Skip to content

Commit 497cfd4

Browse files
committed
Update API CreateCycleTask: update response param.
1 parent cf1b79e commit 497cfd4

File tree

2 files changed

+136
-32
lines changed

2 files changed

+136
-32
lines changed

sas-20181203/package.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "@alicloud/sas20181203",
3-
"version": "4.3.2",
3+
"version": "4.3.3",
44
"description": "",
55
"main": "dist/client.js",
66
"scripts": {

sas-20181203/src/client.ts

+135-31
Original file line numberDiff line numberDiff line change
@@ -2356,8 +2356,35 @@ export class ChangeSecurityScoreRuleRequestSecurityScoreRuleList extends $dara.M
23562356
}
23572357

23582358
export class CreateAntiBruteForceRuleRequestProtocolType extends $dara.Model {
2359+
/**
2360+
* @remarks
2361+
* Whether to enable RDP interception, default is on. Values:
2362+
* - **on**: Enable
2363+
* - **off**: Disable
2364+
*
2365+
* @example
2366+
* on
2367+
*/
23592368
rdp?: string;
2369+
/**
2370+
* @remarks
2371+
* Whether to enable the SqlServer interception method, default is off. Values:
2372+
* - **on**: Enable
2373+
* - **off**: Disable
2374+
*
2375+
* @example
2376+
* off
2377+
*/
23602378
sqlServer?: string;
2379+
/**
2380+
* @remarks
2381+
* Whether to enable SSH interception, default is on. Values:
2382+
* - **on**: Enable
2383+
* - **off**: Disable
2384+
*
2385+
* @example
2386+
* on
2387+
*/
23612388
ssh?: string;
23622389
static names(): { [key: string]: string } {
23632390
return {
@@ -6832,8 +6859,35 @@ export class DescribeAntiBruteForceRulesResponseBodyPageInfo extends $dara.Model
68326859
}
68336860

68346861
export class DescribeAntiBruteForceRulesResponseBodyRulesProtocolType extends $dara.Model {
6862+
/**
6863+
* @remarks
6864+
* RDP interception method, values:
6865+
* - **on**: enable
6866+
* - **off**: disable
6867+
*
6868+
* @example
6869+
* on
6870+
*/
68356871
rdp?: string;
6872+
/**
6873+
* @remarks
6874+
* SqlServer interception mode, with values:
6875+
* - **on**: enable
6876+
* - **off**: disable
6877+
*
6878+
* @example
6879+
* off
6880+
*/
68366881
sqlServer?: string;
6882+
/**
6883+
* @remarks
6884+
* SSH interception method, with values:
6885+
* - **on**: enabled
6886+
* - **off**: disabled
6887+
*
6888+
* @example
6889+
* on
6890+
*/
68376891
ssh?: string;
68386892
static names(): { [key: string]: string } {
68396893
return {
@@ -6863,7 +6917,7 @@ export class DescribeAntiBruteForceRulesResponseBodyRulesProtocolType extends $d
68636917
export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
68646918
/**
68656919
* @remarks
6866-
* The timestamp when the rule was created. Unit: milliseconds.
6920+
* 防暴力破解规则创建时间戳。单位:毫秒。
68676921
*
68686922
* @example
68696923
* 1669800181000
@@ -6873,10 +6927,10 @@ export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
68736927
* @remarks
68746928
* Indicates whether the defense rule is the default rule. Valid values:
68756929
*
6876-
* * **true**: The defense rule is the default rule.
6877-
* * **false**: The defense rule is not the default rule.
6930+
* * **true**: yes
6931+
* * **false**: no
68786932
*
6879-
* > The default rule takes effect on all servers that are not protected by defense rules against brute-force attacks.
6933+
* > The default rule takes effect on all servers that are not protected by defense rules against brute-force attacks.
68806934
*
68816935
* @example
68826936
* true
@@ -6892,7 +6946,7 @@ export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
68926946
enableSmartRule?: boolean;
68936947
/**
68946948
* @remarks
6895-
* The threshold of logon failures that is specified in the defense rule.
6949+
* The threshold of logon failures that you specify.
68966950
*
68976951
* @example
68986952
* 15
@@ -6930,6 +6984,10 @@ export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
69306984
* AntiBruteForceRule01
69316985
*/
69326986
name?: string;
6987+
/**
6988+
* @remarks
6989+
* The types of protocols that the brute force cracking rule supports to intercept.
6990+
*/
69336991
protocolType?: DescribeAntiBruteForceRulesResponseBodyRulesProtocolType;
69346992
/**
69356993
* @remarks
@@ -77324,8 +77382,35 @@ export class ListVulGlobalConfigResponseBodyVulGlobalConfigList extends $dara.Mo
7732477382
}
7732577383

7732677384
export class ModifyAntiBruteForceRuleRequestProtocolType extends $dara.Model {
77385+
/**
77386+
* @remarks
77387+
* Whether to modify the RDP interception method, which is enabled by default. Values:
77388+
* - **on**: Enable
77389+
* - **off**: Disable
77390+
*
77391+
* @example
77392+
* on
77393+
*/
7732777394
rdp?: string;
77395+
/**
77396+
* @remarks
77397+
* Whether to modify the SQL Server interception method, which is disabled by default. Values:
77398+
* - **on**: Enable
77399+
* - **off**: Disable
77400+
*
77401+
* @example
77402+
* off
77403+
*/
7732877404
sqlServer?: string;
77405+
/**
77406+
* @remarks
77407+
* Whether to modify the SSH interception method, which is enabled by default. Values:
77408+
* - **on**: Enable
77409+
* - **off**: Disable
77410+
*
77411+
* @example
77412+
* on
77413+
*/
7732977414
ssh?: string;
7733077415
static names(): { [key: string]: string } {
7733177416
return {
@@ -91521,8 +91606,6 @@ export class CreateAntiBruteForceRuleRequest extends $dara.Model {
9152191606
* * **true**: yes
9152291607
* * **false**: no
9152391608
*
91524-
* > If no defense rule is created for a server, the default rule is applied to the server.
91525-
*
9152691609
* @example
9152791610
* true
9152891611
*/
@@ -91541,15 +91624,15 @@ export class CreateAntiBruteForceRuleRequest extends $dara.Model {
9154191624
* @remarks
9154291625
* The period of time during which logons from an account are not allowed. Unit: minutes. Valid values:
9154391626
*
91544-
* * **5**: 5 minutes
91545-
* * **15**: 15 minutes
91546-
* * **30**: 30 minutes
91547-
* * **60**: 1 hour
91548-
* * **120**: 2 hours
91549-
* * **360**: 6 hours
91550-
* * **720**: 12 hours
91551-
* * **1440**: 24 hours
91552-
* * **10080**: 7 days
91627+
* * **5**
91628+
* * **15**
91629+
* * **30**
91630+
* * **60**
91631+
* * **120**
91632+
* * **360**
91633+
* * **720**
91634+
* * **1440**
91635+
* * **10080**
9155391636
* * **52560000**: permanent
9155491637
*
9155591638
* This parameter is required.
@@ -91568,6 +91651,10 @@ export class CreateAntiBruteForceRuleRequest extends $dara.Model {
9156891651
* TestAntiBruteForceRule
9156991652
*/
9157091653
name?: string;
91654+
/**
91655+
* @remarks
91656+
* The types of protocols supported for interception by the brute force attack rule creation.
91657+
*/
9157191658
protocolType?: CreateAntiBruteForceRuleRequestProtocolType;
9157291659
resourceOwnerId?: number;
9157391660
/**
@@ -91654,8 +91741,6 @@ export class CreateAntiBruteForceRuleShrinkRequest extends $dara.Model {
9165491741
* * **true**: yes
9165591742
* * **false**: no
9165691743
*
91657-
* > If no defense rule is created for a server, the default rule is applied to the server.
91658-
*
9165991744
* @example
9166091745
* true
9166191746
*/
@@ -91674,15 +91759,15 @@ export class CreateAntiBruteForceRuleShrinkRequest extends $dara.Model {
9167491759
* @remarks
9167591760
* The period of time during which logons from an account are not allowed. Unit: minutes. Valid values:
9167691761
*
91677-
* * **5**: 5 minutes
91678-
* * **15**: 15 minutes
91679-
* * **30**: 30 minutes
91680-
* * **60**: 1 hour
91681-
* * **120**: 2 hours
91682-
* * **360**: 6 hours
91683-
* * **720**: 12 hours
91684-
* * **1440**: 24 hours
91685-
* * **10080**: 7 days
91762+
* * **5**
91763+
* * **15**
91764+
* * **30**
91765+
* * **60**
91766+
* * **120**
91767+
* * **360**
91768+
* * **720**
91769+
* * **1440**
91770+
* * **10080**
9168691771
* * **52560000**: permanent
9168791772
*
9168891773
* This parameter is required.
@@ -91701,6 +91786,10 @@ export class CreateAntiBruteForceRuleShrinkRequest extends $dara.Model {
9170191786
* TestAntiBruteForceRule
9170291787
*/
9170391788
name?: string;
91789+
/**
91790+
* @remarks
91791+
* The types of protocols supported for interception by the brute force attack rule creation.
91792+
*/
9170491793
protocolTypeShrink?: string;
9170591794
resourceOwnerId?: number;
9170691795
/**
@@ -93425,6 +93514,7 @@ export class CreateCycleTaskRequest extends $dara.Model {
9342593514
}
9342693515

9342793516
export class CreateCycleTaskResponseBody extends $dara.Model {
93517+
configId?: string;
9342893518
/**
9342993519
* @remarks
9343093520
* The ID of the request, which is used to locate and troubleshoot issues.
@@ -93435,12 +93525,14 @@ export class CreateCycleTaskResponseBody extends $dara.Model {
9343593525
requestId?: string;
9343693526
static names(): { [key: string]: string } {
9343793527
return {
93528+
configId: 'ConfigId',
9343893529
requestId: 'RequestId',
9343993530
};
9344093531
}
9344193532

9344293533
static types(): { [key: string]: any } {
9344393534
return {
93535+
configId: 'string',
9344493536
requestId: 'string',
9344593537
};
9344693538
}
@@ -108947,7 +109039,6 @@ export class DescribeAntiBruteForceRulesRequest extends $dara.Model {
108947109039
/**
108948109040
* @remarks
108949109041
* The ID of the defense rule.
108950-
*
108951109042
* > You can call the [DescribeAntiBruteForceRules](~~DescribeAntiBruteForceRules~~) operation to query the IDs of defense rules.
108952109043
*
108953109044
* @example
@@ -109026,7 +109117,7 @@ export class DescribeAntiBruteForceRulesResponseBody extends $dara.Model {
109026109117
requestId?: string;
109027109118
/**
109028109119
* @remarks
109029-
* An array that consists of the details of the defense rule.
109120+
* An array that consists of the defense rules returned.
109030109121
*/
109031109122
rules?: DescribeAntiBruteForceRulesResponseBodyRules[];
109032109123
static names(): { [key: string]: string } {
@@ -119678,6 +119769,7 @@ export class DescribeCustomizedStrategyTargetsResponse extends $dara.Model {
119678119769
}
119679119770

119680119771
export class DescribeCycleTaskListRequest extends $dara.Model {
119772+
configId?: string;
119681119773
/**
119682119774
* @remarks
119683119775
* The number of the page to return.
@@ -119714,14 +119806,13 @@ export class DescribeCycleTaskListRequest extends $dara.Model {
119714119806
* * **IMAGE_SCAN**: image scan task
119715119807
* * **EMG_VUL_SCHEDULE_SCAN**: urgent vulnerability scan task
119716119808
*
119717-
* This parameter is required.
119718-
*
119719119809
* @example
119720119810
* IMAGE_SCAN
119721119811
*/
119722119812
taskType?: string;
119723119813
static names(): { [key: string]: string } {
119724119814
return {
119815+
configId: 'ConfigId',
119725119816
currentPage: 'CurrentPage',
119726119817
pageSize: 'PageSize',
119727119818
taskName: 'TaskName',
@@ -119731,6 +119822,7 @@ export class DescribeCycleTaskListRequest extends $dara.Model {
119731119822

119732119823
static types(): { [key: string]: any } {
119733119824
return {
119825+
configId: 'string',
119734119826
currentPage: 'number',
119735119827
pageSize: 'number',
119736119828
taskName: 'string',
@@ -194067,6 +194159,10 @@ export class ModifyAntiBruteForceRuleRequest extends $dara.Model {
194067194159
* TestRule
194068194160
*/
194069194161
name?: string;
194162+
/**
194163+
* @remarks
194164+
* The protocol types supported by the anti-brute force rule for interception.
194165+
*/
194070194166
protocolType?: ModifyAntiBruteForceRuleRequestProtocolType;
194071194167
resourceOwnerId?: number;
194072194168
/**
@@ -194210,6 +194306,10 @@ export class ModifyAntiBruteForceRuleShrinkRequest extends $dara.Model {
194210194306
* TestRule
194211194307
*/
194212194308
name?: string;
194309+
/**
194310+
* @remarks
194311+
* The protocol types supported by the anti-brute force rule for interception.
194312+
*/
194213194313
protocolTypeShrink?: string;
194214194314
resourceOwnerId?: number;
194215194315
/**
@@ -237378,6 +237478,10 @@ export default class Client extends OpenApi {
237378237478
async describeCycleTaskListWithOptions(request: DescribeCycleTaskListRequest, runtime: $dara.RuntimeOptions): Promise<DescribeCycleTaskListResponse> {
237379237479
request.validate();
237380237480
let query = { };
237481+
if (!$dara.isNull(request.configId)) {
237482+
query["ConfigId"] = request.configId;
237483+
}
237484+
237381237485
if (!$dara.isNull(request.currentPage)) {
237382237486
query["CurrentPage"] = request.currentPage;
237383237487
}

0 commit comments

Comments
 (0)