tccli 3.0.948.1__py2.py3-none-any.whl → 3.0.949.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/examples/vpc/v20170312/CreateNetworkAclEntries.md +30 -0
- tccli/examples/vpc/v20170312/DeleteNetworkAclEntries.md +22 -0
- tccli/examples/waf/v20180125/AddAntiFakeUrl.md +46 -0
- tccli/examples/waf/v20180125/AddAntiInfoLeakRules.md +26 -0
- tccli/examples/waf/v20180125/DeleteAntiFakeUrl.md +21 -0
- tccli/examples/waf/v20180125/DeleteAntiInfoLeakRule.md +21 -0
- tccli/examples/waf/v20180125/DeleteCCRule.md +23 -0
- tccli/examples/waf/v20180125/DescribeAntiFakeRules.md +28 -0
- tccli/examples/waf/v20180125/DescribeAntiFakeUrl.md +57 -0
- tccli/examples/waf/v20180125/DescribeAntiInfoLeakRules.md +40 -0
- tccli/examples/waf/v20180125/DescribeAntiInfoLeakageRules.md +38 -0
- tccli/examples/waf/v20180125/DescribeBatchIpAccessControl.md +42 -0
- tccli/examples/waf/v20180125/DescribeCCRule.md +71 -0
- tccli/examples/waf/v20180125/DescribeCCRuleList.md +36 -0
- tccli/examples/waf/v20180125/DescribeSession.md +51 -0
- tccli/examples/waf/v20180125/ModifyAntiFakeUrl.md +24 -0
- tccli/examples/waf/v20180125/ModifyAntiFakeUrlStatus.md +22 -0
- tccli/examples/waf/v20180125/ModifyAntiInfoLeakRuleStatus.md +22 -0
- tccli/examples/waf/v20180125/ModifyAntiInfoLeakRules.md +26 -0
- tccli/examples/waf/v20180125/ModifyCustomWhiteRuleStatus.md +26 -0
- tccli/examples/waf/v20180125/UpsertCCRule.md +95 -0
- tccli/examples/waf/v20180125/UpsertSession.md +25 -0
- tccli/services/vpc/v20170312/api.json +86 -0
- tccli/services/vpc/v20170312/examples.json +16 -0
- tccli/services/vpc/vpc_client.py +195 -89
- tccli/services/waf/v20180125/api.json +2671 -582
- tccli/services/waf/v20180125/examples.json +202 -0
- tccli/services/waf/waf_client.py +1365 -305
- {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/METADATA +2 -2
- {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/RECORD +34 -12
- {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.948.1.dist-info → tccli-3.0.949.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/waf/waf_client.py
CHANGED
@@ -17,7 +17,7 @@ from tencentcloud.waf.v20180125 import models as models_v20180125
|
|
17
17
|
from jmespath import search
|
18
18
|
import time
|
19
19
|
|
20
|
-
def
|
20
|
+
def doDescribeDomainDetailsClb(args, parsed_globals):
|
21
21
|
g_param = parse_global_arg(parsed_globals)
|
22
22
|
|
23
23
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -46,11 +46,11 @@ def doModifyHost(args, parsed_globals):
|
|
46
46
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
47
47
|
client._sdkVersion += ("_CLI_" + __version__)
|
48
48
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
49
|
-
model = models.
|
49
|
+
model = models.DescribeDomainDetailsClbRequest()
|
50
50
|
model.from_json_string(json.dumps(args))
|
51
51
|
start_time = time.time()
|
52
52
|
while True:
|
53
|
-
rsp = client.
|
53
|
+
rsp = client.DescribeDomainDetailsClb(model)
|
54
54
|
result = rsp.to_json_string()
|
55
55
|
try:
|
56
56
|
json_obj = json.loads(result)
|
@@ -69,7 +69,7 @@ def doModifyHost(args, parsed_globals):
|
|
69
69
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
70
70
|
|
71
71
|
|
72
|
-
def
|
72
|
+
def doAddAntiInfoLeakRules(args, parsed_globals):
|
73
73
|
g_param = parse_global_arg(parsed_globals)
|
74
74
|
|
75
75
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -98,11 +98,11 @@ def doDescribeAccessExports(args, parsed_globals):
|
|
98
98
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
99
99
|
client._sdkVersion += ("_CLI_" + __version__)
|
100
100
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
101
|
-
model = models.
|
101
|
+
model = models.AddAntiInfoLeakRulesRequest()
|
102
102
|
model.from_json_string(json.dumps(args))
|
103
103
|
start_time = time.time()
|
104
104
|
while True:
|
105
|
-
rsp = client.
|
105
|
+
rsp = client.AddAntiInfoLeakRules(model)
|
106
106
|
result = rsp.to_json_string()
|
107
107
|
try:
|
108
108
|
json_obj = json.loads(result)
|
@@ -121,7 +121,7 @@ def doDescribeAccessExports(args, parsed_globals):
|
|
121
121
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
122
122
|
|
123
123
|
|
124
|
-
def
|
124
|
+
def doDescribeAccessIndex(args, parsed_globals):
|
125
125
|
g_param = parse_global_arg(parsed_globals)
|
126
126
|
|
127
127
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -150,11 +150,11 @@ def doDescribeFindDomainList(args, parsed_globals):
|
|
150
150
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
151
151
|
client._sdkVersion += ("_CLI_" + __version__)
|
152
152
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
153
|
-
model = models.
|
153
|
+
model = models.DescribeAccessIndexRequest()
|
154
154
|
model.from_json_string(json.dumps(args))
|
155
155
|
start_time = time.time()
|
156
156
|
while True:
|
157
|
-
rsp = client.
|
157
|
+
rsp = client.DescribeAccessIndex(model)
|
158
158
|
result = rsp.to_json_string()
|
159
159
|
try:
|
160
160
|
json_obj = json.loads(result)
|
@@ -173,7 +173,7 @@ def doDescribeFindDomainList(args, parsed_globals):
|
|
173
173
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
174
174
|
|
175
175
|
|
176
|
-
def
|
176
|
+
def doGetAttackTotalCount(args, parsed_globals):
|
177
177
|
g_param = parse_global_arg(parsed_globals)
|
178
178
|
|
179
179
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -202,11 +202,11 @@ def doDescribeAutoDenyIP(args, parsed_globals):
|
|
202
202
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
203
203
|
client._sdkVersion += ("_CLI_" + __version__)
|
204
204
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
205
|
-
model = models.
|
205
|
+
model = models.GetAttackTotalCountRequest()
|
206
206
|
model.from_json_string(json.dumps(args))
|
207
207
|
start_time = time.time()
|
208
208
|
while True:
|
209
|
-
rsp = client.
|
209
|
+
rsp = client.GetAttackTotalCount(model)
|
210
210
|
result = rsp.to_json_string()
|
211
211
|
try:
|
212
212
|
json_obj = json.loads(result)
|
@@ -225,7 +225,7 @@ def doDescribeAutoDenyIP(args, parsed_globals):
|
|
225
225
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
226
226
|
|
227
227
|
|
228
|
-
def
|
228
|
+
def doAddCustomWhiteRule(args, parsed_globals):
|
229
229
|
g_param = parse_global_arg(parsed_globals)
|
230
230
|
|
231
231
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -254,11 +254,11 @@ def doDescribeTlsVersion(args, parsed_globals):
|
|
254
254
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
255
255
|
client._sdkVersion += ("_CLI_" + __version__)
|
256
256
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
257
|
-
model = models.
|
257
|
+
model = models.AddCustomWhiteRuleRequest()
|
258
258
|
model.from_json_string(json.dumps(args))
|
259
259
|
start_time = time.time()
|
260
260
|
while True:
|
261
|
-
rsp = client.
|
261
|
+
rsp = client.AddCustomWhiteRule(model)
|
262
262
|
result = rsp.to_json_string()
|
263
263
|
try:
|
264
264
|
json_obj = json.loads(result)
|
@@ -277,7 +277,7 @@ def doDescribeTlsVersion(args, parsed_globals):
|
|
277
277
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
278
278
|
|
279
279
|
|
280
|
-
def
|
280
|
+
def doDeleteIpAccessControl(args, parsed_globals):
|
281
281
|
g_param = parse_global_arg(parsed_globals)
|
282
282
|
|
283
283
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -306,11 +306,11 @@ def doModifyProtectionStatus(args, parsed_globals):
|
|
306
306
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
307
307
|
client._sdkVersion += ("_CLI_" + __version__)
|
308
308
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
309
|
-
model = models.
|
309
|
+
model = models.DeleteIpAccessControlRequest()
|
310
310
|
model.from_json_string(json.dumps(args))
|
311
311
|
start_time = time.time()
|
312
312
|
while True:
|
313
|
-
rsp = client.
|
313
|
+
rsp = client.DeleteIpAccessControl(model)
|
314
314
|
result = rsp.to_json_string()
|
315
315
|
try:
|
316
316
|
json_obj = json.loads(result)
|
@@ -329,7 +329,7 @@ def doModifyProtectionStatus(args, parsed_globals):
|
|
329
329
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
330
330
|
|
331
331
|
|
332
|
-
def
|
332
|
+
def doDescribeAntiInfoLeakRules(args, parsed_globals):
|
333
333
|
g_param = parse_global_arg(parsed_globals)
|
334
334
|
|
335
335
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -358,11 +358,11 @@ def doDeleteAccessExport(args, parsed_globals):
|
|
358
358
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
359
359
|
client._sdkVersion += ("_CLI_" + __version__)
|
360
360
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
361
|
-
model = models.
|
361
|
+
model = models.DescribeAntiInfoLeakRulesRequest()
|
362
362
|
model.from_json_string(json.dumps(args))
|
363
363
|
start_time = time.time()
|
364
364
|
while True:
|
365
|
-
rsp = client.
|
365
|
+
rsp = client.DescribeAntiInfoLeakRules(model)
|
366
366
|
result = rsp.to_json_string()
|
367
367
|
try:
|
368
368
|
json_obj = json.loads(result)
|
@@ -381,7 +381,7 @@ def doDeleteAccessExport(args, parsed_globals):
|
|
381
381
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
382
382
|
|
383
383
|
|
384
|
-
def
|
384
|
+
def doAddSpartaProtectionsAuto(args, parsed_globals):
|
385
385
|
g_param = parse_global_arg(parsed_globals)
|
386
386
|
|
387
387
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -410,11 +410,11 @@ def doDescribeDomainDetailsClb(args, parsed_globals):
|
|
410
410
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
411
411
|
client._sdkVersion += ("_CLI_" + __version__)
|
412
412
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
413
|
-
model = models.
|
413
|
+
model = models.AddSpartaProtectionsAutoRequest()
|
414
414
|
model.from_json_string(json.dumps(args))
|
415
415
|
start_time = time.time()
|
416
416
|
while True:
|
417
|
-
rsp = client.
|
417
|
+
rsp = client.AddSpartaProtectionsAuto(model)
|
418
418
|
result = rsp.to_json_string()
|
419
419
|
try:
|
420
420
|
json_obj = json.loads(result)
|
@@ -433,7 +433,7 @@ def doDescribeDomainDetailsClb(args, parsed_globals):
|
|
433
433
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
434
434
|
|
435
435
|
|
436
|
-
def
|
436
|
+
def doDescribeAutoDenyIP(args, parsed_globals):
|
437
437
|
g_param = parse_global_arg(parsed_globals)
|
438
438
|
|
439
439
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -462,11 +462,11 @@ def doAddSpartaProtection(args, parsed_globals):
|
|
462
462
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
463
463
|
client._sdkVersion += ("_CLI_" + __version__)
|
464
464
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
465
|
-
model = models.
|
465
|
+
model = models.DescribeAutoDenyIPRequest()
|
466
466
|
model.from_json_string(json.dumps(args))
|
467
467
|
start_time = time.time()
|
468
468
|
while True:
|
469
|
-
rsp = client.
|
469
|
+
rsp = client.DescribeAutoDenyIP(model)
|
470
470
|
result = rsp.to_json_string()
|
471
471
|
try:
|
472
472
|
json_obj = json.loads(result)
|
@@ -485,7 +485,7 @@ def doAddSpartaProtection(args, parsed_globals):
|
|
485
485
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
486
486
|
|
487
487
|
|
488
|
-
def
|
488
|
+
def doDeleteCustomWhiteRule(args, parsed_globals):
|
489
489
|
g_param = parse_global_arg(parsed_globals)
|
490
490
|
|
491
491
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -514,11 +514,11 @@ def doDeleteDomainWhiteRules(args, parsed_globals):
|
|
514
514
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
515
515
|
client._sdkVersion += ("_CLI_" + __version__)
|
516
516
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
517
|
-
model = models.
|
517
|
+
model = models.DeleteCustomWhiteRuleRequest()
|
518
518
|
model.from_json_string(json.dumps(args))
|
519
519
|
start_time = time.time()
|
520
520
|
while True:
|
521
|
-
rsp = client.
|
521
|
+
rsp = client.DeleteCustomWhiteRule(model)
|
522
522
|
result = rsp.to_json_string()
|
523
523
|
try:
|
524
524
|
json_obj = json.loads(result)
|
@@ -537,7 +537,7 @@ def doDeleteDomainWhiteRules(args, parsed_globals):
|
|
537
537
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
538
538
|
|
539
539
|
|
540
|
-
def
|
540
|
+
def doGetAttackDownloadRecords(args, parsed_globals):
|
541
541
|
g_param = parse_global_arg(parsed_globals)
|
542
542
|
|
543
543
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -566,11 +566,11 @@ def doModifyAreaBanStatus(args, parsed_globals):
|
|
566
566
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
567
567
|
client._sdkVersion += ("_CLI_" + __version__)
|
568
568
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
569
|
-
model = models.
|
569
|
+
model = models.GetAttackDownloadRecordsRequest()
|
570
570
|
model.from_json_string(json.dumps(args))
|
571
571
|
start_time = time.time()
|
572
572
|
while True:
|
573
|
-
rsp = client.
|
573
|
+
rsp = client.GetAttackDownloadRecords(model)
|
574
574
|
result = rsp.to_json_string()
|
575
575
|
try:
|
576
576
|
json_obj = json.loads(result)
|
@@ -589,7 +589,7 @@ def doModifyAreaBanStatus(args, parsed_globals):
|
|
589
589
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
590
590
|
|
591
591
|
|
592
|
-
def
|
592
|
+
def doAddCustomRule(args, parsed_globals):
|
593
593
|
g_param = parse_global_arg(parsed_globals)
|
594
594
|
|
595
595
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -618,11 +618,11 @@ def doDescribeDomains(args, parsed_globals):
|
|
618
618
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
619
619
|
client._sdkVersion += ("_CLI_" + __version__)
|
620
620
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
621
|
-
model = models.
|
621
|
+
model = models.AddCustomRuleRequest()
|
622
622
|
model.from_json_string(json.dumps(args))
|
623
623
|
start_time = time.time()
|
624
624
|
while True:
|
625
|
-
rsp = client.
|
625
|
+
rsp = client.AddCustomRule(model)
|
626
626
|
result = rsp.to_json_string()
|
627
627
|
try:
|
628
628
|
json_obj = json.loads(result)
|
@@ -641,7 +641,7 @@ def doDescribeDomains(args, parsed_globals):
|
|
641
641
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
642
642
|
|
643
643
|
|
644
|
-
def
|
644
|
+
def doDeleteCustomRule(args, parsed_globals):
|
645
645
|
g_param = parse_global_arg(parsed_globals)
|
646
646
|
|
647
647
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -670,11 +670,11 @@ def doDescribeAccessIndex(args, parsed_globals):
|
|
670
670
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
671
671
|
client._sdkVersion += ("_CLI_" + __version__)
|
672
672
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
673
|
-
model = models.
|
673
|
+
model = models.DeleteCustomRuleRequest()
|
674
674
|
model.from_json_string(json.dumps(args))
|
675
675
|
start_time = time.time()
|
676
676
|
while True:
|
677
|
-
rsp = client.
|
677
|
+
rsp = client.DeleteCustomRule(model)
|
678
678
|
result = rsp.to_json_string()
|
679
679
|
try:
|
680
680
|
json_obj = json.loads(result)
|
@@ -693,7 +693,7 @@ def doDescribeAccessIndex(args, parsed_globals):
|
|
693
693
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
694
694
|
|
695
695
|
|
696
|
-
def
|
696
|
+
def doModifyAntiFakeUrl(args, parsed_globals):
|
697
697
|
g_param = parse_global_arg(parsed_globals)
|
698
698
|
|
699
699
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -722,11 +722,11 @@ def doCreateAccessExport(args, parsed_globals):
|
|
722
722
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
723
723
|
client._sdkVersion += ("_CLI_" + __version__)
|
724
724
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
725
|
-
model = models.
|
725
|
+
model = models.ModifyAntiFakeUrlRequest()
|
726
726
|
model.from_json_string(json.dumps(args))
|
727
727
|
start_time = time.time()
|
728
728
|
while True:
|
729
|
-
rsp = client.
|
729
|
+
rsp = client.ModifyAntiFakeUrl(model)
|
730
730
|
result = rsp.to_json_string()
|
731
731
|
try:
|
732
732
|
json_obj = json.loads(result)
|
@@ -745,7 +745,7 @@ def doCreateAccessExport(args, parsed_globals):
|
|
745
745
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
746
746
|
|
747
747
|
|
748
|
-
def
|
748
|
+
def doModifySpartaProtection(args, parsed_globals):
|
749
749
|
g_param = parse_global_arg(parsed_globals)
|
750
750
|
|
751
751
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -774,11 +774,11 @@ def doDescribePolicyStatus(args, parsed_globals):
|
|
774
774
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
775
775
|
client._sdkVersion += ("_CLI_" + __version__)
|
776
776
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
777
|
-
model = models.
|
777
|
+
model = models.ModifySpartaProtectionRequest()
|
778
778
|
model.from_json_string(json.dumps(args))
|
779
779
|
start_time = time.time()
|
780
780
|
while True:
|
781
|
-
rsp = client.
|
781
|
+
rsp = client.ModifySpartaProtection(model)
|
782
782
|
result = rsp.to_json_string()
|
783
783
|
try:
|
784
784
|
json_obj = json.loads(result)
|
@@ -797,7 +797,7 @@ def doDescribePolicyStatus(args, parsed_globals):
|
|
797
797
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
798
798
|
|
799
799
|
|
800
|
-
def
|
800
|
+
def doDescribeUserCdcClbWafRegions(args, parsed_globals):
|
801
801
|
g_param = parse_global_arg(parsed_globals)
|
802
802
|
|
803
803
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -826,11 +826,11 @@ def doGetAttackTotalCount(args, parsed_globals):
|
|
826
826
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
827
827
|
client._sdkVersion += ("_CLI_" + __version__)
|
828
828
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
829
|
-
model = models.
|
829
|
+
model = models.DescribeUserCdcClbWafRegionsRequest()
|
830
830
|
model.from_json_string(json.dumps(args))
|
831
831
|
start_time = time.time()
|
832
832
|
while True:
|
833
|
-
rsp = client.
|
833
|
+
rsp = client.DescribeUserCdcClbWafRegions(model)
|
834
834
|
result = rsp.to_json_string()
|
835
835
|
try:
|
836
836
|
json_obj = json.loads(result)
|
@@ -849,7 +849,7 @@ def doGetAttackTotalCount(args, parsed_globals):
|
|
849
849
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
850
850
|
|
851
851
|
|
852
|
-
def
|
852
|
+
def doModifyWafAutoDenyRules(args, parsed_globals):
|
853
853
|
g_param = parse_global_arg(parsed_globals)
|
854
854
|
|
855
855
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -878,11 +878,11 @@ def doSearchAttackLog(args, parsed_globals):
|
|
878
878
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
879
879
|
client._sdkVersion += ("_CLI_" + __version__)
|
880
880
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
881
|
-
model = models.
|
881
|
+
model = models.ModifyWafAutoDenyRulesRequest()
|
882
882
|
model.from_json_string(json.dumps(args))
|
883
883
|
start_time = time.time()
|
884
884
|
while True:
|
885
|
-
rsp = client.
|
885
|
+
rsp = client.ModifyWafAutoDenyRules(model)
|
886
886
|
result = rsp.to_json_string()
|
887
887
|
try:
|
888
888
|
json_obj = json.loads(result)
|
@@ -901,7 +901,7 @@ def doSearchAttackLog(args, parsed_globals):
|
|
901
901
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
902
902
|
|
903
903
|
|
904
|
-
def
|
904
|
+
def doDescribeUserDomainInfo(args, parsed_globals):
|
905
905
|
g_param = parse_global_arg(parsed_globals)
|
906
906
|
|
907
907
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -930,11 +930,11 @@ def doDescribeAccessHistogram(args, parsed_globals):
|
|
930
930
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
931
931
|
client._sdkVersion += ("_CLI_" + __version__)
|
932
932
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
933
|
-
model = models.
|
933
|
+
model = models.DescribeUserDomainInfoRequest()
|
934
934
|
model.from_json_string(json.dumps(args))
|
935
935
|
start_time = time.time()
|
936
936
|
while True:
|
937
|
-
rsp = client.
|
937
|
+
rsp = client.DescribeUserDomainInfo(model)
|
938
938
|
result = rsp.to_json_string()
|
939
939
|
try:
|
940
940
|
json_obj = json.loads(result)
|
@@ -953,7 +953,7 @@ def doDescribeAccessHistogram(args, parsed_globals):
|
|
953
953
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
954
954
|
|
955
955
|
|
956
|
-
def
|
956
|
+
def doDeleteCCRule(args, parsed_globals):
|
957
957
|
g_param = parse_global_arg(parsed_globals)
|
958
958
|
|
959
959
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -982,11 +982,11 @@ def doAddCustomWhiteRule(args, parsed_globals):
|
|
982
982
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
983
983
|
client._sdkVersion += ("_CLI_" + __version__)
|
984
984
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
985
|
-
model = models.
|
985
|
+
model = models.DeleteCCRuleRequest()
|
986
986
|
model.from_json_string(json.dumps(args))
|
987
987
|
start_time = time.time()
|
988
988
|
while True:
|
989
|
-
rsp = client.
|
989
|
+
rsp = client.DeleteCCRule(model)
|
990
990
|
result = rsp.to_json_string()
|
991
991
|
try:
|
992
992
|
json_obj = json.loads(result)
|
@@ -1005,7 +1005,7 @@ def doAddCustomWhiteRule(args, parsed_globals):
|
|
1005
1005
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1006
1006
|
|
1007
1007
|
|
1008
|
-
def
|
1008
|
+
def doDescribeAntiInfoLeakageRules(args, parsed_globals):
|
1009
1009
|
g_param = parse_global_arg(parsed_globals)
|
1010
1010
|
|
1011
1011
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1034,11 +1034,11 @@ def doDescribeInstances(args, parsed_globals):
|
|
1034
1034
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1035
1035
|
client._sdkVersion += ("_CLI_" + __version__)
|
1036
1036
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1037
|
-
model = models.
|
1037
|
+
model = models.DescribeAntiInfoLeakageRulesRequest()
|
1038
1038
|
model.from_json_string(json.dumps(args))
|
1039
1039
|
start_time = time.time()
|
1040
1040
|
while True:
|
1041
|
-
rsp = client.
|
1041
|
+
rsp = client.DescribeAntiInfoLeakageRules(model)
|
1042
1042
|
result = rsp.to_json_string()
|
1043
1043
|
try:
|
1044
1044
|
json_obj = json.loads(result)
|
@@ -1057,7 +1057,7 @@ def doDescribeInstances(args, parsed_globals):
|
|
1057
1057
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1058
1058
|
|
1059
1059
|
|
1060
|
-
def
|
1060
|
+
def doSearchAccessLog(args, parsed_globals):
|
1061
1061
|
g_param = parse_global_arg(parsed_globals)
|
1062
1062
|
|
1063
1063
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1086,11 +1086,11 @@ def doModifySpartaProtectionMode(args, parsed_globals):
|
|
1086
1086
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1087
1087
|
client._sdkVersion += ("_CLI_" + __version__)
|
1088
1088
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1089
|
-
model = models.
|
1089
|
+
model = models.SearchAccessLogRequest()
|
1090
1090
|
model.from_json_string(json.dumps(args))
|
1091
1091
|
start_time = time.time()
|
1092
1092
|
while True:
|
1093
|
-
rsp = client.
|
1093
|
+
rsp = client.SearchAccessLog(model)
|
1094
1094
|
result = rsp.to_json_string()
|
1095
1095
|
try:
|
1096
1096
|
json_obj = json.loads(result)
|
@@ -1109,7 +1109,7 @@ def doModifySpartaProtectionMode(args, parsed_globals):
|
|
1109
1109
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1110
1110
|
|
1111
1111
|
|
1112
|
-
def
|
1112
|
+
def doDescribeWafThreatenIntelligence(args, parsed_globals):
|
1113
1113
|
g_param = parse_global_arg(parsed_globals)
|
1114
1114
|
|
1115
1115
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1138,11 +1138,11 @@ def doDeleteIpAccessControl(args, parsed_globals):
|
|
1138
1138
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1139
1139
|
client._sdkVersion += ("_CLI_" + __version__)
|
1140
1140
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1141
|
-
model = models.
|
1141
|
+
model = models.DescribeWafThreatenIntelligenceRequest()
|
1142
1142
|
model.from_json_string(json.dumps(args))
|
1143
1143
|
start_time = time.time()
|
1144
1144
|
while True:
|
1145
|
-
rsp = client.
|
1145
|
+
rsp = client.DescribeWafThreatenIntelligence(model)
|
1146
1146
|
result = rsp.to_json_string()
|
1147
1147
|
try:
|
1148
1148
|
json_obj = json.loads(result)
|
@@ -1161,7 +1161,7 @@ def doDeleteIpAccessControl(args, parsed_globals):
|
|
1161
1161
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1162
1162
|
|
1163
1163
|
|
1164
|
-
def
|
1164
|
+
def doDescribeIpHitItems(args, parsed_globals):
|
1165
1165
|
g_param = parse_global_arg(parsed_globals)
|
1166
1166
|
|
1167
1167
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1190,11 +1190,11 @@ def doAddSpartaProtectionsAuto(args, parsed_globals):
|
|
1190
1190
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1191
1191
|
client._sdkVersion += ("_CLI_" + __version__)
|
1192
1192
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1193
|
-
model = models.
|
1193
|
+
model = models.DescribeIpHitItemsRequest()
|
1194
1194
|
model.from_json_string(json.dumps(args))
|
1195
1195
|
start_time = time.time()
|
1196
1196
|
while True:
|
1197
|
-
rsp = client.
|
1197
|
+
rsp = client.DescribeIpHitItems(model)
|
1198
1198
|
result = rsp.to_json_string()
|
1199
1199
|
try:
|
1200
1200
|
json_obj = json.loads(result)
|
@@ -1213,7 +1213,7 @@ def doAddSpartaProtectionsAuto(args, parsed_globals):
|
|
1213
1213
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1214
1214
|
|
1215
1215
|
|
1216
|
-
def
|
1216
|
+
def doAddSpartaProtectionAuto(args, parsed_globals):
|
1217
1217
|
g_param = parse_global_arg(parsed_globals)
|
1218
1218
|
|
1219
1219
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1242,11 +1242,11 @@ def doGetAttackHistogram(args, parsed_globals):
|
|
1242
1242
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1243
1243
|
client._sdkVersion += ("_CLI_" + __version__)
|
1244
1244
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1245
|
-
model = models.
|
1245
|
+
model = models.AddSpartaProtectionAutoRequest()
|
1246
1246
|
model.from_json_string(json.dumps(args))
|
1247
1247
|
start_time = time.time()
|
1248
1248
|
while True:
|
1249
|
-
rsp = client.
|
1249
|
+
rsp = client.AddSpartaProtectionAuto(model)
|
1250
1250
|
result = rsp.to_json_string()
|
1251
1251
|
try:
|
1252
1252
|
json_obj = json.loads(result)
|
@@ -1265,7 +1265,7 @@ def doGetAttackHistogram(args, parsed_globals):
|
|
1265
1265
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1266
1266
|
|
1267
1267
|
|
1268
|
-
def
|
1268
|
+
def doDeleteAntiInfoLeakRule(args, parsed_globals):
|
1269
1269
|
g_param = parse_global_arg(parsed_globals)
|
1270
1270
|
|
1271
1271
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1294,11 +1294,11 @@ def doModifyWafAutoDenyStatus(args, parsed_globals):
|
|
1294
1294
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1295
1295
|
client._sdkVersion += ("_CLI_" + __version__)
|
1296
1296
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1297
|
-
model = models.
|
1297
|
+
model = models.DeleteAntiInfoLeakRuleRequest()
|
1298
1298
|
model.from_json_string(json.dumps(args))
|
1299
1299
|
start_time = time.time()
|
1300
1300
|
while True:
|
1301
|
-
rsp = client.
|
1301
|
+
rsp = client.DeleteAntiInfoLeakRule(model)
|
1302
1302
|
result = rsp.to_json_string()
|
1303
1303
|
try:
|
1304
1304
|
json_obj = json.loads(result)
|
@@ -1317,7 +1317,7 @@ def doModifyWafAutoDenyStatus(args, parsed_globals):
|
|
1317
1317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1318
1318
|
|
1319
1319
|
|
1320
|
-
def
|
1320
|
+
def doDescribeRuleLimit(args, parsed_globals):
|
1321
1321
|
g_param = parse_global_arg(parsed_globals)
|
1322
1322
|
|
1323
1323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1346,11 +1346,11 @@ def doModifyBotStatus(args, parsed_globals):
|
|
1346
1346
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1347
1347
|
client._sdkVersion += ("_CLI_" + __version__)
|
1348
1348
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1349
|
-
model = models.
|
1349
|
+
model = models.DescribeRuleLimitRequest()
|
1350
1350
|
model.from_json_string(json.dumps(args))
|
1351
1351
|
start_time = time.time()
|
1352
1352
|
while True:
|
1353
|
-
rsp = client.
|
1353
|
+
rsp = client.DescribeRuleLimit(model)
|
1354
1354
|
result = rsp.to_json_string()
|
1355
1355
|
try:
|
1356
1356
|
json_obj = json.loads(result)
|
@@ -1369,7 +1369,7 @@ def doModifyBotStatus(args, parsed_globals):
|
|
1369
1369
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1370
1370
|
|
1371
1371
|
|
1372
|
-
def
|
1372
|
+
def doDescribeDomains(args, parsed_globals):
|
1373
1373
|
g_param = parse_global_arg(parsed_globals)
|
1374
1374
|
|
1375
1375
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1398,11 +1398,11 @@ def doDescribeRuleLimit(args, parsed_globals):
|
|
1398
1398
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1399
1399
|
client._sdkVersion += ("_CLI_" + __version__)
|
1400
1400
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1401
|
-
model = models.
|
1401
|
+
model = models.DescribeDomainsRequest()
|
1402
1402
|
model.from_json_string(json.dumps(args))
|
1403
1403
|
start_time = time.time()
|
1404
1404
|
while True:
|
1405
|
-
rsp = client.
|
1405
|
+
rsp = client.DescribeDomains(model)
|
1406
1406
|
result = rsp.to_json_string()
|
1407
1407
|
try:
|
1408
1408
|
json_obj = json.loads(result)
|
@@ -1421,7 +1421,7 @@ def doDescribeRuleLimit(args, parsed_globals):
|
|
1421
1421
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1422
1422
|
|
1423
1423
|
|
1424
|
-
def
|
1424
|
+
def doModifyHostStatus(args, parsed_globals):
|
1425
1425
|
g_param = parse_global_arg(parsed_globals)
|
1426
1426
|
|
1427
1427
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1450,11 +1450,11 @@ def doModifyAccessPeriod(args, parsed_globals):
|
|
1450
1450
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1451
1451
|
client._sdkVersion += ("_CLI_" + __version__)
|
1452
1452
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1453
|
-
model = models.
|
1453
|
+
model = models.ModifyHostStatusRequest()
|
1454
1454
|
model.from_json_string(json.dumps(args))
|
1455
1455
|
start_time = time.time()
|
1456
1456
|
while True:
|
1457
|
-
rsp = client.
|
1457
|
+
rsp = client.ModifyHostStatus(model)
|
1458
1458
|
result = rsp.to_json_string()
|
1459
1459
|
try:
|
1460
1460
|
json_obj = json.loads(result)
|
@@ -1473,7 +1473,7 @@ def doModifyAccessPeriod(args, parsed_globals):
|
|
1473
1473
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1474
1474
|
|
1475
1475
|
|
1476
|
-
def
|
1476
|
+
def doModifySpartaProtectionMode(args, parsed_globals):
|
1477
1477
|
g_param = parse_global_arg(parsed_globals)
|
1478
1478
|
|
1479
1479
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1502,11 +1502,11 @@ def doModifyHostFlowMode(args, parsed_globals):
|
|
1502
1502
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1503
1503
|
client._sdkVersion += ("_CLI_" + __version__)
|
1504
1504
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1505
|
-
model = models.
|
1505
|
+
model = models.ModifySpartaProtectionModeRequest()
|
1506
1506
|
model.from_json_string(json.dumps(args))
|
1507
1507
|
start_time = time.time()
|
1508
1508
|
while True:
|
1509
|
-
rsp = client.
|
1509
|
+
rsp = client.ModifySpartaProtectionMode(model)
|
1510
1510
|
result = rsp.to_json_string()
|
1511
1511
|
try:
|
1512
1512
|
json_obj = json.loads(result)
|
@@ -1525,7 +1525,7 @@ def doModifyHostFlowMode(args, parsed_globals):
|
|
1525
1525
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1526
1526
|
|
1527
1527
|
|
1528
|
-
def
|
1528
|
+
def doUpsertIpAccessControl(args, parsed_globals):
|
1529
1529
|
g_param = parse_global_arg(parsed_globals)
|
1530
1530
|
|
1531
1531
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1554,11 +1554,11 @@ def doModifyHostStatus(args, parsed_globals):
|
|
1554
1554
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1555
1555
|
client._sdkVersion += ("_CLI_" + __version__)
|
1556
1556
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1557
|
-
model = models.
|
1557
|
+
model = models.UpsertIpAccessControlRequest()
|
1558
1558
|
model.from_json_string(json.dumps(args))
|
1559
1559
|
start_time = time.time()
|
1560
1560
|
while True:
|
1561
|
-
rsp = client.
|
1561
|
+
rsp = client.UpsertIpAccessControl(model)
|
1562
1562
|
result = rsp.to_json_string()
|
1563
1563
|
try:
|
1564
1564
|
json_obj = json.loads(result)
|
@@ -1577,7 +1577,7 @@ def doModifyHostStatus(args, parsed_globals):
|
|
1577
1577
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1578
1578
|
|
1579
1579
|
|
1580
|
-
def
|
1580
|
+
def doGetAttackHistogram(args, parsed_globals):
|
1581
1581
|
g_param = parse_global_arg(parsed_globals)
|
1582
1582
|
|
1583
1583
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1606,11 +1606,11 @@ def doDescribeVipInfo(args, parsed_globals):
|
|
1606
1606
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1607
1607
|
client._sdkVersion += ("_CLI_" + __version__)
|
1608
1608
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1609
|
-
model = models.
|
1609
|
+
model = models.GetAttackHistogramRequest()
|
1610
1610
|
model.from_json_string(json.dumps(args))
|
1611
1611
|
start_time = time.time()
|
1612
1612
|
while True:
|
1613
|
-
rsp = client.
|
1613
|
+
rsp = client.GetAttackHistogram(model)
|
1614
1614
|
result = rsp.to_json_string()
|
1615
1615
|
try:
|
1616
1616
|
json_obj = json.loads(result)
|
@@ -1629,7 +1629,7 @@ def doDescribeVipInfo(args, parsed_globals):
|
|
1629
1629
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1630
1630
|
|
1631
1631
|
|
1632
|
-
def
|
1632
|
+
def doModifyWafAutoDenyStatus(args, parsed_globals):
|
1633
1633
|
g_param = parse_global_arg(parsed_globals)
|
1634
1634
|
|
1635
1635
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1658,11 +1658,11 @@ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
|
|
1658
1658
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1659
1659
|
client._sdkVersion += ("_CLI_" + __version__)
|
1660
1660
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1661
|
-
model = models.
|
1661
|
+
model = models.ModifyWafAutoDenyStatusRequest()
|
1662
1662
|
model.from_json_string(json.dumps(args))
|
1663
1663
|
start_time = time.time()
|
1664
1664
|
while True:
|
1665
|
-
rsp = client.
|
1665
|
+
rsp = client.ModifyWafAutoDenyStatus(model)
|
1666
1666
|
result = rsp.to_json_string()
|
1667
1667
|
try:
|
1668
1668
|
json_obj = json.loads(result)
|
@@ -1681,7 +1681,7 @@ def doDescribeUserCdcClbWafRegions(args, parsed_globals):
|
|
1681
1681
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1682
1682
|
|
1683
1683
|
|
1684
|
-
def
|
1684
|
+
def doModifyAccessPeriod(args, parsed_globals):
|
1685
1685
|
g_param = parse_global_arg(parsed_globals)
|
1686
1686
|
|
1687
1687
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1710,11 +1710,11 @@ def doDeleteHost(args, parsed_globals):
|
|
1710
1710
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1711
1711
|
client._sdkVersion += ("_CLI_" + __version__)
|
1712
1712
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1713
|
-
model = models.
|
1713
|
+
model = models.ModifyAccessPeriodRequest()
|
1714
1714
|
model.from_json_string(json.dumps(args))
|
1715
1715
|
start_time = time.time()
|
1716
1716
|
while True:
|
1717
|
-
rsp = client.
|
1717
|
+
rsp = client.ModifyAccessPeriod(model)
|
1718
1718
|
result = rsp.to_json_string()
|
1719
1719
|
try:
|
1720
1720
|
json_obj = json.loads(result)
|
@@ -1733,7 +1733,7 @@ def doDeleteHost(args, parsed_globals):
|
|
1733
1733
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1734
1734
|
|
1735
1735
|
|
1736
|
-
def
|
1736
|
+
def doModifyAntiFakeUrlStatus(args, parsed_globals):
|
1737
1737
|
g_param = parse_global_arg(parsed_globals)
|
1738
1738
|
|
1739
1739
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1762,11 +1762,11 @@ def doModifyDomainWhiteRule(args, parsed_globals):
|
|
1762
1762
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1763
1763
|
client._sdkVersion += ("_CLI_" + __version__)
|
1764
1764
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1765
|
-
model = models.
|
1765
|
+
model = models.ModifyAntiFakeUrlStatusRequest()
|
1766
1766
|
model.from_json_string(json.dumps(args))
|
1767
1767
|
start_time = time.time()
|
1768
1768
|
while True:
|
1769
|
-
rsp = client.
|
1769
|
+
rsp = client.ModifyAntiFakeUrlStatus(model)
|
1770
1770
|
result = rsp.to_json_string()
|
1771
1771
|
try:
|
1772
1772
|
json_obj = json.loads(result)
|
@@ -1785,7 +1785,7 @@ def doModifyDomainWhiteRule(args, parsed_globals):
|
|
1785
1785
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1786
1786
|
|
1787
1787
|
|
1788
|
-
def
|
1788
|
+
def doDescribeVipInfo(args, parsed_globals):
|
1789
1789
|
g_param = parse_global_arg(parsed_globals)
|
1790
1790
|
|
1791
1791
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1814,11 +1814,11 @@ def doDescribeFlowTrend(args, parsed_globals):
|
|
1814
1814
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1815
1815
|
client._sdkVersion += ("_CLI_" + __version__)
|
1816
1816
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1817
|
-
model = models.
|
1817
|
+
model = models.DescribeVipInfoRequest()
|
1818
1818
|
model.from_json_string(json.dumps(args))
|
1819
1819
|
start_time = time.time()
|
1820
1820
|
while True:
|
1821
|
-
rsp = client.
|
1821
|
+
rsp = client.DescribeVipInfo(model)
|
1822
1822
|
result = rsp.to_json_string()
|
1823
1823
|
try:
|
1824
1824
|
json_obj = json.loads(result)
|
@@ -1837,7 +1837,7 @@ def doDescribeFlowTrend(args, parsed_globals):
|
|
1837
1837
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1838
1838
|
|
1839
1839
|
|
1840
|
-
def
|
1840
|
+
def doDeleteHost(args, parsed_globals):
|
1841
1841
|
g_param = parse_global_arg(parsed_globals)
|
1842
1842
|
|
1843
1843
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1866,11 +1866,11 @@ def doDescribePeakPoints(args, parsed_globals):
|
|
1866
1866
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1867
1867
|
client._sdkVersion += ("_CLI_" + __version__)
|
1868
1868
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1869
|
-
model = models.
|
1869
|
+
model = models.DeleteHostRequest()
|
1870
1870
|
model.from_json_string(json.dumps(args))
|
1871
1871
|
start_time = time.time()
|
1872
1872
|
while True:
|
1873
|
-
rsp = client.
|
1873
|
+
rsp = client.DeleteHost(model)
|
1874
1874
|
result = rsp.to_json_string()
|
1875
1875
|
try:
|
1876
1876
|
json_obj = json.loads(result)
|
@@ -1889,7 +1889,7 @@ def doDescribePeakPoints(args, parsed_globals):
|
|
1889
1889
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1890
1890
|
|
1891
1891
|
|
1892
|
-
def
|
1892
|
+
def doDescribeAccessFastAnalysis(args, parsed_globals):
|
1893
1893
|
g_param = parse_global_arg(parsed_globals)
|
1894
1894
|
|
1895
1895
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1918,11 +1918,11 @@ def doDescribeHostLimit(args, parsed_globals):
|
|
1918
1918
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1919
1919
|
client._sdkVersion += ("_CLI_" + __version__)
|
1920
1920
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1921
|
-
model = models.
|
1921
|
+
model = models.DescribeAccessFastAnalysisRequest()
|
1922
1922
|
model.from_json_string(json.dumps(args))
|
1923
1923
|
start_time = time.time()
|
1924
1924
|
while True:
|
1925
|
-
rsp = client.
|
1925
|
+
rsp = client.DescribeAccessFastAnalysis(model)
|
1926
1926
|
result = rsp.to_json_string()
|
1927
1927
|
try:
|
1928
1928
|
json_obj = json.loads(result)
|
@@ -1941,7 +1941,7 @@ def doDescribeHostLimit(args, parsed_globals):
|
|
1941
1941
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1942
1942
|
|
1943
1943
|
|
1944
|
-
def
|
1944
|
+
def doDescribePeakPoints(args, parsed_globals):
|
1945
1945
|
g_param = parse_global_arg(parsed_globals)
|
1946
1946
|
|
1947
1947
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1970,11 +1970,11 @@ def doDeleteCustomWhiteRule(args, parsed_globals):
|
|
1970
1970
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
1971
1971
|
client._sdkVersion += ("_CLI_" + __version__)
|
1972
1972
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1973
|
-
model = models.
|
1973
|
+
model = models.DescribePeakPointsRequest()
|
1974
1974
|
model.from_json_string(json.dumps(args))
|
1975
1975
|
start_time = time.time()
|
1976
1976
|
while True:
|
1977
|
-
rsp = client.
|
1977
|
+
rsp = client.DescribePeakPoints(model)
|
1978
1978
|
result = rsp.to_json_string()
|
1979
1979
|
try:
|
1980
1980
|
json_obj = json.loads(result)
|
@@ -2045,7 +2045,7 @@ def doModifyCustomWhiteRule(args, parsed_globals):
|
|
2045
2045
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2046
2046
|
|
2047
2047
|
|
2048
|
-
def
|
2048
|
+
def doDescribeAccessHistogram(args, parsed_globals):
|
2049
2049
|
g_param = parse_global_arg(parsed_globals)
|
2050
2050
|
|
2051
2051
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2074,11 +2074,11 @@ def doGetAttackDownloadRecords(args, parsed_globals):
|
|
2074
2074
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2075
2075
|
client._sdkVersion += ("_CLI_" + __version__)
|
2076
2076
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2077
|
-
model = models.
|
2077
|
+
model = models.DescribeAccessHistogramRequest()
|
2078
2078
|
model.from_json_string(json.dumps(args))
|
2079
2079
|
start_time = time.time()
|
2080
2080
|
while True:
|
2081
|
-
rsp = client.
|
2081
|
+
rsp = client.DescribeAccessHistogram(model)
|
2082
2082
|
result = rsp.to_json_string()
|
2083
2083
|
try:
|
2084
2084
|
json_obj = json.loads(result)
|
@@ -2097,7 +2097,7 @@ def doGetAttackDownloadRecords(args, parsed_globals):
|
|
2097
2097
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2098
2098
|
|
2099
2099
|
|
2100
|
-
def
|
2100
|
+
def doDescribeCCRule(args, parsed_globals):
|
2101
2101
|
g_param = parse_global_arg(parsed_globals)
|
2102
2102
|
|
2103
2103
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2126,11 +2126,11 @@ def doAddCustomRule(args, parsed_globals):
|
|
2126
2126
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2127
2127
|
client._sdkVersion += ("_CLI_" + __version__)
|
2128
2128
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2129
|
-
model = models.
|
2129
|
+
model = models.DescribeCCRuleRequest()
|
2130
2130
|
model.from_json_string(json.dumps(args))
|
2131
2131
|
start_time = time.time()
|
2132
2132
|
while True:
|
2133
|
-
rsp = client.
|
2133
|
+
rsp = client.DescribeCCRule(model)
|
2134
2134
|
result = rsp.to_json_string()
|
2135
2135
|
try:
|
2136
2136
|
json_obj = json.loads(result)
|
@@ -2149,7 +2149,7 @@ def doAddCustomRule(args, parsed_globals):
|
|
2149
2149
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2150
2150
|
|
2151
2151
|
|
2152
|
-
def
|
2152
|
+
def doDescribePeakValue(args, parsed_globals):
|
2153
2153
|
g_param = parse_global_arg(parsed_globals)
|
2154
2154
|
|
2155
2155
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2178,11 +2178,11 @@ def doDescribeIpAccessControl(args, parsed_globals):
|
|
2178
2178
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2179
2179
|
client._sdkVersion += ("_CLI_" + __version__)
|
2180
2180
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2181
|
-
model = models.
|
2181
|
+
model = models.DescribePeakValueRequest()
|
2182
2182
|
model.from_json_string(json.dumps(args))
|
2183
2183
|
start_time = time.time()
|
2184
2184
|
while True:
|
2185
|
-
rsp = client.
|
2185
|
+
rsp = client.DescribePeakValue(model)
|
2186
2186
|
result = rsp.to_json_string()
|
2187
2187
|
try:
|
2188
2188
|
json_obj = json.loads(result)
|
@@ -2201,7 +2201,7 @@ def doDescribeIpAccessControl(args, parsed_globals):
|
|
2201
2201
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2202
2202
|
|
2203
2203
|
|
2204
|
-
def
|
2204
|
+
def doModifyWafThreatenIntelligence(args, parsed_globals):
|
2205
2205
|
g_param = parse_global_arg(parsed_globals)
|
2206
2206
|
|
2207
2207
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2230,11 +2230,11 @@ def doDescribeIpHitItems(args, parsed_globals):
|
|
2230
2230
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2231
2231
|
client._sdkVersion += ("_CLI_" + __version__)
|
2232
2232
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2233
|
-
model = models.
|
2233
|
+
model = models.ModifyWafThreatenIntelligenceRequest()
|
2234
2234
|
model.from_json_string(json.dumps(args))
|
2235
2235
|
start_time = time.time()
|
2236
2236
|
while True:
|
2237
|
-
rsp = client.
|
2237
|
+
rsp = client.ModifyWafThreatenIntelligence(model)
|
2238
2238
|
result = rsp.to_json_string()
|
2239
2239
|
try:
|
2240
2240
|
json_obj = json.loads(result)
|
@@ -2253,7 +2253,7 @@ def doDescribeIpHitItems(args, parsed_globals):
|
|
2253
2253
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2254
2254
|
|
2255
2255
|
|
2256
|
-
def
|
2256
|
+
def doDeleteAttackDownloadRecord(args, parsed_globals):
|
2257
2257
|
g_param = parse_global_arg(parsed_globals)
|
2258
2258
|
|
2259
2259
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2282,11 +2282,11 @@ def doDescribeDomainDetailsSaas(args, parsed_globals):
|
|
2282
2282
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2283
2283
|
client._sdkVersion += ("_CLI_" + __version__)
|
2284
2284
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2285
|
-
model = models.
|
2285
|
+
model = models.DeleteAttackDownloadRecordRequest()
|
2286
2286
|
model.from_json_string(json.dumps(args))
|
2287
2287
|
start_time = time.time()
|
2288
2288
|
while True:
|
2289
|
-
rsp = client.
|
2289
|
+
rsp = client.DeleteAttackDownloadRecord(model)
|
2290
2290
|
result = rsp.to_json_string()
|
2291
2291
|
try:
|
2292
2292
|
json_obj = json.loads(result)
|
@@ -2305,7 +2305,7 @@ def doDescribeDomainDetailsSaas(args, parsed_globals):
|
|
2305
2305
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2306
2306
|
|
2307
2307
|
|
2308
|
-
def
|
2308
|
+
def doDescribeCustomRuleList(args, parsed_globals):
|
2309
2309
|
g_param = parse_global_arg(parsed_globals)
|
2310
2310
|
|
2311
2311
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2334,11 +2334,11 @@ def doModifyCustomRuleStatus(args, parsed_globals):
|
|
2334
2334
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2335
2335
|
client._sdkVersion += ("_CLI_" + __version__)
|
2336
2336
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2337
|
-
model = models.
|
2337
|
+
model = models.DescribeCustomRuleListRequest()
|
2338
2338
|
model.from_json_string(json.dumps(args))
|
2339
2339
|
start_time = time.time()
|
2340
2340
|
while True:
|
2341
|
-
rsp = client.
|
2341
|
+
rsp = client.DescribeCustomRuleList(model)
|
2342
2342
|
result = rsp.to_json_string()
|
2343
2343
|
try:
|
2344
2344
|
json_obj = json.loads(result)
|
@@ -2357,7 +2357,7 @@ def doModifyCustomRuleStatus(args, parsed_globals):
|
|
2357
2357
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2358
2358
|
|
2359
2359
|
|
2360
|
-
def
|
2360
|
+
def doDescribeAttackOverview(args, parsed_globals):
|
2361
2361
|
g_param = parse_global_arg(parsed_globals)
|
2362
2362
|
|
2363
2363
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2386,11 +2386,11 @@ def doDescribeDomainCountInfo(args, parsed_globals):
|
|
2386
2386
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2387
2387
|
client._sdkVersion += ("_CLI_" + __version__)
|
2388
2388
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2389
|
-
model = models.
|
2389
|
+
model = models.DescribeAttackOverviewRequest()
|
2390
2390
|
model.from_json_string(json.dumps(args))
|
2391
2391
|
start_time = time.time()
|
2392
2392
|
while True:
|
2393
|
-
rsp = client.
|
2393
|
+
rsp = client.DescribeAttackOverview(model)
|
2394
2394
|
result = rsp.to_json_string()
|
2395
2395
|
try:
|
2396
2396
|
json_obj = json.loads(result)
|
@@ -2409,7 +2409,7 @@ def doDescribeDomainCountInfo(args, parsed_globals):
|
|
2409
2409
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2410
2410
|
|
2411
2411
|
|
2412
|
-
def
|
2412
|
+
def doDescribeWafInfo(args, parsed_globals):
|
2413
2413
|
g_param = parse_global_arg(parsed_globals)
|
2414
2414
|
|
2415
2415
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2438,11 +2438,11 @@ def doDeleteCustomRule(args, parsed_globals):
|
|
2438
2438
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2439
2439
|
client._sdkVersion += ("_CLI_" + __version__)
|
2440
2440
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2441
|
-
model = models.
|
2441
|
+
model = models.DescribeWafInfoRequest()
|
2442
2442
|
model.from_json_string(json.dumps(args))
|
2443
2443
|
start_time = time.time()
|
2444
2444
|
while True:
|
2445
|
-
rsp = client.
|
2445
|
+
rsp = client.DescribeWafInfo(model)
|
2446
2446
|
result = rsp.to_json_string()
|
2447
2447
|
try:
|
2448
2448
|
json_obj = json.loads(result)
|
@@ -2461,7 +2461,7 @@ def doDeleteCustomRule(args, parsed_globals):
|
|
2461
2461
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2462
2462
|
|
2463
2463
|
|
2464
|
-
def
|
2464
|
+
def doDescribeHosts(args, parsed_globals):
|
2465
2465
|
g_param = parse_global_arg(parsed_globals)
|
2466
2466
|
|
2467
2467
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2490,11 +2490,11 @@ def doDeleteSpartaProtection(args, parsed_globals):
|
|
2490
2490
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2491
2491
|
client._sdkVersion += ("_CLI_" + __version__)
|
2492
2492
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2493
|
-
model = models.
|
2493
|
+
model = models.DescribeHostsRequest()
|
2494
2494
|
model.from_json_string(json.dumps(args))
|
2495
2495
|
start_time = time.time()
|
2496
2496
|
while True:
|
2497
|
-
rsp = client.
|
2497
|
+
rsp = client.DescribeHosts(model)
|
2498
2498
|
result = rsp.to_json_string()
|
2499
2499
|
try:
|
2500
2500
|
json_obj = json.loads(result)
|
@@ -2513,7 +2513,7 @@ def doDeleteSpartaProtection(args, parsed_globals):
|
|
2513
2513
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2514
2514
|
|
2515
2515
|
|
2516
|
-
def
|
2516
|
+
def doAddSpartaProtection(args, parsed_globals):
|
2517
2517
|
g_param = parse_global_arg(parsed_globals)
|
2518
2518
|
|
2519
2519
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2542,11 +2542,11 @@ def doSwitchDomainRules(args, parsed_globals):
|
|
2542
2542
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2543
2543
|
client._sdkVersion += ("_CLI_" + __version__)
|
2544
2544
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2545
|
-
model = models.
|
2545
|
+
model = models.AddSpartaProtectionRequest()
|
2546
2546
|
model.from_json_string(json.dumps(args))
|
2547
2547
|
start_time = time.time()
|
2548
2548
|
while True:
|
2549
|
-
rsp = client.
|
2549
|
+
rsp = client.AddSpartaProtection(model)
|
2550
2550
|
result = rsp.to_json_string()
|
2551
2551
|
try:
|
2552
2552
|
json_obj = json.loads(result)
|
@@ -2565,7 +2565,7 @@ def doSwitchDomainRules(args, parsed_globals):
|
|
2565
2565
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2566
2566
|
|
2567
2567
|
|
2568
|
-
def
|
2568
|
+
def doDescribePolicyStatus(args, parsed_globals):
|
2569
2569
|
g_param = parse_global_arg(parsed_globals)
|
2570
2570
|
|
2571
2571
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2594,11 +2594,11 @@ def doModifyWafThreatenIntelligence(args, parsed_globals):
|
|
2594
2594
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2595
2595
|
client._sdkVersion += ("_CLI_" + __version__)
|
2596
2596
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2597
|
-
model = models.
|
2597
|
+
model = models.DescribePolicyStatusRequest()
|
2598
2598
|
model.from_json_string(json.dumps(args))
|
2599
2599
|
start_time = time.time()
|
2600
2600
|
while True:
|
2601
|
-
rsp = client.
|
2601
|
+
rsp = client.DescribePolicyStatus(model)
|
2602
2602
|
result = rsp.to_json_string()
|
2603
2603
|
try:
|
2604
2604
|
json_obj = json.loads(result)
|
@@ -2617,7 +2617,7 @@ def doModifyWafThreatenIntelligence(args, parsed_globals):
|
|
2617
2617
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2618
2618
|
|
2619
2619
|
|
2620
|
-
def
|
2620
|
+
def doDescribeSession(args, parsed_globals):
|
2621
2621
|
g_param = parse_global_arg(parsed_globals)
|
2622
2622
|
|
2623
2623
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2646,11 +2646,11 @@ def doDeleteAttackDownloadRecord(args, parsed_globals):
|
|
2646
2646
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2647
2647
|
client._sdkVersion += ("_CLI_" + __version__)
|
2648
2648
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2649
|
-
model = models.
|
2649
|
+
model = models.DescribeSessionRequest()
|
2650
2650
|
model.from_json_string(json.dumps(args))
|
2651
2651
|
start_time = time.time()
|
2652
2652
|
while True:
|
2653
|
-
rsp = client.
|
2653
|
+
rsp = client.DescribeSession(model)
|
2654
2654
|
result = rsp.to_json_string()
|
2655
2655
|
try:
|
2656
2656
|
json_obj = json.loads(result)
|
@@ -2669,7 +2669,7 @@ def doDeleteAttackDownloadRecord(args, parsed_globals):
|
|
2669
2669
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2670
2670
|
|
2671
2671
|
|
2672
|
-
def
|
2672
|
+
def doModifyHost(args, parsed_globals):
|
2673
2673
|
g_param = parse_global_arg(parsed_globals)
|
2674
2674
|
|
2675
2675
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2698,11 +2698,11 @@ def doModifyHostMode(args, parsed_globals):
|
|
2698
2698
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2699
2699
|
client._sdkVersion += ("_CLI_" + __version__)
|
2700
2700
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2701
|
-
model = models.
|
2701
|
+
model = models.ModifyHostRequest()
|
2702
2702
|
model.from_json_string(json.dumps(args))
|
2703
2703
|
start_time = time.time()
|
2704
2704
|
while True:
|
2705
|
-
rsp = client.
|
2705
|
+
rsp = client.ModifyHost(model)
|
2706
2706
|
result = rsp.to_json_string()
|
2707
2707
|
try:
|
2708
2708
|
json_obj = json.loads(result)
|
@@ -2721,7 +2721,7 @@ def doModifyHostMode(args, parsed_globals):
|
|
2721
2721
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2722
2722
|
|
2723
2723
|
|
2724
|
-
def
|
2724
|
+
def doDescribeTlsVersion(args, parsed_globals):
|
2725
2725
|
g_param = parse_global_arg(parsed_globals)
|
2726
2726
|
|
2727
2727
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2750,11 +2750,11 @@ def doDescribeAttackOverview(args, parsed_globals):
|
|
2750
2750
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2751
2751
|
client._sdkVersion += ("_CLI_" + __version__)
|
2752
2752
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2753
|
-
model = models.
|
2753
|
+
model = models.DescribeTlsVersionRequest()
|
2754
2754
|
model.from_json_string(json.dumps(args))
|
2755
2755
|
start_time = time.time()
|
2756
2756
|
while True:
|
2757
|
-
rsp = client.
|
2757
|
+
rsp = client.DescribeTlsVersion(model)
|
2758
2758
|
result = rsp.to_json_string()
|
2759
2759
|
try:
|
2760
2760
|
json_obj = json.loads(result)
|
@@ -2773,7 +2773,7 @@ def doDescribeAttackOverview(args, parsed_globals):
|
|
2773
2773
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2774
2774
|
|
2775
2775
|
|
2776
|
-
def
|
2776
|
+
def doModifyProtectionStatus(args, parsed_globals):
|
2777
2777
|
g_param = parse_global_arg(parsed_globals)
|
2778
2778
|
|
2779
2779
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2802,11 +2802,11 @@ def doModifyDomainIpv6Status(args, parsed_globals):
|
|
2802
2802
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2803
2803
|
client._sdkVersion += ("_CLI_" + __version__)
|
2804
2804
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2805
|
-
model = models.
|
2805
|
+
model = models.ModifyProtectionStatusRequest()
|
2806
2806
|
model.from_json_string(json.dumps(args))
|
2807
2807
|
start_time = time.time()
|
2808
2808
|
while True:
|
2809
|
-
rsp = client.
|
2809
|
+
rsp = client.ModifyProtectionStatus(model)
|
2810
2810
|
result = rsp.to_json_string()
|
2811
2811
|
try:
|
2812
2812
|
json_obj = json.loads(result)
|
@@ -2877,7 +2877,7 @@ def doDescribeCiphersDetail(args, parsed_globals):
|
|
2877
2877
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2878
2878
|
|
2879
2879
|
|
2880
|
-
def
|
2880
|
+
def doModifyAreaBanStatus(args, parsed_globals):
|
2881
2881
|
g_param = parse_global_arg(parsed_globals)
|
2882
2882
|
|
2883
2883
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2906,11 +2906,11 @@ def doModifyApiAnalyzeStatus(args, parsed_globals):
|
|
2906
2906
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2907
2907
|
client._sdkVersion += ("_CLI_" + __version__)
|
2908
2908
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2909
|
-
model = models.
|
2909
|
+
model = models.ModifyAreaBanStatusRequest()
|
2910
2910
|
model.from_json_string(json.dumps(args))
|
2911
2911
|
start_time = time.time()
|
2912
2912
|
while True:
|
2913
|
-
rsp = client.
|
2913
|
+
rsp = client.ModifyAreaBanStatus(model)
|
2914
2914
|
result = rsp.to_json_string()
|
2915
2915
|
try:
|
2916
2916
|
json_obj = json.loads(result)
|
@@ -2929,7 +2929,7 @@ def doModifyApiAnalyzeStatus(args, parsed_globals):
|
|
2929
2929
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2930
2930
|
|
2931
2931
|
|
2932
|
-
def
|
2932
|
+
def doDescribeAntiFakeRules(args, parsed_globals):
|
2933
2933
|
g_param = parse_global_arg(parsed_globals)
|
2934
2934
|
|
2935
2935
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -2958,11 +2958,11 @@ def doModifyWafAutoDenyRules(args, parsed_globals):
|
|
2958
2958
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
2959
2959
|
client._sdkVersion += ("_CLI_" + __version__)
|
2960
2960
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2961
|
-
model = models.
|
2961
|
+
model = models.DescribeAntiFakeRulesRequest()
|
2962
2962
|
model.from_json_string(json.dumps(args))
|
2963
2963
|
start_time = time.time()
|
2964
2964
|
while True:
|
2965
|
-
rsp = client.
|
2965
|
+
rsp = client.DescribeAntiFakeRules(model)
|
2966
2966
|
result = rsp.to_json_string()
|
2967
2967
|
try:
|
2968
2968
|
json_obj = json.loads(result)
|
@@ -2981,7 +2981,7 @@ def doModifyWafAutoDenyRules(args, parsed_globals):
|
|
2981
2981
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2982
2982
|
|
2983
2983
|
|
2984
|
-
def
|
2984
|
+
def doDescribeFindDomainList(args, parsed_globals):
|
2985
2985
|
g_param = parse_global_arg(parsed_globals)
|
2986
2986
|
|
2987
2987
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3010,11 +3010,11 @@ def doDescribeUserClbWafRegions(args, parsed_globals):
|
|
3010
3010
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3011
3011
|
client._sdkVersion += ("_CLI_" + __version__)
|
3012
3012
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3013
|
-
model = models.
|
3013
|
+
model = models.DescribeFindDomainListRequest()
|
3014
3014
|
model.from_json_string(json.dumps(args))
|
3015
3015
|
start_time = time.time()
|
3016
3016
|
while True:
|
3017
|
-
rsp = client.
|
3017
|
+
rsp = client.DescribeFindDomainList(model)
|
3018
3018
|
result = rsp.to_json_string()
|
3019
3019
|
try:
|
3020
3020
|
json_obj = json.loads(result)
|
@@ -3033,7 +3033,7 @@ def doDescribeUserClbWafRegions(args, parsed_globals):
|
|
3033
3033
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3034
3034
|
|
3035
3035
|
|
3036
|
-
def
|
3036
|
+
def doDeleteDomainWhiteRules(args, parsed_globals):
|
3037
3037
|
g_param = parse_global_arg(parsed_globals)
|
3038
3038
|
|
3039
3039
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3062,11 +3062,11 @@ def doDescribeUserDomainInfo(args, parsed_globals):
|
|
3062
3062
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3063
3063
|
client._sdkVersion += ("_CLI_" + __version__)
|
3064
3064
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3065
|
-
model = models.
|
3065
|
+
model = models.DeleteDomainWhiteRulesRequest()
|
3066
3066
|
model.from_json_string(json.dumps(args))
|
3067
3067
|
start_time = time.time()
|
3068
3068
|
while True:
|
3069
|
-
rsp = client.
|
3069
|
+
rsp = client.DeleteDomainWhiteRules(model)
|
3070
3070
|
result = rsp.to_json_string()
|
3071
3071
|
try:
|
3072
3072
|
json_obj = json.loads(result)
|
@@ -3085,7 +3085,7 @@ def doDescribeUserDomainInfo(args, parsed_globals):
|
|
3085
3085
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3086
3086
|
|
3087
3087
|
|
3088
|
-
def
|
3088
|
+
def doDescribeDomainDetailsSaas(args, parsed_globals):
|
3089
3089
|
g_param = parse_global_arg(parsed_globals)
|
3090
3090
|
|
3091
3091
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3114,11 +3114,11 @@ def doDescribeWafAutoDenyRules(args, parsed_globals):
|
|
3114
3114
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3115
3115
|
client._sdkVersion += ("_CLI_" + __version__)
|
3116
3116
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3117
|
-
model = models.
|
3117
|
+
model = models.DescribeDomainDetailsSaasRequest()
|
3118
3118
|
model.from_json_string(json.dumps(args))
|
3119
3119
|
start_time = time.time()
|
3120
3120
|
while True:
|
3121
|
-
rsp = client.
|
3121
|
+
rsp = client.DescribeDomainDetailsSaas(model)
|
3122
3122
|
result = rsp.to_json_string()
|
3123
3123
|
try:
|
3124
3124
|
json_obj = json.loads(result)
|
@@ -3137,7 +3137,7 @@ def doDescribeWafAutoDenyRules(args, parsed_globals):
|
|
3137
3137
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3138
3138
|
|
3139
3139
|
|
3140
|
-
def
|
3140
|
+
def doDeleteDownloadRecord(args, parsed_globals):
|
3141
3141
|
g_param = parse_global_arg(parsed_globals)
|
3142
3142
|
|
3143
3143
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3166,11 +3166,11 @@ def doDescribeCustomRuleList(args, parsed_globals):
|
|
3166
3166
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3167
3167
|
client._sdkVersion += ("_CLI_" + __version__)
|
3168
3168
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3169
|
-
model = models.
|
3169
|
+
model = models.DeleteDownloadRecordRequest()
|
3170
3170
|
model.from_json_string(json.dumps(args))
|
3171
3171
|
start_time = time.time()
|
3172
3172
|
while True:
|
3173
|
-
rsp = client.
|
3173
|
+
rsp = client.DeleteDownloadRecord(model)
|
3174
3174
|
result = rsp.to_json_string()
|
3175
3175
|
try:
|
3176
3176
|
json_obj = json.loads(result)
|
@@ -3189,7 +3189,7 @@ def doDescribeCustomRuleList(args, parsed_globals):
|
|
3189
3189
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3190
3190
|
|
3191
3191
|
|
3192
|
-
def
|
3192
|
+
def doModifyCustomRule(args, parsed_globals):
|
3193
3193
|
g_param = parse_global_arg(parsed_globals)
|
3194
3194
|
|
3195
3195
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3218,11 +3218,11 @@ def doModifySpartaProtection(args, parsed_globals):
|
|
3218
3218
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3219
3219
|
client._sdkVersion += ("_CLI_" + __version__)
|
3220
3220
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3221
|
-
model = models.
|
3221
|
+
model = models.ModifyCustomRuleRequest()
|
3222
3222
|
model.from_json_string(json.dumps(args))
|
3223
3223
|
start_time = time.time()
|
3224
3224
|
while True:
|
3225
|
-
rsp = client.
|
3225
|
+
rsp = client.ModifyCustomRule(model)
|
3226
3226
|
result = rsp.to_json_string()
|
3227
3227
|
try:
|
3228
3228
|
json_obj = json.loads(result)
|
@@ -3241,7 +3241,7 @@ def doModifySpartaProtection(args, parsed_globals):
|
|
3241
3241
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3242
3242
|
|
3243
3243
|
|
3244
|
-
def
|
3244
|
+
def doModifyBotStatus(args, parsed_globals):
|
3245
3245
|
g_param = parse_global_arg(parsed_globals)
|
3246
3246
|
|
3247
3247
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3270,11 +3270,11 @@ def doDeleteDownloadRecord(args, parsed_globals):
|
|
3270
3270
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3271
3271
|
client._sdkVersion += ("_CLI_" + __version__)
|
3272
3272
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3273
|
-
model = models.
|
3273
|
+
model = models.ModifyBotStatusRequest()
|
3274
3274
|
model.from_json_string(json.dumps(args))
|
3275
3275
|
start_time = time.time()
|
3276
3276
|
while True:
|
3277
|
-
rsp = client.
|
3277
|
+
rsp = client.ModifyBotStatus(model)
|
3278
3278
|
result = rsp.to_json_string()
|
3279
3279
|
try:
|
3280
3280
|
json_obj = json.loads(result)
|
@@ -3293,7 +3293,7 @@ def doDeleteDownloadRecord(args, parsed_globals):
|
|
3293
3293
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3294
3294
|
|
3295
3295
|
|
3296
|
-
def
|
3296
|
+
def doModifyAntiInfoLeakRules(args, parsed_globals):
|
3297
3297
|
g_param = parse_global_arg(parsed_globals)
|
3298
3298
|
|
3299
3299
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3322,11 +3322,11 @@ def doCreateHost(args, parsed_globals):
|
|
3322
3322
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3323
3323
|
client._sdkVersion += ("_CLI_" + __version__)
|
3324
3324
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3325
|
-
model = models.
|
3325
|
+
model = models.ModifyAntiInfoLeakRulesRequest()
|
3326
3326
|
model.from_json_string(json.dumps(args))
|
3327
3327
|
start_time = time.time()
|
3328
3328
|
while True:
|
3329
|
-
rsp = client.
|
3329
|
+
rsp = client.ModifyAntiInfoLeakRules(model)
|
3330
3330
|
result = rsp.to_json_string()
|
3331
3331
|
try:
|
3332
3332
|
json_obj = json.loads(result)
|
@@ -3345,7 +3345,7 @@ def doCreateHost(args, parsed_globals):
|
|
3345
3345
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3346
3346
|
|
3347
3347
|
|
3348
|
-
def
|
3348
|
+
def doAddAntiFakeUrl(args, parsed_globals):
|
3349
3349
|
g_param = parse_global_arg(parsed_globals)
|
3350
3350
|
|
3351
3351
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3374,11 +3374,11 @@ def doDeleteSession(args, parsed_globals):
|
|
3374
3374
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3375
3375
|
client._sdkVersion += ("_CLI_" + __version__)
|
3376
3376
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3377
|
-
model = models.
|
3377
|
+
model = models.AddAntiFakeUrlRequest()
|
3378
3378
|
model.from_json_string(json.dumps(args))
|
3379
3379
|
start_time = time.time()
|
3380
3380
|
while True:
|
3381
|
-
rsp = client.
|
3381
|
+
rsp = client.AddAntiFakeUrl(model)
|
3382
3382
|
result = rsp.to_json_string()
|
3383
3383
|
try:
|
3384
3384
|
json_obj = json.loads(result)
|
@@ -3397,7 +3397,7 @@ def doDeleteSession(args, parsed_globals):
|
|
3397
3397
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3398
3398
|
|
3399
3399
|
|
3400
|
-
def
|
3400
|
+
def doDescribeFlowTrend(args, parsed_globals):
|
3401
3401
|
g_param = parse_global_arg(parsed_globals)
|
3402
3402
|
|
3403
3403
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3426,11 +3426,11 @@ def doSearchAccessLog(args, parsed_globals):
|
|
3426
3426
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3427
3427
|
client._sdkVersion += ("_CLI_" + __version__)
|
3428
3428
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3429
|
-
model = models.
|
3429
|
+
model = models.DescribeFlowTrendRequest()
|
3430
3430
|
model.from_json_string(json.dumps(args))
|
3431
3431
|
start_time = time.time()
|
3432
3432
|
while True:
|
3433
|
-
rsp = client.
|
3433
|
+
rsp = client.DescribeFlowTrend(model)
|
3434
3434
|
result = rsp.to_json_string()
|
3435
3435
|
try:
|
3436
3436
|
json_obj = json.loads(result)
|
@@ -3449,7 +3449,7 @@ def doSearchAccessLog(args, parsed_globals):
|
|
3449
3449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3450
3450
|
|
3451
3451
|
|
3452
|
-
def
|
3452
|
+
def doDescribeAntiFakeUrl(args, parsed_globals):
|
3453
3453
|
g_param = parse_global_arg(parsed_globals)
|
3454
3454
|
|
3455
3455
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3478,11 +3478,11 @@ def doAddSpartaProtectionAuto(args, parsed_globals):
|
|
3478
3478
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3479
3479
|
client._sdkVersion += ("_CLI_" + __version__)
|
3480
3480
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3481
|
-
model = models.
|
3481
|
+
model = models.DescribeAntiFakeUrlRequest()
|
3482
3482
|
model.from_json_string(json.dumps(args))
|
3483
3483
|
start_time = time.time()
|
3484
3484
|
while True:
|
3485
|
-
rsp = client.
|
3485
|
+
rsp = client.DescribeAntiFakeUrl(model)
|
3486
3486
|
result = rsp.to_json_string()
|
3487
3487
|
try:
|
3488
3488
|
json_obj = json.loads(result)
|
@@ -3501,7 +3501,7 @@ def doAddSpartaProtectionAuto(args, parsed_globals):
|
|
3501
3501
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3502
3502
|
|
3503
3503
|
|
3504
|
-
def
|
3504
|
+
def doModifyDomainWhiteRule(args, parsed_globals):
|
3505
3505
|
g_param = parse_global_arg(parsed_globals)
|
3506
3506
|
|
3507
3507
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3530,11 +3530,11 @@ def doDescribeHosts(args, parsed_globals):
|
|
3530
3530
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3531
3531
|
client._sdkVersion += ("_CLI_" + __version__)
|
3532
3532
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3533
|
-
model = models.
|
3533
|
+
model = models.ModifyDomainWhiteRuleRequest()
|
3534
3534
|
model.from_json_string(json.dumps(args))
|
3535
3535
|
start_time = time.time()
|
3536
3536
|
while True:
|
3537
|
-
rsp = client.
|
3537
|
+
rsp = client.ModifyDomainWhiteRule(model)
|
3538
3538
|
result = rsp.to_json_string()
|
3539
3539
|
try:
|
3540
3540
|
json_obj = json.loads(result)
|
@@ -3553,7 +3553,7 @@ def doDescribeHosts(args, parsed_globals):
|
|
3553
3553
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3554
3554
|
|
3555
3555
|
|
3556
|
-
def
|
3556
|
+
def doModifyCustomRuleStatus(args, parsed_globals):
|
3557
3557
|
g_param = parse_global_arg(parsed_globals)
|
3558
3558
|
|
3559
3559
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3582,11 +3582,11 @@ def doDescribeWafAutoDenyStatus(args, parsed_globals):
|
|
3582
3582
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3583
3583
|
client._sdkVersion += ("_CLI_" + __version__)
|
3584
3584
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3585
|
-
model = models.
|
3585
|
+
model = models.ModifyCustomRuleStatusRequest()
|
3586
3586
|
model.from_json_string(json.dumps(args))
|
3587
3587
|
start_time = time.time()
|
3588
3588
|
while True:
|
3589
|
-
rsp = client.
|
3589
|
+
rsp = client.ModifyCustomRuleStatus(model)
|
3590
3590
|
result = rsp.to_json_string()
|
3591
3591
|
try:
|
3592
3592
|
json_obj = json.loads(result)
|
@@ -3605,7 +3605,7 @@ def doDescribeWafAutoDenyStatus(args, parsed_globals):
|
|
3605
3605
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3606
3606
|
|
3607
3607
|
|
3608
|
-
def
|
3608
|
+
def doDescribeIpAccessControl(args, parsed_globals):
|
3609
3609
|
g_param = parse_global_arg(parsed_globals)
|
3610
3610
|
|
3611
3611
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3634,11 +3634,11 @@ def doDescribeDomainWhiteRules(args, parsed_globals):
|
|
3634
3634
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3635
3635
|
client._sdkVersion += ("_CLI_" + __version__)
|
3636
3636
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3637
|
-
model = models.
|
3637
|
+
model = models.DescribeIpAccessControlRequest()
|
3638
3638
|
model.from_json_string(json.dumps(args))
|
3639
3639
|
start_time = time.time()
|
3640
3640
|
while True:
|
3641
|
-
rsp = client.
|
3641
|
+
rsp = client.DescribeIpAccessControl(model)
|
3642
3642
|
result = rsp.to_json_string()
|
3643
3643
|
try:
|
3644
3644
|
json_obj = json.loads(result)
|
@@ -3657,7 +3657,7 @@ def doDescribeDomainWhiteRules(args, parsed_globals):
|
|
3657
3657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3658
3658
|
|
3659
3659
|
|
3660
|
-
def
|
3660
|
+
def doDescribeDomainCountInfo(args, parsed_globals):
|
3661
3661
|
g_param = parse_global_arg(parsed_globals)
|
3662
3662
|
|
3663
3663
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3686,11 +3686,11 @@ def doDescribeWafThreatenIntelligence(args, parsed_globals):
|
|
3686
3686
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3687
3687
|
client._sdkVersion += ("_CLI_" + __version__)
|
3688
3688
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3689
|
-
model = models.
|
3689
|
+
model = models.DescribeDomainCountInfoRequest()
|
3690
3690
|
model.from_json_string(json.dumps(args))
|
3691
3691
|
start_time = time.time()
|
3692
3692
|
while True:
|
3693
|
-
rsp = client.
|
3693
|
+
rsp = client.DescribeDomainCountInfo(model)
|
3694
3694
|
result = rsp.to_json_string()
|
3695
3695
|
try:
|
3696
3696
|
json_obj = json.loads(result)
|
@@ -3709,7 +3709,7 @@ def doDescribeWafThreatenIntelligence(args, parsed_globals):
|
|
3709
3709
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3710
3710
|
|
3711
3711
|
|
3712
|
-
def
|
3712
|
+
def doDeleteSpartaProtection(args, parsed_globals):
|
3713
3713
|
g_param = parse_global_arg(parsed_globals)
|
3714
3714
|
|
3715
3715
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3738,11 +3738,11 @@ def doDescribeWafInfo(args, parsed_globals):
|
|
3738
3738
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3739
3739
|
client._sdkVersion += ("_CLI_" + __version__)
|
3740
3740
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3741
|
-
model = models.
|
3741
|
+
model = models.DeleteSpartaProtectionRequest()
|
3742
3742
|
model.from_json_string(json.dumps(args))
|
3743
3743
|
start_time = time.time()
|
3744
3744
|
while True:
|
3745
|
-
rsp = client.
|
3745
|
+
rsp = client.DeleteSpartaProtection(model)
|
3746
3746
|
result = rsp.to_json_string()
|
3747
3747
|
try:
|
3748
3748
|
json_obj = json.loads(result)
|
@@ -3761,7 +3761,7 @@ def doDescribeWafInfo(args, parsed_globals):
|
|
3761
3761
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3762
3762
|
|
3763
3763
|
|
3764
|
-
def
|
3764
|
+
def doSwitchDomainRules(args, parsed_globals):
|
3765
3765
|
g_param = parse_global_arg(parsed_globals)
|
3766
3766
|
|
3767
3767
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3790,11 +3790,11 @@ def doModifyDomainsCLSStatus(args, parsed_globals):
|
|
3790
3790
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3791
3791
|
client._sdkVersion += ("_CLI_" + __version__)
|
3792
3792
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3793
|
-
model = models.
|
3793
|
+
model = models.SwitchDomainRulesRequest()
|
3794
3794
|
model.from_json_string(json.dumps(args))
|
3795
3795
|
start_time = time.time()
|
3796
3796
|
while True:
|
3797
|
-
rsp = client.
|
3797
|
+
rsp = client.SwitchDomainRules(model)
|
3798
3798
|
result = rsp.to_json_string()
|
3799
3799
|
try:
|
3800
3800
|
json_obj = json.loads(result)
|
@@ -3813,7 +3813,7 @@ def doModifyDomainsCLSStatus(args, parsed_globals):
|
|
3813
3813
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3814
3814
|
|
3815
3815
|
|
3816
|
-
def
|
3816
|
+
def doDescribeBatchIpAccessControl(args, parsed_globals):
|
3817
3817
|
g_param = parse_global_arg(parsed_globals)
|
3818
3818
|
|
3819
3819
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3842,11 +3842,11 @@ def doModifyCustomRule(args, parsed_globals):
|
|
3842
3842
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3843
3843
|
client._sdkVersion += ("_CLI_" + __version__)
|
3844
3844
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3845
|
-
model = models.
|
3845
|
+
model = models.DescribeBatchIpAccessControlRequest()
|
3846
3846
|
model.from_json_string(json.dumps(args))
|
3847
3847
|
start_time = time.time()
|
3848
3848
|
while True:
|
3849
|
-
rsp = client.
|
3849
|
+
rsp = client.DescribeBatchIpAccessControl(model)
|
3850
3850
|
result = rsp.to_json_string()
|
3851
3851
|
try:
|
3852
3852
|
json_obj = json.loads(result)
|
@@ -3865,7 +3865,7 @@ def doModifyCustomRule(args, parsed_globals):
|
|
3865
3865
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3866
3866
|
|
3867
3867
|
|
3868
|
-
def
|
3868
|
+
def doDescribeWafAutoDenyRules(args, parsed_globals):
|
3869
3869
|
g_param = parse_global_arg(parsed_globals)
|
3870
3870
|
|
3871
3871
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3894,11 +3894,11 @@ def doRefreshAccessCheckResult(args, parsed_globals):
|
|
3894
3894
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3895
3895
|
client._sdkVersion += ("_CLI_" + __version__)
|
3896
3896
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3897
|
-
model = models.
|
3897
|
+
model = models.DescribeWafAutoDenyRulesRequest()
|
3898
3898
|
model.from_json_string(json.dumps(args))
|
3899
3899
|
start_time = time.time()
|
3900
3900
|
while True:
|
3901
|
-
rsp = client.
|
3901
|
+
rsp = client.DescribeWafAutoDenyRules(model)
|
3902
3902
|
result = rsp.to_json_string()
|
3903
3903
|
try:
|
3904
3904
|
json_obj = json.loads(result)
|
@@ -3917,7 +3917,7 @@ def doRefreshAccessCheckResult(args, parsed_globals):
|
|
3917
3917
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3918
3918
|
|
3919
3919
|
|
3920
|
-
def
|
3920
|
+
def doDeleteSession(args, parsed_globals):
|
3921
3921
|
g_param = parse_global_arg(parsed_globals)
|
3922
3922
|
|
3923
3923
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3946,11 +3946,11 @@ def doPostAttackDownloadTask(args, parsed_globals):
|
|
3946
3946
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3947
3947
|
client._sdkVersion += ("_CLI_" + __version__)
|
3948
3948
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3949
|
-
model = models.
|
3949
|
+
model = models.DeleteSessionRequest()
|
3950
3950
|
model.from_json_string(json.dumps(args))
|
3951
3951
|
start_time = time.time()
|
3952
3952
|
while True:
|
3953
|
-
rsp = client.
|
3953
|
+
rsp = client.DeleteSession(model)
|
3954
3954
|
result = rsp.to_json_string()
|
3955
3955
|
try:
|
3956
3956
|
json_obj = json.loads(result)
|
@@ -3969,7 +3969,7 @@ def doPostAttackDownloadTask(args, parsed_globals):
|
|
3969
3969
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3970
3970
|
|
3971
3971
|
|
3972
|
-
def
|
3972
|
+
def doDescribeDomainWhiteRules(args, parsed_globals):
|
3973
3973
|
g_param = parse_global_arg(parsed_globals)
|
3974
3974
|
|
3975
3975
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -3998,11 +3998,11 @@ def doAddDomainWhiteRule(args, parsed_globals):
|
|
3998
3998
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
3999
3999
|
client._sdkVersion += ("_CLI_" + __version__)
|
4000
4000
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4001
|
-
model = models.
|
4001
|
+
model = models.DescribeDomainWhiteRulesRequest()
|
4002
4002
|
model.from_json_string(json.dumps(args))
|
4003
4003
|
start_time = time.time()
|
4004
4004
|
while True:
|
4005
|
-
rsp = client.
|
4005
|
+
rsp = client.DescribeDomainWhiteRules(model)
|
4006
4006
|
result = rsp.to_json_string()
|
4007
4007
|
try:
|
4008
4008
|
json_obj = json.loads(result)
|
@@ -4021,7 +4021,7 @@ def doAddDomainWhiteRule(args, parsed_globals):
|
|
4021
4021
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4022
4022
|
|
4023
4023
|
|
4024
|
-
def
|
4024
|
+
def doModifyDomainsCLSStatus(args, parsed_globals):
|
4025
4025
|
g_param = parse_global_arg(parsed_globals)
|
4026
4026
|
|
4027
4027
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4050,11 +4050,11 @@ def doDescribePeakValue(args, parsed_globals):
|
|
4050
4050
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4051
4051
|
client._sdkVersion += ("_CLI_" + __version__)
|
4052
4052
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4053
|
-
model = models.
|
4053
|
+
model = models.ModifyDomainsCLSStatusRequest()
|
4054
4054
|
model.from_json_string(json.dumps(args))
|
4055
4055
|
start_time = time.time()
|
4056
4056
|
while True:
|
4057
|
-
rsp = client.
|
4057
|
+
rsp = client.ModifyDomainsCLSStatus(model)
|
4058
4058
|
result = rsp.to_json_string()
|
4059
4059
|
try:
|
4060
4060
|
json_obj = json.loads(result)
|
@@ -4073,7 +4073,7 @@ def doDescribePeakValue(args, parsed_globals):
|
|
4073
4073
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4074
4074
|
|
4075
4075
|
|
4076
|
-
def
|
4076
|
+
def doRefreshAccessCheckResult(args, parsed_globals):
|
4077
4077
|
g_param = parse_global_arg(parsed_globals)
|
4078
4078
|
|
4079
4079
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4102,11 +4102,63 @@ def doDescribeAccessFastAnalysis(args, parsed_globals):
|
|
4102
4102
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4103
4103
|
client._sdkVersion += ("_CLI_" + __version__)
|
4104
4104
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4105
|
-
model = models.
|
4105
|
+
model = models.RefreshAccessCheckResultRequest()
|
4106
4106
|
model.from_json_string(json.dumps(args))
|
4107
4107
|
start_time = time.time()
|
4108
4108
|
while True:
|
4109
|
-
rsp = client.
|
4109
|
+
rsp = client.RefreshAccessCheckResult(model)
|
4110
|
+
result = rsp.to_json_string()
|
4111
|
+
try:
|
4112
|
+
json_obj = json.loads(result)
|
4113
|
+
except TypeError as e:
|
4114
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4115
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4116
|
+
break
|
4117
|
+
cur_time = time.time()
|
4118
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4119
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4120
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4121
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4122
|
+
else:
|
4123
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4124
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4125
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4126
|
+
|
4127
|
+
|
4128
|
+
def doPostAttackDownloadTask(args, parsed_globals):
|
4129
|
+
g_param = parse_global_arg(parsed_globals)
|
4130
|
+
|
4131
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4132
|
+
cred = credential.CVMRoleCredential()
|
4133
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4134
|
+
cred = credential.STSAssumeRoleCredential(
|
4135
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4136
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4137
|
+
)
|
4138
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4139
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4140
|
+
else:
|
4141
|
+
cred = credential.Credential(
|
4142
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4143
|
+
)
|
4144
|
+
http_profile = HttpProfile(
|
4145
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4146
|
+
reqMethod="POST",
|
4147
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4148
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4149
|
+
)
|
4150
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4151
|
+
if g_param[OptionsDefine.Language]:
|
4152
|
+
profile.language = g_param[OptionsDefine.Language]
|
4153
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4154
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4155
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4156
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4157
|
+
model = models.PostAttackDownloadTaskRequest()
|
4158
|
+
model.from_json_string(json.dumps(args))
|
4159
|
+
start_time = time.time()
|
4160
|
+
while True:
|
4161
|
+
rsp = client.PostAttackDownloadTask(model)
|
4110
4162
|
result = rsp.to_json_string()
|
4111
4163
|
try:
|
4112
4164
|
json_obj = json.loads(result)
|
@@ -4229,7 +4281,7 @@ def doDescribeHost(args, parsed_globals):
|
|
4229
4281
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4230
4282
|
|
4231
4283
|
|
4232
|
-
def
|
4284
|
+
def doDescribeAccessExports(args, parsed_globals):
|
4233
4285
|
g_param = parse_global_arg(parsed_globals)
|
4234
4286
|
|
4235
4287
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4258,11 +4310,11 @@ def doUpsertIpAccessControl(args, parsed_globals):
|
|
4258
4310
|
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4259
4311
|
client._sdkVersion += ("_CLI_" + __version__)
|
4260
4312
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4261
|
-
model = models.
|
4313
|
+
model = models.DescribeAccessExportsRequest()
|
4262
4314
|
model.from_json_string(json.dumps(args))
|
4263
4315
|
start_time = time.time()
|
4264
4316
|
while True:
|
4265
|
-
rsp = client.
|
4317
|
+
rsp = client.DescribeAccessExports(model)
|
4266
4318
|
result = rsp.to_json_string()
|
4267
4319
|
try:
|
4268
4320
|
json_obj = json.loads(result)
|
@@ -4281,99 +4333,1107 @@ def doUpsertIpAccessControl(args, parsed_globals):
|
|
4281
4333
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4282
4334
|
|
4283
4335
|
|
4284
|
-
|
4285
|
-
|
4286
|
-
|
4287
|
-
}
|
4288
|
-
|
4289
|
-
MODELS_MAP = {
|
4290
|
-
"v20180125": models_v20180125,
|
4291
|
-
|
4292
|
-
}
|
4336
|
+
def doDescribeHostLimit(args, parsed_globals):
|
4337
|
+
g_param = parse_global_arg(parsed_globals)
|
4293
4338
|
|
4294
|
-
|
4295
|
-
|
4296
|
-
|
4297
|
-
|
4298
|
-
|
4299
|
-
|
4300
|
-
|
4301
|
-
|
4302
|
-
|
4303
|
-
|
4304
|
-
|
4305
|
-
|
4306
|
-
|
4307
|
-
|
4308
|
-
|
4309
|
-
|
4310
|
-
|
4311
|
-
|
4312
|
-
|
4313
|
-
"
|
4314
|
-
|
4315
|
-
|
4316
|
-
|
4339
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4340
|
+
cred = credential.CVMRoleCredential()
|
4341
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4342
|
+
cred = credential.STSAssumeRoleCredential(
|
4343
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4344
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4345
|
+
)
|
4346
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4347
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4348
|
+
else:
|
4349
|
+
cred = credential.Credential(
|
4350
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4351
|
+
)
|
4352
|
+
http_profile = HttpProfile(
|
4353
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4354
|
+
reqMethod="POST",
|
4355
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4356
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4357
|
+
)
|
4358
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4359
|
+
if g_param[OptionsDefine.Language]:
|
4360
|
+
profile.language = g_param[OptionsDefine.Language]
|
4361
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4362
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4363
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4364
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4365
|
+
model = models.DescribeHostLimitRequest()
|
4366
|
+
model.from_json_string(json.dumps(args))
|
4367
|
+
start_time = time.time()
|
4368
|
+
while True:
|
4369
|
+
rsp = client.DescribeHostLimit(model)
|
4370
|
+
result = rsp.to_json_string()
|
4371
|
+
try:
|
4372
|
+
json_obj = json.loads(result)
|
4373
|
+
except TypeError as e:
|
4374
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4375
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4376
|
+
break
|
4377
|
+
cur_time = time.time()
|
4378
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4379
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4380
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4381
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4382
|
+
else:
|
4383
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4384
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4385
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4386
|
+
|
4387
|
+
|
4388
|
+
def doDeleteAccessExport(args, parsed_globals):
|
4389
|
+
g_param = parse_global_arg(parsed_globals)
|
4390
|
+
|
4391
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4392
|
+
cred = credential.CVMRoleCredential()
|
4393
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4394
|
+
cred = credential.STSAssumeRoleCredential(
|
4395
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4396
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4397
|
+
)
|
4398
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4399
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4400
|
+
else:
|
4401
|
+
cred = credential.Credential(
|
4402
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4403
|
+
)
|
4404
|
+
http_profile = HttpProfile(
|
4405
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4406
|
+
reqMethod="POST",
|
4407
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4408
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4409
|
+
)
|
4410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4411
|
+
if g_param[OptionsDefine.Language]:
|
4412
|
+
profile.language = g_param[OptionsDefine.Language]
|
4413
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4414
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4415
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4416
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4417
|
+
model = models.DeleteAccessExportRequest()
|
4418
|
+
model.from_json_string(json.dumps(args))
|
4419
|
+
start_time = time.time()
|
4420
|
+
while True:
|
4421
|
+
rsp = client.DeleteAccessExport(model)
|
4422
|
+
result = rsp.to_json_string()
|
4423
|
+
try:
|
4424
|
+
json_obj = json.loads(result)
|
4425
|
+
except TypeError as e:
|
4426
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4427
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4428
|
+
break
|
4429
|
+
cur_time = time.time()
|
4430
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4431
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4432
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4433
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4434
|
+
else:
|
4435
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4436
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4437
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4438
|
+
|
4439
|
+
|
4440
|
+
def doModifyAntiInfoLeakRuleStatus(args, parsed_globals):
|
4441
|
+
g_param = parse_global_arg(parsed_globals)
|
4442
|
+
|
4443
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4444
|
+
cred = credential.CVMRoleCredential()
|
4445
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4446
|
+
cred = credential.STSAssumeRoleCredential(
|
4447
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4448
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4449
|
+
)
|
4450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4451
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4452
|
+
else:
|
4453
|
+
cred = credential.Credential(
|
4454
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4455
|
+
)
|
4456
|
+
http_profile = HttpProfile(
|
4457
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4458
|
+
reqMethod="POST",
|
4459
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4460
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4461
|
+
)
|
4462
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4463
|
+
if g_param[OptionsDefine.Language]:
|
4464
|
+
profile.language = g_param[OptionsDefine.Language]
|
4465
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4466
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4467
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4468
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4469
|
+
model = models.ModifyAntiInfoLeakRuleStatusRequest()
|
4470
|
+
model.from_json_string(json.dumps(args))
|
4471
|
+
start_time = time.time()
|
4472
|
+
while True:
|
4473
|
+
rsp = client.ModifyAntiInfoLeakRuleStatus(model)
|
4474
|
+
result = rsp.to_json_string()
|
4475
|
+
try:
|
4476
|
+
json_obj = json.loads(result)
|
4477
|
+
except TypeError as e:
|
4478
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4479
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4480
|
+
break
|
4481
|
+
cur_time = time.time()
|
4482
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4483
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4484
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4485
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4486
|
+
else:
|
4487
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4488
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4489
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4490
|
+
|
4491
|
+
|
4492
|
+
def doCreateAccessExport(args, parsed_globals):
|
4493
|
+
g_param = parse_global_arg(parsed_globals)
|
4494
|
+
|
4495
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4496
|
+
cred = credential.CVMRoleCredential()
|
4497
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4498
|
+
cred = credential.STSAssumeRoleCredential(
|
4499
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4500
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4501
|
+
)
|
4502
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4503
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4504
|
+
else:
|
4505
|
+
cred = credential.Credential(
|
4506
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4507
|
+
)
|
4508
|
+
http_profile = HttpProfile(
|
4509
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4510
|
+
reqMethod="POST",
|
4511
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4512
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4513
|
+
)
|
4514
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4515
|
+
if g_param[OptionsDefine.Language]:
|
4516
|
+
profile.language = g_param[OptionsDefine.Language]
|
4517
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4518
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4519
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4520
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4521
|
+
model = models.CreateAccessExportRequest()
|
4522
|
+
model.from_json_string(json.dumps(args))
|
4523
|
+
start_time = time.time()
|
4524
|
+
while True:
|
4525
|
+
rsp = client.CreateAccessExport(model)
|
4526
|
+
result = rsp.to_json_string()
|
4527
|
+
try:
|
4528
|
+
json_obj = json.loads(result)
|
4529
|
+
except TypeError as e:
|
4530
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4531
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4532
|
+
break
|
4533
|
+
cur_time = time.time()
|
4534
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4535
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4536
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4537
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4538
|
+
else:
|
4539
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4540
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4541
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4542
|
+
|
4543
|
+
|
4544
|
+
def doSearchAttackLog(args, parsed_globals):
|
4545
|
+
g_param = parse_global_arg(parsed_globals)
|
4546
|
+
|
4547
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4548
|
+
cred = credential.CVMRoleCredential()
|
4549
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4550
|
+
cred = credential.STSAssumeRoleCredential(
|
4551
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4552
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4553
|
+
)
|
4554
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4555
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4556
|
+
else:
|
4557
|
+
cred = credential.Credential(
|
4558
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4559
|
+
)
|
4560
|
+
http_profile = HttpProfile(
|
4561
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4562
|
+
reqMethod="POST",
|
4563
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4564
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4565
|
+
)
|
4566
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4567
|
+
if g_param[OptionsDefine.Language]:
|
4568
|
+
profile.language = g_param[OptionsDefine.Language]
|
4569
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4570
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4571
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4572
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4573
|
+
model = models.SearchAttackLogRequest()
|
4574
|
+
model.from_json_string(json.dumps(args))
|
4575
|
+
start_time = time.time()
|
4576
|
+
while True:
|
4577
|
+
rsp = client.SearchAttackLog(model)
|
4578
|
+
result = rsp.to_json_string()
|
4579
|
+
try:
|
4580
|
+
json_obj = json.loads(result)
|
4581
|
+
except TypeError as e:
|
4582
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4583
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4584
|
+
break
|
4585
|
+
cur_time = time.time()
|
4586
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4587
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4588
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4589
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4590
|
+
else:
|
4591
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4592
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4593
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4594
|
+
|
4595
|
+
|
4596
|
+
def doDescribeInstances(args, parsed_globals):
|
4597
|
+
g_param = parse_global_arg(parsed_globals)
|
4598
|
+
|
4599
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4600
|
+
cred = credential.CVMRoleCredential()
|
4601
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4602
|
+
cred = credential.STSAssumeRoleCredential(
|
4603
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4604
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4605
|
+
)
|
4606
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4607
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4608
|
+
else:
|
4609
|
+
cred = credential.Credential(
|
4610
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4611
|
+
)
|
4612
|
+
http_profile = HttpProfile(
|
4613
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4614
|
+
reqMethod="POST",
|
4615
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4616
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4617
|
+
)
|
4618
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4619
|
+
if g_param[OptionsDefine.Language]:
|
4620
|
+
profile.language = g_param[OptionsDefine.Language]
|
4621
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4622
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4623
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4624
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4625
|
+
model = models.DescribeInstancesRequest()
|
4626
|
+
model.from_json_string(json.dumps(args))
|
4627
|
+
start_time = time.time()
|
4628
|
+
while True:
|
4629
|
+
rsp = client.DescribeInstances(model)
|
4630
|
+
result = rsp.to_json_string()
|
4631
|
+
try:
|
4632
|
+
json_obj = json.loads(result)
|
4633
|
+
except TypeError as e:
|
4634
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4635
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4636
|
+
break
|
4637
|
+
cur_time = time.time()
|
4638
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4639
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4640
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4641
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4642
|
+
else:
|
4643
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4644
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4645
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4646
|
+
|
4647
|
+
|
4648
|
+
def doModifyHostFlowMode(args, parsed_globals):
|
4649
|
+
g_param = parse_global_arg(parsed_globals)
|
4650
|
+
|
4651
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4652
|
+
cred = credential.CVMRoleCredential()
|
4653
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4654
|
+
cred = credential.STSAssumeRoleCredential(
|
4655
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4656
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4657
|
+
)
|
4658
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4659
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4660
|
+
else:
|
4661
|
+
cred = credential.Credential(
|
4662
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4663
|
+
)
|
4664
|
+
http_profile = HttpProfile(
|
4665
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4666
|
+
reqMethod="POST",
|
4667
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4668
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4669
|
+
)
|
4670
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4671
|
+
if g_param[OptionsDefine.Language]:
|
4672
|
+
profile.language = g_param[OptionsDefine.Language]
|
4673
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4674
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4675
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4676
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4677
|
+
model = models.ModifyHostFlowModeRequest()
|
4678
|
+
model.from_json_string(json.dumps(args))
|
4679
|
+
start_time = time.time()
|
4680
|
+
while True:
|
4681
|
+
rsp = client.ModifyHostFlowMode(model)
|
4682
|
+
result = rsp.to_json_string()
|
4683
|
+
try:
|
4684
|
+
json_obj = json.loads(result)
|
4685
|
+
except TypeError as e:
|
4686
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4687
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4688
|
+
break
|
4689
|
+
cur_time = time.time()
|
4690
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4691
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4692
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4693
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4694
|
+
else:
|
4695
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4696
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4697
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4698
|
+
|
4699
|
+
|
4700
|
+
def doModifyApiAnalyzeStatus(args, parsed_globals):
|
4701
|
+
g_param = parse_global_arg(parsed_globals)
|
4702
|
+
|
4703
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4704
|
+
cred = credential.CVMRoleCredential()
|
4705
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4706
|
+
cred = credential.STSAssumeRoleCredential(
|
4707
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4708
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4709
|
+
)
|
4710
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4711
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4712
|
+
else:
|
4713
|
+
cred = credential.Credential(
|
4714
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4715
|
+
)
|
4716
|
+
http_profile = HttpProfile(
|
4717
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4718
|
+
reqMethod="POST",
|
4719
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4720
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4721
|
+
)
|
4722
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4723
|
+
if g_param[OptionsDefine.Language]:
|
4724
|
+
profile.language = g_param[OptionsDefine.Language]
|
4725
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4726
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4727
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4728
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4729
|
+
model = models.ModifyApiAnalyzeStatusRequest()
|
4730
|
+
model.from_json_string(json.dumps(args))
|
4731
|
+
start_time = time.time()
|
4732
|
+
while True:
|
4733
|
+
rsp = client.ModifyApiAnalyzeStatus(model)
|
4734
|
+
result = rsp.to_json_string()
|
4735
|
+
try:
|
4736
|
+
json_obj = json.loads(result)
|
4737
|
+
except TypeError as e:
|
4738
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4739
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4740
|
+
break
|
4741
|
+
cur_time = time.time()
|
4742
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4743
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4744
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4745
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4746
|
+
else:
|
4747
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4748
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4749
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4750
|
+
|
4751
|
+
|
4752
|
+
def doDescribeWafAutoDenyStatus(args, parsed_globals):
|
4753
|
+
g_param = parse_global_arg(parsed_globals)
|
4754
|
+
|
4755
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4756
|
+
cred = credential.CVMRoleCredential()
|
4757
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4758
|
+
cred = credential.STSAssumeRoleCredential(
|
4759
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4760
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4761
|
+
)
|
4762
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4763
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4764
|
+
else:
|
4765
|
+
cred = credential.Credential(
|
4766
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4767
|
+
)
|
4768
|
+
http_profile = HttpProfile(
|
4769
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4770
|
+
reqMethod="POST",
|
4771
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4772
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4773
|
+
)
|
4774
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4775
|
+
if g_param[OptionsDefine.Language]:
|
4776
|
+
profile.language = g_param[OptionsDefine.Language]
|
4777
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4778
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4779
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4780
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4781
|
+
model = models.DescribeWafAutoDenyStatusRequest()
|
4782
|
+
model.from_json_string(json.dumps(args))
|
4783
|
+
start_time = time.time()
|
4784
|
+
while True:
|
4785
|
+
rsp = client.DescribeWafAutoDenyStatus(model)
|
4786
|
+
result = rsp.to_json_string()
|
4787
|
+
try:
|
4788
|
+
json_obj = json.loads(result)
|
4789
|
+
except TypeError as e:
|
4790
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4791
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4792
|
+
break
|
4793
|
+
cur_time = time.time()
|
4794
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4795
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4796
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4797
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4798
|
+
else:
|
4799
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4800
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4801
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4802
|
+
|
4803
|
+
|
4804
|
+
def doModifyCustomWhiteRuleStatus(args, parsed_globals):
|
4805
|
+
g_param = parse_global_arg(parsed_globals)
|
4806
|
+
|
4807
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4808
|
+
cred = credential.CVMRoleCredential()
|
4809
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4810
|
+
cred = credential.STSAssumeRoleCredential(
|
4811
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4812
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4813
|
+
)
|
4814
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4815
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4816
|
+
else:
|
4817
|
+
cred = credential.Credential(
|
4818
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4819
|
+
)
|
4820
|
+
http_profile = HttpProfile(
|
4821
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4822
|
+
reqMethod="POST",
|
4823
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4824
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4825
|
+
)
|
4826
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4827
|
+
if g_param[OptionsDefine.Language]:
|
4828
|
+
profile.language = g_param[OptionsDefine.Language]
|
4829
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4830
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4831
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4832
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4833
|
+
model = models.ModifyCustomWhiteRuleStatusRequest()
|
4834
|
+
model.from_json_string(json.dumps(args))
|
4835
|
+
start_time = time.time()
|
4836
|
+
while True:
|
4837
|
+
rsp = client.ModifyCustomWhiteRuleStatus(model)
|
4838
|
+
result = rsp.to_json_string()
|
4839
|
+
try:
|
4840
|
+
json_obj = json.loads(result)
|
4841
|
+
except TypeError as e:
|
4842
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4843
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4844
|
+
break
|
4845
|
+
cur_time = time.time()
|
4846
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4847
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4848
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4849
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4850
|
+
else:
|
4851
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4852
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4853
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4854
|
+
|
4855
|
+
|
4856
|
+
def doModifyHostMode(args, parsed_globals):
|
4857
|
+
g_param = parse_global_arg(parsed_globals)
|
4858
|
+
|
4859
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4860
|
+
cred = credential.CVMRoleCredential()
|
4861
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4862
|
+
cred = credential.STSAssumeRoleCredential(
|
4863
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4864
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4865
|
+
)
|
4866
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4867
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4868
|
+
else:
|
4869
|
+
cred = credential.Credential(
|
4870
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4871
|
+
)
|
4872
|
+
http_profile = HttpProfile(
|
4873
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4874
|
+
reqMethod="POST",
|
4875
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4876
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4877
|
+
)
|
4878
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4879
|
+
if g_param[OptionsDefine.Language]:
|
4880
|
+
profile.language = g_param[OptionsDefine.Language]
|
4881
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4882
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4883
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4884
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4885
|
+
model = models.ModifyHostModeRequest()
|
4886
|
+
model.from_json_string(json.dumps(args))
|
4887
|
+
start_time = time.time()
|
4888
|
+
while True:
|
4889
|
+
rsp = client.ModifyHostMode(model)
|
4890
|
+
result = rsp.to_json_string()
|
4891
|
+
try:
|
4892
|
+
json_obj = json.loads(result)
|
4893
|
+
except TypeError as e:
|
4894
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4895
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4896
|
+
break
|
4897
|
+
cur_time = time.time()
|
4898
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4899
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4900
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4901
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4902
|
+
else:
|
4903
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4904
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4905
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4906
|
+
|
4907
|
+
|
4908
|
+
def doDescribeUserClbWafRegions(args, parsed_globals):
|
4909
|
+
g_param = parse_global_arg(parsed_globals)
|
4910
|
+
|
4911
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4912
|
+
cred = credential.CVMRoleCredential()
|
4913
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4914
|
+
cred = credential.STSAssumeRoleCredential(
|
4915
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4916
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4917
|
+
)
|
4918
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4919
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4920
|
+
else:
|
4921
|
+
cred = credential.Credential(
|
4922
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4923
|
+
)
|
4924
|
+
http_profile = HttpProfile(
|
4925
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4926
|
+
reqMethod="POST",
|
4927
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4928
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4929
|
+
)
|
4930
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4931
|
+
if g_param[OptionsDefine.Language]:
|
4932
|
+
profile.language = g_param[OptionsDefine.Language]
|
4933
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4934
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4935
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4936
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4937
|
+
model = models.DescribeUserClbWafRegionsRequest()
|
4938
|
+
model.from_json_string(json.dumps(args))
|
4939
|
+
start_time = time.time()
|
4940
|
+
while True:
|
4941
|
+
rsp = client.DescribeUserClbWafRegions(model)
|
4942
|
+
result = rsp.to_json_string()
|
4943
|
+
try:
|
4944
|
+
json_obj = json.loads(result)
|
4945
|
+
except TypeError as e:
|
4946
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4947
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4948
|
+
break
|
4949
|
+
cur_time = time.time()
|
4950
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4951
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4952
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4953
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4954
|
+
else:
|
4955
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4956
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4957
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4958
|
+
|
4959
|
+
|
4960
|
+
def doUpsertCCRule(args, parsed_globals):
|
4961
|
+
g_param = parse_global_arg(parsed_globals)
|
4962
|
+
|
4963
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4964
|
+
cred = credential.CVMRoleCredential()
|
4965
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4966
|
+
cred = credential.STSAssumeRoleCredential(
|
4967
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4968
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
4969
|
+
)
|
4970
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4971
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4972
|
+
else:
|
4973
|
+
cred = credential.Credential(
|
4974
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4975
|
+
)
|
4976
|
+
http_profile = HttpProfile(
|
4977
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4978
|
+
reqMethod="POST",
|
4979
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4980
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4981
|
+
)
|
4982
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4983
|
+
if g_param[OptionsDefine.Language]:
|
4984
|
+
profile.language = g_param[OptionsDefine.Language]
|
4985
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4986
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
4987
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4988
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4989
|
+
model = models.UpsertCCRuleRequest()
|
4990
|
+
model.from_json_string(json.dumps(args))
|
4991
|
+
start_time = time.time()
|
4992
|
+
while True:
|
4993
|
+
rsp = client.UpsertCCRule(model)
|
4994
|
+
result = rsp.to_json_string()
|
4995
|
+
try:
|
4996
|
+
json_obj = json.loads(result)
|
4997
|
+
except TypeError as e:
|
4998
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4999
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5000
|
+
break
|
5001
|
+
cur_time = time.time()
|
5002
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5003
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5004
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5005
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5006
|
+
else:
|
5007
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5008
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5009
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5010
|
+
|
5011
|
+
|
5012
|
+
def doDeleteAntiFakeUrl(args, parsed_globals):
|
5013
|
+
g_param = parse_global_arg(parsed_globals)
|
5014
|
+
|
5015
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5016
|
+
cred = credential.CVMRoleCredential()
|
5017
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5018
|
+
cred = credential.STSAssumeRoleCredential(
|
5019
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5020
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5021
|
+
)
|
5022
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5023
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5024
|
+
else:
|
5025
|
+
cred = credential.Credential(
|
5026
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5027
|
+
)
|
5028
|
+
http_profile = HttpProfile(
|
5029
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5030
|
+
reqMethod="POST",
|
5031
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5032
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5033
|
+
)
|
5034
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5035
|
+
if g_param[OptionsDefine.Language]:
|
5036
|
+
profile.language = g_param[OptionsDefine.Language]
|
5037
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5038
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
5039
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5040
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5041
|
+
model = models.DeleteAntiFakeUrlRequest()
|
5042
|
+
model.from_json_string(json.dumps(args))
|
5043
|
+
start_time = time.time()
|
5044
|
+
while True:
|
5045
|
+
rsp = client.DeleteAntiFakeUrl(model)
|
5046
|
+
result = rsp.to_json_string()
|
5047
|
+
try:
|
5048
|
+
json_obj = json.loads(result)
|
5049
|
+
except TypeError as e:
|
5050
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5051
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5052
|
+
break
|
5053
|
+
cur_time = time.time()
|
5054
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5055
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5056
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5057
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5058
|
+
else:
|
5059
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5060
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5061
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5062
|
+
|
5063
|
+
|
5064
|
+
def doDescribeCCRuleList(args, parsed_globals):
|
5065
|
+
g_param = parse_global_arg(parsed_globals)
|
5066
|
+
|
5067
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5068
|
+
cred = credential.CVMRoleCredential()
|
5069
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5070
|
+
cred = credential.STSAssumeRoleCredential(
|
5071
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5072
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5073
|
+
)
|
5074
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5075
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5076
|
+
else:
|
5077
|
+
cred = credential.Credential(
|
5078
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5079
|
+
)
|
5080
|
+
http_profile = HttpProfile(
|
5081
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5082
|
+
reqMethod="POST",
|
5083
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5084
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5085
|
+
)
|
5086
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5087
|
+
if g_param[OptionsDefine.Language]:
|
5088
|
+
profile.language = g_param[OptionsDefine.Language]
|
5089
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5090
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
5091
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5092
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5093
|
+
model = models.DescribeCCRuleListRequest()
|
5094
|
+
model.from_json_string(json.dumps(args))
|
5095
|
+
start_time = time.time()
|
5096
|
+
while True:
|
5097
|
+
rsp = client.DescribeCCRuleList(model)
|
5098
|
+
result = rsp.to_json_string()
|
5099
|
+
try:
|
5100
|
+
json_obj = json.loads(result)
|
5101
|
+
except TypeError as e:
|
5102
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5103
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5104
|
+
break
|
5105
|
+
cur_time = time.time()
|
5106
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5107
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5108
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5109
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5110
|
+
else:
|
5111
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5112
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5113
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5114
|
+
|
5115
|
+
|
5116
|
+
def doCreateHost(args, parsed_globals):
|
5117
|
+
g_param = parse_global_arg(parsed_globals)
|
5118
|
+
|
5119
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5120
|
+
cred = credential.CVMRoleCredential()
|
5121
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5122
|
+
cred = credential.STSAssumeRoleCredential(
|
5123
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5124
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5125
|
+
)
|
5126
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5127
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5128
|
+
else:
|
5129
|
+
cred = credential.Credential(
|
5130
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5131
|
+
)
|
5132
|
+
http_profile = HttpProfile(
|
5133
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5134
|
+
reqMethod="POST",
|
5135
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5136
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5137
|
+
)
|
5138
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5139
|
+
if g_param[OptionsDefine.Language]:
|
5140
|
+
profile.language = g_param[OptionsDefine.Language]
|
5141
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5142
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
5143
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5144
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5145
|
+
model = models.CreateHostRequest()
|
5146
|
+
model.from_json_string(json.dumps(args))
|
5147
|
+
start_time = time.time()
|
5148
|
+
while True:
|
5149
|
+
rsp = client.CreateHost(model)
|
5150
|
+
result = rsp.to_json_string()
|
5151
|
+
try:
|
5152
|
+
json_obj = json.loads(result)
|
5153
|
+
except TypeError as e:
|
5154
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5155
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5156
|
+
break
|
5157
|
+
cur_time = time.time()
|
5158
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5159
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5160
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5161
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5162
|
+
else:
|
5163
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5164
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5165
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5166
|
+
|
5167
|
+
|
5168
|
+
def doUpsertSession(args, parsed_globals):
|
5169
|
+
g_param = parse_global_arg(parsed_globals)
|
5170
|
+
|
5171
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5172
|
+
cred = credential.CVMRoleCredential()
|
5173
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5174
|
+
cred = credential.STSAssumeRoleCredential(
|
5175
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5176
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5177
|
+
)
|
5178
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5179
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5180
|
+
else:
|
5181
|
+
cred = credential.Credential(
|
5182
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5183
|
+
)
|
5184
|
+
http_profile = HttpProfile(
|
5185
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5186
|
+
reqMethod="POST",
|
5187
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5188
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5189
|
+
)
|
5190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5191
|
+
if g_param[OptionsDefine.Language]:
|
5192
|
+
profile.language = g_param[OptionsDefine.Language]
|
5193
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5194
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
5195
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5196
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5197
|
+
model = models.UpsertSessionRequest()
|
5198
|
+
model.from_json_string(json.dumps(args))
|
5199
|
+
start_time = time.time()
|
5200
|
+
while True:
|
5201
|
+
rsp = client.UpsertSession(model)
|
5202
|
+
result = rsp.to_json_string()
|
5203
|
+
try:
|
5204
|
+
json_obj = json.loads(result)
|
5205
|
+
except TypeError as e:
|
5206
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5207
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5208
|
+
break
|
5209
|
+
cur_time = time.time()
|
5210
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5211
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5212
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5213
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5214
|
+
else:
|
5215
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5216
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5217
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5218
|
+
|
5219
|
+
|
5220
|
+
def doAddDomainWhiteRule(args, parsed_globals):
|
5221
|
+
g_param = parse_global_arg(parsed_globals)
|
5222
|
+
|
5223
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5224
|
+
cred = credential.CVMRoleCredential()
|
5225
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5226
|
+
cred = credential.STSAssumeRoleCredential(
|
5227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5228
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5229
|
+
)
|
5230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5231
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5232
|
+
else:
|
5233
|
+
cred = credential.Credential(
|
5234
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5235
|
+
)
|
5236
|
+
http_profile = HttpProfile(
|
5237
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5238
|
+
reqMethod="POST",
|
5239
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5240
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5241
|
+
)
|
5242
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5243
|
+
if g_param[OptionsDefine.Language]:
|
5244
|
+
profile.language = g_param[OptionsDefine.Language]
|
5245
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5246
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
5247
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5248
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5249
|
+
model = models.AddDomainWhiteRuleRequest()
|
5250
|
+
model.from_json_string(json.dumps(args))
|
5251
|
+
start_time = time.time()
|
5252
|
+
while True:
|
5253
|
+
rsp = client.AddDomainWhiteRule(model)
|
5254
|
+
result = rsp.to_json_string()
|
5255
|
+
try:
|
5256
|
+
json_obj = json.loads(result)
|
5257
|
+
except TypeError as e:
|
5258
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5259
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5260
|
+
break
|
5261
|
+
cur_time = time.time()
|
5262
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5263
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5264
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5265
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5266
|
+
else:
|
5267
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5268
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5269
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5270
|
+
|
5271
|
+
|
5272
|
+
def doModifyDomainIpv6Status(args, parsed_globals):
|
5273
|
+
g_param = parse_global_arg(parsed_globals)
|
5274
|
+
|
5275
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5276
|
+
cred = credential.CVMRoleCredential()
|
5277
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5278
|
+
cred = credential.STSAssumeRoleCredential(
|
5279
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5280
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
5281
|
+
)
|
5282
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5283
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5284
|
+
else:
|
5285
|
+
cred = credential.Credential(
|
5286
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5287
|
+
)
|
5288
|
+
http_profile = HttpProfile(
|
5289
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5290
|
+
reqMethod="POST",
|
5291
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5292
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5293
|
+
)
|
5294
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5295
|
+
if g_param[OptionsDefine.Language]:
|
5296
|
+
profile.language = g_param[OptionsDefine.Language]
|
5297
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5298
|
+
client = mod.WafClient(cred, g_param[OptionsDefine.Region], profile)
|
5299
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5300
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5301
|
+
model = models.ModifyDomainIpv6StatusRequest()
|
5302
|
+
model.from_json_string(json.dumps(args))
|
5303
|
+
start_time = time.time()
|
5304
|
+
while True:
|
5305
|
+
rsp = client.ModifyDomainIpv6Status(model)
|
5306
|
+
result = rsp.to_json_string()
|
5307
|
+
try:
|
5308
|
+
json_obj = json.loads(result)
|
5309
|
+
except TypeError as e:
|
5310
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5311
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5312
|
+
break
|
5313
|
+
cur_time = time.time()
|
5314
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5315
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5316
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5317
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5318
|
+
else:
|
5319
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5320
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5321
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5322
|
+
|
5323
|
+
|
5324
|
+
CLIENT_MAP = {
|
5325
|
+
"v20180125": waf_client_v20180125,
|
5326
|
+
|
5327
|
+
}
|
5328
|
+
|
5329
|
+
MODELS_MAP = {
|
5330
|
+
"v20180125": models_v20180125,
|
5331
|
+
|
5332
|
+
}
|
5333
|
+
|
5334
|
+
ACTION_MAP = {
|
5335
|
+
"DescribeDomainDetailsClb": doDescribeDomainDetailsClb,
|
5336
|
+
"AddAntiInfoLeakRules": doAddAntiInfoLeakRules,
|
5337
|
+
"DescribeAccessIndex": doDescribeAccessIndex,
|
5338
|
+
"GetAttackTotalCount": doGetAttackTotalCount,
|
5339
|
+
"AddCustomWhiteRule": doAddCustomWhiteRule,
|
5340
|
+
"DeleteIpAccessControl": doDeleteIpAccessControl,
|
5341
|
+
"DescribeAntiInfoLeakRules": doDescribeAntiInfoLeakRules,
|
4317
5342
|
"AddSpartaProtectionsAuto": doAddSpartaProtectionsAuto,
|
5343
|
+
"DescribeAutoDenyIP": doDescribeAutoDenyIP,
|
5344
|
+
"DeleteCustomWhiteRule": doDeleteCustomWhiteRule,
|
5345
|
+
"GetAttackDownloadRecords": doGetAttackDownloadRecords,
|
5346
|
+
"AddCustomRule": doAddCustomRule,
|
5347
|
+
"DeleteCustomRule": doDeleteCustomRule,
|
5348
|
+
"ModifyAntiFakeUrl": doModifyAntiFakeUrl,
|
5349
|
+
"ModifySpartaProtection": doModifySpartaProtection,
|
5350
|
+
"DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
|
5351
|
+
"ModifyWafAutoDenyRules": doModifyWafAutoDenyRules,
|
5352
|
+
"DescribeUserDomainInfo": doDescribeUserDomainInfo,
|
5353
|
+
"DeleteCCRule": doDeleteCCRule,
|
5354
|
+
"DescribeAntiInfoLeakageRules": doDescribeAntiInfoLeakageRules,
|
5355
|
+
"SearchAccessLog": doSearchAccessLog,
|
5356
|
+
"DescribeWafThreatenIntelligence": doDescribeWafThreatenIntelligence,
|
5357
|
+
"DescribeIpHitItems": doDescribeIpHitItems,
|
5358
|
+
"AddSpartaProtectionAuto": doAddSpartaProtectionAuto,
|
5359
|
+
"DeleteAntiInfoLeakRule": doDeleteAntiInfoLeakRule,
|
5360
|
+
"DescribeRuleLimit": doDescribeRuleLimit,
|
5361
|
+
"DescribeDomains": doDescribeDomains,
|
5362
|
+
"ModifyHostStatus": doModifyHostStatus,
|
5363
|
+
"ModifySpartaProtectionMode": doModifySpartaProtectionMode,
|
5364
|
+
"UpsertIpAccessControl": doUpsertIpAccessControl,
|
4318
5365
|
"GetAttackHistogram": doGetAttackHistogram,
|
4319
5366
|
"ModifyWafAutoDenyStatus": doModifyWafAutoDenyStatus,
|
4320
|
-
"ModifyBotStatus": doModifyBotStatus,
|
4321
|
-
"DescribeRuleLimit": doDescribeRuleLimit,
|
4322
5367
|
"ModifyAccessPeriod": doModifyAccessPeriod,
|
4323
|
-
"
|
4324
|
-
"ModifyHostStatus": doModifyHostStatus,
|
5368
|
+
"ModifyAntiFakeUrlStatus": doModifyAntiFakeUrlStatus,
|
4325
5369
|
"DescribeVipInfo": doDescribeVipInfo,
|
4326
|
-
"DescribeUserCdcClbWafRegions": doDescribeUserCdcClbWafRegions,
|
4327
5370
|
"DeleteHost": doDeleteHost,
|
4328
|
-
"
|
4329
|
-
"DescribeFlowTrend": doDescribeFlowTrend,
|
5371
|
+
"DescribeAccessFastAnalysis": doDescribeAccessFastAnalysis,
|
4330
5372
|
"DescribePeakPoints": doDescribePeakPoints,
|
4331
|
-
"DescribeHostLimit": doDescribeHostLimit,
|
4332
|
-
"DeleteCustomWhiteRule": doDeleteCustomWhiteRule,
|
4333
5373
|
"ModifyCustomWhiteRule": doModifyCustomWhiteRule,
|
4334
|
-
"
|
4335
|
-
"
|
4336
|
-
"
|
4337
|
-
"
|
5374
|
+
"DescribeAccessHistogram": doDescribeAccessHistogram,
|
5375
|
+
"DescribeCCRule": doDescribeCCRule,
|
5376
|
+
"DescribePeakValue": doDescribePeakValue,
|
5377
|
+
"ModifyWafThreatenIntelligence": doModifyWafThreatenIntelligence,
|
5378
|
+
"DeleteAttackDownloadRecord": doDeleteAttackDownloadRecord,
|
5379
|
+
"DescribeCustomRuleList": doDescribeCustomRuleList,
|
5380
|
+
"DescribeAttackOverview": doDescribeAttackOverview,
|
5381
|
+
"DescribeWafInfo": doDescribeWafInfo,
|
5382
|
+
"DescribeHosts": doDescribeHosts,
|
5383
|
+
"AddSpartaProtection": doAddSpartaProtection,
|
5384
|
+
"DescribePolicyStatus": doDescribePolicyStatus,
|
5385
|
+
"DescribeSession": doDescribeSession,
|
5386
|
+
"ModifyHost": doModifyHost,
|
5387
|
+
"DescribeTlsVersion": doDescribeTlsVersion,
|
5388
|
+
"ModifyProtectionStatus": doModifyProtectionStatus,
|
5389
|
+
"DescribeCiphersDetail": doDescribeCiphersDetail,
|
5390
|
+
"ModifyAreaBanStatus": doModifyAreaBanStatus,
|
5391
|
+
"DescribeAntiFakeRules": doDescribeAntiFakeRules,
|
5392
|
+
"DescribeFindDomainList": doDescribeFindDomainList,
|
5393
|
+
"DeleteDomainWhiteRules": doDeleteDomainWhiteRules,
|
4338
5394
|
"DescribeDomainDetailsSaas": doDescribeDomainDetailsSaas,
|
5395
|
+
"DeleteDownloadRecord": doDeleteDownloadRecord,
|
5396
|
+
"ModifyCustomRule": doModifyCustomRule,
|
5397
|
+
"ModifyBotStatus": doModifyBotStatus,
|
5398
|
+
"ModifyAntiInfoLeakRules": doModifyAntiInfoLeakRules,
|
5399
|
+
"AddAntiFakeUrl": doAddAntiFakeUrl,
|
5400
|
+
"DescribeFlowTrend": doDescribeFlowTrend,
|
5401
|
+
"DescribeAntiFakeUrl": doDescribeAntiFakeUrl,
|
5402
|
+
"ModifyDomainWhiteRule": doModifyDomainWhiteRule,
|
4339
5403
|
"ModifyCustomRuleStatus": doModifyCustomRuleStatus,
|
5404
|
+
"DescribeIpAccessControl": doDescribeIpAccessControl,
|
4340
5405
|
"DescribeDomainCountInfo": doDescribeDomainCountInfo,
|
4341
|
-
"DeleteCustomRule": doDeleteCustomRule,
|
4342
5406
|
"DeleteSpartaProtection": doDeleteSpartaProtection,
|
4343
5407
|
"SwitchDomainRules": doSwitchDomainRules,
|
4344
|
-
"
|
4345
|
-
"DeleteAttackDownloadRecord": doDeleteAttackDownloadRecord,
|
4346
|
-
"ModifyHostMode": doModifyHostMode,
|
4347
|
-
"DescribeAttackOverview": doDescribeAttackOverview,
|
4348
|
-
"ModifyDomainIpv6Status": doModifyDomainIpv6Status,
|
4349
|
-
"DescribeCiphersDetail": doDescribeCiphersDetail,
|
4350
|
-
"ModifyApiAnalyzeStatus": doModifyApiAnalyzeStatus,
|
4351
|
-
"ModifyWafAutoDenyRules": doModifyWafAutoDenyRules,
|
4352
|
-
"DescribeUserClbWafRegions": doDescribeUserClbWafRegions,
|
4353
|
-
"DescribeUserDomainInfo": doDescribeUserDomainInfo,
|
5408
|
+
"DescribeBatchIpAccessControl": doDescribeBatchIpAccessControl,
|
4354
5409
|
"DescribeWafAutoDenyRules": doDescribeWafAutoDenyRules,
|
4355
|
-
"DescribeCustomRuleList": doDescribeCustomRuleList,
|
4356
|
-
"ModifySpartaProtection": doModifySpartaProtection,
|
4357
|
-
"DeleteDownloadRecord": doDeleteDownloadRecord,
|
4358
|
-
"CreateHost": doCreateHost,
|
4359
5410
|
"DeleteSession": doDeleteSession,
|
4360
|
-
"SearchAccessLog": doSearchAccessLog,
|
4361
|
-
"AddSpartaProtectionAuto": doAddSpartaProtectionAuto,
|
4362
|
-
"DescribeHosts": doDescribeHosts,
|
4363
|
-
"DescribeWafAutoDenyStatus": doDescribeWafAutoDenyStatus,
|
4364
5411
|
"DescribeDomainWhiteRules": doDescribeDomainWhiteRules,
|
4365
|
-
"DescribeWafThreatenIntelligence": doDescribeWafThreatenIntelligence,
|
4366
|
-
"DescribeWafInfo": doDescribeWafInfo,
|
4367
5412
|
"ModifyDomainsCLSStatus": doModifyDomainsCLSStatus,
|
4368
|
-
"ModifyCustomRule": doModifyCustomRule,
|
4369
5413
|
"RefreshAccessCheckResult": doRefreshAccessCheckResult,
|
4370
5414
|
"PostAttackDownloadTask": doPostAttackDownloadTask,
|
4371
|
-
"AddDomainWhiteRule": doAddDomainWhiteRule,
|
4372
|
-
"DescribePeakValue": doDescribePeakValue,
|
4373
|
-
"DescribeAccessFastAnalysis": doDescribeAccessFastAnalysis,
|
4374
5415
|
"DescribeCustomWhiteRule": doDescribeCustomWhiteRule,
|
4375
5416
|
"DescribeHost": doDescribeHost,
|
4376
|
-
"
|
5417
|
+
"DescribeAccessExports": doDescribeAccessExports,
|
5418
|
+
"DescribeHostLimit": doDescribeHostLimit,
|
5419
|
+
"DeleteAccessExport": doDeleteAccessExport,
|
5420
|
+
"ModifyAntiInfoLeakRuleStatus": doModifyAntiInfoLeakRuleStatus,
|
5421
|
+
"CreateAccessExport": doCreateAccessExport,
|
5422
|
+
"SearchAttackLog": doSearchAttackLog,
|
5423
|
+
"DescribeInstances": doDescribeInstances,
|
5424
|
+
"ModifyHostFlowMode": doModifyHostFlowMode,
|
5425
|
+
"ModifyApiAnalyzeStatus": doModifyApiAnalyzeStatus,
|
5426
|
+
"DescribeWafAutoDenyStatus": doDescribeWafAutoDenyStatus,
|
5427
|
+
"ModifyCustomWhiteRuleStatus": doModifyCustomWhiteRuleStatus,
|
5428
|
+
"ModifyHostMode": doModifyHostMode,
|
5429
|
+
"DescribeUserClbWafRegions": doDescribeUserClbWafRegions,
|
5430
|
+
"UpsertCCRule": doUpsertCCRule,
|
5431
|
+
"DeleteAntiFakeUrl": doDeleteAntiFakeUrl,
|
5432
|
+
"DescribeCCRuleList": doDescribeCCRuleList,
|
5433
|
+
"CreateHost": doCreateHost,
|
5434
|
+
"UpsertSession": doUpsertSession,
|
5435
|
+
"AddDomainWhiteRule": doAddDomainWhiteRule,
|
5436
|
+
"ModifyDomainIpv6Status": doModifyDomainIpv6Status,
|
4377
5437
|
|
4378
5438
|
}
|
4379
5439
|
|