@@ -2356,8 +2356,35 @@ export class ChangeSecurityScoreRuleRequestSecurityScoreRuleList extends $dara.M
2356
2356
}
2357
2357
2358
2358
export class CreateAntiBruteForceRuleRequestProtocolType extends $dara.Model {
2359
+ /**
2360
+ * @remarks
2361
+ * Whether to enable RDP interception, default is on. Values:
2362
+ * - **on**: Enable
2363
+ * - **off**: Disable
2364
+ *
2365
+ * @example
2366
+ * on
2367
+ */
2359
2368
rdp?: string;
2369
+ /**
2370
+ * @remarks
2371
+ * Whether to enable the SqlServer interception method, default is off. Values:
2372
+ * - **on**: Enable
2373
+ * - **off**: Disable
2374
+ *
2375
+ * @example
2376
+ * off
2377
+ */
2360
2378
sqlServer?: string;
2379
+ /**
2380
+ * @remarks
2381
+ * Whether to enable SSH interception, default is on. Values:
2382
+ * - **on**: Enable
2383
+ * - **off**: Disable
2384
+ *
2385
+ * @example
2386
+ * on
2387
+ */
2361
2388
ssh?: string;
2362
2389
static names(): { [key: string]: string } {
2363
2390
return {
@@ -6832,8 +6859,35 @@ export class DescribeAntiBruteForceRulesResponseBodyPageInfo extends $dara.Model
6832
6859
}
6833
6860
6834
6861
export class DescribeAntiBruteForceRulesResponseBodyRulesProtocolType extends $dara.Model {
6862
+ /**
6863
+ * @remarks
6864
+ * RDP interception method, values:
6865
+ * - **on**: enable
6866
+ * - **off**: disable
6867
+ *
6868
+ * @example
6869
+ * on
6870
+ */
6835
6871
rdp?: string;
6872
+ /**
6873
+ * @remarks
6874
+ * SqlServer interception mode, with values:
6875
+ * - **on**: enable
6876
+ * - **off**: disable
6877
+ *
6878
+ * @example
6879
+ * off
6880
+ */
6836
6881
sqlServer?: string;
6882
+ /**
6883
+ * @remarks
6884
+ * SSH interception method, with values:
6885
+ * - **on**: enabled
6886
+ * - **off**: disabled
6887
+ *
6888
+ * @example
6889
+ * on
6890
+ */
6837
6891
ssh?: string;
6838
6892
static names(): { [key: string]: string } {
6839
6893
return {
@@ -6863,7 +6917,7 @@ export class DescribeAntiBruteForceRulesResponseBodyRulesProtocolType extends $d
6863
6917
export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
6864
6918
/**
6865
6919
* @remarks
6866
- * The timestamp when the rule was created. Unit: milliseconds.
6920
+ * 防暴力破解规则创建时间戳。单位:毫秒。
6867
6921
*
6868
6922
* @example
6869
6923
* 1669800181000
@@ -6873,10 +6927,10 @@ export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
6873
6927
* @remarks
6874
6928
* Indicates whether the defense rule is the default rule. Valid values:
6875
6929
*
6876
- * * **true**: The defense rule is the default rule.
6877
- * * **false**: The defense rule is not the default rule.
6930
+ * * **true**: yes
6931
+ * * **false**: no
6878
6932
*
6879
- * > The default rule takes effect on all servers that are not protected by defense rules against brute-force attacks.
6933
+ * > The default rule takes effect on all servers that are not protected by defense rules against brute-force attacks.
6880
6934
*
6881
6935
* @example
6882
6936
* true
@@ -6892,7 +6946,7 @@ export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
6892
6946
enableSmartRule?: boolean;
6893
6947
/**
6894
6948
* @remarks
6895
- * The threshold of logon failures that is specified in the defense rule .
6949
+ * The threshold of logon failures that you specify .
6896
6950
*
6897
6951
* @example
6898
6952
* 15
@@ -6930,6 +6984,10 @@ export class DescribeAntiBruteForceRulesResponseBodyRules extends $dara.Model {
6930
6984
* AntiBruteForceRule01
6931
6985
*/
6932
6986
name?: string;
6987
+ /**
6988
+ * @remarks
6989
+ * The types of protocols that the brute force cracking rule supports to intercept.
6990
+ */
6933
6991
protocolType?: DescribeAntiBruteForceRulesResponseBodyRulesProtocolType;
6934
6992
/**
6935
6993
* @remarks
@@ -77324,8 +77382,35 @@ export class ListVulGlobalConfigResponseBodyVulGlobalConfigList extends $dara.Mo
77324
77382
}
77325
77383
77326
77384
export class ModifyAntiBruteForceRuleRequestProtocolType extends $dara.Model {
77385
+ /**
77386
+ * @remarks
77387
+ * Whether to modify the RDP interception method, which is enabled by default. Values:
77388
+ * - **on**: Enable
77389
+ * - **off**: Disable
77390
+ *
77391
+ * @example
77392
+ * on
77393
+ */
77327
77394
rdp?: string;
77395
+ /**
77396
+ * @remarks
77397
+ * Whether to modify the SQL Server interception method, which is disabled by default. Values:
77398
+ * - **on**: Enable
77399
+ * - **off**: Disable
77400
+ *
77401
+ * @example
77402
+ * off
77403
+ */
77328
77404
sqlServer?: string;
77405
+ /**
77406
+ * @remarks
77407
+ * Whether to modify the SSH interception method, which is enabled by default. Values:
77408
+ * - **on**: Enable
77409
+ * - **off**: Disable
77410
+ *
77411
+ * @example
77412
+ * on
77413
+ */
77329
77414
ssh?: string;
77330
77415
static names(): { [key: string]: string } {
77331
77416
return {
@@ -91521,8 +91606,6 @@ export class CreateAntiBruteForceRuleRequest extends $dara.Model {
91521
91606
* * **true**: yes
91522
91607
* * **false**: no
91523
91608
*
91524
- * > If no defense rule is created for a server, the default rule is applied to the server.
91525
- *
91526
91609
* @example
91527
91610
* true
91528
91611
*/
@@ -91541,15 +91624,15 @@ export class CreateAntiBruteForceRuleRequest extends $dara.Model {
91541
91624
* @remarks
91542
91625
* The period of time during which logons from an account are not allowed. Unit: minutes. Valid values:
91543
91626
*
91544
- * * **5**: 5 minutes
91545
- * * **15**: 15 minutes
91546
- * * **30**: 30 minutes
91547
- * * **60**: 1 hour
91548
- * * **120**: 2 hours
91549
- * * **360**: 6 hours
91550
- * * **720**: 12 hours
91551
- * * **1440**: 24 hours
91552
- * * **10080**: 7 days
91627
+ * * **5**
91628
+ * * **15**
91629
+ * * **30**
91630
+ * * **60**
91631
+ * * **120**
91632
+ * * **360**
91633
+ * * **720**
91634
+ * * **1440**
91635
+ * * **10080**
91553
91636
* * **52560000**: permanent
91554
91637
*
91555
91638
* This parameter is required.
@@ -91568,6 +91651,10 @@ export class CreateAntiBruteForceRuleRequest extends $dara.Model {
91568
91651
* TestAntiBruteForceRule
91569
91652
*/
91570
91653
name?: string;
91654
+ /**
91655
+ * @remarks
91656
+ * The types of protocols supported for interception by the brute force attack rule creation.
91657
+ */
91571
91658
protocolType?: CreateAntiBruteForceRuleRequestProtocolType;
91572
91659
resourceOwnerId?: number;
91573
91660
/**
@@ -91654,8 +91741,6 @@ export class CreateAntiBruteForceRuleShrinkRequest extends $dara.Model {
91654
91741
* * **true**: yes
91655
91742
* * **false**: no
91656
91743
*
91657
- * > If no defense rule is created for a server, the default rule is applied to the server.
91658
- *
91659
91744
* @example
91660
91745
* true
91661
91746
*/
@@ -91674,15 +91759,15 @@ export class CreateAntiBruteForceRuleShrinkRequest extends $dara.Model {
91674
91759
* @remarks
91675
91760
* The period of time during which logons from an account are not allowed. Unit: minutes. Valid values:
91676
91761
*
91677
- * * **5**: 5 minutes
91678
- * * **15**: 15 minutes
91679
- * * **30**: 30 minutes
91680
- * * **60**: 1 hour
91681
- * * **120**: 2 hours
91682
- * * **360**: 6 hours
91683
- * * **720**: 12 hours
91684
- * * **1440**: 24 hours
91685
- * * **10080**: 7 days
91762
+ * * **5**
91763
+ * * **15**
91764
+ * * **30**
91765
+ * * **60**
91766
+ * * **120**
91767
+ * * **360**
91768
+ * * **720**
91769
+ * * **1440**
91770
+ * * **10080**
91686
91771
* * **52560000**: permanent
91687
91772
*
91688
91773
* This parameter is required.
@@ -91701,6 +91786,10 @@ export class CreateAntiBruteForceRuleShrinkRequest extends $dara.Model {
91701
91786
* TestAntiBruteForceRule
91702
91787
*/
91703
91788
name?: string;
91789
+ /**
91790
+ * @remarks
91791
+ * The types of protocols supported for interception by the brute force attack rule creation.
91792
+ */
91704
91793
protocolTypeShrink?: string;
91705
91794
resourceOwnerId?: number;
91706
91795
/**
@@ -93425,6 +93514,7 @@ export class CreateCycleTaskRequest extends $dara.Model {
93425
93514
}
93426
93515
93427
93516
export class CreateCycleTaskResponseBody extends $dara.Model {
93517
+ configId?: string;
93428
93518
/**
93429
93519
* @remarks
93430
93520
* The ID of the request, which is used to locate and troubleshoot issues.
@@ -93435,12 +93525,14 @@ export class CreateCycleTaskResponseBody extends $dara.Model {
93435
93525
requestId?: string;
93436
93526
static names(): { [key: string]: string } {
93437
93527
return {
93528
+ configId: 'ConfigId',
93438
93529
requestId: 'RequestId',
93439
93530
};
93440
93531
}
93441
93532
93442
93533
static types(): { [key: string]: any } {
93443
93534
return {
93535
+ configId: 'string',
93444
93536
requestId: 'string',
93445
93537
};
93446
93538
}
@@ -108947,7 +109039,6 @@ export class DescribeAntiBruteForceRulesRequest extends $dara.Model {
108947
109039
/**
108948
109040
* @remarks
108949
109041
* The ID of the defense rule.
108950
- *
108951
109042
* > You can call the [DescribeAntiBruteForceRules](~~DescribeAntiBruteForceRules~~) operation to query the IDs of defense rules.
108952
109043
*
108953
109044
* @example
@@ -109026,7 +109117,7 @@ export class DescribeAntiBruteForceRulesResponseBody extends $dara.Model {
109026
109117
requestId?: string;
109027
109118
/**
109028
109119
* @remarks
109029
- * An array that consists of the details of the defense rule .
109120
+ * An array that consists of the defense rules returned .
109030
109121
*/
109031
109122
rules?: DescribeAntiBruteForceRulesResponseBodyRules[];
109032
109123
static names(): { [key: string]: string } {
@@ -119678,6 +119769,7 @@ export class DescribeCustomizedStrategyTargetsResponse extends $dara.Model {
119678
119769
}
119679
119770
119680
119771
export class DescribeCycleTaskListRequest extends $dara.Model {
119772
+ configId?: string;
119681
119773
/**
119682
119774
* @remarks
119683
119775
* The number of the page to return.
@@ -119714,14 +119806,13 @@ export class DescribeCycleTaskListRequest extends $dara.Model {
119714
119806
* * **IMAGE_SCAN**: image scan task
119715
119807
* * **EMG_VUL_SCHEDULE_SCAN**: urgent vulnerability scan task
119716
119808
*
119717
- * This parameter is required.
119718
- *
119719
119809
* @example
119720
119810
* IMAGE_SCAN
119721
119811
*/
119722
119812
taskType?: string;
119723
119813
static names(): { [key: string]: string } {
119724
119814
return {
119815
+ configId: 'ConfigId',
119725
119816
currentPage: 'CurrentPage',
119726
119817
pageSize: 'PageSize',
119727
119818
taskName: 'TaskName',
@@ -119731,6 +119822,7 @@ export class DescribeCycleTaskListRequest extends $dara.Model {
119731
119822
119732
119823
static types(): { [key: string]: any } {
119733
119824
return {
119825
+ configId: 'string',
119734
119826
currentPage: 'number',
119735
119827
pageSize: 'number',
119736
119828
taskName: 'string',
@@ -194067,6 +194159,10 @@ export class ModifyAntiBruteForceRuleRequest extends $dara.Model {
194067
194159
* TestRule
194068
194160
*/
194069
194161
name?: string;
194162
+ /**
194163
+ * @remarks
194164
+ * The protocol types supported by the anti-brute force rule for interception.
194165
+ */
194070
194166
protocolType?: ModifyAntiBruteForceRuleRequestProtocolType;
194071
194167
resourceOwnerId?: number;
194072
194168
/**
@@ -194210,6 +194306,10 @@ export class ModifyAntiBruteForceRuleShrinkRequest extends $dara.Model {
194210
194306
* TestRule
194211
194307
*/
194212
194308
name?: string;
194309
+ /**
194310
+ * @remarks
194311
+ * The protocol types supported by the anti-brute force rule for interception.
194312
+ */
194213
194313
protocolTypeShrink?: string;
194214
194314
resourceOwnerId?: number;
194215
194315
/**
@@ -237378,6 +237478,10 @@ export default class Client extends OpenApi {
237378
237478
async describeCycleTaskListWithOptions(request: DescribeCycleTaskListRequest, runtime: $dara.RuntimeOptions): Promise<DescribeCycleTaskListResponse> {
237379
237479
request.validate();
237380
237480
let query = { };
237481
+ if (!$dara.isNull(request.configId)) {
237482
+ query["ConfigId"] = request.configId;
237483
+ }
237484
+
237381
237485
if (!$dara.isNull(request.currentPage)) {
237382
237486
query["CurrentPage"] = request.currentPage;
237383
237487
}
0 commit comments