
307
|
+
}
|
|
308
|
+
},
|
|
309
|
+
"interfaces": null,
|
|
310
|
+
"kind": "INPUT_OBJECT",
|
|
311
|
+
"name": "PolicyRuleActivePeriodInput",
|
|
312
|
+
"possibleTypes": null
|
|
313
|
+
},
|
|
314
|
+
"indexType": "input_object",
|
|
315
|
+
"kind": [
|
|
316
|
+
"NON_NULL",
|
|
317
|
+
"INPUT_OBJECT"
|
|
318
|
+
],
|
|
319
|
+
"name": "PolicyRuleActivePeriodInput",
|
|
320
|
+
"non_null": false
|
|
321
|
+
},
|
|
322
|
+
"varName": "policyRuleActivePeriodInput"
|
|
323
|
+
},
|
|
219
324
|
"application": {
|
|
220
325
|
"defaultValue": "{application: [], appCategory: [], customApp: [], customCategory: [], sanctionedAppsCategory: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: []}",
|
|
221
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
326
|
+
"description": "Application traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
222
327
|
"id_str": "addRule___input___rule___application",
|
|
223
328
|
"name": "application",
|
|
224
329
|
"path": "addRule.input.rule.application",
|
|
@@ -518,7 +623,7 @@
|
|
|
518
623
|
},
|
|
519
624
|
"customCategory": {
|
|
520
625
|
"defaultValue": "[]",
|
|
521
|
-
"description": "Custom Categories
|
|
626
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
522
627
|
"id_str": "addRule___input___rule___application___customCategory",
|
|
523
628
|
"name": "customCategory",
|
|
524
629
|
"path": "addRule.input.rule.application.customCategory",
|
|
@@ -1023,7 +1128,7 @@
|
|
|
1023
1128
|
},
|
|
1024
1129
|
"country": {
|
|
1025
1130
|
"defaultValue": "[]",
|
|
1026
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
1131
|
+
"description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
1027
1132
|
"id_str": "addRule___input___rule___country",
|
|
1028
1133
|
"name": "country",
|
|
1029
1134
|
"path": "addRule.input.rule.country",
|
|
@@ -1137,7 +1242,7 @@
|
|
|
1137
1242
|
},
|
|
1138
1243
|
"destination": {
|
|
1139
1244
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
1140
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
1245
|
+
"description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
1141
1246
|
"id_str": "addRule___input___rule___destination",
|
|
1142
1247
|
"name": "destination",
|
|
1143
1248
|
"path": "addRule.input.rule.destination",
|
|
@@ -1167,7 +1272,7 @@
|
|
|
1167
1272
|
"inputFields": {
|
|
1168
1273
|
"by": {
|
|
1169
1274
|
"defaultValue": "ID",
|
|
1170
|
-
"description": "Defines the object identification method
|
|
1275
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
1171
1276
|
"id_str": "addRule___input___rule___destination___floatingSubnet___by",
|
|
1172
1277
|
"name": "by",
|
|
1173
1278
|
"path": "addRule.input.rule.destination.floatingSubnet.by",
|
|
@@ -2231,7 +2336,7 @@
|
|
|
2231
2336
|
},
|
|
2232
2337
|
"device": {
|
|
2233
2338
|
"defaultValue": "[]",
|
|
2234
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
2339
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
2235
2340
|
"id_str": "addRule___input___rule___device",
|
|
2236
2341
|
"name": "device",
|
|
2237
2342
|
"path": "addRule.input.rule.device",
|
|
@@ -2483,7 +2588,7 @@
|
|
|
2483
2588
|
},
|
|
2484
2589
|
"deviceOS": {
|
|
2485
2590
|
"defaultValue": "[]",
|
|
2486
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
2591
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
2487
2592
|
"id_str": "addRule___input___rule___deviceOS",
|
|
2488
2593
|
"name": "deviceOS",
|
|
2489
2594
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -2929,7 +3034,7 @@
|
|
|
2929
3034
|
},
|
|
2930
3035
|
"customCategory": {
|
|
2931
3036
|
"defaultValue": "[]",
|
|
2932
|
-
"description": "Custom Categories
|
|
3037
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
2933
3038
|
"id_str": "addRule___input___rule___exceptions___application___customCategory",
|
|
2934
3039
|
"name": "customCategory",
|
|
2935
3040
|
"path": "addRule.input.rule.exceptions.application.customCategory",
|
|
@@ -3559,7 +3664,7 @@
|
|
|
3559
3664
|
"inputFields": {
|
|
3560
3665
|
"by": {
|
|
3561
3666
|
"defaultValue": "ID",
|
|
3562
|
-
"description": "Defines the object identification method
|
|
3667
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
3563
3668
|
"id_str": "addRule___input___rule___exceptions___destination___floatingSubnet___by",
|
|
3564
3669
|
"name": "by",
|
|
3565
3670
|
"path": "addRule.input.rule.exceptions.destination.floatingSubnet.by",
|
|
@@ -5344,7 +5449,7 @@
|
|
|
5344
5449
|
"inputFields": {
|
|
5345
5450
|
"by": {
|
|
5346
5451
|
"defaultValue": "ID",
|
|
5347
|
-
"description": "Defines the object identification method
|
|
5452
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
5348
5453
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
5349
5454
|
"name": "by",
|
|
5350
5455
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -6742,7 +6847,7 @@
|
|
|
6742
6847
|
},
|
|
6743
6848
|
"service": {
|
|
6744
6849
|
"defaultValue": "{standard: [], custom: []}",
|
|
6745
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
6850
|
+
"description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
6746
6851
|
"id_str": "addRule___input___rule___service",
|
|
6747
6852
|
"name": "service",
|
|
6748
6853
|
"path": "addRule.input.rule.service",
|
|
@@ -7050,7 +7155,7 @@
|
|
|
7050
7155
|
},
|
|
7051
7156
|
"source": {
|
|
7052
7157
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
7053
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
7158
|
+
"description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
7054
7159
|
"id_str": "addRule___input___rule___source",
|
|
7055
7160
|
"name": "source",
|
|
7056
7161
|
"path": "addRule.input.rule.source",
|
|
@@ -7080,7 +7185,7 @@
|
|
|
7080
7185
|
"inputFields": {
|
|
7081
7186
|
"by": {
|
|
7082
7187
|
"defaultValue": "ID",
|
|
7083
|
-
"description": "Defines the object identification method
|
|
7188
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
7084
7189
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
7085
7190
|
"name": "by",
|
|
7086
7191
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -8174,7 +8279,7 @@
|
|
|
8174
8279
|
"inputFields": {
|
|
8175
8280
|
"enabled": {
|
|
8176
8281
|
"defaultValue": "false",
|
|
8177
|
-
"description": "TRUE
|
|
8282
|
+
"description": "TRUE – send alerts when the rule is matched, FALSE – don’t send alerts when the rule is matched",
|
|
8178
8283
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
8179
8284
|
"name": "enabled",
|
|
8180
8285
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -8798,6 +8903,8 @@
|
|
|
8798
8903
|
"PolicyMutationError": true,
|
|
8799
8904
|
"PolicyMutationRevisionInput": true,
|
|
8800
8905
|
"PolicyMutationStatus": true,
|
|
8906
|
+
"PolicyRuleActivePeriod": true,
|
|
8907
|
+
"PolicyRuleActivePeriodInput": true,
|
|
8801
8908
|
"PolicyRulePositionEnum": true,
|
|
8802
8909
|
"PolicyRulePositionInput": true,
|
|
8803
8910
|
"PolicyRuleTrackingAlert": true,
|
|
@@ -9065,9 +9172,114 @@
|
|
|
9065
9172
|
},
|
|
9066
9173
|
"varName": "action"
|
|
9067
9174
|
},
|
|
9175
|
+
"activePeriod": {
|
|
9176
|
+
"defaultValue": "{useEffectiveFrom: false, useExpiresAt: false}",
|
|
9177
|
+
"description": "The time period during which the rule is active, outside this period, the rule is inactive",
|
|
9178
|
+
"id_str": "addRule___input___rule___activePeriod",
|
|
9179
|
+
"name": "activePeriod",
|
|
9180
|
+
"path": "addRule.input.rule.activePeriod",
|
|
9181
|
+
"requestStr": "$policyRuleActivePeriodInput:PolicyRuleActivePeriodInput! ",
|
|
9182
|
+
"required": true,
|
|
9183
|
+
"responseStr": "activePeriod:$policyRuleActivePeriodInput ",
|
|
9184
|
+
"type": {
|
|
9185
|
+
"definition": {
|
|
9186
|
+
"description": "Input of the time period during which the rule is active, outside this period, the rule is inactive",
|
|
9187
|
+
"enumValues": null,
|
|
9188
|
+
"fields": null,
|
|
9189
|
+
"inputFields": {
|
|
9190
|
+
"effectiveFrom": {
|
|
9191
|
+
"defaultValue": null,
|
|
9192
|
+
"description": "The time the rule becomes active, if not used, default null",
|
|
9193
|
+
"id_str": "addRule___input___rule___activePeriod___effectiveFrom",
|
|
9194
|
+
"name": "effectiveFrom",
|
|
9195
|
+
"path": "addRule.input.rule.activePeriod.effectiveFrom",
|
|
9196
|
+
"requestStr": "$effectiveFrom:DateTime ",
|
|
9197
|
+
"required": false,
|
|
9198
|
+
"responseStr": "effectiveFrom:$effectiveFrom ",
|
|
9199
|
+
"type": {
|
|
9200
|
+
"kind": [
|
|
9201
|
+
"SCALAR"
|
|
9202
|
+
],
|
|
9203
|
+
"name": "DateTime",
|
|
9204
|
+
"non_null": false
|
|
9205
|
+
},
|
|
9206
|
+
"varName": "effectiveFrom"
|
|
9207
|
+
},
|
|
9208
|
+
"expiresAt": {
|
|
9209
|
+
"defaultValue": null,
|
|
9210
|
+
"description": "The time the rule expires, if not used, default null",
|
|
9211
|
+
"id_str": "addRule___input___rule___activePeriod___expiresAt",
|
|
9212
|
+
"name": "expiresAt",
|
|
9213
|
+
"path": "addRule.input.rule.activePeriod.expiresAt",
|
|
9214
|
+
"requestStr": "$expiresAt:DateTime ",
|
|
9215
|
+
"required": false,
|
|
9216
|
+
"responseStr": "expiresAt:$expiresAt ",
|
|
9217
|
+
"type": {
|
|
9218
|
+
"kind": [
|
|
9219
|
+
"SCALAR"
|
|
9220
|
+
],
|
|
9221
|
+
"name": "DateTime",
|
|
9222
|
+
"non_null": false
|
|
9223
|
+
},
|
|
9224
|
+
"varName": "expiresAt"
|
|
9225
|
+
},
|
|
9226
|
+
"useEffectiveFrom": {
|
|
9227
|
+
"defaultValue": "false",
|
|
9228
|
+
"description": null,
|
|
9229
|
+
"id_str": "addRule___input___rule___activePeriod___useEffectiveFrom",
|
|
9230
|
+
"name": "useEffectiveFrom",
|
|
9231
|
+
"path": "addRule.input.rule.activePeriod.useEffectiveFrom",
|
|
9232
|
+
"requestStr": "$useEffectiveFrom:Boolean! ",
|
|
9233
|
+
"required": true,
|
|
9234
|
+
"responseStr": "useEffectiveFrom:$useEffectiveFrom ",
|
|
9235
|
+
"type": {
|
|
9236
|
+
"kind": [
|
|
9237
|
+
"NON_NULL",
|
|
9238
|
+
"SCALAR"
|
|
9239
|
+
],
|
|
9240
|
+
"name": "Boolean",
|
|
9241
|
+
"non_null": false
|
|
9242
|
+
},
|
|
9243
|
+
"varName": "useEffectiveFrom"
|
|
9244
|
+
},
|
|
9245
|
+
"useExpiresAt": {
|
|
9246
|
+
"defaultValue": "false",
|
|
9247
|
+
"description": null,
|
|
9248
|
+
"id_str": "addRule___input___rule___activePeriod___useExpiresAt",
|
|
9249
|
+
"name": "useExpiresAt",
|
|
9250
|
+
"path": "addRule.input.rule.activePeriod.useExpiresAt",
|
|
9251
|
+
"requestStr": "$useExpiresAt:Boolean! ",
|
|
9252
|
+
"required": true,
|
|
9253
|
+
"responseStr": "useExpiresAt:$useExpiresAt ",
|
|
9254
|
+
"type": {
|
|
9255
|
+
"kind": [
|
|
9256
|
+
"NON_NULL",
|
|
9257
|
+
"SCALAR"
|
|
9258
|
+
],
|
|
9259
|
+
"name": "Boolean",
|
|
9260
|
+
"non_null": false
|
|
9261
|
+
},
|
|
9262
|
+
"varName": "useExpiresAt"
|
|
9263
|
+
}
|
|
9264
|
+
},
|
|
9265
|
+
"interfaces": null,
|
|
9266
|
+
"kind": "INPUT_OBJECT",
|
|
9267
|
+
"name": "PolicyRuleActivePeriodInput",
|
|
9268
|
+
"possibleTypes": null
|
|
9269
|
+
},
|
|
9270
|
+
"indexType": "input_object",
|
|
9271
|
+
"kind": [
|
|
9272
|
+
"NON_NULL",
|
|
9273
|
+
"INPUT_OBJECT"
|
|
9274
|
+
],
|
|
9275
|
+
"name": "PolicyRuleActivePeriodInput",
|
|
9276
|
+
"non_null": false
|
|
9277
|
+
},
|
|
9278
|
+
"varName": "policyRuleActivePeriodInput"
|
|
9279
|
+
},
|
|
9068
9280
|
"application": {
|
|
9069
9281
|
"defaultValue": "{application: [], appCategory: [], customApp: [], customCategory: [], sanctionedAppsCategory: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: []}",
|
|
9070
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
9282
|
+
"description": "Application traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
9071
9283
|
"id_str": "addRule___input___rule___application",
|
|
9072
9284
|
"name": "application",
|
|
9073
9285
|
"path": "addRule.input.rule.application",
|
|
@@ -9367,7 +9579,7 @@
|
|
|
9367
9579
|
},
|
|
9368
9580
|
"customCategory": {
|
|
9369
9581
|
"defaultValue": "[]",
|
|
9370
|
-
"description": "Custom Categories
|
|
9582
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
9371
9583
|
"id_str": "addRule___input___rule___application___customCategory",
|
|
9372
9584
|
"name": "customCategory",
|
|
9373
9585
|
"path": "addRule.input.rule.application.customCategory",
|
|
@@ -9872,7 +10084,7 @@
|
|
|
9872
10084
|
},
|
|
9873
10085
|
"country": {
|
|
9874
10086
|
"defaultValue": "[]",
|
|
9875
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
10087
|
+
"description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
9876
10088
|
"id_str": "addRule___input___rule___country",
|
|
9877
10089
|
"name": "country",
|
|
9878
10090
|
"path": "addRule.input.rule.country",
|
|
@@ -9986,7 +10198,7 @@
|
|
|
9986
10198
|
},
|
|
9987
10199
|
"destination": {
|
|
9988
10200
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
9989
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
10201
|
+
"description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
9990
10202
|
"id_str": "addRule___input___rule___destination",
|
|
9991
10203
|
"name": "destination",
|
|
9992
10204
|
"path": "addRule.input.rule.destination",
|
|
@@ -10016,7 +10228,7 @@
|
|
|
10016
10228
|
"inputFields": {
|
|
10017
10229
|
"by": {
|
|
10018
10230
|
"defaultValue": "ID",
|
|
10019
|
-
"description": "Defines the object identification method
|
|
10231
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
10020
10232
|
"id_str": "addRule___input___rule___destination___floatingSubnet___by",
|
|
10021
10233
|
"name": "by",
|
|
10022
10234
|
"path": "addRule.input.rule.destination.floatingSubnet.by",
|
|
@@ -11080,7 +11292,7 @@
|
|
|
11080
11292
|
},
|
|
11081
11293
|
"device": {
|
|
11082
11294
|
"defaultValue": "[]",
|
|
11083
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
11295
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
11084
11296
|
"id_str": "addRule___input___rule___device",
|
|
11085
11297
|
"name": "device",
|
|
11086
11298
|
"path": "addRule.input.rule.device",
|
|
@@ -11332,7 +11544,7 @@
|
|
|
11332
11544
|
},
|
|
11333
11545
|
"deviceOS": {
|
|
11334
11546
|
"defaultValue": "[]",
|
|
11335
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
11547
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
11336
11548
|
"id_str": "addRule___input___rule___deviceOS",
|
|
11337
11549
|
"name": "deviceOS",
|
|
11338
11550
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -11778,7 +11990,7 @@
|
|
|
11778
11990
|
},
|
|
11779
11991
|
"customCategory": {
|
|
11780
11992
|
"defaultValue": "[]",
|
|
11781
|
-
"description": "Custom Categories
|
|
11993
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
11782
11994
|
"id_str": "addRule___input___rule___exceptions___application___customCategory",
|
|
11783
11995
|
"name": "customCategory",
|
|
11784
11996
|
"path": "addRule.input.rule.exceptions.application.customCategory",
|
|
@@ -12408,7 +12620,7 @@
|
|
|
12408
12620
|
"inputFields": {
|
|
12409
12621
|
"by": {
|
|
12410
12622
|
"defaultValue": "ID",
|
|
12411
|
-
"description": "Defines the object identification method
|
|
12623
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
12412
12624
|
"id_str": "addRule___input___rule___exceptions___destination___floatingSubnet___by",
|
|
12413
12625
|
"name": "by",
|
|
12414
12626
|
"path": "addRule.input.rule.exceptions.destination.floatingSubnet.by",
|
|
@@ -14193,7 +14405,7 @@
|
|
|
14193
14405
|
"inputFields": {
|
|
14194
14406
|
"by": {
|
|
14195
14407
|
"defaultValue": "ID",
|
|
14196
|
-
"description": "Defines the object identification method
|
|
14408
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
14197
14409
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
14198
14410
|
"name": "by",
|
|
14199
14411
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -15591,7 +15803,7 @@
|
|
|
15591
15803
|
},
|
|
15592
15804
|
"service": {
|
|
15593
15805
|
"defaultValue": "{standard: [], custom: []}",
|
|
15594
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
15806
|
+
"description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
15595
15807
|
"id_str": "addRule___input___rule___service",
|
|
15596
15808
|
"name": "service",
|
|
15597
15809
|
"path": "addRule.input.rule.service",
|
|
@@ -15899,7 +16111,7 @@
|
|
|
15899
16111
|
},
|
|
15900
16112
|
"source": {
|
|
15901
16113
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
15902
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
16114
|
+
"description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
15903
16115
|
"id_str": "addRule___input___rule___source",
|
|
15904
16116
|
"name": "source",
|
|
15905
16117
|
"path": "addRule.input.rule.source",
|
|
@@ -15929,7 +16141,7 @@
|
|
|
15929
16141
|
"inputFields": {
|
|
15930
16142
|
"by": {
|
|
15931
16143
|
"defaultValue": "ID",
|
|
15932
|
-
"description": "Defines the object identification method
|
|
16144
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
15933
16145
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
15934
16146
|
"name": "by",
|
|
15935
16147
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -17023,7 +17235,7 @@
|
|
|
17023
17235
|
"inputFields": {
|
|
17024
17236
|
"enabled": {
|
|
17025
17237
|
"defaultValue": "false",
|
|
17026
|
-
"description": "TRUE
|
|
17238
|
+
"description": "TRUE – send alerts when the rule is matched, FALSE – don’t send alerts when the rule is matched",
|
|
17027
17239
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
17028
17240
|
"name": "enabled",
|
|
17029
17241
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -17869,9 +18081,114 @@
|
|
|
17869
18081
|
},
|
|
17870
18082
|
"varName": "action"
|
|
17871
18083
|
},
|
|
18084
|
+
"activePeriod": {
|
|
18085
|
+
"defaultValue": "{useEffectiveFrom: false, useExpiresAt: false}",
|
|
18086
|
+
"description": "The time period during which the rule is active, outside this period, the rule is inactive",
|
|
18087
|
+
"id_str": "addRule___input___rule___activePeriod",
|
|
18088
|
+
"name": "activePeriod",
|
|
18089
|
+
"path": "addRule.input.rule.activePeriod",
|
|
18090
|
+
"requestStr": "$policyRuleActivePeriodInput:PolicyRuleActivePeriodInput! ",
|
|
18091
|
+
"required": true,
|
|
18092
|
+
"responseStr": "activePeriod:$policyRuleActivePeriodInput ",
|
|
18093
|
+
"type": {
|
|
18094
|
+
"definition": {
|
|
18095
|
+
"description": "Input of the time period during which the rule is active, outside this period, the rule is inactive",
|
|
18096
|
+
"enumValues": null,
|
|
18097
|
+
"fields": null,
|
|
18098
|
+
"inputFields": {
|
|
18099
|
+
"effectiveFrom": {
|
|
18100
|
+
"defaultValue": null,
|
|
18101
|
+
"description": "The time the rule becomes active, if not used, default null",
|
|
18102
|
+
"id_str": "addRule___input___rule___activePeriod___effectiveFrom",
|
|
18103
|
+
"name": "effectiveFrom",
|
|
18104
|
+
"path": "addRule.input.rule.activePeriod.effectiveFrom",
|
|
18105
|
+
"requestStr": "$effectiveFrom:DateTime ",
|
|
18106
|
+
"required": false,
|
|
18107
|
+
"responseStr": "effectiveFrom:$effectiveFrom ",
|
|
18108
|
+
"type": {
|
|
18109
|
+
"kind": [
|
|
18110
|
+
"SCALAR"
|
|
18111
|
+
],
|
|
18112
|
+
"name": "DateTime",
|
|
18113
|
+
"non_null": false
|
|
18114
|
+
},
|
|
18115
|
+
"varName": "effectiveFrom"
|
|
18116
|
+
},
|
|
18117
|
+
"expiresAt": {
|
|
18118
|
+
"defaultValue": null,
|
|
18119
|
+
"description": "The time the rule expires, if not used, default null",
|
|
18120
|
+
"id_str": "addRule___input___rule___activePeriod___expiresAt",
|
|
18121
|
+
"name": "expiresAt",
|
|
18122
|
+
"path": "addRule.input.rule.activePeriod.expiresAt",
|
|
18123
|
+
"requestStr": "$expiresAt:DateTime ",
|
|
18124
|
+
"required": false,
|
|
18125
|
+
"responseStr": "expiresAt:$expiresAt ",
|
|
18126
|
+
"type": {
|
|
18127
|
+
"kind": [
|
|
18128
|
+
"SCALAR"
|
|
18129
|
+
],
|
|
18130
|
+
"name": "DateTime",
|
|
18131
|
+
"non_null": false
|
|
18132
|
+
},
|
|
18133
|
+
"varName": "expiresAt"
|
|
18134
|
+
},
|
|
18135
|
+
"useEffectiveFrom": {
|
|
18136
|
+
"defaultValue": "false",
|
|
18137
|
+
"description": null,
|
|
18138
|
+
"id_str": "addRule___input___rule___activePeriod___useEffectiveFrom",
|
|
18139
|
+
"name": "useEffectiveFrom",
|
|
18140
|
+
"path": "addRule.input.rule.activePeriod.useEffectiveFrom",
|
|
18141
|
+
"requestStr": "$useEffectiveFrom:Boolean! ",
|
|
18142
|
+
"required": true,
|
|
18143
|
+
"responseStr": "useEffectiveFrom:$useEffectiveFrom ",
|
|
18144
|
+
"type": {
|
|
18145
|
+
"kind": [
|
|
18146
|
+
"NON_NULL",
|
|
18147
|
+
"SCALAR"
|
|
18148
|
+
],
|
|
18149
|
+
"name": "Boolean",
|
|
18150
|
+
"non_null": false
|
|
18151
|
+
},
|
|
18152
|
+
"varName": "useEffectiveFrom"
|
|
18153
|
+
},
|
|
18154
|
+
"useExpiresAt": {
|
|
18155
|
+
"defaultValue": "false",
|
|
18156
|
+
"description": null,
|
|
18157
|
+
"id_str": "addRule___input___rule___activePeriod___useExpiresAt",
|
|
18158
|
+
"name": "useExpiresAt",
|
|
18159
|
+
"path": "addRule.input.rule.activePeriod.useExpiresAt",
|
|
18160
|
+
"requestStr": "$useExpiresAt:Boolean! ",
|
|
18161
|
+
"required": true,
|
|
18162
|
+
"responseStr": "useExpiresAt:$useExpiresAt ",
|
|
18163
|
+
"type": {
|
|
18164
|
+
"kind": [
|
|
18165
|
+
"NON_NULL",
|
|
18166
|
+
"SCALAR"
|
|
18167
|
+
],
|
|
18168
|
+
"name": "Boolean",
|
|
18169
|
+
"non_null": false
|
|
18170
|
+
},
|
|
18171
|
+
"varName": "useExpiresAt"
|
|
18172
|
+
}
|
|
18173
|
+
},
|
|
18174
|
+
"interfaces": null,
|
|
18175
|
+
"kind": "INPUT_OBJECT",
|
|
18176
|
+
"name": "PolicyRuleActivePeriodInput",
|
|
18177
|
+
"possibleTypes": null
|
|
18178
|
+
},
|
|
18179
|
+
"indexType": "input_object",
|
|
18180
|
+
"kind": [
|
|
18181
|
+
"NON_NULL",
|
|
18182
|
+
"INPUT_OBJECT"
|
|
18183
|
+
],
|
|
18184
|
+
"name": "PolicyRuleActivePeriodInput",
|
|
18185
|
+
"non_null": false
|
|
18186
|
+
},
|
|
18187
|
+
"varName": "policyRuleActivePeriodInput"
|
|
18188
|
+
},
|
|
17872
18189
|
"application": {
|
|
17873
18190
|
"defaultValue": "{application: [], appCategory: [], customApp: [], customCategory: [], sanctionedAppsCategory: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: []}",
|
|
17874
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
18191
|
+
"description": "Application traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
17875
18192
|
"id_str": "addRule___input___rule___application",
|
|
17876
18193
|
"name": "application",
|
|
17877
18194
|
"path": "addRule.input.rule.application",
|
|
@@ -18171,7 +18488,7 @@
|
|
|
18171
18488
|
},
|
|
18172
18489
|
"customCategory": {
|
|
18173
18490
|
"defaultValue": "[]",
|
|
18174
|
-
"description": "Custom Categories
|
|
18491
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
18175
18492
|
"id_str": "addRule___input___rule___application___customCategory",
|
|
18176
18493
|
"name": "customCategory",
|
|
18177
18494
|
"path": "addRule.input.rule.application.customCategory",
|
|
@@ -18676,7 +18993,7 @@
|
|
|
18676
18993
|
},
|
|
18677
18994
|
"country": {
|
|
18678
18995
|
"defaultValue": "[]",
|
|
18679
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
18996
|
+
"description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
18680
18997
|
"id_str": "addRule___input___rule___country",
|
|
18681
18998
|
"name": "country",
|
|
18682
18999
|
"path": "addRule.input.rule.country",
|
|
@@ -18790,7 +19107,7 @@
|
|
|
18790
19107
|
},
|
|
18791
19108
|
"destination": {
|
|
18792
19109
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
18793
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
19110
|
+
"description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
18794
19111
|
"id_str": "addRule___input___rule___destination",
|
|
18795
19112
|
"name": "destination",
|
|
18796
19113
|
"path": "addRule.input.rule.destination",
|
|
@@ -18820,7 +19137,7 @@
|
|
|
18820
19137
|
"inputFields": {
|
|
18821
19138
|
"by": {
|
|
18822
19139
|
"defaultValue": "ID",
|
|
18823
|
-
"description": "Defines the object identification method
|
|
19140
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
18824
19141
|
"id_str": "addRule___input___rule___destination___floatingSubnet___by",
|
|
18825
19142
|
"name": "by",
|
|
18826
19143
|
"path": "addRule.input.rule.destination.floatingSubnet.by",
|
|
@@ -19884,7 +20201,7 @@
|
|
|
19884
20201
|
},
|
|
19885
20202
|
"device": {
|
|
19886
20203
|
"defaultValue": "[]",
|
|
19887
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
20204
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
19888
20205
|
"id_str": "addRule___input___rule___device",
|
|
19889
20206
|
"name": "device",
|
|
19890
20207
|
"path": "addRule.input.rule.device",
|
|
@@ -20136,7 +20453,7 @@
|
|
|
20136
20453
|
},
|
|
20137
20454
|
"deviceOS": {
|
|
20138
20455
|
"defaultValue": "[]",
|
|
20139
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
20456
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
20140
20457
|
"id_str": "addRule___input___rule___deviceOS",
|
|
20141
20458
|
"name": "deviceOS",
|
|
20142
20459
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -20582,7 +20899,7 @@
|
|
|
20582
20899
|
},
|
|
20583
20900
|
"customCategory": {
|
|
20584
20901
|
"defaultValue": "[]",
|
|
20585
|
-
"description": "Custom Categories
|
|
20902
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
20586
20903
|
"id_str": "addRule___input___rule___exceptions___application___customCategory",
|
|
20587
20904
|
"name": "customCategory",
|
|
20588
20905
|
"path": "addRule.input.rule.exceptions.application.customCategory",
|
|
@@ -21212,7 +21529,7 @@
|
|
|
21212
21529
|
"inputFields": {
|
|
21213
21530
|
"by": {
|
|
21214
21531
|
"defaultValue": "ID",
|
|
21215
|
-
"description": "Defines the object identification method
|
|
21532
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
21216
21533
|
"id_str": "addRule___input___rule___exceptions___destination___floatingSubnet___by",
|
|
21217
21534
|
"name": "by",
|
|
21218
21535
|
"path": "addRule.input.rule.exceptions.destination.floatingSubnet.by",
|
|
@@ -22997,7 +23314,7 @@
|
|
|
22997
23314
|
"inputFields": {
|
|
22998
23315
|
"by": {
|
|
22999
23316
|
"defaultValue": "ID",
|
|
23000
|
-
"description": "Defines the object identification method
|
|
23317
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
23001
23318
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
23002
23319
|
"name": "by",
|
|
23003
23320
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -24395,7 +24712,7 @@
|
|
|
24395
24712
|
},
|
|
24396
24713
|
"service": {
|
|
24397
24714
|
"defaultValue": "{standard: [], custom: []}",
|
|
24398
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
24715
|
+
"description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
24399
24716
|
"id_str": "addRule___input___rule___service",
|
|
24400
24717
|
"name": "service",
|
|
24401
24718
|
"path": "addRule.input.rule.service",
|
|
@@ -24703,7 +25020,7 @@
|
|
|
24703
25020
|
},
|
|
24704
25021
|
"source": {
|
|
24705
25022
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
24706
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
25023
|
+
"description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
24707
25024
|
"id_str": "addRule___input___rule___source",
|
|
24708
25025
|
"name": "source",
|
|
24709
25026
|
"path": "addRule.input.rule.source",
|
|
@@ -24733,7 +25050,7 @@
|
|
|
24733
25050
|
"inputFields": {
|
|
24734
25051
|
"by": {
|
|
24735
25052
|
"defaultValue": "ID",
|
|
24736
|
-
"description": "Defines the object identification method
|
|
25053
|
+
"description": "Defines the object identification method – by ID (default) or by name",
|
|
24737
25054
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
24738
25055
|
"name": "by",
|
|
24739
25056
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -25827,7 +26144,7 @@
|
|
|
25827
26144
|
"inputFields": {
|
|
25828
26145
|
"enabled": {
|
|
25829
26146
|
"defaultValue": "false",
|
|
25830
|
-
"description": "TRUE
|
|
26147
|
+
"description": "TRUE – send alerts when the rule is matched, FALSE – don’t send alerts when the rule is matched",
|
|
25831
26148
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
25832
26149
|
"name": "enabled",
|
|
25833
26150
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -26327,7 +26644,7 @@
|
|
|
26327
26644
|
"responseStr": "errors:$policyMutationError ",
|
|
26328
26645
|
"type": {
|
|
26329
26646
|
"definition": {
|
|
26330
|
-
"description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can
|
|
26647
|
+
"description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can’t publish policy due to an internal error. Please try again in a few minutes\"\n\n\n## Rule Errors\n\n### `ruleIsLocked`\n- **Error Message:** \"Rule is locked by another revision\"\n\n### `ruleWasRemoved`\n- **Error Message:** \"Rule was already removed\"\n\n### `ruleNotExist`\n- **Error Message:** \"Rule does not exist\"\n\n### `ruleSectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `ruleSectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `rulePositionInvalid`\n- **Error Message:** \"Rule position is invalid\"\n\n### `ruleNameIsEmpty`\n- **Error Message:** \"Rule name can't be empty\"\n\n### `ruleNameAlreadyExists`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `ruleSystemModification`\n- **Error Message:** \"Can't modify a system rule\"\n\n### `ruleSystemMove`\n- **Error Message:** \"Can't add a rule above the system rules\"\n\n### `ruleHasInvalidEntity`\n- **Error Message:** \"Rule has an invalid entity\"\n\n### `failedValidatingRule`\n- **Error Message:** \"Something went wrong, couldn't validate rule\"\n\n\n## Section Errors\n\n### `sectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `sectionSystemMove`\n- **Error Message:** \"Section with system rules cannot be moved or removed\"\n\n### `sectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `sectionPositionInvalid`\n- **Error Message:** \"Section position is invalid\"",
|
|
26331
26648
|
"enumValues": null,
|
|
26332
26649
|
"fields": {
|
|
26333
26650
|
"errorCode": {
|
|
@@ -26626,11 +26943,127 @@
|
|
|
26626
26943
|
},
|
|
26627
26944
|
"varName": "action"
|
|
26628
26945
|
},
|
|
26946
|
+
"activePeriod": {
|
|
26947
|
+
"alias": "policyRuleActivePeriodActivePeriod: activePeriod",
|
|
26948
|
+
"args": {},
|
|
26949
|
+
"deprecationReason": null,
|
|
26950
|
+
"description": "The time period during which the rule is active, outside this period, the rule is inactive",
|
|
26951
|
+
"id_str": "wanFirewall___addRule___rule___rule___activePeriod",
|
|
26952
|
+
"isDeprecated": false,
|
|
26953
|
+
"name": "activePeriod",
|
|
26954
|
+
"path": "wanFirewall.addRule.rule.rule.activePeriod",
|
|
26955
|
+
"requestStr": "$policyRuleActivePeriod:PolicyRuleActivePeriod! ",
|
|
26956
|
+
"required": true,
|
|
26957
|
+
"responseStr": "activePeriod:$policyRuleActivePeriod ",
|
|
26958
|
+
"type": {
|
|
26959
|
+
"definition": {
|
|
26960
|
+
"description": "Returns the time period during which the rule is active, outside this period, the rule is inactive",
|
|
26961
|
+
"enumValues": null,
|
|
26962
|
+
"fields": {
|
|
26963
|
+
"effectiveFrom": {
|
|
26964
|
+
"args": {},
|
|
26965
|
+
"deprecationReason": null,
|
|
26966
|
+
"description": "The time the rule becomes active, if not used, default null",
|
|
26967
|
+
"id_str": "wanFirewall___addRule___rule___rule___activePeriod___effectiveFrom",
|
|
26968
|
+
"isDeprecated": false,
|
|
26969
|
+
"name": "effectiveFrom",
|
|
26970
|
+
"path": "wanFirewall.addRule.rule.rule.activePeriod.effectiveFrom",
|
|
26971
|
+
"requestStr": "$effectiveFrom:DateTime ",
|
|
26972
|
+
"required": false,
|
|
26973
|
+
"responseStr": "effectiveFrom:$effectiveFrom ",
|
|
26974
|
+
"type": {
|
|
26975
|
+
"kind": [
|
|
26976
|
+
"SCALAR"
|
|
26977
|
+
],
|
|
26978
|
+
"name": "DateTime",
|
|
26979
|
+
"non_null": false
|
|
26980
|
+
},
|
|
26981
|
+
"varName": "effectiveFrom"
|
|
26982
|
+
},
|
|
26983
|
+
"expiresAt": {
|
|
26984
|
+
"args": {},
|
|
26985
|
+
"deprecationReason": null,
|
|
26986
|
+
"description": "The time the rule expires, if not used, default null",
|
|
26987
|
+
"id_str": "wanFirewall___addRule___rule___rule___activePeriod___expiresAt",
|
|
26988
|
+
"isDeprecated": false,
|
|
26989
|
+
"name": "expiresAt",
|
|
26990
|
+
"path": "wanFirewall.addRule.rule.rule.activePeriod.expiresAt",
|
|
26991
|
+
"requestStr": "$expiresAt:DateTime ",
|
|
26992
|
+
"required": false,
|
|
26993
|
+
"responseStr": "expiresAt:$expiresAt ",
|
|
26994
|
+
"type": {
|
|
26995
|
+
"kind": [
|
|
26996
|
+
"SCALAR"
|
|
26997
|
+
],
|
|
26998
|
+
"name": "DateTime",
|
|
26999
|
+
"non_null": false
|
|
27000
|
+
},
|
|
27001
|
+
"varName": "expiresAt"
|
|
27002
|
+
},
|
|
27003
|
+
"useEffectiveFrom": {
|
|
27004
|
+
"args": {},
|
|
27005
|
+
"deprecationReason": null,
|
|
27006
|
+
"description": null,
|
|
27007
|
+
"id_str": "wanFirewall___addRule___rule___rule___activePeriod___useEffectiveFrom",
|
|
27008
|
+
"isDeprecated": false,
|
|
27009
|
+
"name": "useEffectiveFrom",
|
|
27010
|
+
"path": "wanFirewall.addRule.rule.rule.activePeriod.useEffectiveFrom",
|
|
27011
|
+
"requestStr": "$useEffectiveFrom:Boolean! ",
|
|
27012
|
+
"required": true,
|
|
27013
|
+
"responseStr": "useEffectiveFrom:$useEffectiveFrom ",
|
|
27014
|
+
"type": {
|
|
27015
|
+
"kind": [
|
|
27016
|
+
"NON_NULL",
|
|
27017
|
+
"SCALAR"
|
|
27018
|
+
],
|
|
27019
|
+
"name": "Boolean",
|
|
27020
|
+
"non_null": false
|
|
27021
|
+
},
|
|
27022
|
+
"varName": "useEffectiveFrom"
|
|
27023
|
+
},
|
|
27024
|
+
"useExpiresAt": {
|
|
27025
|
+
"args": {},
|
|
27026
|
+
"deprecationReason": null,
|
|
27027
|
+
"description": null,
|
|
27028
|
+
"id_str": "wanFirewall___addRule___rule___rule___activePeriod___useExpiresAt",
|
|
27029
|
+
"isDeprecated": false,
|
|
27030
|
+
"name": "useExpiresAt",
|
|
27031
|
+
"path": "wanFirewall.addRule.rule.rule.activePeriod.useExpiresAt",
|
|
27032
|
+
"requestStr": "$useExpiresAt:Boolean! ",
|
|
27033
|
+
"required": true,
|
|
27034
|
+
"responseStr": "useExpiresAt:$useExpiresAt ",
|
|
27035
|
+
"type": {
|
|
27036
|
+
"kind": [
|
|
27037
|
+
"NON_NULL",
|
|
27038
|
+
"SCALAR"
|
|
27039
|
+
],
|
|
27040
|
+
"name": "Boolean",
|
|
27041
|
+
"non_null": false
|
|
27042
|
+
},
|
|
27043
|
+
"varName": "useExpiresAt"
|
|
27044
|
+
}
|
|
27045
|
+
},
|
|
27046
|
+
"inputFields": null,
|
|
27047
|
+
"interfaces": {},
|
|
27048
|
+
"kind": "OBJECT",
|
|
27049
|
+
"name": "PolicyRuleActivePeriod",
|
|
27050
|
+
"possibleTypes": null
|
|
27051
|
+
},
|
|
27052
|
+
"indexType": "object",
|
|
27053
|
+
"kind": [
|
|
27054
|
+
"NON_NULL",
|
|
27055
|
+
"OBJECT"
|
|
27056
|
+
],
|
|
27057
|
+
"name": "PolicyRuleActivePeriod",
|
|
27058
|
+
"non_null": false
|
|
27059
|
+
},
|
|
27060
|
+
"varName": "policyRuleActivePeriod"
|
|
27061
|
+
},
|
|
26629
27062
|
"application": {
|
|
26630
27063
|
"alias": "wanFirewallApplicationApplication: application",
|
|
26631
27064
|
"args": {},
|
|
26632
27065
|
"deprecationReason": null,
|
|
26633
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
27066
|
+
"description": "Application traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
26634
27067
|
"id_str": "wanFirewall___addRule___rule___rule___application",
|
|
26635
27068
|
"isDeprecated": false,
|
|
26636
27069
|
"name": "application",
|
|
@@ -26881,7 +27314,7 @@
|
|
|
26881
27314
|
"alias": "customCategoryRefCustomCategory: customCategory",
|
|
26882
27315
|
"args": {},
|
|
26883
27316
|
"deprecationReason": null,
|
|
26884
|
-
"description": "Custom Categories
|
|
27317
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
26885
27318
|
"id_str": "wanFirewall___addRule___rule___rule___application___customCategory",
|
|
26886
27319
|
"isDeprecated": false,
|
|
26887
27320
|
"name": "customCategory",
|
|
@@ -27354,7 +27787,7 @@
|
|
|
27354
27787
|
"alias": "countryRefCountry: country",
|
|
27355
27788
|
"args": {},
|
|
27356
27789
|
"deprecationReason": null,
|
|
27357
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
27790
|
+
"description": "Source country traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
27358
27791
|
"id_str": "wanFirewall___addRule___rule___rule___country",
|
|
27359
27792
|
"isDeprecated": false,
|
|
27360
27793
|
"name": "country",
|
|
@@ -27453,7 +27886,7 @@
|
|
|
27453
27886
|
"alias": "wanFirewallDestinationDestination: destination",
|
|
27454
27887
|
"args": {},
|
|
27455
27888
|
"deprecationReason": null,
|
|
27456
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
27889
|
+
"description": "Destination traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
27457
27890
|
"id_str": "wanFirewall___addRule___rule___rule___destination",
|
|
27458
27891
|
"isDeprecated": false,
|
|
27459
27892
|
"name": "destination",
|
|
@@ -28391,7 +28824,7 @@
|
|
|
28391
28824
|
"alias": "deviceProfileRefDevice: device",
|
|
28392
28825
|
"args": {},
|
|
28393
28826
|
"deprecationReason": null,
|
|
28394
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
28827
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
28395
28828
|
"id_str": "wanFirewall___addRule___rule___rule___device",
|
|
28396
28829
|
"isDeprecated": false,
|
|
28397
28830
|
"name": "device",
|
|
@@ -28641,7 +29074,7 @@
|
|
|
28641
29074
|
"alias": "operatingSystemDeviceOS: deviceOS",
|
|
28642
29075
|
"args": {},
|
|
28643
29076
|
"deprecationReason": null,
|
|
28644
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
29077
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
28645
29078
|
"id_str": "wanFirewall___addRule___rule___rule___deviceOS",
|
|
28646
29079
|
"isDeprecated": false,
|
|
28647
29080
|
"name": "deviceOS",
|
|
@@ -29048,7 +29481,7 @@
|
|
|
29048
29481
|
"alias": "customCategoryRefCustomCategory: customCategory",
|
|
29049
29482
|
"args": {},
|
|
29050
29483
|
"deprecationReason": null,
|
|
29051
|
-
"description": "Custom Categories
|
|
29484
|
+
"description": "Custom Categories – Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
29052
29485
|
"id_str": "wanFirewall___addRule___rule___rule___exceptions___application___customCategory",
|
|
29053
29486
|
"isDeprecated": false,
|
|
29054
29487
|
"name": "customCategory",
|
|
@@ -32650,7 +33083,7 @@
|
|
|
32650
33083
|
"alias": "wanFirewallServiceTypeService: service",
|
|
32651
33084
|
"args": {},
|
|
32652
33085
|
"deprecationReason": null,
|
|
32653
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
33086
|
+
"description": "Destination service traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
32654
33087
|
"id_str": "wanFirewall___addRule___rule___rule___service",
|
|
32655
33088
|
"isDeprecated": false,
|
|
32656
33089
|
"name": "service",
|
|
@@ -32959,7 +33392,7 @@
|
|
|
32959
33392
|
"alias": "wanFirewallSourceSource: source",
|
|
32960
33393
|
"args": {},
|
|
32961
33394
|
"deprecationReason": null,
|
|
32962
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
33395
|
+
"description": "Source traffic matching criteria.\nLogical ‘OR’ is applied within the criteria set.\nLogical ‘AND’ is applied between criteria sets.",
|
|
32963
33396
|
"id_str": "wanFirewall___addRule___rule___rule___source",
|
|
32964
33397
|
"isDeprecated": false,
|
|
32965
33398
|
"name": "source",
|
|
@@ -33930,7 +34363,7 @@
|
|
|
33930
34363
|
"enabled": {
|
|
33931
34364
|
"args": {},
|
|
33932
34365
|
"deprecationReason": null,
|
|
33933
|
-
"description": "TRUE
|
|
34366
|
+
"description": "TRUE – send alerts when the rule is matched, FALSE – don’t send alerts when the rule is matched",
|
|
33934
34367
|
"id_str": "wanFirewall___addRule___rule___rule___tracking___alert___enabled",
|
|
33935
34368
|
"isDeprecated": false,
|
|
33936
34369
|
"name": "enabled",
|
|
@@ -34469,6 +34902,20 @@
|
|
|
34469
34902
|
"action": {
|
|
34470
34903
|
"action": "enum(WanFirewallActionEnum)"
|
|
34471
34904
|
},
|
|
34905
|
+
"activePeriod": {
|
|
34906
|
+
"effectiveFrom": {
|
|
34907
|
+
"effectiveFrom": "DateTime"
|
|
34908
|
+
},
|
|
34909
|
+
"expiresAt": {
|
|
34910
|
+
"expiresAt": "DateTime"
|
|
34911
|
+
},
|
|
34912
|
+
"useEffectiveFrom": {
|
|
34913
|
+
"useEffectiveFrom": "Boolean"
|
|
34914
|
+
},
|
|
34915
|
+
"useExpiresAt": {
|
|
34916
|
+
"useExpiresAt": "Boolean"
|
|
34917
|
+
}
|
|
34918
|
+
},
|
|
34472
34919
|
"application": {
|
|
34473
34920
|
"appCategory": {
|
|
34474
34921
|
"by": {
|