Modifies the protected directory for a specific server.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer. OpenAPI Explorer dynamically generates the sample code of the operation for different SDKs.

Request parameters

Parameter Type Required Example Description
Action String Yes ModifyWebLockUpdateConfig

The operation that you want to perform.

Set the value to ModifyWebLockUpdateConfig.

SourceIp String No 1.2.3.4

The source IP address of the request.

Lang String No zh

The natural language of the request and response. Valid values:

  • zh: Chinese
  • en: English
Id Integer No 12345

The ID of the protected directory that you want to modify.

Note You can call the DescribeWebLockConfigListl operation to query the IDs of protected directories.
Uuid String No 4fe8e1cd-3c37-4851-b9de-124da32c****

The UUID of the server for which you want to modify the protected directory.

Note You can call the DescribeCloudCenterInstances operation to query the UUIDs of servers.
Dir String No /home/admin/tomcat

The directory for which you want to enable web tamper proofing.

ExclusiveDir String No /home/admin/test

The directory for which you want to disable web tamper proofing.

Note If you set Mode to blacklist, you must specify this parameter.
ExclusiveFileType String No jpg

The type of file for which you want to disable web tamper proofing. Separate multiple types with semicolons (;). Valid values:

  • php
  • jsp
  • asp
  • aspx
  • js
  • cgi
  • html
  • htm
  • xml
  • shtml
  • shtm
  • jpg
  • gif
  • png
Note If you set Mode to blacklist, you must specify this parameter.
LocalBackupDir String No /usr/local/backup

The local directory that stores the backup files of the protected directory to modify.

The directory format of a Linux server is different from that of a Windows server. You must enter the directory in the required format based on your operating system. Directory formats of Windows and Linux servers:

  • Linux server: /usr/local/aegis/bak
  • Windows server: C:\Program Files (x86)\Alibaba\Aegis\bak
Mode String No blacklist

The protection mode. Valid values:

  • whitelist: In this mode, web tamper proofing is enabled for the specified directories and types of files.
  • blacklist: In this mode, web tamper proofing is enabled for the unspecified subdirectories, types of files, and files in the protected directory.
InclusiveFileType String No jpg

The type of file for which you want to enable web tamper proofing. Separate multiple types with semicolons (;). Valid values:

  • php
  • jsp
  • asp
  • aspx
  • js
  • cgi
  • html
  • htm
  • xml
  • shtml
  • shtm
  • jpg
  • gif
  • png
Note If you set Mode to whitelist, you must specify this parameter.
ExclusiveFile String No /home/admin/apache.log

The file for which you want to disable web tamper proofing.

Note If you set Mode to blacklist, you must specify this parameter.
InclusiveFile String No /home/admin/test.log

The file for which you want to enable web tamper proofing.

Note If you set Mode to whitelist, you must specify this parameter.

Response parameters

Parameter Type Example Description
RequestId String D9354C1A-D709-4873-9AAE-41513327B247

The ID of the request.

Examples

Sample requests

http(s)://[Endpoint]/?Action=ModifyWebLockUpdateConfig
&<Common request parameters>

Sample success responses

XML format

<ModifyWebLockUpdateConfigResponse>
      <RequestId>D9354C1A-D709-4873-9AAE-41513327B247</RequestId>
</ModifyWebLockUpdateConfigResponse>

JSON format

{
    "RequestId": "D9354C1A-D709-4873-9AAE-41513327B247"
}

Error codes

For a list of error codes, visit the API Error Center.