yandexcloud 0.313.0__py3-none-any.whl → 0.314.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of yandexcloud might be problematic. Click here for more details.
- yandex/cloud/datasphere/v2/jobs/jobs_pb2.py +2 -2
- yandex/cloud/datasphere/v2/jobs/jobs_pb2.pyi +2 -0
- yandex/cloud/datatransfer/v1/endpoint/clickhouse_pb2.pyi +6 -2
- yandex/cloud/iam/v1/iam_token_service_pb2.py +11 -3
- yandex/cloud/iam/v1/iam_token_service_pb2.pyi +30 -0
- yandex/cloud/iam/v1/iam_token_service_pb2_grpc.py +36 -2
- yandex/cloud/iam/v1/iam_token_service_pb2_grpc.pyi +26 -6
- yandex/cloud/mdb/clickhouse/v1/cluster_service_pb2.py +152 -150
- yandex/cloud/mdb/clickhouse/v1/cluster_service_pb2.pyi +5 -1
- yandex/cloud/mdb/elasticsearch/v1/cluster_service_pb2.py +86 -84
- yandex/cloud/mdb/elasticsearch/v1/cluster_service_pb2.pyi +5 -1
- yandex/cloud/mdb/greenplum/v1/cluster_pb2.py +24 -24
- yandex/cloud/mdb/greenplum/v1/cluster_pb2.pyi +21 -3
- yandex/cloud/mdb/greenplum/v1/cluster_service_pb2.py +80 -78
- yandex/cloud/mdb/greenplum/v1/cluster_service_pb2.pyi +37 -7
- yandex/cloud/mdb/greenplum/v1/config_pb2.py +36 -30
- yandex/cloud/mdb/greenplum/v1/config_pb2.pyi +74 -4
- yandex/cloud/mdb/kafka/v1/cluster_service_pb2.py +50 -48
- yandex/cloud/mdb/kafka/v1/cluster_service_pb2.pyi +5 -1
- yandex/cloud/mdb/mongodb/v1/backup_pb2.py +4 -4
- yandex/cloud/mdb/mongodb/v1/backup_pb2.pyi +5 -1
- yandex/cloud/mdb/mongodb/v1/cluster_service_pb2.py +226 -224
- yandex/cloud/mdb/mongodb/v1/cluster_service_pb2.pyi +5 -1
- yandex/cloud/mdb/mysql/v1/cluster_service_pb2.py +88 -86
- yandex/cloud/mdb/mysql/v1/cluster_service_pb2.pyi +9 -1
- yandex/cloud/mdb/opensearch/v1/cluster_service_pb2.py +112 -110
- yandex/cloud/mdb/opensearch/v1/cluster_service_pb2.pyi +5 -1
- yandex/cloud/mdb/postgresql/v1/cluster_service_pb2.py +90 -88
- yandex/cloud/mdb/postgresql/v1/cluster_service_pb2.pyi +9 -1
- yandex/cloud/mdb/redis/v1/cluster_pb2.py +4 -4
- yandex/cloud/mdb/redis/v1/cluster_pb2.pyi +5 -1
- yandex/cloud/mdb/redis/v1/cluster_service_pb2.py +106 -104
- yandex/cloud/mdb/redis/v1/cluster_service_pb2.pyi +5 -1
- yandex/cloud/monitoring/v3/chart_widget_pb2.py +38 -36
- yandex/cloud/monitoring/v3/chart_widget_pb2.pyi +17 -3
- yandex/cloud/smartwebsecurity/v1/security_profile_pb2.py +42 -36
- yandex/cloud/smartwebsecurity/v1/security_profile_pb2.pyi +75 -9
- yandex/cloud/smartwebsecurity/v1/security_profile_service_pb2.py +18 -18
- yandex/cloud/smartwebsecurity/v1/security_profile_service_pb2.pyi +10 -2
- {yandexcloud-0.313.0.dist-info → yandexcloud-0.314.0.dist-info}/METADATA +1 -1
- {yandexcloud-0.313.0.dist-info → yandexcloud-0.314.0.dist-info}/RECORD +45 -45
- {yandexcloud-0.313.0.dist-info → yandexcloud-0.314.0.dist-info}/AUTHORS +0 -0
- {yandexcloud-0.313.0.dist-info → yandexcloud-0.314.0.dist-info}/LICENSE +0 -0
- {yandexcloud-0.313.0.dist-info → yandexcloud-0.314.0.dist-info}/WHEEL +0 -0
- {yandexcloud-0.313.0.dist-info → yandexcloud-0.314.0.dist-info}/top_level.txt +0 -0
|
@@ -15,7 +15,7 @@ from google.protobuf import timestamp_pb2 as google_dot_protobuf_dot_timestamp__
|
|
|
15
15
|
from yandex.cloud import validation_pb2 as yandex_dot_cloud_dot_validation__pb2
|
|
16
16
|
|
|
17
17
|
|
|
18
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n7yandex/cloud/smartwebsecurity/v1/security_profile.proto\x12 yandex.cloud.smartwebsecurity.v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1dyandex/cloud/validation.proto\"\
|
|
18
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n7yandex/cloud/smartwebsecurity/v1/security_profile.proto\x12 yandex.cloud.smartwebsecurity.v1\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1dyandex/cloud/validation.proto\"\xb9\x05\n\x0fSecurityProfile\x12\n\n\x02id\x18\x01 \x01(\t\x12\x11\n\tfolder_id\x18\x02 \x01(\t\x12\x8a\x01\n\x06labels\x18\x03 \x03(\x0b\x32=.yandex.cloud.smartwebsecurity.v1.SecurityProfile.LabelsEntryB;\xf2\xc7\x31\x0b[-_0-9a-z]*\x82\xc8\x31\x04<=64\x8a\xc8\x31\x04<=63\xb2\xc8\x31\x18\x12\x10[a-z][-_0-9a-z]*\x1a\x04\x31-63\x12\x38\n\x04name\x18\x04 \x01(\tB*\xe8\xc7\x31\x01\xf2\xc7\x31\x1a[a-zA-Z0-9][a-zA-Z0-9-_.]*\x8a\xc8\x31\x04\x31-50\x12\x1e\n\x0b\x64\x65scription\x18\x05 \x01(\tB\t\x8a\xc8\x31\x05<=512\x12]\n\x0e\x64\x65\x66\x61ult_action\x18\x06 \x01(\x0e\x32?.yandex.cloud.smartwebsecurity.v1.SecurityProfile.DefaultActionB\x04\xe8\xc7\x31\x01\x12\x46\n\x0esecurity_rules\x18\x07 \x03(\x0b\x32..yandex.cloud.smartwebsecurity.v1.SecurityRule\x12.\n\ncreated_at\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x10\n\x08\x63loud_id\x18\n \x01(\t\x12\x12\n\ncaptcha_id\x18\x0b \x01(\t\x12(\n advanced_rate_limiter_profile_id\x18\x0c \x01(\t\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"D\n\rDefaultAction\x12\x1e\n\x1a\x44\x45\x46\x41ULT_ACTION_UNSPECIFIED\x10\x00\x12\t\n\x05\x41LLOW\x10\x01\x12\x08\n\x04\x44\x45NY\x10\x02J\x04\x08\t\x10\n\"\xb6\x08\n\x0cSecurityRule\x12\x38\n\x04name\x18\x01 \x01(\tB*\xe8\xc7\x31\x01\xf2\xc7\x31\x1a[a-zA-Z0-9][a-zA-Z0-9-_.]*\x8a\xc8\x31\x04\x31-50\x12\x1e\n\x08priority\x18\x02 \x01(\x03\x42\x0c\xfa\xc7\x31\x08\x31-999999\x12\x0f\n\x07\x64ry_run\x18\x03 \x01(\x08\x12V\n\x0erule_condition\x18\x04 \x01(\x0b\x32<.yandex.cloud.smartwebsecurity.v1.SecurityRule.RuleConditionH\x00\x12Z\n\x10smart_protection\x18\x05 \x01(\x0b\x32>.yandex.cloud.smartwebsecurity.v1.SecurityRule.SmartProtectionH\x00\x12\x41\n\x03waf\x18\x06 \x01(\x0b\x32\x32.yandex.cloud.smartwebsecurity.v1.SecurityRule.WafH\x00\x12\x1e\n\x0b\x64\x65scription\x18\x07 \x01(\tB\t\x8a\xc8\x31\x05<=512\x1a\xdb\x01\n\rRuleCondition\x12S\n\x06\x61\x63tion\x18\x01 \x01(\x0e\x32\x43.yandex.cloud.smartwebsecurity.v1.SecurityRule.RuleCondition.Action\x12>\n\tcondition\x18\x02 \x01(\x0b\x32+.yandex.cloud.smartwebsecurity.v1.Condition\"5\n\x06\x41\x63tion\x12\x16\n\x12\x41\x43TION_UNSPECIFIED\x10\x00\x12\t\n\x05\x41LLOW\x10\x01\x12\x08\n\x04\x44\x45NY\x10\x02\x1a\xd5\x01\n\x0fSmartProtection\x12Q\n\x04mode\x18\x01 \x01(\x0e\x32\x43.yandex.cloud.smartwebsecurity.v1.SecurityRule.SmartProtection.Mode\x12>\n\tcondition\x18\x02 \x01(\x0b\x32+.yandex.cloud.smartwebsecurity.v1.Condition\"/\n\x04Mode\x12\x14\n\x10MODE_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01\x12\x07\n\x03\x41PI\x10\x02\x1a\xdb\x01\n\x03Waf\x12\x45\n\x04mode\x18\x01 \x01(\x0e\x32\x37.yandex.cloud.smartwebsecurity.v1.SecurityRule.Waf.Mode\x12>\n\tcondition\x18\x02 \x01(\x0b\x32+.yandex.cloud.smartwebsecurity.v1.Condition\x12\x1c\n\x0ewaf_profile_id\x18\x03 \x01(\tB\x04\xe8\xc7\x31\x01\"/\n\x04Mode\x12\x14\n\x10MODE_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01\x12\x07\n\x03\x41PI\x10\x02\x42\x10\n\x0erule_specifier\"\xf9\r\n\tCondition\x12O\n\tauthority\x18\x01 \x01(\x0b\x32<.yandex.cloud.smartwebsecurity.v1.Condition.AuthorityMatcher\x12R\n\x0bhttp_method\x18\x02 \x01(\x0b\x32=.yandex.cloud.smartwebsecurity.v1.Condition.HttpMethodMatcher\x12R\n\x0brequest_uri\x18\x03 \x01(\x0b\x32=.yandex.cloud.smartwebsecurity.v1.Condition.RequestUriMatcher\x12T\n\x07headers\x18\x04 \x03(\x0b\x32\x39.yandex.cloud.smartwebsecurity.v1.Condition.HeaderMatcherB\x08\x82\xc8\x31\x04<=20\x12H\n\tsource_ip\x18\x05 \x01(\x0b\x32\x35.yandex.cloud.smartwebsecurity.v1.Condition.IpMatcher\x1a\xfc\x01\n\rStringMatcher\x12 \n\x0b\x65xact_match\x18\x01 \x01(\tB\t\x8a\xc8\x31\x05\x30-255H\x00\x12$\n\x0f\x65xact_not_match\x18\x02 \x01(\tB\t\x8a\xc8\x31\x05\x30-255H\x00\x12!\n\x0cprefix_match\x18\x03 \x01(\tB\t\x8a\xc8\x31\x05\x30-255H\x00\x12%\n\x10prefix_not_match\x18\x04 \x01(\tB\t\x8a\xc8\x31\x05\x30-255H\x00\x12%\n\x10pire_regex_match\x18\x05 \x01(\tB\t\x8a\xc8\x31\x05\x30-255H\x00\x12)\n\x14pire_regex_not_match\x18\x06 \x01(\tB\t\x8a\xc8\x31\x05\x30-255H\x00\x42\x07\n\x05match\x1an\n\x11HttpMethodMatcher\x12Y\n\x0chttp_methods\x18\x01 \x03(\x0b\x32\x39.yandex.cloud.smartwebsecurity.v1.Condition.StringMatcherB\x08\x82\xc8\x31\x04<=20\x1al\n\x10\x41uthorityMatcher\x12X\n\x0b\x61uthorities\x18\x01 \x03(\x0b\x32\x39.yandex.cloud.smartwebsecurity.v1.Condition.StringMatcherB\x08\x82\xc8\x31\x04<=20\x1a\xb1\x01\n\x11RequestUriMatcher\x12G\n\x04path\x18\x01 \x01(\x0b\x32\x39.yandex.cloud.smartwebsecurity.v1.Condition.StringMatcher\x12S\n\x07queries\x18\x02 \x03(\x0b\x32\x38.yandex.cloud.smartwebsecurity.v1.Condition.QueryMatcherB\x08\x82\xc8\x31\x04<=20\x1az\n\x0cQueryMatcher\x12\x1a\n\x03key\x18\x01 \x01(\tB\r\xe8\xc7\x31\x01\x8a\xc8\x31\x05\x31-255\x12N\n\x05value\x18\x02 \x01(\x0b\x32\x39.yandex.cloud.smartwebsecurity.v1.Condition.StringMatcherB\x04\xe8\xc7\x31\x01\x1a|\n\rHeaderMatcher\x12\x1b\n\x04name\x18\x01 \x01(\tB\r\xe8\xc7\x31\x01\x8a\xc8\x31\x05\x31-255\x12N\n\x05value\x18\x02 \x01(\x0b\x32\x39.yandex.cloud.smartwebsecurity.v1.Condition.StringMatcherB\x04\xe8\xc7\x31\x01\x1a\xdf\x02\n\tIpMatcher\x12T\n\x0fip_ranges_match\x18\x01 \x01(\x0b\x32;.yandex.cloud.smartwebsecurity.v1.Condition.IpRangesMatcher\x12X\n\x13ip_ranges_not_match\x18\x02 \x01(\x0b\x32;.yandex.cloud.smartwebsecurity.v1.Condition.IpRangesMatcher\x12N\n\x0cgeo_ip_match\x18\x03 \x01(\x0b\x32\x38.yandex.cloud.smartwebsecurity.v1.Condition.GeoIpMatcher\x12R\n\x10geo_ip_not_match\x18\x04 \x01(\x0b\x32\x38.yandex.cloud.smartwebsecurity.v1.Condition.GeoIpMatcher\x1a\x31\n\x0fIpRangesMatcher\x12\x1e\n\tip_ranges\x18\x01 \x03(\tB\x0b\x82\xc8\x31\x07<=10000\x1a\x33\n\x0cGeoIpMatcher\x12#\n\tlocations\x18\x01 \x03(\tB\x10\x82\xc8\x31\x03>=1\x8a\xc8\x31\x01\x32\x90\xc8\x31\x01\x42}\n$yandex.cloud.api.smartwebsecurity.v1ZUgithub.com/yandex-cloud/go-genproto/yandex/cloud/smartwebsecurity/v1;smartwebsecurityb\x06proto3')
|
|
19
19
|
|
|
20
20
|
_globals = globals()
|
|
21
21
|
_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
|
|
@@ -33,6 +33,8 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
33
33
|
_SECURITYPROFILE.fields_by_name['description']._serialized_options = b'\212\3101\005<=512'
|
|
34
34
|
_SECURITYPROFILE.fields_by_name['default_action']._options = None
|
|
35
35
|
_SECURITYPROFILE.fields_by_name['default_action']._serialized_options = b'\350\3071\001'
|
|
36
|
+
_SECURITYRULE_WAF.fields_by_name['waf_profile_id']._options = None
|
|
37
|
+
_SECURITYRULE_WAF.fields_by_name['waf_profile_id']._serialized_options = b'\350\3071\001'
|
|
36
38
|
_SECURITYRULE.fields_by_name['name']._options = None
|
|
37
39
|
_SECURITYRULE.fields_by_name['name']._serialized_options = b'\350\3071\001\362\3071\032[a-zA-Z0-9][a-zA-Z0-9-_.]*\212\3101\0041-50'
|
|
38
40
|
_SECURITYRULE.fields_by_name['priority']._options = None
|
|
@@ -72,39 +74,43 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
72
74
|
_CONDITION.fields_by_name['headers']._options = None
|
|
73
75
|
_CONDITION.fields_by_name['headers']._serialized_options = b'\202\3101\004<=20'
|
|
74
76
|
_globals['_SECURITYPROFILE']._serialized_start=158
|
|
75
|
-
_globals['_SECURITYPROFILE']._serialized_end=
|
|
76
|
-
_globals['_SECURITYPROFILE_LABELSENTRY']._serialized_start=
|
|
77
|
-
_globals['_SECURITYPROFILE_LABELSENTRY']._serialized_end=
|
|
78
|
-
_globals['_SECURITYPROFILE_DEFAULTACTION']._serialized_start=
|
|
79
|
-
_globals['_SECURITYPROFILE_DEFAULTACTION']._serialized_end=
|
|
80
|
-
_globals['_SECURITYRULE']._serialized_start=
|
|
81
|
-
_globals['_SECURITYRULE']._serialized_end=
|
|
82
|
-
_globals['_SECURITYRULE_RULECONDITION']._serialized_start=
|
|
83
|
-
_globals['_SECURITYRULE_RULECONDITION']._serialized_end=
|
|
84
|
-
_globals['_SECURITYRULE_RULECONDITION_ACTION']._serialized_start=
|
|
85
|
-
_globals['_SECURITYRULE_RULECONDITION_ACTION']._serialized_end=
|
|
86
|
-
_globals['_SECURITYRULE_SMARTPROTECTION']._serialized_start=
|
|
87
|
-
_globals['_SECURITYRULE_SMARTPROTECTION']._serialized_end=
|
|
88
|
-
_globals['_SECURITYRULE_SMARTPROTECTION_MODE']._serialized_start=
|
|
89
|
-
_globals['_SECURITYRULE_SMARTPROTECTION_MODE']._serialized_end=
|
|
90
|
-
_globals['
|
|
91
|
-
_globals['
|
|
92
|
-
_globals['
|
|
93
|
-
_globals['
|
|
94
|
-
_globals['
|
|
95
|
-
_globals['
|
|
96
|
-
_globals['
|
|
97
|
-
_globals['
|
|
98
|
-
_globals['
|
|
99
|
-
_globals['
|
|
100
|
-
_globals['
|
|
101
|
-
_globals['
|
|
102
|
-
_globals['
|
|
103
|
-
_globals['
|
|
104
|
-
_globals['
|
|
105
|
-
_globals['
|
|
106
|
-
_globals['
|
|
107
|
-
_globals['
|
|
108
|
-
_globals['
|
|
109
|
-
_globals['
|
|
77
|
+
_globals['_SECURITYPROFILE']._serialized_end=855
|
|
78
|
+
_globals['_SECURITYPROFILE_LABELSENTRY']._serialized_start=734
|
|
79
|
+
_globals['_SECURITYPROFILE_LABELSENTRY']._serialized_end=779
|
|
80
|
+
_globals['_SECURITYPROFILE_DEFAULTACTION']._serialized_start=781
|
|
81
|
+
_globals['_SECURITYPROFILE_DEFAULTACTION']._serialized_end=849
|
|
82
|
+
_globals['_SECURITYRULE']._serialized_start=858
|
|
83
|
+
_globals['_SECURITYRULE']._serialized_end=1936
|
|
84
|
+
_globals['_SECURITYRULE_RULECONDITION']._serialized_start=1261
|
|
85
|
+
_globals['_SECURITYRULE_RULECONDITION']._serialized_end=1480
|
|
86
|
+
_globals['_SECURITYRULE_RULECONDITION_ACTION']._serialized_start=1427
|
|
87
|
+
_globals['_SECURITYRULE_RULECONDITION_ACTION']._serialized_end=1480
|
|
88
|
+
_globals['_SECURITYRULE_SMARTPROTECTION']._serialized_start=1483
|
|
89
|
+
_globals['_SECURITYRULE_SMARTPROTECTION']._serialized_end=1696
|
|
90
|
+
_globals['_SECURITYRULE_SMARTPROTECTION_MODE']._serialized_start=1649
|
|
91
|
+
_globals['_SECURITYRULE_SMARTPROTECTION_MODE']._serialized_end=1696
|
|
92
|
+
_globals['_SECURITYRULE_WAF']._serialized_start=1699
|
|
93
|
+
_globals['_SECURITYRULE_WAF']._serialized_end=1918
|
|
94
|
+
_globals['_SECURITYRULE_WAF_MODE']._serialized_start=1649
|
|
95
|
+
_globals['_SECURITYRULE_WAF_MODE']._serialized_end=1696
|
|
96
|
+
_globals['_CONDITION']._serialized_start=1939
|
|
97
|
+
_globals['_CONDITION']._serialized_end=3724
|
|
98
|
+
_globals['_CONDITION_STRINGMATCHER']._serialized_start=2362
|
|
99
|
+
_globals['_CONDITION_STRINGMATCHER']._serialized_end=2614
|
|
100
|
+
_globals['_CONDITION_HTTPMETHODMATCHER']._serialized_start=2616
|
|
101
|
+
_globals['_CONDITION_HTTPMETHODMATCHER']._serialized_end=2726
|
|
102
|
+
_globals['_CONDITION_AUTHORITYMATCHER']._serialized_start=2728
|
|
103
|
+
_globals['_CONDITION_AUTHORITYMATCHER']._serialized_end=2836
|
|
104
|
+
_globals['_CONDITION_REQUESTURIMATCHER']._serialized_start=2839
|
|
105
|
+
_globals['_CONDITION_REQUESTURIMATCHER']._serialized_end=3016
|
|
106
|
+
_globals['_CONDITION_QUERYMATCHER']._serialized_start=3018
|
|
107
|
+
_globals['_CONDITION_QUERYMATCHER']._serialized_end=3140
|
|
108
|
+
_globals['_CONDITION_HEADERMATCHER']._serialized_start=3142
|
|
109
|
+
_globals['_CONDITION_HEADERMATCHER']._serialized_end=3266
|
|
110
|
+
_globals['_CONDITION_IPMATCHER']._serialized_start=3269
|
|
111
|
+
_globals['_CONDITION_IPMATCHER']._serialized_end=3620
|
|
112
|
+
_globals['_CONDITION_IPRANGESMATCHER']._serialized_start=3622
|
|
113
|
+
_globals['_CONDITION_IPRANGESMATCHER']._serialized_end=3671
|
|
114
|
+
_globals['_CONDITION_GEOIPMATCHER']._serialized_start=3673
|
|
115
|
+
_globals['_CONDITION_GEOIPMATCHER']._serialized_end=3724
|
|
110
116
|
# @@protoc_insertion_point(module_scope)
|
|
@@ -65,28 +65,31 @@ class SecurityProfile(google.protobuf.message.Message):
|
|
|
65
65
|
|
|
66
66
|
ID_FIELD_NUMBER: builtins.int
|
|
67
67
|
FOLDER_ID_FIELD_NUMBER: builtins.int
|
|
68
|
-
CLOUD_ID_FIELD_NUMBER: builtins.int
|
|
69
68
|
LABELS_FIELD_NUMBER: builtins.int
|
|
70
69
|
NAME_FIELD_NUMBER: builtins.int
|
|
71
70
|
DESCRIPTION_FIELD_NUMBER: builtins.int
|
|
72
71
|
DEFAULT_ACTION_FIELD_NUMBER: builtins.int
|
|
73
72
|
SECURITY_RULES_FIELD_NUMBER: builtins.int
|
|
74
73
|
CREATED_AT_FIELD_NUMBER: builtins.int
|
|
74
|
+
CLOUD_ID_FIELD_NUMBER: builtins.int
|
|
75
75
|
CAPTCHA_ID_FIELD_NUMBER: builtins.int
|
|
76
|
+
ADVANCED_RATE_LIMITER_PROFILE_ID_FIELD_NUMBER: builtins.int
|
|
76
77
|
id: builtins.str
|
|
77
78
|
"""ID of the security profile."""
|
|
78
79
|
folder_id: builtins.str
|
|
79
80
|
"""ID of the folder that the security profile belongs to."""
|
|
80
|
-
cloud_id: builtins.str
|
|
81
|
-
"""ID of the cloud that the security profile belongs to."""
|
|
82
81
|
name: builtins.str
|
|
83
82
|
"""Name of the security profile. The name is unique within the folder. 1-50 characters long."""
|
|
84
83
|
description: builtins.str
|
|
85
84
|
"""Optional description of the security profile."""
|
|
86
85
|
default_action: global___SecurityProfile.DefaultAction.ValueType
|
|
87
86
|
"""Action to perform if none of rules matched."""
|
|
87
|
+
cloud_id: builtins.str
|
|
88
|
+
"""ID of the cloud that the security profile belongs to."""
|
|
88
89
|
captcha_id: builtins.str
|
|
89
90
|
"""Captcha ID to use with this security profile. Set empty to use default."""
|
|
91
|
+
advanced_rate_limiter_profile_id: builtins.str
|
|
92
|
+
"""Advanced rate limiter profile ID to use with this security profile. Set empty to use default."""
|
|
90
93
|
@property
|
|
91
94
|
def labels(self) -> google.protobuf.internal.containers.ScalarMap[builtins.str, builtins.str]:
|
|
92
95
|
"""Labels as `` key:value `` pairs. Maximum of 64 per resource."""
|
|
@@ -104,17 +107,18 @@ class SecurityProfile(google.protobuf.message.Message):
|
|
|
104
107
|
*,
|
|
105
108
|
id: builtins.str = ...,
|
|
106
109
|
folder_id: builtins.str = ...,
|
|
107
|
-
cloud_id: builtins.str = ...,
|
|
108
110
|
labels: collections.abc.Mapping[builtins.str, builtins.str] | None = ...,
|
|
109
111
|
name: builtins.str = ...,
|
|
110
112
|
description: builtins.str = ...,
|
|
111
113
|
default_action: global___SecurityProfile.DefaultAction.ValueType = ...,
|
|
112
114
|
security_rules: collections.abc.Iterable[global___SecurityRule] | None = ...,
|
|
113
115
|
created_at: google.protobuf.timestamp_pb2.Timestamp | None = ...,
|
|
116
|
+
cloud_id: builtins.str = ...,
|
|
114
117
|
captcha_id: builtins.str = ...,
|
|
118
|
+
advanced_rate_limiter_profile_id: builtins.str = ...,
|
|
115
119
|
) -> None: ...
|
|
116
120
|
def HasField(self, field_name: typing.Literal["created_at", b"created_at"]) -> builtins.bool: ...
|
|
117
|
-
def ClearField(self, field_name: typing.Literal["captcha_id", b"captcha_id", "cloud_id", b"cloud_id", "created_at", b"created_at", "default_action", b"default_action", "description", b"description", "folder_id", b"folder_id", "id", b"id", "labels", b"labels", "name", b"name", "security_rules", b"security_rules"]) -> None: ...
|
|
121
|
+
def ClearField(self, field_name: typing.Literal["advanced_rate_limiter_profile_id", b"advanced_rate_limiter_profile_id", "captcha_id", b"captcha_id", "cloud_id", b"cloud_id", "created_at", b"created_at", "default_action", b"default_action", "description", b"description", "folder_id", b"folder_id", "id", b"id", "labels", b"labels", "name", b"name", "security_rules", b"security_rules"]) -> None: ...
|
|
118
122
|
|
|
119
123
|
global___SecurityProfile = SecurityProfile
|
|
120
124
|
|
|
@@ -220,14 +224,71 @@ class SecurityRule(google.protobuf.message.Message):
|
|
|
220
224
|
def HasField(self, field_name: typing.Literal["condition", b"condition"]) -> builtins.bool: ...
|
|
221
225
|
def ClearField(self, field_name: typing.Literal["condition", b"condition", "mode", b"mode"]) -> None: ...
|
|
222
226
|
|
|
227
|
+
@typing.final
|
|
228
|
+
class Waf(google.protobuf.message.Message):
|
|
229
|
+
"""Waf object."""
|
|
230
|
+
|
|
231
|
+
DESCRIPTOR: google.protobuf.descriptor.Descriptor
|
|
232
|
+
|
|
233
|
+
class _Mode:
|
|
234
|
+
ValueType = typing.NewType("ValueType", builtins.int)
|
|
235
|
+
V: typing_extensions.TypeAlias = ValueType
|
|
236
|
+
|
|
237
|
+
class _ModeEnumTypeWrapper(google.protobuf.internal.enum_type_wrapper._EnumTypeWrapper[SecurityRule.Waf._Mode.ValueType], builtins.type):
|
|
238
|
+
DESCRIPTOR: google.protobuf.descriptor.EnumDescriptor
|
|
239
|
+
MODE_UNSPECIFIED: SecurityRule.Waf._Mode.ValueType # 0
|
|
240
|
+
FULL: SecurityRule.Waf._Mode.ValueType # 1
|
|
241
|
+
"""Full protection means that the traffic will be checked based on ML models and behavioral analysis,
|
|
242
|
+
with suspicious requests being sent to SmartCaptcha.
|
|
243
|
+
"""
|
|
244
|
+
API: SecurityRule.Waf._Mode.ValueType # 2
|
|
245
|
+
"""API protection means checking the traffic based on ML models and behavioral analysis without sending suspicious
|
|
246
|
+
requests to SmartCaptcha. The suspicious requests will be blocked.
|
|
247
|
+
"""
|
|
248
|
+
|
|
249
|
+
class Mode(_Mode, metaclass=_ModeEnumTypeWrapper):
|
|
250
|
+
"""Mode of protection."""
|
|
251
|
+
|
|
252
|
+
MODE_UNSPECIFIED: SecurityRule.Waf.Mode.ValueType # 0
|
|
253
|
+
FULL: SecurityRule.Waf.Mode.ValueType # 1
|
|
254
|
+
"""Full protection means that the traffic will be checked based on ML models and behavioral analysis,
|
|
255
|
+
with suspicious requests being sent to SmartCaptcha.
|
|
256
|
+
"""
|
|
257
|
+
API: SecurityRule.Waf.Mode.ValueType # 2
|
|
258
|
+
"""API protection means checking the traffic based on ML models and behavioral analysis without sending suspicious
|
|
259
|
+
requests to SmartCaptcha. The suspicious requests will be blocked.
|
|
260
|
+
"""
|
|
261
|
+
|
|
262
|
+
MODE_FIELD_NUMBER: builtins.int
|
|
263
|
+
CONDITION_FIELD_NUMBER: builtins.int
|
|
264
|
+
WAF_PROFILE_ID_FIELD_NUMBER: builtins.int
|
|
265
|
+
mode: global___SecurityRule.Waf.Mode.ValueType
|
|
266
|
+
"""Mode of protection."""
|
|
267
|
+
waf_profile_id: builtins.str
|
|
268
|
+
"""ID of WAF profile to use in this rule."""
|
|
269
|
+
@property
|
|
270
|
+
def condition(self) -> global___Condition:
|
|
271
|
+
"""The condition for matching the rule."""
|
|
272
|
+
|
|
273
|
+
def __init__(
|
|
274
|
+
self,
|
|
275
|
+
*,
|
|
276
|
+
mode: global___SecurityRule.Waf.Mode.ValueType = ...,
|
|
277
|
+
condition: global___Condition | None = ...,
|
|
278
|
+
waf_profile_id: builtins.str = ...,
|
|
279
|
+
) -> None: ...
|
|
280
|
+
def HasField(self, field_name: typing.Literal["condition", b"condition"]) -> builtins.bool: ...
|
|
281
|
+
def ClearField(self, field_name: typing.Literal["condition", b"condition", "mode", b"mode", "waf_profile_id", b"waf_profile_id"]) -> None: ...
|
|
282
|
+
|
|
223
283
|
NAME_FIELD_NUMBER: builtins.int
|
|
224
284
|
PRIORITY_FIELD_NUMBER: builtins.int
|
|
225
285
|
DRY_RUN_FIELD_NUMBER: builtins.int
|
|
226
286
|
RULE_CONDITION_FIELD_NUMBER: builtins.int
|
|
227
287
|
SMART_PROTECTION_FIELD_NUMBER: builtins.int
|
|
288
|
+
WAF_FIELD_NUMBER: builtins.int
|
|
228
289
|
DESCRIPTION_FIELD_NUMBER: builtins.int
|
|
229
290
|
name: builtins.str
|
|
230
|
-
"""Name of the rule. The name is unique within the
|
|
291
|
+
"""Name of the rule. The name is unique within the security profile. 1-50 characters long."""
|
|
231
292
|
priority: builtins.int
|
|
232
293
|
"""Determines the priority for checking the incoming traffic.
|
|
233
294
|
Enter an integer within the range of 1 and 999999.
|
|
@@ -250,6 +311,10 @@ class SecurityRule(google.protobuf.message.Message):
|
|
|
250
311
|
def smart_protection(self) -> global___SecurityRule.SmartProtection:
|
|
251
312
|
"""Smart Protection rule, see [Smart Protection rules](/docs/smartwebsecurity/concepts/rules#smart-protection-rules)."""
|
|
252
313
|
|
|
314
|
+
@property
|
|
315
|
+
def waf(self) -> global___SecurityRule.Waf:
|
|
316
|
+
"""Web Application Firewall (WAF) rule, see [WAF rules](/docs/smartwebsecurity/concepts/rules#waf-rules)."""
|
|
317
|
+
|
|
253
318
|
def __init__(
|
|
254
319
|
self,
|
|
255
320
|
*,
|
|
@@ -258,11 +323,12 @@ class SecurityRule(google.protobuf.message.Message):
|
|
|
258
323
|
dry_run: builtins.bool = ...,
|
|
259
324
|
rule_condition: global___SecurityRule.RuleCondition | None = ...,
|
|
260
325
|
smart_protection: global___SecurityRule.SmartProtection | None = ...,
|
|
326
|
+
waf: global___SecurityRule.Waf | None = ...,
|
|
261
327
|
description: builtins.str = ...,
|
|
262
328
|
) -> None: ...
|
|
263
|
-
def HasField(self, field_name: typing.Literal["rule_condition", b"rule_condition", "rule_specifier", b"rule_specifier", "smart_protection", b"smart_protection"]) -> builtins.bool: ...
|
|
264
|
-
def ClearField(self, field_name: typing.Literal["description", b"description", "dry_run", b"dry_run", "name", b"name", "priority", b"priority", "rule_condition", b"rule_condition", "rule_specifier", b"rule_specifier", "smart_protection", b"smart_protection"]) -> None: ...
|
|
265
|
-
def WhichOneof(self, oneof_group: typing.Literal["rule_specifier", b"rule_specifier"]) -> typing.Literal["rule_condition", "smart_protection"] | None: ...
|
|
329
|
+
def HasField(self, field_name: typing.Literal["rule_condition", b"rule_condition", "rule_specifier", b"rule_specifier", "smart_protection", b"smart_protection", "waf", b"waf"]) -> builtins.bool: ...
|
|
330
|
+
def ClearField(self, field_name: typing.Literal["description", b"description", "dry_run", b"dry_run", "name", b"name", "priority", b"priority", "rule_condition", b"rule_condition", "rule_specifier", b"rule_specifier", "smart_protection", b"smart_protection", "waf", b"waf"]) -> None: ...
|
|
331
|
+
def WhichOneof(self, oneof_group: typing.Literal["rule_specifier", b"rule_specifier"]) -> typing.Literal["rule_condition", "smart_protection", "waf"] | None: ...
|
|
266
332
|
|
|
267
333
|
global___SecurityRule = SecurityRule
|
|
268
334
|
|
|
@@ -19,7 +19,7 @@ from yandex.cloud.operation import operation_pb2 as yandex_dot_cloud_dot_operati
|
|
|
19
19
|
from yandex.cloud.smartwebsecurity.v1 import security_profile_pb2 as yandex_dot_cloud_dot_smartwebsecurity_dot_v1_dot_security__profile__pb2
|
|
20
20
|
|
|
21
21
|
|
|
22
|
-
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n?yandex/cloud/smartwebsecurity/v1/security_profile_service.proto\x12 yandex.cloud.smartwebsecurity.v1\x1a\x1cgoogle/api/annotations.proto\x1a google/protobuf/field_mask.proto\x1a yandex/cloud/api/operation.proto\x1a\x1dyandex/cloud/validation.proto\x1a&yandex/cloud/operation/operation.proto\x1a\x37yandex/cloud/smartwebsecurity/v1/security_profile.proto\">\n\x19GetSecurityProfileRequest\x12!\n\x13security_profile_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\"6\n\x1bListSecurityProfilesRequest\x12\x17\n\tfolder_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\"l\n\x1cListSecurityProfilesResponse\x12L\n\x11security_profiles\x18\x01 \x03(\x0b\x32\x31.yandex.cloud.smartwebsecurity.v1.SecurityProfile\"\
|
|
22
|
+
DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n?yandex/cloud/smartwebsecurity/v1/security_profile_service.proto\x12 yandex.cloud.smartwebsecurity.v1\x1a\x1cgoogle/api/annotations.proto\x1a google/protobuf/field_mask.proto\x1a yandex/cloud/api/operation.proto\x1a\x1dyandex/cloud/validation.proto\x1a&yandex/cloud/operation/operation.proto\x1a\x37yandex/cloud/smartwebsecurity/v1/security_profile.proto\">\n\x19GetSecurityProfileRequest\x12!\n\x13security_profile_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\"6\n\x1bListSecurityProfilesRequest\x12\x17\n\tfolder_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\"l\n\x1cListSecurityProfilesResponse\x12L\n\x11security_profiles\x18\x01 \x03(\x0b\x32\x31.yandex.cloud.smartwebsecurity.v1.SecurityProfile\"\xc4\x03\n\x1c\x43reateSecurityProfileRequest\x12\x17\n\tfolder_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\x12Z\n\x06labels\x18\x02 \x03(\x0b\x32J.yandex.cloud.smartwebsecurity.v1.CreateSecurityProfileRequest.LabelsEntry\x12\x0c\n\x04name\x18\x03 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x04 \x01(\t\x12W\n\x0e\x64\x65\x66\x61ult_action\x18\x05 \x01(\x0e\x32?.yandex.cloud.smartwebsecurity.v1.SecurityProfile.DefaultAction\x12\x46\n\x0esecurity_rules\x18\x06 \x03(\x0b\x32..yandex.cloud.smartwebsecurity.v1.SecurityRule\x12\x12\n\ncaptcha_id\x18\x07 \x01(\t\x12(\n advanced_rate_limiter_profile_id\x18\x08 \x01(\t\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"<\n\x1d\x43reateSecurityProfileMetadata\x12\x1b\n\x13security_profile_id\x18\x01 \x01(\t\"\xff\x03\n\x1cUpdateSecurityProfileRequest\x12!\n\x13security_profile_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\x12/\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMask\x12Z\n\x06labels\x18\x03 \x03(\x0b\x32J.yandex.cloud.smartwebsecurity.v1.UpdateSecurityProfileRequest.LabelsEntry\x12\x0c\n\x04name\x18\x04 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x05 \x01(\t\x12W\n\x0e\x64\x65\x66\x61ult_action\x18\x06 \x01(\x0e\x32?.yandex.cloud.smartwebsecurity.v1.SecurityProfile.DefaultAction\x12\x46\n\x0esecurity_rules\x18\x07 \x03(\x0b\x32..yandex.cloud.smartwebsecurity.v1.SecurityRule\x12\x12\n\ncaptcha_id\x18\x08 \x01(\t\x12(\n advanced_rate_limiter_profile_id\x18\t \x01(\t\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"<\n\x1dUpdateSecurityProfileMetadata\x12\x1b\n\x13security_profile_id\x18\x01 \x01(\t\"A\n\x1c\x44\x65leteSecurityProfileRequest\x12!\n\x13security_profile_id\x18\x01 \x01(\tB\x04\xe8\xc7\x31\x01\"<\n\x1d\x44\x65leteSecurityProfileMetadata\x12\x1b\n\x13security_profile_id\x18\x01 \x01(\t2\xb7\x08\n\x16SecurityProfileService\x12\xba\x01\n\x03Get\x12;.yandex.cloud.smartwebsecurity.v1.GetSecurityProfileRequest\x1a\x31.yandex.cloud.smartwebsecurity.v1.SecurityProfile\"C\x82\xd3\xe4\x93\x02=\x12;/smartwebsecurity/v1/securityProfiles/{security_profile_id}\x12\xb4\x01\n\x04List\x12=.yandex.cloud.smartwebsecurity.v1.ListSecurityProfilesRequest\x1a>.yandex.cloud.smartwebsecurity.v1.ListSecurityProfilesResponse\"-\x82\xd3\xe4\x93\x02\'\x12%/smartwebsecurity/v1/securityProfiles\x12\xd1\x01\n\x06\x43reate\x12>.yandex.cloud.smartwebsecurity.v1.CreateSecurityProfileRequest\x1a!.yandex.cloud.operation.Operation\"d\xb2\xd2*0\n\x1d\x43reateSecurityProfileMetadata\x12\x0fSecurityProfile\x82\xd3\xe4\x93\x02*\"%/smartwebsecurity/v1/securityProfiles:\x01*\x12\xe7\x01\n\x06Update\x12>.yandex.cloud.smartwebsecurity.v1.UpdateSecurityProfileRequest\x1a!.yandex.cloud.operation.Operation\"z\xb2\xd2*0\n\x1dUpdateSecurityProfileMetadata\x12\x0fSecurityProfile\x82\xd3\xe4\x93\x02@2;/smartwebsecurity/v1/securityProfiles/{security_profile_id}:\x01*\x12\xea\x01\n\x06\x44\x65lete\x12>.yandex.cloud.smartwebsecurity.v1.DeleteSecurityProfileRequest\x1a!.yandex.cloud.operation.Operation\"}\xb2\xd2*6\n\x1d\x44\x65leteSecurityProfileMetadata\x12\x15google.protobuf.Empty\x82\xd3\xe4\x93\x02=*;/smartwebsecurity/v1/securityProfiles/{security_profile_id}B}\n$yandex.cloud.api.smartwebsecurity.v1ZUgithub.com/yandex-cloud/go-genproto/yandex/cloud/smartwebsecurity/v1;smartwebsecurityb\x06proto3')
|
|
23
23
|
|
|
24
24
|
_globals = globals()
|
|
25
25
|
_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
|
|
@@ -58,21 +58,21 @@ if _descriptor._USE_C_DESCRIPTORS == False:
|
|
|
58
58
|
_globals['_LISTSECURITYPROFILESRESPONSE']._serialized_start=447
|
|
59
59
|
_globals['_LISTSECURITYPROFILESRESPONSE']._serialized_end=555
|
|
60
60
|
_globals['_CREATESECURITYPROFILEREQUEST']._serialized_start=558
|
|
61
|
-
_globals['_CREATESECURITYPROFILEREQUEST']._serialized_end=
|
|
62
|
-
_globals['_CREATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_start=
|
|
63
|
-
_globals['_CREATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_end=
|
|
64
|
-
_globals['_CREATESECURITYPROFILEMETADATA']._serialized_start=
|
|
65
|
-
_globals['_CREATESECURITYPROFILEMETADATA']._serialized_end=
|
|
66
|
-
_globals['_UPDATESECURITYPROFILEREQUEST']._serialized_start=
|
|
67
|
-
_globals['_UPDATESECURITYPROFILEREQUEST']._serialized_end=
|
|
68
|
-
_globals['_UPDATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_start=
|
|
69
|
-
_globals['_UPDATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_end=
|
|
70
|
-
_globals['_UPDATESECURITYPROFILEMETADATA']._serialized_start=
|
|
71
|
-
_globals['_UPDATESECURITYPROFILEMETADATA']._serialized_end=
|
|
72
|
-
_globals['_DELETESECURITYPROFILEREQUEST']._serialized_start=
|
|
73
|
-
_globals['_DELETESECURITYPROFILEREQUEST']._serialized_end=
|
|
74
|
-
_globals['_DELETESECURITYPROFILEMETADATA']._serialized_start=
|
|
75
|
-
_globals['_DELETESECURITYPROFILEMETADATA']._serialized_end=
|
|
76
|
-
_globals['_SECURITYPROFILESERVICE']._serialized_start=
|
|
77
|
-
_globals['_SECURITYPROFILESERVICE']._serialized_end=
|
|
61
|
+
_globals['_CREATESECURITYPROFILEREQUEST']._serialized_end=1010
|
|
62
|
+
_globals['_CREATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_start=965
|
|
63
|
+
_globals['_CREATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_end=1010
|
|
64
|
+
_globals['_CREATESECURITYPROFILEMETADATA']._serialized_start=1012
|
|
65
|
+
_globals['_CREATESECURITYPROFILEMETADATA']._serialized_end=1072
|
|
66
|
+
_globals['_UPDATESECURITYPROFILEREQUEST']._serialized_start=1075
|
|
67
|
+
_globals['_UPDATESECURITYPROFILEREQUEST']._serialized_end=1586
|
|
68
|
+
_globals['_UPDATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_start=965
|
|
69
|
+
_globals['_UPDATESECURITYPROFILEREQUEST_LABELSENTRY']._serialized_end=1010
|
|
70
|
+
_globals['_UPDATESECURITYPROFILEMETADATA']._serialized_start=1588
|
|
71
|
+
_globals['_UPDATESECURITYPROFILEMETADATA']._serialized_end=1648
|
|
72
|
+
_globals['_DELETESECURITYPROFILEREQUEST']._serialized_start=1650
|
|
73
|
+
_globals['_DELETESECURITYPROFILEREQUEST']._serialized_end=1715
|
|
74
|
+
_globals['_DELETESECURITYPROFILEMETADATA']._serialized_start=1717
|
|
75
|
+
_globals['_DELETESECURITYPROFILEMETADATA']._serialized_end=1777
|
|
76
|
+
_globals['_SECURITYPROFILESERVICE']._serialized_start=1780
|
|
77
|
+
_globals['_SECURITYPROFILESERVICE']._serialized_end=2859
|
|
78
78
|
# @@protoc_insertion_point(module_scope)
|
|
@@ -95,6 +95,7 @@ class CreateSecurityProfileRequest(google.protobuf.message.Message):
|
|
|
95
95
|
DEFAULT_ACTION_FIELD_NUMBER: builtins.int
|
|
96
96
|
SECURITY_RULES_FIELD_NUMBER: builtins.int
|
|
97
97
|
CAPTCHA_ID_FIELD_NUMBER: builtins.int
|
|
98
|
+
ADVANCED_RATE_LIMITER_PROFILE_ID_FIELD_NUMBER: builtins.int
|
|
98
99
|
folder_id: builtins.str
|
|
99
100
|
"""ID of the folder to create a security profile in."""
|
|
100
101
|
name: builtins.str
|
|
@@ -105,6 +106,8 @@ class CreateSecurityProfileRequest(google.protobuf.message.Message):
|
|
|
105
106
|
"""Action to perform if none of rules matched."""
|
|
106
107
|
captcha_id: builtins.str
|
|
107
108
|
"""Captcha ID to use with this security profile. Set empty to use default."""
|
|
109
|
+
advanced_rate_limiter_profile_id: builtins.str
|
|
110
|
+
"""Advanced rate limiter profile ID to use with this security profile. Set empty to use default."""
|
|
108
111
|
@property
|
|
109
112
|
def labels(self) -> google.protobuf.internal.containers.ScalarMap[builtins.str, builtins.str]:
|
|
110
113
|
"""Labels as `` key:value `` pairs. Maximum of 64 per resource."""
|
|
@@ -123,8 +126,9 @@ class CreateSecurityProfileRequest(google.protobuf.message.Message):
|
|
|
123
126
|
default_action: yandex.cloud.smartwebsecurity.v1.security_profile_pb2.SecurityProfile.DefaultAction.ValueType = ...,
|
|
124
127
|
security_rules: collections.abc.Iterable[yandex.cloud.smartwebsecurity.v1.security_profile_pb2.SecurityRule] | None = ...,
|
|
125
128
|
captcha_id: builtins.str = ...,
|
|
129
|
+
advanced_rate_limiter_profile_id: builtins.str = ...,
|
|
126
130
|
) -> None: ...
|
|
127
|
-
def ClearField(self, field_name: typing.Literal["captcha_id", b"captcha_id", "default_action", b"default_action", "description", b"description", "folder_id", b"folder_id", "labels", b"labels", "name", b"name", "security_rules", b"security_rules"]) -> None: ...
|
|
131
|
+
def ClearField(self, field_name: typing.Literal["advanced_rate_limiter_profile_id", b"advanced_rate_limiter_profile_id", "captcha_id", b"captcha_id", "default_action", b"default_action", "description", b"description", "folder_id", b"folder_id", "labels", b"labels", "name", b"name", "security_rules", b"security_rules"]) -> None: ...
|
|
128
132
|
|
|
129
133
|
global___CreateSecurityProfileRequest = CreateSecurityProfileRequest
|
|
130
134
|
|
|
@@ -172,6 +176,7 @@ class UpdateSecurityProfileRequest(google.protobuf.message.Message):
|
|
|
172
176
|
DEFAULT_ACTION_FIELD_NUMBER: builtins.int
|
|
173
177
|
SECURITY_RULES_FIELD_NUMBER: builtins.int
|
|
174
178
|
CAPTCHA_ID_FIELD_NUMBER: builtins.int
|
|
179
|
+
ADVANCED_RATE_LIMITER_PROFILE_ID_FIELD_NUMBER: builtins.int
|
|
175
180
|
security_profile_id: builtins.str
|
|
176
181
|
"""ID of the security profile to update."""
|
|
177
182
|
name: builtins.str
|
|
@@ -182,6 +187,8 @@ class UpdateSecurityProfileRequest(google.protobuf.message.Message):
|
|
|
182
187
|
"""Action to perform if none of rules matched."""
|
|
183
188
|
captcha_id: builtins.str
|
|
184
189
|
"""Captcha ID to use with this security profile. Set empty to use default."""
|
|
190
|
+
advanced_rate_limiter_profile_id: builtins.str
|
|
191
|
+
"""Advanced rate limiter profile ID to use with this security profile. Set empty to use default."""
|
|
185
192
|
@property
|
|
186
193
|
def update_mask(self) -> google.protobuf.field_mask_pb2.FieldMask:
|
|
187
194
|
"""Field mask that specifies which fields of the SecurityProfile resource are going to be updated."""
|
|
@@ -205,9 +212,10 @@ class UpdateSecurityProfileRequest(google.protobuf.message.Message):
|
|
|
205
212
|
default_action: yandex.cloud.smartwebsecurity.v1.security_profile_pb2.SecurityProfile.DefaultAction.ValueType = ...,
|
|
206
213
|
security_rules: collections.abc.Iterable[yandex.cloud.smartwebsecurity.v1.security_profile_pb2.SecurityRule] | None = ...,
|
|
207
214
|
captcha_id: builtins.str = ...,
|
|
215
|
+
advanced_rate_limiter_profile_id: builtins.str = ...,
|
|
208
216
|
) -> None: ...
|
|
209
217
|
def HasField(self, field_name: typing.Literal["update_mask", b"update_mask"]) -> builtins.bool: ...
|
|
210
|
-
def ClearField(self, field_name: typing.Literal["captcha_id", b"captcha_id", "default_action", b"default_action", "description", b"description", "labels", b"labels", "name", b"name", "security_profile_id", b"security_profile_id", "security_rules", b"security_rules", "update_mask", b"update_mask"]) -> None: ...
|
|
218
|
+
def ClearField(self, field_name: typing.Literal["advanced_rate_limiter_profile_id", b"advanced_rate_limiter_profile_id", "captcha_id", b"captcha_id", "default_action", b"default_action", "description", b"description", "labels", b"labels", "name", b"name", "security_profile_id", b"security_profile_id", "security_rules", b"security_rules", "update_mask", b"update_mask"]) -> None: ...
|
|
211
219
|
|
|
212
220
|
global___UpdateSecurityProfileRequest = UpdateSecurityProfileRequest
|
|
213
221
|
|