tccli 3.0.948.1__py2.py3-none-any.whl → 3.0.949.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (34) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/vpc/v20170312/CreateNetworkAclEntries.md +30 -0
  3. tccli/examples/vpc/v20170312/DeleteNetworkAclEntries.md +22 -0
  4. tccli/examples/waf/v20180125/AddAntiFakeUrl.md +46 -0
  5. tccli/examples/waf/v20180125/AddAntiInfoLeakRules.md +26 -0
  6. tccli/examples/waf/v20180125/DeleteAntiFakeUrl.md +21 -0
  7. tccli/examples/waf/v20180125/DeleteAntiInfoLeakRule.md +21 -0
  8. tccli/examples/waf/v20180125/DeleteCCRule.md +23 -0
  9. tccli/examples/waf/v20180125/DescribeAntiFakeRules.md +28 -0
  10. tccli/examples/waf/v20180125/DescribeAntiFakeUrl.md +57 -0
  11. tccli/examples/waf/v20180125/DescribeAntiInfoLeakRules.md +40 -0
  12. tccli/examples/waf/v20180125/DescribeAntiInfoLeakageRules.md +38 -0
  13. tccli/examples/waf/v20180125/DescribeBatchIpAccessControl.md +42 -0
  14. tccli/examples/waf/v20180125/DescribeCCRule.md +71 -0
  15. tccli/examples/waf/v20180125/DescribeCCRuleList.md +36 -0
  16. tccli/examples/waf/v20180125/DescribeSession.md +51 -0
  17. tccli/examples/waf/v20180125/ModifyAntiFakeUrl.md +24 -0
  18. tccli/examples/waf/v20180125/ModifyAntiFakeUrlStatus.md +22 -0
  19. tccli/examples/waf/v20180125/ModifyAntiInfoLeakRuleStatus.md +22 -0
  20. tccli/examples/waf/v20180125/ModifyAntiInfoLeakRules.md +26 -0
  21. tccli/examples/waf/v20180125/ModifyCustomWhiteRuleStatus.md +26 -0
  22. tccli/examples/waf/v20180125/UpsertCCRule.md +95 -0
  23. tccli/examples/waf/v20180125/UpsertSession.md +25 -0
  24. tccli/services/vpc/v20170312/api.json +86 -0
  25. tccli/services/vpc/v20170312/examples.json +16 -0
  26. tccli/services/vpc/vpc_client.py +195 -89
  27. tccli/services/waf/v20180125/api.json +2671 -582
  28. tccli/services/waf/v20180125/examples.json +202 -0
  29. tccli/services/waf/waf_client.py +1365 -305
  30. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/METADATA +2 -2
  31. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/RECORD +34 -12
  32. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/WHEEL +0 -0
  33. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/entry_points.txt +0 -0
  34. {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/license_files/LICENSE +0 -0
@@ -17,7 +17,7 @@ from tencentcloud.waf.v20180125 import models as models_v20180125
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
- def doModifyHost(args, parsed_globals):
20
+ def doDescribeDomainDetailsClb(args, parsed_globals):
21
21
  g_param = parse_global_arg(parsed_globals)
22
22
 
23
23
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -46,11 +46,11 @@ def doModifyHost(args, parsed_globals):
46
46
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
47
47
  client._sdkVersion += ("_CLI_" + __version__)
48
48
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
49
- model = models.ModifyHostRequest()
49
+ model = models.DescribeDomainDetailsClbRequest()
50
50
  model.from_json_string(json.dumps(args))
51
51
  start_time = time.time()
52
52
  while True:
53
- rsp = client.ModifyHost(model)
53
+ rsp = client.DescribeDomainDetailsClb(model)
54
54
  result = rsp.to_json_string()
55
55
  try:
56
56
  json_obj = json.loads(result)
@@ -69,7 +69,7 @@ def doModifyHost(args, parsed_globals):
69
69
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
70
 
71
71
 
72
- def doDescribeAccessExports(args, parsed_globals):
72
+ def doAddAntiInfoLeakRules(args, parsed_globals):
73
73
  g_param = parse_global_arg(parsed_globals)
74
74
 
75
75
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -98,11 +98,11 @@ def doDescribeAccessExports(args, parsed_globals):
98
98
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
99
99
  client._sdkVersion += ("_CLI_" + __version__)
100
100
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.DescribeAccessExportsRequest()
101
+ model = models.AddAntiInfoLeakRulesRequest()
102
102
  model.from_json_string(json.dumps(args))
103
103
  start_time = time.time()
104
104
  while True:
105
- rsp = client.DescribeAccessExports(model)
105
+ rsp = client.AddAntiInfoLeakRules(model)
106
106
  result = rsp.to_json_string()
107
107
  try:
108
108
  json_obj = json.loads(result)
@@ -121,7 +121,7 @@ def doDescribeAccessExports(args, parsed_globals):
121
121
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
122
122
 
123
123
 
124
- def doDescribeFindDomainList(args, parsed_globals):
124
+ def doDescribeAccessIndex(args, parsed_globals):
125
125
  g_param = parse_global_arg(parsed_globals)
126
126
 
127
127
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -150,11 +150,11 @@ def doDescribeFindDomainList(args, parsed_globals):
150
150
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
151
151
  client._sdkVersion += ("_CLI_" + __version__)
152
152
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
153
- model = models.DescribeFindDomainListRequest()
153
+ model = models.DescribeAccessIndexRequest()
154
154
  model.from_json_string(json.dumps(args))
155
155
  start_time = time.time()
156
156
  while True:
157
- rsp = client.DescribeFindDomainList(model)
157
+ rsp = client.DescribeAccessIndex(model)
158
158
  result = rsp.to_json_string()
159
159
  try:
160
160
  json_obj = json.loads(result)
@@ -173,7 +173,7 @@ def doDescribeFindDomainList(args, parsed_globals):
173
173
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
174
 
175
175
 
176
- def doDescribeAutoDenyIP(args, parsed_globals):
176
+ def doGetAttackTotalCount(args, parsed_globals):
177
177
  g_param = parse_global_arg(parsed_globals)
178
178
 
179
179
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -202,11 +202,11 @@ def doDescribeAutoDenyIP(args, parsed_globals):
202
202
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
203
203
  client._sdkVersion += ("_CLI_" + __version__)
204
204
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
- model = models.DescribeAutoDenyIPRequest()
205
+ model = models.GetAttackTotalCountRequest()
206
206
  model.from_json_string(json.dumps(args))
207
207
  start_time = time.time()
208
208
  while True:
209
- rsp = client.DescribeAutoDenyIP(model)
209
+ rsp = client.GetAttackTotalCount(model)
210
210
  result = rsp.to_json_string()
211
211
  try:
212
212
  json_obj = json.loads(result)
@@ -225,7 +225,7 @@ def doDescribeAutoDenyIP(args, parsed_globals):
225
225
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
226
 
227
227
 
228
- def doDescribeTlsVersion(args, parsed_globals):
228
+ def doAddCustomWhiteRule(args, parsed_globals):
229
229
  g_param = parse_global_arg(parsed_globals)
230
230
 
231
231
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -254,11 +254,11 @@ def doDescribeTlsVersion(args, parsed_globals):
254
254
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
255
255
  client._sdkVersion += ("_CLI_" + __version__)
256
256
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.DescribeTlsVersionRequest()
257
+ model = models.AddCustomWhiteRuleRequest()
258
258
  model.from_json_string(json.dumps(args))
259
259
  start_time = time.time()
260
260
  while True:
261
- rsp = client.DescribeTlsVersion(model)
261
+ rsp = client.AddCustomWhiteRule(model)
262
262
  result = rsp.to_json_string()
263
263
  try:
264
264
  json_obj = json.loads(result)
@@ -277,7 +277,7 @@ def doDescribeTlsVersion(args, parsed_globals):
277
277
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
278
278
 
279
279
 
280
- def doModifyProtectionStatus(args, parsed_globals):
280
+ def doDeleteIpAccessControl(args, parsed_globals):
281
281
  g_param = parse_global_arg(parsed_globals)
282
282
 
283
283
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -306,11 +306,11 @@ def doModifyProtectionStatus(args, parsed_globals):
306
306
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
307
307
  client._sdkVersion += ("_CLI_" + __version__)
308
308
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.ModifyProtectionStatusRequest()
309
+ model = models.DeleteIpAccessControlRequest()
310
310
  model.from_json_string(json.dumps(args))
311
311
  start_time = time.time()
312
312
  while True:
313
- rsp = client.ModifyProtectionStatus(model)
313
+ rsp = client.DeleteIpAccessControl(model)
314
314
  result = rsp.to_json_string()
315
315
  try:
316
316
  json_obj = json.loads(result)
@@ -329,7 +329,7 @@ def doModifyProtectionStatus(args, parsed_globals):
329
329
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
330
 
331
331
 
332
- def doDeleteAccessExport(args, parsed_globals):
332
+ def doDescribeAntiInfoLeakRules(args, parsed_globals):
333
333
  g_param = parse_global_arg(parsed_globals)
334
334
 
335
335
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -358,11 +358,11 @@ def doDeleteAccessExport(args, parsed_globals):
358
358
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
359
359
  client._sdkVersion += ("_CLI_" + __version__)
360
360
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.DeleteAccessExportRequest()
361
+ model = models.DescribeAntiInfoLeakRulesRequest()
362
362
  model.from_json_string(json.dumps(args))
363
363
  start_time = time.time()
364
364
  while True:
365
- rsp = client.DeleteAccessExport(model)
365
+ rsp = client.DescribeAntiInfoLeakRules(model)
366
366
  result = rsp.to_json_string()
367
367
  try:
368
368
  json_obj = json.loads(result)
@@ -381,7 +381,7 @@ def doDeleteAccessExport(args, parsed_globals):
381
381
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
382
 
383
383
 
384
- def doDescribeDomainDetailsClb(args, parsed_globals):
384
+ def doAddSpartaProtectionsAuto(args, parsed_globals):
385
385
  g_param = parse_global_arg(parsed_globals)
386
386
 
387
387
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -410,11 +410,11 @@ def doDescribeDomainDetailsClb(args, parsed_globals):
410
410
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
411
411
  client._sdkVersion += ("_CLI_" + __version__)
412
412
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.DescribeDomainDetailsClbRequest()
413
+ model = models.AddSpartaProtectionsAutoRequest()
414
414
  model.from_json_string(json.dumps(args))
415
415
  start_time = time.time()
416
416
  while True:
417
- rsp = client.DescribeDomainDetailsClb(model)
417
+ rsp = client.AddSpartaProtectionsAuto(model)
418
418
  result = rsp.to_json_string()
419
419
  try:
420
420
  json_obj = json.loads(result)
@@ -433,7 +433,7 @@ def doDescribeDomainDetailsClb(args, parsed_globals):
433
433
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
434
 
435
435
 
436
- def doAddSpartaProtection(args, parsed_globals):
436
+ def doDescribeAutoDenyIP(args, parsed_globals):
437
437
  g_param = parse_global_arg(parsed_globals)
438
438
 
439
439
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -462,11 +462,11 @@ def doAddSpartaProtection(args, parsed_globals):
462
462
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
463
463
  client._sdkVersion += ("_CLI_" + __version__)
464
464
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.AddSpartaProtectionRequest()
465
+ model = models.DescribeAutoDenyIPRequest()
466
466
  model.from_json_string(json.dumps(args))
467
467
  start_time = time.time()
468
468
  while True:
469
- rsp = client.AddSpartaProtection(model)
469
+ rsp = client.DescribeAutoDenyIP(model)
470
470
  result = rsp.to_json_string()
471
471
  try:
472
472
  json_obj = json.loads(result)
@@ -485,7 +485,7 @@ def doAddSpartaProtection(args, parsed_globals):
485
485
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
486
 
487
487
 
488
- def doDeleteDomainWhiteRules(args, parsed_globals):
488
+ def doDeleteCustomWhiteRule(args, parsed_globals):
489
489
  g_param = parse_global_arg(parsed_globals)
490
490
 
491
491
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -514,11 +514,11 @@ def doDeleteDomainWhiteRules(args, parsed_globals):
514
514
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
515
515
  client._sdkVersion += ("_CLI_" + __version__)
516
516
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.DeleteDomainWhiteRulesRequest()
517
+ model = models.DeleteCustomWhiteRuleRequest()
518
518
  model.from_json_string(json.dumps(args))
519
519
  start_time = time.time()
520
520
  while True:
521
- rsp = client.DeleteDomainWhiteRules(model)
521
+ rsp = client.DeleteCustomWhiteRule(model)
522
522
  result = rsp.to_json_string()
523
523
  try:
524
524
  json_obj = json.loads(result)
@@ -537,7 +537,7 @@ def doDeleteDomainWhiteRules(args, parsed_globals):
537
537
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
538
 
539
539
 
540
- def doModifyAreaBanStatus(args, parsed_globals):
540
+ def doGetAttackDownloadRecords(args, parsed_globals):
541
541
  g_param = parse_global_arg(parsed_globals)
542
542
 
543
543
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -566,11 +566,11 @@ def doModifyAreaBanStatus(args, parsed_globals):
566
566
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
567
567
  client._sdkVersion += ("_CLI_" + __version__)
568
568
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.ModifyAreaBanStatusRequest()
569
+ model = models.GetAttackDownloadRecordsRequest()
570
570
  model.from_json_string(json.dumps(args))
571
571
  start_time = time.time()
572
572
  while True:
573
- rsp = client.ModifyAreaBanStatus(model)
573
+ rsp = client.GetAttackDownloadRecords(model)
574
574
  result = rsp.to_json_string()
575
575
  try:
576
576
  json_obj = json.loads(result)
@@ -589,7 +589,7 @@ def doModifyAreaBanStatus(args, parsed_globals):
589
589
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
590
 
591
591
 
592
- def doDescribeDomains(args, parsed_globals):
592
+ def doAddCustomRule(args, parsed_globals):
593
593
  g_param = parse_global_arg(parsed_globals)
594
594
 
595
595
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -618,11 +618,11 @@ def doDescribeDomains(args, parsed_globals):
618
618
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
619
619
  client._sdkVersion += ("_CLI_" + __version__)
620
620
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.DescribeDomainsRequest()
621
+ model = models.AddCustomRuleRequest()
622
622
  model.from_json_string(json.dumps(args))
623
623
  start_time = time.time()
624
624
  while True:
625
- rsp = client.DescribeDomains(model)
625
+ rsp = client.AddCustomRule(model)
626
626
  result = rsp.to_json_string()
627
627
  try:
628
628
  json_obj = json.loads(result)
@@ -641,7 +641,7 @@ def doDescribeDomains(args, parsed_globals):
641
641
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
642
 
643
643
 
644
- def doDescribeAccessIndex(args, parsed_globals):
644
+ def doDeleteCustomRule(args, parsed_globals):
645
645
  g_param = parse_global_arg(parsed_globals)
646
646
 
647
647
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -670,11 +670,11 @@ def doDescribeAccessIndex(args, parsed_globals):
670
670
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
671
671
  client._sdkVersion += ("_CLI_" + __version__)
672
672
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.DescribeAccessIndexRequest()
673
+ model = models.DeleteCustomRuleRequest()
674
674
  model.from_json_string(json.dumps(args))
675
675
  start_time = time.time()
676
676
  while True:
677
- rsp = client.DescribeAccessIndex(model)
677
+ rsp = client.DeleteCustomRule(model)
678
678
  result = rsp.to_json_string()
679
679
  try:
680
680
  json_obj = json.loads(result)
@@ -693,7 +693,7 @@ def doDescribeAccessIndex(args, parsed_globals):
693
693
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
694
 
695
695
 
696
- def doCreateAccessExport(args, parsed_globals):
696
+ def doModifyAntiFakeUrl(args, parsed_globals):
697
697
  g_param = parse_global_arg(parsed_globals)
698
698
 
699
699
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -722,11 +722,11 @@ def doCreateAccessExport(args, parsed_globals):
722
722
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
723
723
  client._sdkVersion += ("_CLI_" + __version__)
724
724
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.CreateAccessExportRequest()
725
+ model = models.ModifyAntiFakeUrlRequest()
726
726
  model.from_json_string(json.dumps(args))
727
727
  start_time = time.time()
728
728
  while True:
729
- rsp = client.CreateAccessExport(model)
729
+ rsp = client.ModifyAntiFakeUrl(model)
730
730
  result = rsp.to_json_string()
731
731
  try:
732
732
  json_obj = json.loads(result)
@@ -745,7 +745,7 @@ def doCreateAccessExport(args, parsed_globals):
745
745
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
746
 
747
747
 
748
- def doDescribePolicyStatus(args, parsed_globals):
748
+ def doModifySpartaProtection(args, parsed_globals):
749
749
  g_param = parse_global_arg(parsed_globals)
750
750
 
751
751
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -774,11 +774,11 @@ def doDescribePolicyStatus(args, parsed_globals):
774
774
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
775
775
  client._sdkVersion += ("_CLI_" + __version__)
776
776
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.DescribePolicyStatusRequest()
777
+ model = models.ModifySpartaProtectionRequest()
778
778
  model.from_json_string(json.dumps(args))
779
779
  start_time = time.time()
780
780
  while True:
781
- rsp = client.DescribePolicyStatus(model)
781
+ rsp = client.ModifySpartaProtection(model)
782
782
  result = rsp.to_json_string()
783
783
  try:
784
784
  json_obj = json.loads(result)
@@ -797,7 +797,7 @@ def doDescribePolicyStatus(args, parsed_globals):
797
797
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
798
 
799
799
 
800
- def doGetAttackTotalCount(args, parsed_globals):
800
+ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
801
801
  g_param = parse_global_arg(parsed_globals)
802
802
 
803
803
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -826,11 +826,11 @@ def doGetAttackTotalCount(args, parsed_globals):
826
826
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
827
827
  client._sdkVersion += ("_CLI_" + __version__)
828
828
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.GetAttackTotalCountRequest()
829
+ model = models.DescribeUserCdcClbWafRegionsRequest()
830
830
  model.from_json_string(json.dumps(args))
831
831
  start_time = time.time()
832
832
  while True:
833
- rsp = client.GetAttackTotalCount(model)
833
+ rsp = client.DescribeUserCdcClbWafRegions(model)
834
834
  result = rsp.to_json_string()
835
835
  try:
836
836
  json_obj = json.loads(result)
@@ -849,7 +849,7 @@ def doGetAttackTotalCount(args, parsed_globals):
849
849
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
850
 
851
851
 
852
- def doSearchAttackLog(args, parsed_globals):
852
+ def doModifyWafAutoDenyRules(args, parsed_globals):
853
853
  g_param = parse_global_arg(parsed_globals)
854
854
 
855
855
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -878,11 +878,11 @@ def doSearchAttackLog(args, parsed_globals):
878
878
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
879
879
  client._sdkVersion += ("_CLI_" + __version__)
880
880
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.SearchAttackLogRequest()
881
+ model = models.ModifyWafAutoDenyRulesRequest()
882
882
  model.from_json_string(json.dumps(args))
883
883
  start_time = time.time()
884
884
  while True:
885
- rsp = client.SearchAttackLog(model)
885
+ rsp = client.ModifyWafAutoDenyRules(model)
886
886
  result = rsp.to_json_string()
887
887
  try:
888
888
  json_obj = json.loads(result)
@@ -901,7 +901,7 @@ def doSearchAttackLog(args, parsed_globals):
901
901
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
902
 
903
903
 
904
- def doDescribeAccessHistogram(args, parsed_globals):
904
+ def doDescribeUserDomainInfo(args, parsed_globals):
905
905
  g_param = parse_global_arg(parsed_globals)
906
906
 
907
907
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -930,11 +930,11 @@ def doDescribeAccessHistogram(args, parsed_globals):
930
930
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
931
931
  client._sdkVersion += ("_CLI_" + __version__)
932
932
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.DescribeAccessHistogramRequest()
933
+ model = models.DescribeUserDomainInfoRequest()
934
934
  model.from_json_string(json.dumps(args))
935
935
  start_time = time.time()
936
936
  while True:
937
- rsp = client.DescribeAccessHistogram(model)
937
+ rsp = client.DescribeUserDomainInfo(model)
938
938
  result = rsp.to_json_string()
939
939
  try:
940
940
  json_obj = json.loads(result)
@@ -953,7 +953,7 @@ def doDescribeAccessHistogram(args, parsed_globals):
953
953
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
954
 
955
955
 
956
- def doAddCustomWhiteRule(args, parsed_globals):
956
+ def doDeleteCCRule(args, parsed_globals):
957
957
  g_param = parse_global_arg(parsed_globals)
958
958
 
959
959
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -982,11 +982,11 @@ def doAddCustomWhiteRule(args, parsed_globals):
982
982
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
983
983
  client._sdkVersion += ("_CLI_" + __version__)
984
984
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
985
- model = models.AddCustomWhiteRuleRequest()
985
+ model = models.DeleteCCRuleRequest()
986
986
  model.from_json_string(json.dumps(args))
987
987
  start_time = time.time()
988
988
  while True:
989
- rsp = client.AddCustomWhiteRule(model)
989
+ rsp = client.DeleteCCRule(model)
990
990
  result = rsp.to_json_string()
991
991
  try:
992
992
  json_obj = json.loads(result)
@@ -1005,7 +1005,7 @@ def doAddCustomWhiteRule(args, parsed_globals):
1005
1005
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1006
 
1007
1007
 
1008
- def doDescribeInstances(args, parsed_globals):
1008
+ def doDescribeAntiInfoLeakageRules(args, parsed_globals):
1009
1009
  g_param = parse_global_arg(parsed_globals)
1010
1010
 
1011
1011
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1034,11 +1034,11 @@ def doDescribeInstances(args, parsed_globals):
1034
1034
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1035
1035
  client._sdkVersion += ("_CLI_" + __version__)
1036
1036
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.DescribeInstancesRequest()
1037
+ model = models.DescribeAntiInfoLeakageRulesRequest()
1038
1038
  model.from_json_string(json.dumps(args))
1039
1039
  start_time = time.time()
1040
1040
  while True:
1041
- rsp = client.DescribeInstances(model)
1041
+ rsp = client.DescribeAntiInfoLeakageRules(model)
1042
1042
  result = rsp.to_json_string()
1043
1043
  try:
1044
1044
  json_obj = json.loads(result)
@@ -1057,7 +1057,7 @@ def doDescribeInstances(args, parsed_globals):
1057
1057
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1058
 
1059
1059
 
1060
- def doModifySpartaProtectionMode(args, parsed_globals):
1060
+ def doSearchAccessLog(args, parsed_globals):
1061
1061
  g_param = parse_global_arg(parsed_globals)
1062
1062
 
1063
1063
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1086,11 +1086,11 @@ def doModifySpartaProtectionMode(args, parsed_globals):
1086
1086
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1087
1087
  client._sdkVersion += ("_CLI_" + __version__)
1088
1088
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.ModifySpartaProtectionModeRequest()
1089
+ model = models.SearchAccessLogRequest()
1090
1090
  model.from_json_string(json.dumps(args))
1091
1091
  start_time = time.time()
1092
1092
  while True:
1093
- rsp = client.ModifySpartaProtectionMode(model)
1093
+ rsp = client.SearchAccessLog(model)
1094
1094
  result = rsp.to_json_string()
1095
1095
  try:
1096
1096
  json_obj = json.loads(result)
@@ -1109,7 +1109,7 @@ def doModifySpartaProtectionMode(args, parsed_globals):
1109
1109
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
1110
 
1111
1111
 
1112
- def doDeleteIpAccessControl(args, parsed_globals):
1112
+ def doDescribeWafThreatenIntelligence(args, parsed_globals):
1113
1113
  g_param = parse_global_arg(parsed_globals)
1114
1114
 
1115
1115
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1138,11 +1138,11 @@ def doDeleteIpAccessControl(args, parsed_globals):
1138
1138
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1139
1139
  client._sdkVersion += ("_CLI_" + __version__)
1140
1140
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1141
- model = models.DeleteIpAccessControlRequest()
1141
+ model = models.DescribeWafThreatenIntelligenceRequest()
1142
1142
  model.from_json_string(json.dumps(args))
1143
1143
  start_time = time.time()
1144
1144
  while True:
1145
- rsp = client.DeleteIpAccessControl(model)
1145
+ rsp = client.DescribeWafThreatenIntelligence(model)
1146
1146
  result = rsp.to_json_string()
1147
1147
  try:
1148
1148
  json_obj = json.loads(result)
@@ -1161,7 +1161,7 @@ def doDeleteIpAccessControl(args, parsed_globals):
1161
1161
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
1162
 
1163
1163
 
1164
- def doAddSpartaProtectionsAuto(args, parsed_globals):
1164
+ def doDescribeIpHitItems(args, parsed_globals):
1165
1165
  g_param = parse_global_arg(parsed_globals)
1166
1166
 
1167
1167
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1190,11 +1190,11 @@ def doAddSpartaProtectionsAuto(args, parsed_globals):
1190
1190
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1191
1191
  client._sdkVersion += ("_CLI_" + __version__)
1192
1192
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1193
- model = models.AddSpartaProtectionsAutoRequest()
1193
+ model = models.DescribeIpHitItemsRequest()
1194
1194
  model.from_json_string(json.dumps(args))
1195
1195
  start_time = time.time()
1196
1196
  while True:
1197
- rsp = client.AddSpartaProtectionsAuto(model)
1197
+ rsp = client.DescribeIpHitItems(model)
1198
1198
  result = rsp.to_json_string()
1199
1199
  try:
1200
1200
  json_obj = json.loads(result)
@@ -1213,7 +1213,7 @@ def doAddSpartaProtectionsAuto(args, parsed_globals):
1213
1213
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
1214
 
1215
1215
 
1216
- def doGetAttackHistogram(args, parsed_globals):
1216
+ def doAddSpartaProtectionAuto(args, parsed_globals):
1217
1217
  g_param = parse_global_arg(parsed_globals)
1218
1218
 
1219
1219
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1242,11 +1242,11 @@ def doGetAttackHistogram(args, parsed_globals):
1242
1242
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1243
1243
  client._sdkVersion += ("_CLI_" + __version__)
1244
1244
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1245
- model = models.GetAttackHistogramRequest()
1245
+ model = models.AddSpartaProtectionAutoRequest()
1246
1246
  model.from_json_string(json.dumps(args))
1247
1247
  start_time = time.time()
1248
1248
  while True:
1249
- rsp = client.GetAttackHistogram(model)
1249
+ rsp = client.AddSpartaProtectionAuto(model)
1250
1250
  result = rsp.to_json_string()
1251
1251
  try:
1252
1252
  json_obj = json.loads(result)
@@ -1265,7 +1265,7 @@ def doGetAttackHistogram(args, parsed_globals):
1265
1265
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1266
 
1267
1267
 
1268
- def doModifyWafAutoDenyStatus(args, parsed_globals):
1268
+ def doDeleteAntiInfoLeakRule(args, parsed_globals):
1269
1269
  g_param = parse_global_arg(parsed_globals)
1270
1270
 
1271
1271
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1294,11 +1294,11 @@ def doModifyWafAutoDenyStatus(args, parsed_globals):
1294
1294
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1295
1295
  client._sdkVersion += ("_CLI_" + __version__)
1296
1296
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
- model = models.ModifyWafAutoDenyStatusRequest()
1297
+ model = models.DeleteAntiInfoLeakRuleRequest()
1298
1298
  model.from_json_string(json.dumps(args))
1299
1299
  start_time = time.time()
1300
1300
  while True:
1301
- rsp = client.ModifyWafAutoDenyStatus(model)
1301
+ rsp = client.DeleteAntiInfoLeakRule(model)
1302
1302
  result = rsp.to_json_string()
1303
1303
  try:
1304
1304
  json_obj = json.loads(result)
@@ -1317,7 +1317,7 @@ def doModifyWafAutoDenyStatus(args, parsed_globals):
1317
1317
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1318
 
1319
1319
 
1320
- def doModifyBotStatus(args, parsed_globals):
1320
+ def doDescribeRuleLimit(args, parsed_globals):
1321
1321
  g_param = parse_global_arg(parsed_globals)
1322
1322
 
1323
1323
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1346,11 +1346,11 @@ def doModifyBotStatus(args, parsed_globals):
1346
1346
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1347
1347
  client._sdkVersion += ("_CLI_" + __version__)
1348
1348
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.ModifyBotStatusRequest()
1349
+ model = models.DescribeRuleLimitRequest()
1350
1350
  model.from_json_string(json.dumps(args))
1351
1351
  start_time = time.time()
1352
1352
  while True:
1353
- rsp = client.ModifyBotStatus(model)
1353
+ rsp = client.DescribeRuleLimit(model)
1354
1354
  result = rsp.to_json_string()
1355
1355
  try:
1356
1356
  json_obj = json.loads(result)
@@ -1369,7 +1369,7 @@ def doModifyBotStatus(args, parsed_globals):
1369
1369
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1370
1370
 
1371
1371
 
1372
- def doDescribeRuleLimit(args, parsed_globals):
1372
+ def doDescribeDomains(args, parsed_globals):
1373
1373
  g_param = parse_global_arg(parsed_globals)
1374
1374
 
1375
1375
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1398,11 +1398,11 @@ def doDescribeRuleLimit(args, parsed_globals):
1398
1398
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1399
1399
  client._sdkVersion += ("_CLI_" + __version__)
1400
1400
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
- model = models.DescribeRuleLimitRequest()
1401
+ model = models.DescribeDomainsRequest()
1402
1402
  model.from_json_string(json.dumps(args))
1403
1403
  start_time = time.time()
1404
1404
  while True:
1405
- rsp = client.DescribeRuleLimit(model)
1405
+ rsp = client.DescribeDomains(model)
1406
1406
  result = rsp.to_json_string()
1407
1407
  try:
1408
1408
  json_obj = json.loads(result)
@@ -1421,7 +1421,7 @@ def doDescribeRuleLimit(args, parsed_globals):
1421
1421
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
1422
 
1423
1423
 
1424
- def doModifyAccessPeriod(args, parsed_globals):
1424
+ def doModifyHostStatus(args, parsed_globals):
1425
1425
  g_param = parse_global_arg(parsed_globals)
1426
1426
 
1427
1427
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1450,11 +1450,11 @@ def doModifyAccessPeriod(args, parsed_globals):
1450
1450
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1451
1451
  client._sdkVersion += ("_CLI_" + __version__)
1452
1452
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.ModifyAccessPeriodRequest()
1453
+ model = models.ModifyHostStatusRequest()
1454
1454
  model.from_json_string(json.dumps(args))
1455
1455
  start_time = time.time()
1456
1456
  while True:
1457
- rsp = client.ModifyAccessPeriod(model)
1457
+ rsp = client.ModifyHostStatus(model)
1458
1458
  result = rsp.to_json_string()
1459
1459
  try:
1460
1460
  json_obj = json.loads(result)
@@ -1473,7 +1473,7 @@ def doModifyAccessPeriod(args, parsed_globals):
1473
1473
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1474
1474
 
1475
1475
 
1476
- def doModifyHostFlowMode(args, parsed_globals):
1476
+ def doModifySpartaProtectionMode(args, parsed_globals):
1477
1477
  g_param = parse_global_arg(parsed_globals)
1478
1478
 
1479
1479
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1502,11 +1502,11 @@ def doModifyHostFlowMode(args, parsed_globals):
1502
1502
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1503
1503
  client._sdkVersion += ("_CLI_" + __version__)
1504
1504
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1505
- model = models.ModifyHostFlowModeRequest()
1505
+ model = models.ModifySpartaProtectionModeRequest()
1506
1506
  model.from_json_string(json.dumps(args))
1507
1507
  start_time = time.time()
1508
1508
  while True:
1509
- rsp = client.ModifyHostFlowMode(model)
1509
+ rsp = client.ModifySpartaProtectionMode(model)
1510
1510
  result = rsp.to_json_string()
1511
1511
  try:
1512
1512
  json_obj = json.loads(result)
@@ -1525,7 +1525,7 @@ def doModifyHostFlowMode(args, parsed_globals):
1525
1525
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1526
1526
 
1527
1527
 
1528
- def doModifyHostStatus(args, parsed_globals):
1528
+ def doUpsertIpAccessControl(args, parsed_globals):
1529
1529
  g_param = parse_global_arg(parsed_globals)
1530
1530
 
1531
1531
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1554,11 +1554,11 @@ def doModifyHostStatus(args, parsed_globals):
1554
1554
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1555
1555
  client._sdkVersion += ("_CLI_" + __version__)
1556
1556
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1557
- model = models.ModifyHostStatusRequest()
1557
+ model = models.UpsertIpAccessControlRequest()
1558
1558
  model.from_json_string(json.dumps(args))
1559
1559
  start_time = time.time()
1560
1560
  while True:
1561
- rsp = client.ModifyHostStatus(model)
1561
+ rsp = client.UpsertIpAccessControl(model)
1562
1562
  result = rsp.to_json_string()
1563
1563
  try:
1564
1564
  json_obj = json.loads(result)
@@ -1577,7 +1577,7 @@ def doModifyHostStatus(args, parsed_globals):
1577
1577
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1578
1578
 
1579
1579
 
1580
- def doDescribeVipInfo(args, parsed_globals):
1580
+ def doGetAttackHistogram(args, parsed_globals):
1581
1581
  g_param = parse_global_arg(parsed_globals)
1582
1582
 
1583
1583
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1606,11 +1606,11 @@ def doDescribeVipInfo(args, parsed_globals):
1606
1606
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1607
1607
  client._sdkVersion += ("_CLI_" + __version__)
1608
1608
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1609
- model = models.DescribeVipInfoRequest()
1609
+ model = models.GetAttackHistogramRequest()
1610
1610
  model.from_json_string(json.dumps(args))
1611
1611
  start_time = time.time()
1612
1612
  while True:
1613
- rsp = client.DescribeVipInfo(model)
1613
+ rsp = client.GetAttackHistogram(model)
1614
1614
  result = rsp.to_json_string()
1615
1615
  try:
1616
1616
  json_obj = json.loads(result)
@@ -1629,7 +1629,7 @@ def doDescribeVipInfo(args, parsed_globals):
1629
1629
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1630
1630
 
1631
1631
 
1632
- def doDescribeUserCdcClbWafRegions(args, parsed_globals):
1632
+ def doModifyWafAutoDenyStatus(args, parsed_globals):
1633
1633
  g_param = parse_global_arg(parsed_globals)
1634
1634
 
1635
1635
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1658,11 +1658,11 @@ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
1658
1658
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1659
1659
  client._sdkVersion += ("_CLI_" + __version__)
1660
1660
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1661
- model = models.DescribeUserCdcClbWafRegionsRequest()
1661
+ model = models.ModifyWafAutoDenyStatusRequest()
1662
1662
  model.from_json_string(json.dumps(args))
1663
1663
  start_time = time.time()
1664
1664
  while True:
1665
- rsp = client.DescribeUserCdcClbWafRegions(model)
1665
+ rsp = client.ModifyWafAutoDenyStatus(model)
1666
1666
  result = rsp.to_json_string()
1667
1667
  try:
1668
1668
  json_obj = json.loads(result)
@@ -1681,7 +1681,7 @@ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
1681
1681
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1682
1682
 
1683
1683
 
1684
- def doDeleteHost(args, parsed_globals):
1684
+ def doModifyAccessPeriod(args, parsed_globals):
1685
1685
  g_param = parse_global_arg(parsed_globals)
1686
1686
 
1687
1687
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1710,11 +1710,11 @@ def doDeleteHost(args, parsed_globals):
1710
1710
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1711
1711
  client._sdkVersion += ("_CLI_" + __version__)
1712
1712
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1713
- model = models.DeleteHostRequest()
1713
+ model = models.ModifyAccessPeriodRequest()
1714
1714
  model.from_json_string(json.dumps(args))
1715
1715
  start_time = time.time()
1716
1716
  while True:
1717
- rsp = client.DeleteHost(model)
1717
+ rsp = client.ModifyAccessPeriod(model)
1718
1718
  result = rsp.to_json_string()
1719
1719
  try:
1720
1720
  json_obj = json.loads(result)
@@ -1733,7 +1733,7 @@ def doDeleteHost(args, parsed_globals):
1733
1733
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1734
1734
 
1735
1735
 
1736
- def doModifyDomainWhiteRule(args, parsed_globals):
1736
+ def doModifyAntiFakeUrlStatus(args, parsed_globals):
1737
1737
  g_param = parse_global_arg(parsed_globals)
1738
1738
 
1739
1739
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1762,11 +1762,11 @@ def doModifyDomainWhiteRule(args, parsed_globals):
1762
1762
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1763
1763
  client._sdkVersion += ("_CLI_" + __version__)
1764
1764
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1765
- model = models.ModifyDomainWhiteRuleRequest()
1765
+ model = models.ModifyAntiFakeUrlStatusRequest()
1766
1766
  model.from_json_string(json.dumps(args))
1767
1767
  start_time = time.time()
1768
1768
  while True:
1769
- rsp = client.ModifyDomainWhiteRule(model)
1769
+ rsp = client.ModifyAntiFakeUrlStatus(model)
1770
1770
  result = rsp.to_json_string()
1771
1771
  try:
1772
1772
  json_obj = json.loads(result)
@@ -1785,7 +1785,7 @@ def doModifyDomainWhiteRule(args, parsed_globals):
1785
1785
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1786
1786
 
1787
1787
 
1788
- def doDescribeFlowTrend(args, parsed_globals):
1788
+ def doDescribeVipInfo(args, parsed_globals):
1789
1789
  g_param = parse_global_arg(parsed_globals)
1790
1790
 
1791
1791
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1814,11 +1814,11 @@ def doDescribeFlowTrend(args, parsed_globals):
1814
1814
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1815
1815
  client._sdkVersion += ("_CLI_" + __version__)
1816
1816
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1817
- model = models.DescribeFlowTrendRequest()
1817
+ model = models.DescribeVipInfoRequest()
1818
1818
  model.from_json_string(json.dumps(args))
1819
1819
  start_time = time.time()
1820
1820
  while True:
1821
- rsp = client.DescribeFlowTrend(model)
1821
+ rsp = client.DescribeVipInfo(model)
1822
1822
  result = rsp.to_json_string()
1823
1823
  try:
1824
1824
  json_obj = json.loads(result)
@@ -1837,7 +1837,7 @@ def doDescribeFlowTrend(args, parsed_globals):
1837
1837
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1838
1838
 
1839
1839
 
1840
- def doDescribePeakPoints(args, parsed_globals):
1840
+ def doDeleteHost(args, parsed_globals):
1841
1841
  g_param = parse_global_arg(parsed_globals)
1842
1842
 
1843
1843
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1866,11 +1866,11 @@ def doDescribePeakPoints(args, parsed_globals):
1866
1866
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1867
1867
  client._sdkVersion += ("_CLI_" + __version__)
1868
1868
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1869
- model = models.DescribePeakPointsRequest()
1869
+ model = models.DeleteHostRequest()
1870
1870
  model.from_json_string(json.dumps(args))
1871
1871
  start_time = time.time()
1872
1872
  while True:
1873
- rsp = client.DescribePeakPoints(model)
1873
+ rsp = client.DeleteHost(model)
1874
1874
  result = rsp.to_json_string()
1875
1875
  try:
1876
1876
  json_obj = json.loads(result)
@@ -1889,7 +1889,7 @@ def doDescribePeakPoints(args, parsed_globals):
1889
1889
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
1890
 
1891
1891
 
1892
- def doDescribeHostLimit(args, parsed_globals):
1892
+ def doDescribeAccessFastAnalysis(args, parsed_globals):
1893
1893
  g_param = parse_global_arg(parsed_globals)
1894
1894
 
1895
1895
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1918,11 +1918,11 @@ def doDescribeHostLimit(args, parsed_globals):
1918
1918
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1919
1919
  client._sdkVersion += ("_CLI_" + __version__)
1920
1920
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.DescribeHostLimitRequest()
1921
+ model = models.DescribeAccessFastAnalysisRequest()
1922
1922
  model.from_json_string(json.dumps(args))
1923
1923
  start_time = time.time()
1924
1924
  while True:
1925
- rsp = client.DescribeHostLimit(model)
1925
+ rsp = client.DescribeAccessFastAnalysis(model)
1926
1926
  result = rsp.to_json_string()
1927
1927
  try:
1928
1928
  json_obj = json.loads(result)
@@ -1941,7 +1941,7 @@ def doDescribeHostLimit(args, parsed_globals):
1941
1941
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
1942
 
1943
1943
 
1944
- def doDeleteCustomWhiteRule(args, parsed_globals):
1944
+ def doDescribePeakPoints(args, parsed_globals):
1945
1945
  g_param = parse_global_arg(parsed_globals)
1946
1946
 
1947
1947
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1970,11 +1970,11 @@ def doDeleteCustomWhiteRule(args, parsed_globals):
1970
1970
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
1971
1971
  client._sdkVersion += ("_CLI_" + __version__)
1972
1972
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1973
- model = models.DeleteCustomWhiteRuleRequest()
1973
+ model = models.DescribePeakPointsRequest()
1974
1974
  model.from_json_string(json.dumps(args))
1975
1975
  start_time = time.time()
1976
1976
  while True:
1977
- rsp = client.DeleteCustomWhiteRule(model)
1977
+ rsp = client.DescribePeakPoints(model)
1978
1978
  result = rsp.to_json_string()
1979
1979
  try:
1980
1980
  json_obj = json.loads(result)
@@ -2045,7 +2045,7 @@ def doModifyCustomWhiteRule(args, parsed_globals):
2045
2045
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2046
2046
 
2047
2047
 
2048
- def doGetAttackDownloadRecords(args, parsed_globals):
2048
+ def doDescribeAccessHistogram(args, parsed_globals):
2049
2049
  g_param = parse_global_arg(parsed_globals)
2050
2050
 
2051
2051
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2074,11 +2074,11 @@ def doGetAttackDownloadRecords(args, parsed_globals):
2074
2074
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2075
2075
  client._sdkVersion += ("_CLI_" + __version__)
2076
2076
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2077
- model = models.GetAttackDownloadRecordsRequest()
2077
+ model = models.DescribeAccessHistogramRequest()
2078
2078
  model.from_json_string(json.dumps(args))
2079
2079
  start_time = time.time()
2080
2080
  while True:
2081
- rsp = client.GetAttackDownloadRecords(model)
2081
+ rsp = client.DescribeAccessHistogram(model)
2082
2082
  result = rsp.to_json_string()
2083
2083
  try:
2084
2084
  json_obj = json.loads(result)
@@ -2097,7 +2097,7 @@ def doGetAttackDownloadRecords(args, parsed_globals):
2097
2097
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2098
2098
 
2099
2099
 
2100
- def doAddCustomRule(args, parsed_globals):
2100
+ def doDescribeCCRule(args, parsed_globals):
2101
2101
  g_param = parse_global_arg(parsed_globals)
2102
2102
 
2103
2103
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2126,11 +2126,11 @@ def doAddCustomRule(args, parsed_globals):
2126
2126
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2127
2127
  client._sdkVersion += ("_CLI_" + __version__)
2128
2128
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2129
- model = models.AddCustomRuleRequest()
2129
+ model = models.DescribeCCRuleRequest()
2130
2130
  model.from_json_string(json.dumps(args))
2131
2131
  start_time = time.time()
2132
2132
  while True:
2133
- rsp = client.AddCustomRule(model)
2133
+ rsp = client.DescribeCCRule(model)
2134
2134
  result = rsp.to_json_string()
2135
2135
  try:
2136
2136
  json_obj = json.loads(result)
@@ -2149,7 +2149,7 @@ def doAddCustomRule(args, parsed_globals):
2149
2149
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2150
2150
 
2151
2151
 
2152
- def doDescribeIpAccessControl(args, parsed_globals):
2152
+ def doDescribePeakValue(args, parsed_globals):
2153
2153
  g_param = parse_global_arg(parsed_globals)
2154
2154
 
2155
2155
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2178,11 +2178,11 @@ def doDescribeIpAccessControl(args, parsed_globals):
2178
2178
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2179
2179
  client._sdkVersion += ("_CLI_" + __version__)
2180
2180
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2181
- model = models.DescribeIpAccessControlRequest()
2181
+ model = models.DescribePeakValueRequest()
2182
2182
  model.from_json_string(json.dumps(args))
2183
2183
  start_time = time.time()
2184
2184
  while True:
2185
- rsp = client.DescribeIpAccessControl(model)
2185
+ rsp = client.DescribePeakValue(model)
2186
2186
  result = rsp.to_json_string()
2187
2187
  try:
2188
2188
  json_obj = json.loads(result)
@@ -2201,7 +2201,7 @@ def doDescribeIpAccessControl(args, parsed_globals):
2201
2201
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2202
2202
 
2203
2203
 
2204
- def doDescribeIpHitItems(args, parsed_globals):
2204
+ def doModifyWafThreatenIntelligence(args, parsed_globals):
2205
2205
  g_param = parse_global_arg(parsed_globals)
2206
2206
 
2207
2207
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2230,11 +2230,11 @@ def doDescribeIpHitItems(args, parsed_globals):
2230
2230
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2231
2231
  client._sdkVersion += ("_CLI_" + __version__)
2232
2232
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2233
- model = models.DescribeIpHitItemsRequest()
2233
+ model = models.ModifyWafThreatenIntelligenceRequest()
2234
2234
  model.from_json_string(json.dumps(args))
2235
2235
  start_time = time.time()
2236
2236
  while True:
2237
- rsp = client.DescribeIpHitItems(model)
2237
+ rsp = client.ModifyWafThreatenIntelligence(model)
2238
2238
  result = rsp.to_json_string()
2239
2239
  try:
2240
2240
  json_obj = json.loads(result)
@@ -2253,7 +2253,7 @@ def doDescribeIpHitItems(args, parsed_globals):
2253
2253
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2254
2254
 
2255
2255
 
2256
- def doDescribeDomainDetailsSaas(args, parsed_globals):
2256
+ def doDeleteAttackDownloadRecord(args, parsed_globals):
2257
2257
  g_param = parse_global_arg(parsed_globals)
2258
2258
 
2259
2259
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2282,11 +2282,11 @@ def doDescribeDomainDetailsSaas(args, parsed_globals):
2282
2282
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2283
2283
  client._sdkVersion += ("_CLI_" + __version__)
2284
2284
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2285
- model = models.DescribeDomainDetailsSaasRequest()
2285
+ model = models.DeleteAttackDownloadRecordRequest()
2286
2286
  model.from_json_string(json.dumps(args))
2287
2287
  start_time = time.time()
2288
2288
  while True:
2289
- rsp = client.DescribeDomainDetailsSaas(model)
2289
+ rsp = client.DeleteAttackDownloadRecord(model)
2290
2290
  result = rsp.to_json_string()
2291
2291
  try:
2292
2292
  json_obj = json.loads(result)
@@ -2305,7 +2305,7 @@ def doDescribeDomainDetailsSaas(args, parsed_globals):
2305
2305
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2306
2306
 
2307
2307
 
2308
- def doModifyCustomRuleStatus(args, parsed_globals):
2308
+ def doDescribeCustomRuleList(args, parsed_globals):
2309
2309
  g_param = parse_global_arg(parsed_globals)
2310
2310
 
2311
2311
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2334,11 +2334,11 @@ def doModifyCustomRuleStatus(args, parsed_globals):
2334
2334
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2335
2335
  client._sdkVersion += ("_CLI_" + __version__)
2336
2336
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2337
- model = models.ModifyCustomRuleStatusRequest()
2337
+ model = models.DescribeCustomRuleListRequest()
2338
2338
  model.from_json_string(json.dumps(args))
2339
2339
  start_time = time.time()
2340
2340
  while True:
2341
- rsp = client.ModifyCustomRuleStatus(model)
2341
+ rsp = client.DescribeCustomRuleList(model)
2342
2342
  result = rsp.to_json_string()
2343
2343
  try:
2344
2344
  json_obj = json.loads(result)
@@ -2357,7 +2357,7 @@ def doModifyCustomRuleStatus(args, parsed_globals):
2357
2357
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
2358
 
2359
2359
 
2360
- def doDescribeDomainCountInfo(args, parsed_globals):
2360
+ def doDescribeAttackOverview(args, parsed_globals):
2361
2361
  g_param = parse_global_arg(parsed_globals)
2362
2362
 
2363
2363
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2386,11 +2386,11 @@ def doDescribeDomainCountInfo(args, parsed_globals):
2386
2386
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2387
2387
  client._sdkVersion += ("_CLI_" + __version__)
2388
2388
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
- model = models.DescribeDomainCountInfoRequest()
2389
+ model = models.DescribeAttackOverviewRequest()
2390
2390
  model.from_json_string(json.dumps(args))
2391
2391
  start_time = time.time()
2392
2392
  while True:
2393
- rsp = client.DescribeDomainCountInfo(model)
2393
+ rsp = client.DescribeAttackOverview(model)
2394
2394
  result = rsp.to_json_string()
2395
2395
  try:
2396
2396
  json_obj = json.loads(result)
@@ -2409,7 +2409,7 @@ def doDescribeDomainCountInfo(args, parsed_globals):
2409
2409
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
2410
 
2411
2411
 
2412
- def doDeleteCustomRule(args, parsed_globals):
2412
+ def doDescribeWafInfo(args, parsed_globals):
2413
2413
  g_param = parse_global_arg(parsed_globals)
2414
2414
 
2415
2415
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2438,11 +2438,11 @@ def doDeleteCustomRule(args, parsed_globals):
2438
2438
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2439
2439
  client._sdkVersion += ("_CLI_" + __version__)
2440
2440
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2441
- model = models.DeleteCustomRuleRequest()
2441
+ model = models.DescribeWafInfoRequest()
2442
2442
  model.from_json_string(json.dumps(args))
2443
2443
  start_time = time.time()
2444
2444
  while True:
2445
- rsp = client.DeleteCustomRule(model)
2445
+ rsp = client.DescribeWafInfo(model)
2446
2446
  result = rsp.to_json_string()
2447
2447
  try:
2448
2448
  json_obj = json.loads(result)
@@ -2461,7 +2461,7 @@ def doDeleteCustomRule(args, parsed_globals):
2461
2461
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2462
2462
 
2463
2463
 
2464
- def doDeleteSpartaProtection(args, parsed_globals):
2464
+ def doDescribeHosts(args, parsed_globals):
2465
2465
  g_param = parse_global_arg(parsed_globals)
2466
2466
 
2467
2467
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2490,11 +2490,11 @@ def doDeleteSpartaProtection(args, parsed_globals):
2490
2490
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2491
2491
  client._sdkVersion += ("_CLI_" + __version__)
2492
2492
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2493
- model = models.DeleteSpartaProtectionRequest()
2493
+ model = models.DescribeHostsRequest()
2494
2494
  model.from_json_string(json.dumps(args))
2495
2495
  start_time = time.time()
2496
2496
  while True:
2497
- rsp = client.DeleteSpartaProtection(model)
2497
+ rsp = client.DescribeHosts(model)
2498
2498
  result = rsp.to_json_string()
2499
2499
  try:
2500
2500
  json_obj = json.loads(result)
@@ -2513,7 +2513,7 @@ def doDeleteSpartaProtection(args, parsed_globals):
2513
2513
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2514
2514
 
2515
2515
 
2516
- def doSwitchDomainRules(args, parsed_globals):
2516
+ def doAddSpartaProtection(args, parsed_globals):
2517
2517
  g_param = parse_global_arg(parsed_globals)
2518
2518
 
2519
2519
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2542,11 +2542,11 @@ def doSwitchDomainRules(args, parsed_globals):
2542
2542
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2543
2543
  client._sdkVersion += ("_CLI_" + __version__)
2544
2544
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2545
- model = models.SwitchDomainRulesRequest()
2545
+ model = models.AddSpartaProtectionRequest()
2546
2546
  model.from_json_string(json.dumps(args))
2547
2547
  start_time = time.time()
2548
2548
  while True:
2549
- rsp = client.SwitchDomainRules(model)
2549
+ rsp = client.AddSpartaProtection(model)
2550
2550
  result = rsp.to_json_string()
2551
2551
  try:
2552
2552
  json_obj = json.loads(result)
@@ -2565,7 +2565,7 @@ def doSwitchDomainRules(args, parsed_globals):
2565
2565
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2566
2566
 
2567
2567
 
2568
- def doModifyWafThreatenIntelligence(args, parsed_globals):
2568
+ def doDescribePolicyStatus(args, parsed_globals):
2569
2569
  g_param = parse_global_arg(parsed_globals)
2570
2570
 
2571
2571
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2594,11 +2594,11 @@ def doModifyWafThreatenIntelligence(args, parsed_globals):
2594
2594
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2595
2595
  client._sdkVersion += ("_CLI_" + __version__)
2596
2596
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2597
- model = models.ModifyWafThreatenIntelligenceRequest()
2597
+ model = models.DescribePolicyStatusRequest()
2598
2598
  model.from_json_string(json.dumps(args))
2599
2599
  start_time = time.time()
2600
2600
  while True:
2601
- rsp = client.ModifyWafThreatenIntelligence(model)
2601
+ rsp = client.DescribePolicyStatus(model)
2602
2602
  result = rsp.to_json_string()
2603
2603
  try:
2604
2604
  json_obj = json.loads(result)
@@ -2617,7 +2617,7 @@ def doModifyWafThreatenIntelligence(args, parsed_globals):
2617
2617
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2618
2618
 
2619
2619
 
2620
- def doDeleteAttackDownloadRecord(args, parsed_globals):
2620
+ def doDescribeSession(args, parsed_globals):
2621
2621
  g_param = parse_global_arg(parsed_globals)
2622
2622
 
2623
2623
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2646,11 +2646,11 @@ def doDeleteAttackDownloadRecord(args, parsed_globals):
2646
2646
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2647
2647
  client._sdkVersion += ("_CLI_" + __version__)
2648
2648
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2649
- model = models.DeleteAttackDownloadRecordRequest()
2649
+ model = models.DescribeSessionRequest()
2650
2650
  model.from_json_string(json.dumps(args))
2651
2651
  start_time = time.time()
2652
2652
  while True:
2653
- rsp = client.DeleteAttackDownloadRecord(model)
2653
+ rsp = client.DescribeSession(model)
2654
2654
  result = rsp.to_json_string()
2655
2655
  try:
2656
2656
  json_obj = json.loads(result)
@@ -2669,7 +2669,7 @@ def doDeleteAttackDownloadRecord(args, parsed_globals):
2669
2669
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2670
2670
 
2671
2671
 
2672
- def doModifyHostMode(args, parsed_globals):
2672
+ def doModifyHost(args, parsed_globals):
2673
2673
  g_param = parse_global_arg(parsed_globals)
2674
2674
 
2675
2675
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2698,11 +2698,11 @@ def doModifyHostMode(args, parsed_globals):
2698
2698
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2699
2699
  client._sdkVersion += ("_CLI_" + __version__)
2700
2700
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2701
- model = models.ModifyHostModeRequest()
2701
+ model = models.ModifyHostRequest()
2702
2702
  model.from_json_string(json.dumps(args))
2703
2703
  start_time = time.time()
2704
2704
  while True:
2705
- rsp = client.ModifyHostMode(model)
2705
+ rsp = client.ModifyHost(model)
2706
2706
  result = rsp.to_json_string()
2707
2707
  try:
2708
2708
  json_obj = json.loads(result)
@@ -2721,7 +2721,7 @@ def doModifyHostMode(args, parsed_globals):
2721
2721
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2722
2722
 
2723
2723
 
2724
- def doDescribeAttackOverview(args, parsed_globals):
2724
+ def doDescribeTlsVersion(args, parsed_globals):
2725
2725
  g_param = parse_global_arg(parsed_globals)
2726
2726
 
2727
2727
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2750,11 +2750,11 @@ def doDescribeAttackOverview(args, parsed_globals):
2750
2750
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2751
2751
  client._sdkVersion += ("_CLI_" + __version__)
2752
2752
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2753
- model = models.DescribeAttackOverviewRequest()
2753
+ model = models.DescribeTlsVersionRequest()
2754
2754
  model.from_json_string(json.dumps(args))
2755
2755
  start_time = time.time()
2756
2756
  while True:
2757
- rsp = client.DescribeAttackOverview(model)
2757
+ rsp = client.DescribeTlsVersion(model)
2758
2758
  result = rsp.to_json_string()
2759
2759
  try:
2760
2760
  json_obj = json.loads(result)
@@ -2773,7 +2773,7 @@ def doDescribeAttackOverview(args, parsed_globals):
2773
2773
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2774
2774
 
2775
2775
 
2776
- def doModifyDomainIpv6Status(args, parsed_globals):
2776
+ def doModifyProtectionStatus(args, parsed_globals):
2777
2777
  g_param = parse_global_arg(parsed_globals)
2778
2778
 
2779
2779
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2802,11 +2802,11 @@ def doModifyDomainIpv6Status(args, parsed_globals):
2802
2802
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2803
2803
  client._sdkVersion += ("_CLI_" + __version__)
2804
2804
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2805
- model = models.ModifyDomainIpv6StatusRequest()
2805
+ model = models.ModifyProtectionStatusRequest()
2806
2806
  model.from_json_string(json.dumps(args))
2807
2807
  start_time = time.time()
2808
2808
  while True:
2809
- rsp = client.ModifyDomainIpv6Status(model)
2809
+ rsp = client.ModifyProtectionStatus(model)
2810
2810
  result = rsp.to_json_string()
2811
2811
  try:
2812
2812
  json_obj = json.loads(result)
@@ -2877,7 +2877,7 @@ def doDescribeCiphersDetail(args, parsed_globals):
2877
2877
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2878
2878
 
2879
2879
 
2880
- def doModifyApiAnalyzeStatus(args, parsed_globals):
2880
+ def doModifyAreaBanStatus(args, parsed_globals):
2881
2881
  g_param = parse_global_arg(parsed_globals)
2882
2882
 
2883
2883
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2906,11 +2906,11 @@ def doModifyApiAnalyzeStatus(args, parsed_globals):
2906
2906
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2907
2907
  client._sdkVersion += ("_CLI_" + __version__)
2908
2908
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2909
- model = models.ModifyApiAnalyzeStatusRequest()
2909
+ model = models.ModifyAreaBanStatusRequest()
2910
2910
  model.from_json_string(json.dumps(args))
2911
2911
  start_time = time.time()
2912
2912
  while True:
2913
- rsp = client.ModifyApiAnalyzeStatus(model)
2913
+ rsp = client.ModifyAreaBanStatus(model)
2914
2914
  result = rsp.to_json_string()
2915
2915
  try:
2916
2916
  json_obj = json.loads(result)
@@ -2929,7 +2929,7 @@ def doModifyApiAnalyzeStatus(args, parsed_globals):
2929
2929
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2930
2930
 
2931
2931
 
2932
- def doModifyWafAutoDenyRules(args, parsed_globals):
2932
+ def doDescribeAntiFakeRules(args, parsed_globals):
2933
2933
  g_param = parse_global_arg(parsed_globals)
2934
2934
 
2935
2935
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2958,11 +2958,11 @@ def doModifyWafAutoDenyRules(args, parsed_globals):
2958
2958
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
2959
2959
  client._sdkVersion += ("_CLI_" + __version__)
2960
2960
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2961
- model = models.ModifyWafAutoDenyRulesRequest()
2961
+ model = models.DescribeAntiFakeRulesRequest()
2962
2962
  model.from_json_string(json.dumps(args))
2963
2963
  start_time = time.time()
2964
2964
  while True:
2965
- rsp = client.ModifyWafAutoDenyRules(model)
2965
+ rsp = client.DescribeAntiFakeRules(model)
2966
2966
  result = rsp.to_json_string()
2967
2967
  try:
2968
2968
  json_obj = json.loads(result)
@@ -2981,7 +2981,7 @@ def doModifyWafAutoDenyRules(args, parsed_globals):
2981
2981
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2982
2982
 
2983
2983
 
2984
- def doDescribeUserClbWafRegions(args, parsed_globals):
2984
+ def doDescribeFindDomainList(args, parsed_globals):
2985
2985
  g_param = parse_global_arg(parsed_globals)
2986
2986
 
2987
2987
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3010,11 +3010,11 @@ def doDescribeUserClbWafRegions(args, parsed_globals):
3010
3010
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3011
3011
  client._sdkVersion += ("_CLI_" + __version__)
3012
3012
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3013
- model = models.DescribeUserClbWafRegionsRequest()
3013
+ model = models.DescribeFindDomainListRequest()
3014
3014
  model.from_json_string(json.dumps(args))
3015
3015
  start_time = time.time()
3016
3016
  while True:
3017
- rsp = client.DescribeUserClbWafRegions(model)
3017
+ rsp = client.DescribeFindDomainList(model)
3018
3018
  result = rsp.to_json_string()
3019
3019
  try:
3020
3020
  json_obj = json.loads(result)
@@ -3033,7 +3033,7 @@ def doDescribeUserClbWafRegions(args, parsed_globals):
3033
3033
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3034
3034
 
3035
3035
 
3036
- def doDescribeUserDomainInfo(args, parsed_globals):
3036
+ def doDeleteDomainWhiteRules(args, parsed_globals):
3037
3037
  g_param = parse_global_arg(parsed_globals)
3038
3038
 
3039
3039
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3062,11 +3062,11 @@ def doDescribeUserDomainInfo(args, parsed_globals):
3062
3062
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3063
3063
  client._sdkVersion += ("_CLI_" + __version__)
3064
3064
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3065
- model = models.DescribeUserDomainInfoRequest()
3065
+ model = models.DeleteDomainWhiteRulesRequest()
3066
3066
  model.from_json_string(json.dumps(args))
3067
3067
  start_time = time.time()
3068
3068
  while True:
3069
- rsp = client.DescribeUserDomainInfo(model)
3069
+ rsp = client.DeleteDomainWhiteRules(model)
3070
3070
  result = rsp.to_json_string()
3071
3071
  try:
3072
3072
  json_obj = json.loads(result)
@@ -3085,7 +3085,7 @@ def doDescribeUserDomainInfo(args, parsed_globals):
3085
3085
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3086
3086
 
3087
3087
 
3088
- def doDescribeWafAutoDenyRules(args, parsed_globals):
3088
+ def doDescribeDomainDetailsSaas(args, parsed_globals):
3089
3089
  g_param = parse_global_arg(parsed_globals)
3090
3090
 
3091
3091
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3114,11 +3114,11 @@ def doDescribeWafAutoDenyRules(args, parsed_globals):
3114
3114
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3115
3115
  client._sdkVersion += ("_CLI_" + __version__)
3116
3116
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3117
- model = models.DescribeWafAutoDenyRulesRequest()
3117
+ model = models.DescribeDomainDetailsSaasRequest()
3118
3118
  model.from_json_string(json.dumps(args))
3119
3119
  start_time = time.time()
3120
3120
  while True:
3121
- rsp = client.DescribeWafAutoDenyRules(model)
3121
+ rsp = client.DescribeDomainDetailsSaas(model)
3122
3122
  result = rsp.to_json_string()
3123
3123
  try:
3124
3124
  json_obj = json.loads(result)
@@ -3137,7 +3137,7 @@ def doDescribeWafAutoDenyRules(args, parsed_globals):
3137
3137
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3138
3138
 
3139
3139
 
3140
- def doDescribeCustomRuleList(args, parsed_globals):
3140
+ def doDeleteDownloadRecord(args, parsed_globals):
3141
3141
  g_param = parse_global_arg(parsed_globals)
3142
3142
 
3143
3143
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3166,11 +3166,11 @@ def doDescribeCustomRuleList(args, parsed_globals):
3166
3166
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3167
3167
  client._sdkVersion += ("_CLI_" + __version__)
3168
3168
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3169
- model = models.DescribeCustomRuleListRequest()
3169
+ model = models.DeleteDownloadRecordRequest()
3170
3170
  model.from_json_string(json.dumps(args))
3171
3171
  start_time = time.time()
3172
3172
  while True:
3173
- rsp = client.DescribeCustomRuleList(model)
3173
+ rsp = client.DeleteDownloadRecord(model)
3174
3174
  result = rsp.to_json_string()
3175
3175
  try:
3176
3176
  json_obj = json.loads(result)
@@ -3189,7 +3189,7 @@ def doDescribeCustomRuleList(args, parsed_globals):
3189
3189
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3190
3190
 
3191
3191
 
3192
- def doModifySpartaProtection(args, parsed_globals):
3192
+ def doModifyCustomRule(args, parsed_globals):
3193
3193
  g_param = parse_global_arg(parsed_globals)
3194
3194
 
3195
3195
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3218,11 +3218,11 @@ def doModifySpartaProtection(args, parsed_globals):
3218
3218
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3219
3219
  client._sdkVersion += ("_CLI_" + __version__)
3220
3220
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3221
- model = models.ModifySpartaProtectionRequest()
3221
+ model = models.ModifyCustomRuleRequest()
3222
3222
  model.from_json_string(json.dumps(args))
3223
3223
  start_time = time.time()
3224
3224
  while True:
3225
- rsp = client.ModifySpartaProtection(model)
3225
+ rsp = client.ModifyCustomRule(model)
3226
3226
  result = rsp.to_json_string()
3227
3227
  try:
3228
3228
  json_obj = json.loads(result)
@@ -3241,7 +3241,7 @@ def doModifySpartaProtection(args, parsed_globals):
3241
3241
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3242
3242
 
3243
3243
 
3244
- def doDeleteDownloadRecord(args, parsed_globals):
3244
+ def doModifyBotStatus(args, parsed_globals):
3245
3245
  g_param = parse_global_arg(parsed_globals)
3246
3246
 
3247
3247
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3270,11 +3270,11 @@ def doDeleteDownloadRecord(args, parsed_globals):
3270
3270
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3271
3271
  client._sdkVersion += ("_CLI_" + __version__)
3272
3272
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3273
- model = models.DeleteDownloadRecordRequest()
3273
+ model = models.ModifyBotStatusRequest()
3274
3274
  model.from_json_string(json.dumps(args))
3275
3275
  start_time = time.time()
3276
3276
  while True:
3277
- rsp = client.DeleteDownloadRecord(model)
3277
+ rsp = client.ModifyBotStatus(model)
3278
3278
  result = rsp.to_json_string()
3279
3279
  try:
3280
3280
  json_obj = json.loads(result)
@@ -3293,7 +3293,7 @@ def doDeleteDownloadRecord(args, parsed_globals):
3293
3293
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3294
3294
 
3295
3295
 
3296
- def doCreateHost(args, parsed_globals):
3296
+ def doModifyAntiInfoLeakRules(args, parsed_globals):
3297
3297
  g_param = parse_global_arg(parsed_globals)
3298
3298
 
3299
3299
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3322,11 +3322,11 @@ def doCreateHost(args, parsed_globals):
3322
3322
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3323
3323
  client._sdkVersion += ("_CLI_" + __version__)
3324
3324
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3325
- model = models.CreateHostRequest()
3325
+ model = models.ModifyAntiInfoLeakRulesRequest()
3326
3326
  model.from_json_string(json.dumps(args))
3327
3327
  start_time = time.time()
3328
3328
  while True:
3329
- rsp = client.CreateHost(model)
3329
+ rsp = client.ModifyAntiInfoLeakRules(model)
3330
3330
  result = rsp.to_json_string()
3331
3331
  try:
3332
3332
  json_obj = json.loads(result)
@@ -3345,7 +3345,7 @@ def doCreateHost(args, parsed_globals):
3345
3345
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3346
3346
 
3347
3347
 
3348
- def doDeleteSession(args, parsed_globals):
3348
+ def doAddAntiFakeUrl(args, parsed_globals):
3349
3349
  g_param = parse_global_arg(parsed_globals)
3350
3350
 
3351
3351
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3374,11 +3374,11 @@ def doDeleteSession(args, parsed_globals):
3374
3374
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3375
3375
  client._sdkVersion += ("_CLI_" + __version__)
3376
3376
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3377
- model = models.DeleteSessionRequest()
3377
+ model = models.AddAntiFakeUrlRequest()
3378
3378
  model.from_json_string(json.dumps(args))
3379
3379
  start_time = time.time()
3380
3380
  while True:
3381
- rsp = client.DeleteSession(model)
3381
+ rsp = client.AddAntiFakeUrl(model)
3382
3382
  result = rsp.to_json_string()
3383
3383
  try:
3384
3384
  json_obj = json.loads(result)
@@ -3397,7 +3397,7 @@ def doDeleteSession(args, parsed_globals):
3397
3397
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3398
3398
 
3399
3399
 
3400
- def doSearchAccessLog(args, parsed_globals):
3400
+ def doDescribeFlowTrend(args, parsed_globals):
3401
3401
  g_param = parse_global_arg(parsed_globals)
3402
3402
 
3403
3403
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3426,11 +3426,11 @@ def doSearchAccessLog(args, parsed_globals):
3426
3426
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3427
3427
  client._sdkVersion += ("_CLI_" + __version__)
3428
3428
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3429
- model = models.SearchAccessLogRequest()
3429
+ model = models.DescribeFlowTrendRequest()
3430
3430
  model.from_json_string(json.dumps(args))
3431
3431
  start_time = time.time()
3432
3432
  while True:
3433
- rsp = client.SearchAccessLog(model)
3433
+ rsp = client.DescribeFlowTrend(model)
3434
3434
  result = rsp.to_json_string()
3435
3435
  try:
3436
3436
  json_obj = json.loads(result)
@@ -3449,7 +3449,7 @@ def doSearchAccessLog(args, parsed_globals):
3449
3449
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3450
3450
 
3451
3451
 
3452
- def doAddSpartaProtectionAuto(args, parsed_globals):
3452
+ def doDescribeAntiFakeUrl(args, parsed_globals):
3453
3453
  g_param = parse_global_arg(parsed_globals)
3454
3454
 
3455
3455
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3478,11 +3478,11 @@ def doAddSpartaProtectionAuto(args, parsed_globals):
3478
3478
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3479
3479
  client._sdkVersion += ("_CLI_" + __version__)
3480
3480
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3481
- model = models.AddSpartaProtectionAutoRequest()
3481
+ model = models.DescribeAntiFakeUrlRequest()
3482
3482
  model.from_json_string(json.dumps(args))
3483
3483
  start_time = time.time()
3484
3484
  while True:
3485
- rsp = client.AddSpartaProtectionAuto(model)
3485
+ rsp = client.DescribeAntiFakeUrl(model)
3486
3486
  result = rsp.to_json_string()
3487
3487
  try:
3488
3488
  json_obj = json.loads(result)
@@ -3501,7 +3501,7 @@ def doAddSpartaProtectionAuto(args, parsed_globals):
3501
3501
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3502
3502
 
3503
3503
 
3504
- def doDescribeHosts(args, parsed_globals):
3504
+ def doModifyDomainWhiteRule(args, parsed_globals):
3505
3505
  g_param = parse_global_arg(parsed_globals)
3506
3506
 
3507
3507
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3530,11 +3530,11 @@ def doDescribeHosts(args, parsed_globals):
3530
3530
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3531
3531
  client._sdkVersion += ("_CLI_" + __version__)
3532
3532
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3533
- model = models.DescribeHostsRequest()
3533
+ model = models.ModifyDomainWhiteRuleRequest()
3534
3534
  model.from_json_string(json.dumps(args))
3535
3535
  start_time = time.time()
3536
3536
  while True:
3537
- rsp = client.DescribeHosts(model)
3537
+ rsp = client.ModifyDomainWhiteRule(model)
3538
3538
  result = rsp.to_json_string()
3539
3539
  try:
3540
3540
  json_obj = json.loads(result)
@@ -3553,7 +3553,7 @@ def doDescribeHosts(args, parsed_globals):
3553
3553
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3554
3554
 
3555
3555
 
3556
- def doDescribeWafAutoDenyStatus(args, parsed_globals):
3556
+ def doModifyCustomRuleStatus(args, parsed_globals):
3557
3557
  g_param = parse_global_arg(parsed_globals)
3558
3558
 
3559
3559
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3582,11 +3582,11 @@ def doDescribeWafAutoDenyStatus(args, parsed_globals):
3582
3582
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3583
3583
  client._sdkVersion += ("_CLI_" + __version__)
3584
3584
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3585
- model = models.DescribeWafAutoDenyStatusRequest()
3585
+ model = models.ModifyCustomRuleStatusRequest()
3586
3586
  model.from_json_string(json.dumps(args))
3587
3587
  start_time = time.time()
3588
3588
  while True:
3589
- rsp = client.DescribeWafAutoDenyStatus(model)
3589
+ rsp = client.ModifyCustomRuleStatus(model)
3590
3590
  result = rsp.to_json_string()
3591
3591
  try:
3592
3592
  json_obj = json.loads(result)
@@ -3605,7 +3605,7 @@ def doDescribeWafAutoDenyStatus(args, parsed_globals):
3605
3605
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3606
3606
 
3607
3607
 
3608
- def doDescribeDomainWhiteRules(args, parsed_globals):
3608
+ def doDescribeIpAccessControl(args, parsed_globals):
3609
3609
  g_param = parse_global_arg(parsed_globals)
3610
3610
 
3611
3611
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3634,11 +3634,11 @@ def doDescribeDomainWhiteRules(args, parsed_globals):
3634
3634
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3635
3635
  client._sdkVersion += ("_CLI_" + __version__)
3636
3636
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3637
- model = models.DescribeDomainWhiteRulesRequest()
3637
+ model = models.DescribeIpAccessControlRequest()
3638
3638
  model.from_json_string(json.dumps(args))
3639
3639
  start_time = time.time()
3640
3640
  while True:
3641
- rsp = client.DescribeDomainWhiteRules(model)
3641
+ rsp = client.DescribeIpAccessControl(model)
3642
3642
  result = rsp.to_json_string()
3643
3643
  try:
3644
3644
  json_obj = json.loads(result)
@@ -3657,7 +3657,7 @@ def doDescribeDomainWhiteRules(args, parsed_globals):
3657
3657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3658
3658
 
3659
3659
 
3660
- def doDescribeWafThreatenIntelligence(args, parsed_globals):
3660
+ def doDescribeDomainCountInfo(args, parsed_globals):
3661
3661
  g_param = parse_global_arg(parsed_globals)
3662
3662
 
3663
3663
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3686,11 +3686,11 @@ def doDescribeWafThreatenIntelligence(args, parsed_globals):
3686
3686
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3687
3687
  client._sdkVersion += ("_CLI_" + __version__)
3688
3688
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3689
- model = models.DescribeWafThreatenIntelligenceRequest()
3689
+ model = models.DescribeDomainCountInfoRequest()
3690
3690
  model.from_json_string(json.dumps(args))
3691
3691
  start_time = time.time()
3692
3692
  while True:
3693
- rsp = client.DescribeWafThreatenIntelligence(model)
3693
+ rsp = client.DescribeDomainCountInfo(model)
3694
3694
  result = rsp.to_json_string()
3695
3695
  try:
3696
3696
  json_obj = json.loads(result)
@@ -3709,7 +3709,7 @@ def doDescribeWafThreatenIntelligence(args, parsed_globals):
3709
3709
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
3710
 
3711
3711
 
3712
- def doDescribeWafInfo(args, parsed_globals):
3712
+ def doDeleteSpartaProtection(args, parsed_globals):
3713
3713
  g_param = parse_global_arg(parsed_globals)
3714
3714
 
3715
3715
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3738,11 +3738,11 @@ def doDescribeWafInfo(args, parsed_globals):
3738
3738
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3739
3739
  client._sdkVersion += ("_CLI_" + __version__)
3740
3740
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3741
- model = models.DescribeWafInfoRequest()
3741
+ model = models.DeleteSpartaProtectionRequest()
3742
3742
  model.from_json_string(json.dumps(args))
3743
3743
  start_time = time.time()
3744
3744
  while True:
3745
- rsp = client.DescribeWafInfo(model)
3745
+ rsp = client.DeleteSpartaProtection(model)
3746
3746
  result = rsp.to_json_string()
3747
3747
  try:
3748
3748
  json_obj = json.loads(result)
@@ -3761,7 +3761,7 @@ def doDescribeWafInfo(args, parsed_globals):
3761
3761
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3762
3762
 
3763
3763
 
3764
- def doModifyDomainsCLSStatus(args, parsed_globals):
3764
+ def doSwitchDomainRules(args, parsed_globals):
3765
3765
  g_param = parse_global_arg(parsed_globals)
3766
3766
 
3767
3767
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3790,11 +3790,11 @@ def doModifyDomainsCLSStatus(args, parsed_globals):
3790
3790
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3791
3791
  client._sdkVersion += ("_CLI_" + __version__)
3792
3792
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3793
- model = models.ModifyDomainsCLSStatusRequest()
3793
+ model = models.SwitchDomainRulesRequest()
3794
3794
  model.from_json_string(json.dumps(args))
3795
3795
  start_time = time.time()
3796
3796
  while True:
3797
- rsp = client.ModifyDomainsCLSStatus(model)
3797
+ rsp = client.SwitchDomainRules(model)
3798
3798
  result = rsp.to_json_string()
3799
3799
  try:
3800
3800
  json_obj = json.loads(result)
@@ -3813,7 +3813,7 @@ def doModifyDomainsCLSStatus(args, parsed_globals):
3813
3813
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3814
3814
 
3815
3815
 
3816
- def doModifyCustomRule(args, parsed_globals):
3816
+ def doDescribeBatchIpAccessControl(args, parsed_globals):
3817
3817
  g_param = parse_global_arg(parsed_globals)
3818
3818
 
3819
3819
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3842,11 +3842,11 @@ def doModifyCustomRule(args, parsed_globals):
3842
3842
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3843
3843
  client._sdkVersion += ("_CLI_" + __version__)
3844
3844
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3845
- model = models.ModifyCustomRuleRequest()
3845
+ model = models.DescribeBatchIpAccessControlRequest()
3846
3846
  model.from_json_string(json.dumps(args))
3847
3847
  start_time = time.time()
3848
3848
  while True:
3849
- rsp = client.ModifyCustomRule(model)
3849
+ rsp = client.DescribeBatchIpAccessControl(model)
3850
3850
  result = rsp.to_json_string()
3851
3851
  try:
3852
3852
  json_obj = json.loads(result)
@@ -3865,7 +3865,7 @@ def doModifyCustomRule(args, parsed_globals):
3865
3865
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
3866
 
3867
3867
 
3868
- def doRefreshAccessCheckResult(args, parsed_globals):
3868
+ def doDescribeWafAutoDenyRules(args, parsed_globals):
3869
3869
  g_param = parse_global_arg(parsed_globals)
3870
3870
 
3871
3871
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3894,11 +3894,11 @@ def doRefreshAccessCheckResult(args, parsed_globals):
3894
3894
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3895
3895
  client._sdkVersion += ("_CLI_" + __version__)
3896
3896
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3897
- model = models.RefreshAccessCheckResultRequest()
3897
+ model = models.DescribeWafAutoDenyRulesRequest()
3898
3898
  model.from_json_string(json.dumps(args))
3899
3899
  start_time = time.time()
3900
3900
  while True:
3901
- rsp = client.RefreshAccessCheckResult(model)
3901
+ rsp = client.DescribeWafAutoDenyRules(model)
3902
3902
  result = rsp.to_json_string()
3903
3903
  try:
3904
3904
  json_obj = json.loads(result)
@@ -3917,7 +3917,7 @@ def doRefreshAccessCheckResult(args, parsed_globals):
3917
3917
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3918
3918
 
3919
3919
 
3920
- def doPostAttackDownloadTask(args, parsed_globals):
3920
+ def doDeleteSession(args, parsed_globals):
3921
3921
  g_param = parse_global_arg(parsed_globals)
3922
3922
 
3923
3923
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3946,11 +3946,11 @@ def doPostAttackDownloadTask(args, parsed_globals):
3946
3946
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3947
3947
  client._sdkVersion += ("_CLI_" + __version__)
3948
3948
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3949
- model = models.PostAttackDownloadTaskRequest()
3949
+ model = models.DeleteSessionRequest()
3950
3950
  model.from_json_string(json.dumps(args))
3951
3951
  start_time = time.time()
3952
3952
  while True:
3953
- rsp = client.PostAttackDownloadTask(model)
3953
+ rsp = client.DeleteSession(model)
3954
3954
  result = rsp.to_json_string()
3955
3955
  try:
3956
3956
  json_obj = json.loads(result)
@@ -3969,7 +3969,7 @@ def doPostAttackDownloadTask(args, parsed_globals):
3969
3969
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3970
3970
 
3971
3971
 
3972
- def doAddDomainWhiteRule(args, parsed_globals):
3972
+ def doDescribeDomainWhiteRules(args, parsed_globals):
3973
3973
  g_param = parse_global_arg(parsed_globals)
3974
3974
 
3975
3975
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3998,11 +3998,11 @@ def doAddDomainWhiteRule(args, parsed_globals):
3998
3998
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
3999
3999
  client._sdkVersion += ("_CLI_" + __version__)
4000
4000
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4001
- model = models.AddDomainWhiteRuleRequest()
4001
+ model = models.DescribeDomainWhiteRulesRequest()
4002
4002
  model.from_json_string(json.dumps(args))
4003
4003
  start_time = time.time()
4004
4004
  while True:
4005
- rsp = client.AddDomainWhiteRule(model)
4005
+ rsp = client.DescribeDomainWhiteRules(model)
4006
4006
  result = rsp.to_json_string()
4007
4007
  try:
4008
4008
  json_obj = json.loads(result)
@@ -4021,7 +4021,7 @@ def doAddDomainWhiteRule(args, parsed_globals):
4021
4021
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4022
4022
 
4023
4023
 
4024
- def doDescribePeakValue(args, parsed_globals):
4024
+ def doModifyDomainsCLSStatus(args, parsed_globals):
4025
4025
  g_param = parse_global_arg(parsed_globals)
4026
4026
 
4027
4027
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4050,11 +4050,11 @@ def doDescribePeakValue(args, parsed_globals):
4050
4050
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4051
4051
  client._sdkVersion += ("_CLI_" + __version__)
4052
4052
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4053
- model = models.DescribePeakValueRequest()
4053
+ model = models.ModifyDomainsCLSStatusRequest()
4054
4054
  model.from_json_string(json.dumps(args))
4055
4055
  start_time = time.time()
4056
4056
  while True:
4057
- rsp = client.DescribePeakValue(model)
4057
+ rsp = client.ModifyDomainsCLSStatus(model)
4058
4058
  result = rsp.to_json_string()
4059
4059
  try:
4060
4060
  json_obj = json.loads(result)
@@ -4073,7 +4073,7 @@ def doDescribePeakValue(args, parsed_globals):
4073
4073
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4074
4074
 
4075
4075
 
4076
- def doDescribeAccessFastAnalysis(args, parsed_globals):
4076
+ def doRefreshAccessCheckResult(args, parsed_globals):
4077
4077
  g_param = parse_global_arg(parsed_globals)
4078
4078
 
4079
4079
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4102,11 +4102,63 @@ def doDescribeAccessFastAnalysis(args, parsed_globals):
4102
4102
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4103
4103
  client._sdkVersion += ("_CLI_" + __version__)
4104
4104
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4105
- model = models.DescribeAccessFastAnalysisRequest()
4105
+ model = models.RefreshAccessCheckResultRequest()
4106
4106
  model.from_json_string(json.dumps(args))
4107
4107
  start_time = time.time()
4108
4108
  while True:
4109
- rsp = client.DescribeAccessFastAnalysis(model)
4109
+ rsp = client.RefreshAccessCheckResult(model)
4110
+ result = rsp.to_json_string()
4111
+ try:
4112
+ json_obj = json.loads(result)
4113
+ except TypeError as e:
4114
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4115
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4116
+ break
4117
+ cur_time = time.time()
4118
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4119
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4120
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4121
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4122
+ else:
4123
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4124
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4125
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4126
+
4127
+
4128
+ def doPostAttackDownloadTask(args, parsed_globals):
4129
+ g_param = parse_global_arg(parsed_globals)
4130
+
4131
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4132
+ cred = credential.CVMRoleCredential()
4133
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4134
+ cred = credential.STSAssumeRoleCredential(
4135
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4136
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4137
+ )
4138
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4139
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4140
+ else:
4141
+ cred = credential.Credential(
4142
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4143
+ )
4144
+ http_profile = HttpProfile(
4145
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4146
+ reqMethod="POST",
4147
+ endpoint=g_param[OptionsDefine.Endpoint],
4148
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4149
+ )
4150
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4151
+ if g_param[OptionsDefine.Language]:
4152
+ profile.language = g_param[OptionsDefine.Language]
4153
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4154
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4155
+ client._sdkVersion += ("_CLI_" + __version__)
4156
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4157
+ model = models.PostAttackDownloadTaskRequest()
4158
+ model.from_json_string(json.dumps(args))
4159
+ start_time = time.time()
4160
+ while True:
4161
+ rsp = client.PostAttackDownloadTask(model)
4110
4162
  result = rsp.to_json_string()
4111
4163
  try:
4112
4164
  json_obj = json.loads(result)
@@ -4229,7 +4281,7 @@ def doDescribeHost(args, parsed_globals):
4229
4281
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4230
4282
 
4231
4283
 
4232
- def doUpsertIpAccessControl(args, parsed_globals):
4284
+ def doDescribeAccessExports(args, parsed_globals):
4233
4285
  g_param = parse_global_arg(parsed_globals)
4234
4286
 
4235
4287
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4258,11 +4310,11 @@ def doUpsertIpAccessControl(args, parsed_globals):
4258
4310
  client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4259
4311
  client._sdkVersion += ("_CLI_" + __version__)
4260
4312
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4261
- model = models.UpsertIpAccessControlRequest()
4313
+ model = models.DescribeAccessExportsRequest()
4262
4314
  model.from_json_string(json.dumps(args))
4263
4315
  start_time = time.time()
4264
4316
  while True:
4265
- rsp = client.UpsertIpAccessControl(model)
4317
+ rsp = client.DescribeAccessExports(model)
4266
4318
  result = rsp.to_json_string()
4267
4319
  try:
4268
4320
  json_obj = json.loads(result)
@@ -4281,99 +4333,1107 @@ def doUpsertIpAccessControl(args, parsed_globals):
4281
4333
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4282
4334
 
4283
4335
 
4284
- CLIENT_MAP = {
4285
- "v20180125": waf_client_v20180125,
4286
-
4287
- }
4288
-
4289
- MODELS_MAP = {
4290
- "v20180125": models_v20180125,
4291
-
4292
- }
4336
+ def doDescribeHostLimit(args, parsed_globals):
4337
+ g_param = parse_global_arg(parsed_globals)
4293
4338
 
4294
- ACTION_MAP = {
4295
- "ModifyHost": doModifyHost,
4296
- "DescribeAccessExports": doDescribeAccessExports,
4297
- "DescribeFindDomainList": doDescribeFindDomainList,
4298
- "DescribeAutoDenyIP": doDescribeAutoDenyIP,
4299
- "DescribeTlsVersion": doDescribeTlsVersion,
4300
- "ModifyProtectionStatus": doModifyProtectionStatus,
4301
- "DeleteAccessExport": doDeleteAccessExport,
4302
- "DescribeDomainDetailsClb": doDescribeDomainDetailsClb,
4303
- "AddSpartaProtection": doAddSpartaProtection,
4304
- "DeleteDomainWhiteRules": doDeleteDomainWhiteRules,
4305
- "ModifyAreaBanStatus": doModifyAreaBanStatus,
4306
- "DescribeDomains": doDescribeDomains,
4307
- "DescribeAccessIndex": doDescribeAccessIndex,
4308
- "CreateAccessExport": doCreateAccessExport,
4309
- "DescribePolicyStatus": doDescribePolicyStatus,
4310
- "GetAttackTotalCount": doGetAttackTotalCount,
4311
- "SearchAttackLog": doSearchAttackLog,
4312
- "DescribeAccessHistogram": doDescribeAccessHistogram,
4313
- "AddCustomWhiteRule": doAddCustomWhiteRule,
4314
- "DescribeInstances": doDescribeInstances,
4315
- "ModifySpartaProtectionMode": doModifySpartaProtectionMode,
4316
- "DeleteIpAccessControl": doDeleteIpAccessControl,
4339
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4340
+ cred = credential.CVMRoleCredential()
4341
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4342
+ cred = credential.STSAssumeRoleCredential(
4343
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4344
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4345
+ )
4346
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4347
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4348
+ else:
4349
+ cred = credential.Credential(
4350
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4351
+ )
4352
+ http_profile = HttpProfile(
4353
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4354
+ reqMethod="POST",
4355
+ endpoint=g_param[OptionsDefine.Endpoint],
4356
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4357
+ )
4358
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4359
+ if g_param[OptionsDefine.Language]:
4360
+ profile.language = g_param[OptionsDefine.Language]
4361
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4362
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4363
+ client._sdkVersion += ("_CLI_" + __version__)
4364
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4365
+ model = models.DescribeHostLimitRequest()
4366
+ model.from_json_string(json.dumps(args))
4367
+ start_time = time.time()
4368
+ while True:
4369
+ rsp = client.DescribeHostLimit(model)
4370
+ result = rsp.to_json_string()
4371
+ try:
4372
+ json_obj = json.loads(result)
4373
+ except TypeError as e:
4374
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4375
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4376
+ break
4377
+ cur_time = time.time()
4378
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4379
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4380
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4381
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4382
+ else:
4383
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4384
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4385
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4386
+
4387
+
4388
+ def doDeleteAccessExport(args, parsed_globals):
4389
+ g_param = parse_global_arg(parsed_globals)
4390
+
4391
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4392
+ cred = credential.CVMRoleCredential()
4393
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4394
+ cred = credential.STSAssumeRoleCredential(
4395
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4397
+ )
4398
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
+ else:
4401
+ cred = credential.Credential(
4402
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4403
+ )
4404
+ http_profile = HttpProfile(
4405
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4406
+ reqMethod="POST",
4407
+ endpoint=g_param[OptionsDefine.Endpoint],
4408
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4409
+ )
4410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4411
+ if g_param[OptionsDefine.Language]:
4412
+ profile.language = g_param[OptionsDefine.Language]
4413
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4414
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4415
+ client._sdkVersion += ("_CLI_" + __version__)
4416
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4417
+ model = models.DeleteAccessExportRequest()
4418
+ model.from_json_string(json.dumps(args))
4419
+ start_time = time.time()
4420
+ while True:
4421
+ rsp = client.DeleteAccessExport(model)
4422
+ result = rsp.to_json_string()
4423
+ try:
4424
+ json_obj = json.loads(result)
4425
+ except TypeError as e:
4426
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4427
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4428
+ break
4429
+ cur_time = time.time()
4430
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4431
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4432
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4433
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4434
+ else:
4435
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4436
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4437
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4438
+
4439
+
4440
+ def doModifyAntiInfoLeakRuleStatus(args, parsed_globals):
4441
+ g_param = parse_global_arg(parsed_globals)
4442
+
4443
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4444
+ cred = credential.CVMRoleCredential()
4445
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4446
+ cred = credential.STSAssumeRoleCredential(
4447
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4448
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4449
+ )
4450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4451
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4452
+ else:
4453
+ cred = credential.Credential(
4454
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4455
+ )
4456
+ http_profile = HttpProfile(
4457
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4458
+ reqMethod="POST",
4459
+ endpoint=g_param[OptionsDefine.Endpoint],
4460
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4461
+ )
4462
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4463
+ if g_param[OptionsDefine.Language]:
4464
+ profile.language = g_param[OptionsDefine.Language]
4465
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4466
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4467
+ client._sdkVersion += ("_CLI_" + __version__)
4468
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4469
+ model = models.ModifyAntiInfoLeakRuleStatusRequest()
4470
+ model.from_json_string(json.dumps(args))
4471
+ start_time = time.time()
4472
+ while True:
4473
+ rsp = client.ModifyAntiInfoLeakRuleStatus(model)
4474
+ result = rsp.to_json_string()
4475
+ try:
4476
+ json_obj = json.loads(result)
4477
+ except TypeError as e:
4478
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4479
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4480
+ break
4481
+ cur_time = time.time()
4482
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4483
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4484
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4485
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4486
+ else:
4487
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4488
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4489
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4490
+
4491
+
4492
+ def doCreateAccessExport(args, parsed_globals):
4493
+ g_param = parse_global_arg(parsed_globals)
4494
+
4495
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4496
+ cred = credential.CVMRoleCredential()
4497
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4498
+ cred = credential.STSAssumeRoleCredential(
4499
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4500
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4501
+ )
4502
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4503
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4504
+ else:
4505
+ cred = credential.Credential(
4506
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4507
+ )
4508
+ http_profile = HttpProfile(
4509
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4510
+ reqMethod="POST",
4511
+ endpoint=g_param[OptionsDefine.Endpoint],
4512
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4513
+ )
4514
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4515
+ if g_param[OptionsDefine.Language]:
4516
+ profile.language = g_param[OptionsDefine.Language]
4517
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4518
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4519
+ client._sdkVersion += ("_CLI_" + __version__)
4520
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4521
+ model = models.CreateAccessExportRequest()
4522
+ model.from_json_string(json.dumps(args))
4523
+ start_time = time.time()
4524
+ while True:
4525
+ rsp = client.CreateAccessExport(model)
4526
+ result = rsp.to_json_string()
4527
+ try:
4528
+ json_obj = json.loads(result)
4529
+ except TypeError as e:
4530
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4531
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4532
+ break
4533
+ cur_time = time.time()
4534
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4535
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4536
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4537
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4538
+ else:
4539
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4540
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4541
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4542
+
4543
+
4544
+ def doSearchAttackLog(args, parsed_globals):
4545
+ g_param = parse_global_arg(parsed_globals)
4546
+
4547
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4548
+ cred = credential.CVMRoleCredential()
4549
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4550
+ cred = credential.STSAssumeRoleCredential(
4551
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4552
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4553
+ )
4554
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4555
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4556
+ else:
4557
+ cred = credential.Credential(
4558
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4559
+ )
4560
+ http_profile = HttpProfile(
4561
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4562
+ reqMethod="POST",
4563
+ endpoint=g_param[OptionsDefine.Endpoint],
4564
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4565
+ )
4566
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4567
+ if g_param[OptionsDefine.Language]:
4568
+ profile.language = g_param[OptionsDefine.Language]
4569
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4570
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4571
+ client._sdkVersion += ("_CLI_" + __version__)
4572
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4573
+ model = models.SearchAttackLogRequest()
4574
+ model.from_json_string(json.dumps(args))
4575
+ start_time = time.time()
4576
+ while True:
4577
+ rsp = client.SearchAttackLog(model)
4578
+ result = rsp.to_json_string()
4579
+ try:
4580
+ json_obj = json.loads(result)
4581
+ except TypeError as e:
4582
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4583
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4584
+ break
4585
+ cur_time = time.time()
4586
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4587
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4588
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4589
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4590
+ else:
4591
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4592
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4593
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4594
+
4595
+
4596
+ def doDescribeInstances(args, parsed_globals):
4597
+ g_param = parse_global_arg(parsed_globals)
4598
+
4599
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4600
+ cred = credential.CVMRoleCredential()
4601
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4602
+ cred = credential.STSAssumeRoleCredential(
4603
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4604
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4605
+ )
4606
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4607
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4608
+ else:
4609
+ cred = credential.Credential(
4610
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4611
+ )
4612
+ http_profile = HttpProfile(
4613
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4614
+ reqMethod="POST",
4615
+ endpoint=g_param[OptionsDefine.Endpoint],
4616
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4617
+ )
4618
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4619
+ if g_param[OptionsDefine.Language]:
4620
+ profile.language = g_param[OptionsDefine.Language]
4621
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4622
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4623
+ client._sdkVersion += ("_CLI_" + __version__)
4624
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4625
+ model = models.DescribeInstancesRequest()
4626
+ model.from_json_string(json.dumps(args))
4627
+ start_time = time.time()
4628
+ while True:
4629
+ rsp = client.DescribeInstances(model)
4630
+ result = rsp.to_json_string()
4631
+ try:
4632
+ json_obj = json.loads(result)
4633
+ except TypeError as e:
4634
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4635
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4636
+ break
4637
+ cur_time = time.time()
4638
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4639
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4640
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4641
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4642
+ else:
4643
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4644
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4645
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4646
+
4647
+
4648
+ def doModifyHostFlowMode(args, parsed_globals):
4649
+ g_param = parse_global_arg(parsed_globals)
4650
+
4651
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4652
+ cred = credential.CVMRoleCredential()
4653
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4654
+ cred = credential.STSAssumeRoleCredential(
4655
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4656
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4657
+ )
4658
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4659
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4660
+ else:
4661
+ cred = credential.Credential(
4662
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4663
+ )
4664
+ http_profile = HttpProfile(
4665
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4666
+ reqMethod="POST",
4667
+ endpoint=g_param[OptionsDefine.Endpoint],
4668
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4669
+ )
4670
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4671
+ if g_param[OptionsDefine.Language]:
4672
+ profile.language = g_param[OptionsDefine.Language]
4673
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4674
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4675
+ client._sdkVersion += ("_CLI_" + __version__)
4676
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4677
+ model = models.ModifyHostFlowModeRequest()
4678
+ model.from_json_string(json.dumps(args))
4679
+ start_time = time.time()
4680
+ while True:
4681
+ rsp = client.ModifyHostFlowMode(model)
4682
+ result = rsp.to_json_string()
4683
+ try:
4684
+ json_obj = json.loads(result)
4685
+ except TypeError as e:
4686
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4687
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4688
+ break
4689
+ cur_time = time.time()
4690
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4691
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4692
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4693
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4694
+ else:
4695
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4696
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4697
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4698
+
4699
+
4700
+ def doModifyApiAnalyzeStatus(args, parsed_globals):
4701
+ g_param = parse_global_arg(parsed_globals)
4702
+
4703
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4704
+ cred = credential.CVMRoleCredential()
4705
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4706
+ cred = credential.STSAssumeRoleCredential(
4707
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4708
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4709
+ )
4710
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4711
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4712
+ else:
4713
+ cred = credential.Credential(
4714
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4715
+ )
4716
+ http_profile = HttpProfile(
4717
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4718
+ reqMethod="POST",
4719
+ endpoint=g_param[OptionsDefine.Endpoint],
4720
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4721
+ )
4722
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4723
+ if g_param[OptionsDefine.Language]:
4724
+ profile.language = g_param[OptionsDefine.Language]
4725
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4726
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4727
+ client._sdkVersion += ("_CLI_" + __version__)
4728
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4729
+ model = models.ModifyApiAnalyzeStatusRequest()
4730
+ model.from_json_string(json.dumps(args))
4731
+ start_time = time.time()
4732
+ while True:
4733
+ rsp = client.ModifyApiAnalyzeStatus(model)
4734
+ result = rsp.to_json_string()
4735
+ try:
4736
+ json_obj = json.loads(result)
4737
+ except TypeError as e:
4738
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4739
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4740
+ break
4741
+ cur_time = time.time()
4742
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4743
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4744
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4745
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4746
+ else:
4747
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4748
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4749
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4750
+
4751
+
4752
+ def doDescribeWafAutoDenyStatus(args, parsed_globals):
4753
+ g_param = parse_global_arg(parsed_globals)
4754
+
4755
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4756
+ cred = credential.CVMRoleCredential()
4757
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4758
+ cred = credential.STSAssumeRoleCredential(
4759
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4760
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4761
+ )
4762
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4763
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4764
+ else:
4765
+ cred = credential.Credential(
4766
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4767
+ )
4768
+ http_profile = HttpProfile(
4769
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4770
+ reqMethod="POST",
4771
+ endpoint=g_param[OptionsDefine.Endpoint],
4772
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4773
+ )
4774
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4775
+ if g_param[OptionsDefine.Language]:
4776
+ profile.language = g_param[OptionsDefine.Language]
4777
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4778
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4779
+ client._sdkVersion += ("_CLI_" + __version__)
4780
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4781
+ model = models.DescribeWafAutoDenyStatusRequest()
4782
+ model.from_json_string(json.dumps(args))
4783
+ start_time = time.time()
4784
+ while True:
4785
+ rsp = client.DescribeWafAutoDenyStatus(model)
4786
+ result = rsp.to_json_string()
4787
+ try:
4788
+ json_obj = json.loads(result)
4789
+ except TypeError as e:
4790
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4791
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4792
+ break
4793
+ cur_time = time.time()
4794
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4795
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4796
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4797
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4798
+ else:
4799
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4800
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4801
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4802
+
4803
+
4804
+ def doModifyCustomWhiteRuleStatus(args, parsed_globals):
4805
+ g_param = parse_global_arg(parsed_globals)
4806
+
4807
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4808
+ cred = credential.CVMRoleCredential()
4809
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4810
+ cred = credential.STSAssumeRoleCredential(
4811
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4812
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4813
+ )
4814
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4815
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4816
+ else:
4817
+ cred = credential.Credential(
4818
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4819
+ )
4820
+ http_profile = HttpProfile(
4821
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4822
+ reqMethod="POST",
4823
+ endpoint=g_param[OptionsDefine.Endpoint],
4824
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4825
+ )
4826
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4827
+ if g_param[OptionsDefine.Language]:
4828
+ profile.language = g_param[OptionsDefine.Language]
4829
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4830
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4831
+ client._sdkVersion += ("_CLI_" + __version__)
4832
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4833
+ model = models.ModifyCustomWhiteRuleStatusRequest()
4834
+ model.from_json_string(json.dumps(args))
4835
+ start_time = time.time()
4836
+ while True:
4837
+ rsp = client.ModifyCustomWhiteRuleStatus(model)
4838
+ result = rsp.to_json_string()
4839
+ try:
4840
+ json_obj = json.loads(result)
4841
+ except TypeError as e:
4842
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4843
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4844
+ break
4845
+ cur_time = time.time()
4846
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4847
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4848
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4849
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4850
+ else:
4851
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4852
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4853
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4854
+
4855
+
4856
+ def doModifyHostMode(args, parsed_globals):
4857
+ g_param = parse_global_arg(parsed_globals)
4858
+
4859
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4860
+ cred = credential.CVMRoleCredential()
4861
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4862
+ cred = credential.STSAssumeRoleCredential(
4863
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4864
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4865
+ )
4866
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4867
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4868
+ else:
4869
+ cred = credential.Credential(
4870
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4871
+ )
4872
+ http_profile = HttpProfile(
4873
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4874
+ reqMethod="POST",
4875
+ endpoint=g_param[OptionsDefine.Endpoint],
4876
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4877
+ )
4878
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4879
+ if g_param[OptionsDefine.Language]:
4880
+ profile.language = g_param[OptionsDefine.Language]
4881
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4882
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4883
+ client._sdkVersion += ("_CLI_" + __version__)
4884
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4885
+ model = models.ModifyHostModeRequest()
4886
+ model.from_json_string(json.dumps(args))
4887
+ start_time = time.time()
4888
+ while True:
4889
+ rsp = client.ModifyHostMode(model)
4890
+ result = rsp.to_json_string()
4891
+ try:
4892
+ json_obj = json.loads(result)
4893
+ except TypeError as e:
4894
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4895
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4896
+ break
4897
+ cur_time = time.time()
4898
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4899
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4900
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4901
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4902
+ else:
4903
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4904
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4905
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4906
+
4907
+
4908
+ def doDescribeUserClbWafRegions(args, parsed_globals):
4909
+ g_param = parse_global_arg(parsed_globals)
4910
+
4911
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4912
+ cred = credential.CVMRoleCredential()
4913
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4914
+ cred = credential.STSAssumeRoleCredential(
4915
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4916
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4917
+ )
4918
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4919
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4920
+ else:
4921
+ cred = credential.Credential(
4922
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4923
+ )
4924
+ http_profile = HttpProfile(
4925
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4926
+ reqMethod="POST",
4927
+ endpoint=g_param[OptionsDefine.Endpoint],
4928
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4929
+ )
4930
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4931
+ if g_param[OptionsDefine.Language]:
4932
+ profile.language = g_param[OptionsDefine.Language]
4933
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4934
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4935
+ client._sdkVersion += ("_CLI_" + __version__)
4936
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4937
+ model = models.DescribeUserClbWafRegionsRequest()
4938
+ model.from_json_string(json.dumps(args))
4939
+ start_time = time.time()
4940
+ while True:
4941
+ rsp = client.DescribeUserClbWafRegions(model)
4942
+ result = rsp.to_json_string()
4943
+ try:
4944
+ json_obj = json.loads(result)
4945
+ except TypeError as e:
4946
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4947
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4948
+ break
4949
+ cur_time = time.time()
4950
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4951
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4952
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4953
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4954
+ else:
4955
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4956
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4957
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4958
+
4959
+
4960
+ def doUpsertCCRule(args, parsed_globals):
4961
+ g_param = parse_global_arg(parsed_globals)
4962
+
4963
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4964
+ cred = credential.CVMRoleCredential()
4965
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4966
+ cred = credential.STSAssumeRoleCredential(
4967
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4968
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
4969
+ )
4970
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4971
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4972
+ else:
4973
+ cred = credential.Credential(
4974
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4975
+ )
4976
+ http_profile = HttpProfile(
4977
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4978
+ reqMethod="POST",
4979
+ endpoint=g_param[OptionsDefine.Endpoint],
4980
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4981
+ )
4982
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4983
+ if g_param[OptionsDefine.Language]:
4984
+ profile.language = g_param[OptionsDefine.Language]
4985
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4986
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
4987
+ client._sdkVersion += ("_CLI_" + __version__)
4988
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4989
+ model = models.UpsertCCRuleRequest()
4990
+ model.from_json_string(json.dumps(args))
4991
+ start_time = time.time()
4992
+ while True:
4993
+ rsp = client.UpsertCCRule(model)
4994
+ result = rsp.to_json_string()
4995
+ try:
4996
+ json_obj = json.loads(result)
4997
+ except TypeError as e:
4998
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4999
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5000
+ break
5001
+ cur_time = time.time()
5002
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5003
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5004
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5005
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5006
+ else:
5007
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5008
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5009
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5010
+
5011
+
5012
+ def doDeleteAntiFakeUrl(args, parsed_globals):
5013
+ g_param = parse_global_arg(parsed_globals)
5014
+
5015
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5016
+ cred = credential.CVMRoleCredential()
5017
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5018
+ cred = credential.STSAssumeRoleCredential(
5019
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5020
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
5021
+ )
5022
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5023
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5024
+ else:
5025
+ cred = credential.Credential(
5026
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5027
+ )
5028
+ http_profile = HttpProfile(
5029
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5030
+ reqMethod="POST",
5031
+ endpoint=g_param[OptionsDefine.Endpoint],
5032
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5033
+ )
5034
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5035
+ if g_param[OptionsDefine.Language]:
5036
+ profile.language = g_param[OptionsDefine.Language]
5037
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5038
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5039
+ client._sdkVersion += ("_CLI_" + __version__)
5040
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5041
+ model = models.DeleteAntiFakeUrlRequest()
5042
+ model.from_json_string(json.dumps(args))
5043
+ start_time = time.time()
5044
+ while True:
5045
+ rsp = client.DeleteAntiFakeUrl(model)
5046
+ result = rsp.to_json_string()
5047
+ try:
5048
+ json_obj = json.loads(result)
5049
+ except TypeError as e:
5050
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5051
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5052
+ break
5053
+ cur_time = time.time()
5054
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5055
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5056
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5057
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5058
+ else:
5059
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5060
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5061
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5062
+
5063
+
5064
+ def doDescribeCCRuleList(args, parsed_globals):
5065
+ g_param = parse_global_arg(parsed_globals)
5066
+
5067
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5068
+ cred = credential.CVMRoleCredential()
5069
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5070
+ cred = credential.STSAssumeRoleCredential(
5071
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5072
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
5073
+ )
5074
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5075
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5076
+ else:
5077
+ cred = credential.Credential(
5078
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5079
+ )
5080
+ http_profile = HttpProfile(
5081
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5082
+ reqMethod="POST",
5083
+ endpoint=g_param[OptionsDefine.Endpoint],
5084
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5085
+ )
5086
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5087
+ if g_param[OptionsDefine.Language]:
5088
+ profile.language = g_param[OptionsDefine.Language]
5089
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5090
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5091
+ client._sdkVersion += ("_CLI_" + __version__)
5092
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5093
+ model = models.DescribeCCRuleListRequest()
5094
+ model.from_json_string(json.dumps(args))
5095
+ start_time = time.time()
5096
+ while True:
5097
+ rsp = client.DescribeCCRuleList(model)
5098
+ result = rsp.to_json_string()
5099
+ try:
5100
+ json_obj = json.loads(result)
5101
+ except TypeError as e:
5102
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5103
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5104
+ break
5105
+ cur_time = time.time()
5106
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5107
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5108
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5109
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5110
+ else:
5111
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5112
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5113
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5114
+
5115
+
5116
+ def doCreateHost(args, parsed_globals):
5117
+ g_param = parse_global_arg(parsed_globals)
5118
+
5119
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5120
+ cred = credential.CVMRoleCredential()
5121
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5122
+ cred = credential.STSAssumeRoleCredential(
5123
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5124
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
5125
+ )
5126
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5127
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5128
+ else:
5129
+ cred = credential.Credential(
5130
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5131
+ )
5132
+ http_profile = HttpProfile(
5133
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5134
+ reqMethod="POST",
5135
+ endpoint=g_param[OptionsDefine.Endpoint],
5136
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5137
+ )
5138
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5139
+ if g_param[OptionsDefine.Language]:
5140
+ profile.language = g_param[OptionsDefine.Language]
5141
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5142
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5143
+ client._sdkVersion += ("_CLI_" + __version__)
5144
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5145
+ model = models.CreateHostRequest()
5146
+ model.from_json_string(json.dumps(args))
5147
+ start_time = time.time()
5148
+ while True:
5149
+ rsp = client.CreateHost(model)
5150
+ result = rsp.to_json_string()
5151
+ try:
5152
+ json_obj = json.loads(result)
5153
+ except TypeError as e:
5154
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5155
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5156
+ break
5157
+ cur_time = time.time()
5158
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5159
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5160
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5161
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5162
+ else:
5163
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5164
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5165
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5166
+
5167
+
5168
+ def doUpsertSession(args, parsed_globals):
5169
+ g_param = parse_global_arg(parsed_globals)
5170
+
5171
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5172
+ cred = credential.CVMRoleCredential()
5173
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5174
+ cred = credential.STSAssumeRoleCredential(
5175
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5176
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
5177
+ )
5178
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5179
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5180
+ else:
5181
+ cred = credential.Credential(
5182
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5183
+ )
5184
+ http_profile = HttpProfile(
5185
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5186
+ reqMethod="POST",
5187
+ endpoint=g_param[OptionsDefine.Endpoint],
5188
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5189
+ )
5190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5191
+ if g_param[OptionsDefine.Language]:
5192
+ profile.language = g_param[OptionsDefine.Language]
5193
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5194
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5195
+ client._sdkVersion += ("_CLI_" + __version__)
5196
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5197
+ model = models.UpsertSessionRequest()
5198
+ model.from_json_string(json.dumps(args))
5199
+ start_time = time.time()
5200
+ while True:
5201
+ rsp = client.UpsertSession(model)
5202
+ result = rsp.to_json_string()
5203
+ try:
5204
+ json_obj = json.loads(result)
5205
+ except TypeError as e:
5206
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5207
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5208
+ break
5209
+ cur_time = time.time()
5210
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5211
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5212
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5213
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5214
+ else:
5215
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5216
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5217
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5218
+
5219
+
5220
+ def doAddDomainWhiteRule(args, parsed_globals):
5221
+ g_param = parse_global_arg(parsed_globals)
5222
+
5223
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5224
+ cred = credential.CVMRoleCredential()
5225
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5226
+ cred = credential.STSAssumeRoleCredential(
5227
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5228
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
5229
+ )
5230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5231
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5232
+ else:
5233
+ cred = credential.Credential(
5234
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5235
+ )
5236
+ http_profile = HttpProfile(
5237
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5238
+ reqMethod="POST",
5239
+ endpoint=g_param[OptionsDefine.Endpoint],
5240
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5241
+ )
5242
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5243
+ if g_param[OptionsDefine.Language]:
5244
+ profile.language = g_param[OptionsDefine.Language]
5245
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5246
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5247
+ client._sdkVersion += ("_CLI_" + __version__)
5248
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5249
+ model = models.AddDomainWhiteRuleRequest()
5250
+ model.from_json_string(json.dumps(args))
5251
+ start_time = time.time()
5252
+ while True:
5253
+ rsp = client.AddDomainWhiteRule(model)
5254
+ result = rsp.to_json_string()
5255
+ try:
5256
+ json_obj = json.loads(result)
5257
+ except TypeError as e:
5258
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5259
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5260
+ break
5261
+ cur_time = time.time()
5262
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5263
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5264
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5265
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5266
+ else:
5267
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5268
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5269
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5270
+
5271
+
5272
+ def doModifyDomainIpv6Status(args, parsed_globals):
5273
+ g_param = parse_global_arg(parsed_globals)
5274
+
5275
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5276
+ cred = credential.CVMRoleCredential()
5277
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5278
+ cred = credential.STSAssumeRoleCredential(
5279
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5280
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
5281
+ )
5282
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5283
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5284
+ else:
5285
+ cred = credential.Credential(
5286
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5287
+ )
5288
+ http_profile = HttpProfile(
5289
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5290
+ reqMethod="POST",
5291
+ endpoint=g_param[OptionsDefine.Endpoint],
5292
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5293
+ )
5294
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5295
+ if g_param[OptionsDefine.Language]:
5296
+ profile.language = g_param[OptionsDefine.Language]
5297
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5298
+ client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
5299
+ client._sdkVersion += ("_CLI_" + __version__)
5300
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5301
+ model = models.ModifyDomainIpv6StatusRequest()
5302
+ model.from_json_string(json.dumps(args))
5303
+ start_time = time.time()
5304
+ while True:
5305
+ rsp = client.ModifyDomainIpv6Status(model)
5306
+ result = rsp.to_json_string()
5307
+ try:
5308
+ json_obj = json.loads(result)
5309
+ except TypeError as e:
5310
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5311
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5312
+ break
5313
+ cur_time = time.time()
5314
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5315
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5316
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5317
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5318
+ else:
5319
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5320
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5321
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5322
+
5323
+
5324
+ CLIENT_MAP = {
5325
+ "v20180125": waf_client_v20180125,
5326
+
5327
+ }
5328
+
5329
+ MODELS_MAP = {
5330
+ "v20180125": models_v20180125,
5331
+
5332
+ }
5333
+
5334
+ ACTION_MAP = {
5335
+ "DescribeDomainDetailsClb": doDescribeDomainDetailsClb,
5336
+ "AddAntiInfoLeakRules": doAddAntiInfoLeakRules,
5337
+ "DescribeAccessIndex": doDescribeAccessIndex,
5338
+ "GetAttackTotalCount": doGetAttackTotalCount,
5339
+ "AddCustomWhiteRule": doAddCustomWhiteRule,
5340
+ "DeleteIpAccessControl": doDeleteIpAccessControl,
5341
+ "DescribeAntiInfoLeakRules": doDescribeAntiInfoLeakRules,
4317
5342
  "AddSpartaProtectionsAuto": doAddSpartaProtectionsAuto,
5343
+ "DescribeAutoDenyIP": doDescribeAutoDenyIP,
5344
+ "DeleteCustomWhiteRule": doDeleteCustomWhiteRule,
5345
+ "GetAttackDownloadRecords": doGetAttackDownloadRecords,
5346
+ "AddCustomRule": doAddCustomRule,
5347
+ "DeleteCustomRule": doDeleteCustomRule,
5348
+ "ModifyAntiFakeUrl": doModifyAntiFakeUrl,
5349
+ "ModifySpartaProtection": doModifySpartaProtection,
5350
+ "DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
5351
+ "ModifyWafAutoDenyRules": doModifyWafAutoDenyRules,
5352
+ "DescribeUserDomainInfo": doDescribeUserDomainInfo,
5353
+ "DeleteCCRule": doDeleteCCRule,
5354
+ "DescribeAntiInfoLeakageRules": doDescribeAntiInfoLeakageRules,
5355
+ "SearchAccessLog": doSearchAccessLog,
5356
+ "DescribeWafThreatenIntelligence": doDescribeWafThreatenIntelligence,
5357
+ "DescribeIpHitItems": doDescribeIpHitItems,
5358
+ "AddSpartaProtectionAuto": doAddSpartaProtectionAuto,
5359
+ "DeleteAntiInfoLeakRule": doDeleteAntiInfoLeakRule,
5360
+ "DescribeRuleLimit": doDescribeRuleLimit,
5361
+ "DescribeDomains": doDescribeDomains,
5362
+ "ModifyHostStatus": doModifyHostStatus,
5363
+ "ModifySpartaProtectionMode": doModifySpartaProtectionMode,
5364
+ "UpsertIpAccessControl": doUpsertIpAccessControl,
4318
5365
  "GetAttackHistogram": doGetAttackHistogram,
4319
5366
  "ModifyWafAutoDenyStatus": doModifyWafAutoDenyStatus,
4320
- "ModifyBotStatus": doModifyBotStatus,
4321
- "DescribeRuleLimit": doDescribeRuleLimit,
4322
5367
  "ModifyAccessPeriod": doModifyAccessPeriod,
4323
- "ModifyHostFlowMode": doModifyHostFlowMode,
4324
- "ModifyHostStatus": doModifyHostStatus,
5368
+ "ModifyAntiFakeUrlStatus": doModifyAntiFakeUrlStatus,
4325
5369
  "DescribeVipInfo": doDescribeVipInfo,
4326
- "DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
4327
5370
  "DeleteHost": doDeleteHost,
4328
- "ModifyDomainWhiteRule": doModifyDomainWhiteRule,
4329
- "DescribeFlowTrend": doDescribeFlowTrend,
5371
+ "DescribeAccessFastAnalysis": doDescribeAccessFastAnalysis,
4330
5372
  "DescribePeakPoints": doDescribePeakPoints,
4331
- "DescribeHostLimit": doDescribeHostLimit,
4332
- "DeleteCustomWhiteRule": doDeleteCustomWhiteRule,
4333
5373
  "ModifyCustomWhiteRule": doModifyCustomWhiteRule,
4334
- "GetAttackDownloadRecords": doGetAttackDownloadRecords,
4335
- "AddCustomRule": doAddCustomRule,
4336
- "DescribeIpAccessControl": doDescribeIpAccessControl,
4337
- "DescribeIpHitItems": doDescribeIpHitItems,
5374
+ "DescribeAccessHistogram": doDescribeAccessHistogram,
5375
+ "DescribeCCRule": doDescribeCCRule,
5376
+ "DescribePeakValue": doDescribePeakValue,
5377
+ "ModifyWafThreatenIntelligence": doModifyWafThreatenIntelligence,
5378
+ "DeleteAttackDownloadRecord": doDeleteAttackDownloadRecord,
5379
+ "DescribeCustomRuleList": doDescribeCustomRuleList,
5380
+ "DescribeAttackOverview": doDescribeAttackOverview,
5381
+ "DescribeWafInfo": doDescribeWafInfo,
5382
+ "DescribeHosts": doDescribeHosts,
5383
+ "AddSpartaProtection": doAddSpartaProtection,
5384
+ "DescribePolicyStatus": doDescribePolicyStatus,
5385
+ "DescribeSession": doDescribeSession,
5386
+ "ModifyHost": doModifyHost,
5387
+ "DescribeTlsVersion": doDescribeTlsVersion,
5388
+ "ModifyProtectionStatus": doModifyProtectionStatus,
5389
+ "DescribeCiphersDetail": doDescribeCiphersDetail,
5390
+ "ModifyAreaBanStatus": doModifyAreaBanStatus,
5391
+ "DescribeAntiFakeRules": doDescribeAntiFakeRules,
5392
+ "DescribeFindDomainList": doDescribeFindDomainList,
5393
+ "DeleteDomainWhiteRules": doDeleteDomainWhiteRules,
4338
5394
  "DescribeDomainDetailsSaas": doDescribeDomainDetailsSaas,
5395
+ "DeleteDownloadRecord": doDeleteDownloadRecord,
5396
+ "ModifyCustomRule": doModifyCustomRule,
5397
+ "ModifyBotStatus": doModifyBotStatus,
5398
+ "ModifyAntiInfoLeakRules": doModifyAntiInfoLeakRules,
5399
+ "AddAntiFakeUrl": doAddAntiFakeUrl,
5400
+ "DescribeFlowTrend": doDescribeFlowTrend,
5401
+ "DescribeAntiFakeUrl": doDescribeAntiFakeUrl,
5402
+ "ModifyDomainWhiteRule": doModifyDomainWhiteRule,
4339
5403
  "ModifyCustomRuleStatus": doModifyCustomRuleStatus,
5404
+ "DescribeIpAccessControl": doDescribeIpAccessControl,
4340
5405
  "DescribeDomainCountInfo": doDescribeDomainCountInfo,
4341
- "DeleteCustomRule": doDeleteCustomRule,
4342
5406
  "DeleteSpartaProtection": doDeleteSpartaProtection,
4343
5407
  "SwitchDomainRules": doSwitchDomainRules,
4344
- "ModifyWafThreatenIntelligence": doModifyWafThreatenIntelligence,
4345
- "DeleteAttackDownloadRecord": doDeleteAttackDownloadRecord,
4346
- "ModifyHostMode": doModifyHostMode,
4347
- "DescribeAttackOverview": doDescribeAttackOverview,
4348
- "ModifyDomainIpv6Status": doModifyDomainIpv6Status,
4349
- "DescribeCiphersDetail": doDescribeCiphersDetail,
4350
- "ModifyApiAnalyzeStatus": doModifyApiAnalyzeStatus,
4351
- "ModifyWafAutoDenyRules": doModifyWafAutoDenyRules,
4352
- "DescribeUserClbWafRegions": doDescribeUserClbWafRegions,
4353
- "DescribeUserDomainInfo": doDescribeUserDomainInfo,
5408
+ "DescribeBatchIpAccessControl": doDescribeBatchIpAccessControl,
4354
5409
  "DescribeWafAutoDenyRules": doDescribeWafAutoDenyRules,
4355
- "DescribeCustomRuleList": doDescribeCustomRuleList,
4356
- "ModifySpartaProtection": doModifySpartaProtection,
4357
- "DeleteDownloadRecord": doDeleteDownloadRecord,
4358
- "CreateHost": doCreateHost,
4359
5410
  "DeleteSession": doDeleteSession,
4360
- "SearchAccessLog": doSearchAccessLog,
4361
- "AddSpartaProtectionAuto": doAddSpartaProtectionAuto,
4362
- "DescribeHosts": doDescribeHosts,
4363
- "DescribeWafAutoDenyStatus": doDescribeWafAutoDenyStatus,
4364
5411
  "DescribeDomainWhiteRules": doDescribeDomainWhiteRules,
4365
- "DescribeWafThreatenIntelligence": doDescribeWafThreatenIntelligence,
4366
- "DescribeWafInfo": doDescribeWafInfo,
4367
5412
  "ModifyDomainsCLSStatus": doModifyDomainsCLSStatus,
4368
- "ModifyCustomRule": doModifyCustomRule,
4369
5413
  "RefreshAccessCheckResult": doRefreshAccessCheckResult,
4370
5414
  "PostAttackDownloadTask": doPostAttackDownloadTask,
4371
- "AddDomainWhiteRule": doAddDomainWhiteRule,
4372
- "DescribePeakValue": doDescribePeakValue,
4373
- "DescribeAccessFastAnalysis": doDescribeAccessFastAnalysis,
4374
5415
  "DescribeCustomWhiteRule": doDescribeCustomWhiteRule,
4375
5416
  "DescribeHost": doDescribeHost,
4376
- "UpsertIpAccessControl": doUpsertIpAccessControl,
5417
+ "DescribeAccessExports": doDescribeAccessExports,
5418
+ "DescribeHostLimit": doDescribeHostLimit,
5419
+ "DeleteAccessExport": doDeleteAccessExport,
5420
+ "ModifyAntiInfoLeakRuleStatus": doModifyAntiInfoLeakRuleStatus,
5421
+ "CreateAccessExport": doCreateAccessExport,
5422
+ "SearchAttackLog": doSearchAttackLog,
5423
+ "DescribeInstances": doDescribeInstances,
5424
+ "ModifyHostFlowMode": doModifyHostFlowMode,
5425
+ "ModifyApiAnalyzeStatus": doModifyApiAnalyzeStatus,
5426
+ "DescribeWafAutoDenyStatus": doDescribeWafAutoDenyStatus,
5427
+ "ModifyCustomWhiteRuleStatus": doModifyCustomWhiteRuleStatus,
5428
+ "ModifyHostMode": doModifyHostMode,
5429
+ "DescribeUserClbWafRegions": doDescribeUserClbWafRegions,
5430
+ "UpsertCCRule": doUpsertCCRule,
5431
+ "DeleteAntiFakeUrl": doDeleteAntiFakeUrl,
5432
+ "DescribeCCRuleList": doDescribeCCRuleList,
5433
+ "CreateHost": doCreateHost,
5434
+ "UpsertSession": doUpsertSession,
5435
+ "AddDomainWhiteRule": doAddDomainWhiteRule,
5436
+ "ModifyDomainIpv6Status": doModifyDomainIpv6Status,
4377
5437
 
4378
5438
  }
4379
5439