tccli 3.0.1087.1__py2.py3-none-any.whl → 3.0.1089.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
tccli/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = '3.0.1087.1'
1
+ __version__ = '3.0.1089.1'
@@ -0,0 +1,32 @@
1
+ **Example 1: 查询IVR音频文件列表示例**
2
+
3
+
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli ccc DescribeIvrAudioList --cli-unfold-argument \
9
+ --SdkAppId 160000000 \
10
+ --CustomFileName abc \
11
+ --PageSize 1 \
12
+ --PageNumber 0
13
+ ```
14
+
15
+ Output:
16
+ ```
17
+ {
18
+ "Response": {
19
+ "TotalCount": 1,
20
+ "FileInfo": [
21
+ {
22
+ "FileId": 1,
23
+ "CustomFileName": "abc",
24
+ "AudioFileName": "a.mp3",
25
+ "Status": 0
26
+ }
27
+ ],
28
+ "RequestId": "abc"
29
+ }
30
+ }
31
+ ```
32
+
@@ -0,0 +1,22 @@
1
+ **Example 1: 上传IVR音频文件**
2
+
3
+
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli ccc UploadIvrAudio --cli-unfold-argument \
9
+ --SdkAppId 0 \
10
+ --AudioList.0.CustomFileName abc \
11
+ --AudioList.0.AudioUrl http://xxxx.com/a.mp3
12
+ ```
13
+
14
+ Output:
15
+ ```
16
+ {
17
+ "Response": {
18
+ "RequestId": "abc"
19
+ }
20
+ }
21
+ ```
22
+
@@ -1,4 +1,4 @@
1
- **Example 1: test**
1
+ **Example 1: 示例**
2
2
 
3
3
  ck水平扩容实例
4
4
 
@@ -6,23 +6,22 @@ Input:
6
6
 
7
7
  ```
8
8
  tccli cdwch ScaleOutInstance --cli-unfold-argument \
9
- --InstanceId abc \
10
- --Type abc \
11
- --NodeCount 0 \
12
- --ScaleOutCluster abc \
9
+ --InstanceId cdwch-ax2x3bc \
10
+ --Type COMMON \
11
+ --NodeCount 6 \
12
+ --ScaleOutCluster default_cluster \
13
13
  --UserSubnetIPNum 0 \
14
- --ScaleOutNodeIp abc \
15
- --ReduceShardInfo abc
14
+ --ScaleOutNodeIp 10.0.23.3
16
15
  ```
17
16
 
18
17
  Output:
19
18
  ```
20
19
  {
21
20
  "Response": {
22
- "FlowId": "abc",
23
- "InstanceId": "abc",
24
- "ErrorMsg": "abc",
25
- "RequestId": "abc"
21
+ "FlowId": "1232",
22
+ "InstanceId": "cdwch-ax2x3bc",
23
+ "ErrorMsg": "",
24
+ "RequestId": "8asdlq-ax0imasd-xqwe234"
26
25
  }
27
26
  }
28
27
  ```
@@ -0,0 +1,455 @@
1
+ **Example 1: success1**
2
+
3
+ success1
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli csip DescribeAssetViewVulRiskList --cli-unfold-argument ```
9
+
10
+ Output:
11
+ ```
12
+ {
13
+ "Response": {
14
+ "Data": [
15
+ {
16
+ "AffectAsset": "182.254.145.158",
17
+ "AppId": "1300448058",
18
+ "AppName": "OpenSSH",
19
+ "AppVersion": "-",
20
+ "CVE": "CVE-2020-15778",
21
+ "CVSS": 0,
22
+ "CWPVersion": 4,
23
+ "Component": "OpenSSH",
24
+ "EMGCVulType": 0,
25
+ "FirstTime": "2023-09-26 16:34:50",
26
+ "From": "云安全中心",
27
+ "HandleTaskId": "",
28
+ "Index": "360bfa2c7c6f118db22f829991424d7a",
29
+ "InstanceId": "ins-kja8dy5r",
30
+ "InstanceName": "[autotest][勿删]自动化测试NAT1",
31
+ "InstanceType": "CVM",
32
+ "InstanceUUID": "7bb60327-47de-4bce-b979-57166dc89c72",
33
+ "Level": "high",
34
+ "Nick": "",
35
+ "PCMGRId": "",
36
+ "POCId": "c808d8eb0e9c322279c2efa3b82a491c",
37
+ "Payload": "OpenSSH/7.4",
38
+ "Port": "22",
39
+ "RecentTime": "2023-09-27 11:49:10",
40
+ "RiskId": "1498f23a853529b3be8cf554629e4533",
41
+ "Status": 0,
42
+ "TaskId": "",
43
+ "Uin": "",
44
+ "VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
45
+ "VULType": "命令注入",
46
+ "VULURL": ""
47
+ },
48
+ {
49
+ "AffectAsset": "42.192.123.209",
50
+ "AppId": "1300448058",
51
+ "AppName": "OpenSSH",
52
+ "AppVersion": "-",
53
+ "CVE": "CVE-2020-15778",
54
+ "CVSS": 0,
55
+ "CWPVersion": 4,
56
+ "Component": "OpenSSH",
57
+ "EMGCVulType": 0,
58
+ "FirstTime": "2023-09-26 16:34:50",
59
+ "From": "云安全中心",
60
+ "HandleTaskId": "",
61
+ "Index": "774b28af351a041b41f246ca43a50b59",
62
+ "InstanceId": "ins-p1jyrg75",
63
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
64
+ "InstanceType": "CVM",
65
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
66
+ "Level": "high",
67
+ "Nick": "",
68
+ "PCMGRId": "",
69
+ "POCId": "c808d8eb0e9c322279c2efa3b82a491c",
70
+ "Payload": "OpenSSH/8.0",
71
+ "Port": "22",
72
+ "RecentTime": "2023-09-27 11:49:10",
73
+ "RiskId": "1498f23a853529b3be8cf554629e4533",
74
+ "Status": 0,
75
+ "TaskId": "",
76
+ "Uin": "",
77
+ "VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
78
+ "VULType": "命令注入",
79
+ "VULURL": ""
80
+ },
81
+ {
82
+ "AffectAsset": "81.69.38.139",
83
+ "AppId": "1300448058",
84
+ "AppName": "OpenSSH",
85
+ "AppVersion": "-",
86
+ "CVE": "CVE-2020-15778",
87
+ "CVSS": 0,
88
+ "CWPVersion": 4,
89
+ "Component": "OpenSSH",
90
+ "EMGCVulType": 0,
91
+ "FirstTime": "2023-09-26 16:34:50",
92
+ "From": "云安全中心",
93
+ "HandleTaskId": "",
94
+ "Index": "e1399eb478bb080626419625f762d23e",
95
+ "InstanceId": "ins-17ye5faf",
96
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
97
+ "InstanceType": "CVM",
98
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
99
+ "Level": "high",
100
+ "Nick": "",
101
+ "PCMGRId": "",
102
+ "POCId": "c808d8eb0e9c322279c2efa3b82a491c",
103
+ "Payload": "OpenSSH/8.0",
104
+ "Port": "22",
105
+ "RecentTime": "2023-09-27 11:49:10",
106
+ "RiskId": "1498f23a853529b3be8cf554629e4533",
107
+ "Status": 0,
108
+ "TaskId": "",
109
+ "Uin": "",
110
+ "VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
111
+ "VULType": "命令注入",
112
+ "VULURL": ""
113
+ },
114
+ {
115
+ "AffectAsset": "42.192.123.209",
116
+ "AppId": "1300448058",
117
+ "AppName": "Nginx",
118
+ "AppVersion": "-",
119
+ "CVE": "CVE-2019-9511",
120
+ "CVSS": 0,
121
+ "CWPVersion": 4,
122
+ "Component": "Nginx",
123
+ "EMGCVulType": 0,
124
+ "FirstTime": "2023-09-26 16:34:50",
125
+ "From": "云安全中心",
126
+ "HandleTaskId": "",
127
+ "Index": "fed411b4775d7f46cd192a45e2877f0b",
128
+ "InstanceId": "ins-p1jyrg75",
129
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
130
+ "InstanceType": "CVM",
131
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
132
+ "Level": "high",
133
+ "Nick": "",
134
+ "PCMGRId": "",
135
+ "POCId": "654f82856a1f02e61941529f4d7bb642",
136
+ "Payload": "nginx/1.14.1",
137
+ "Port": "80",
138
+ "RecentTime": "2023-09-27 11:49:10",
139
+ "RiskId": "28d5b79163e64cd046e6537131ea9e08",
140
+ "Status": 0,
141
+ "TaskId": "",
142
+ "Uin": "",
143
+ "VULName": "nginx 安全漏洞(CVE-2019-9511)",
144
+ "VULType": "其他",
145
+ "VULURL": ""
146
+ },
147
+ {
148
+ "AffectAsset": "81.69.38.139",
149
+ "AppId": "1300448058",
150
+ "AppName": "Nginx",
151
+ "AppVersion": "-",
152
+ "CVE": "CVE-2019-9511",
153
+ "CVSS": 0,
154
+ "CWPVersion": 4,
155
+ "Component": "Nginx",
156
+ "EMGCVulType": 0,
157
+ "FirstTime": "2023-09-26 16:34:50",
158
+ "From": "云安全中心",
159
+ "HandleTaskId": "",
160
+ "Index": "3b4a757f4f20274df5afbf45a9fd961b",
161
+ "InstanceId": "ins-17ye5faf",
162
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
163
+ "InstanceType": "CVM",
164
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
165
+ "Level": "high",
166
+ "Nick": "",
167
+ "PCMGRId": "",
168
+ "POCId": "654f82856a1f02e61941529f4d7bb642",
169
+ "Payload": "nginx/1.14.1",
170
+ "Port": "80",
171
+ "RecentTime": "2023-09-27 11:49:10",
172
+ "RiskId": "28d5b79163e64cd046e6537131ea9e08",
173
+ "Status": 0,
174
+ "TaskId": "",
175
+ "Uin": "",
176
+ "VULName": "nginx 安全漏洞(CVE-2019-9511)",
177
+ "VULType": "其他",
178
+ "VULURL": ""
179
+ },
180
+ {
181
+ "AffectAsset": "42.192.123.209",
182
+ "AppId": "1300448058",
183
+ "AppName": "Nginx",
184
+ "AppVersion": "-",
185
+ "CVE": "CVE-2022-41742",
186
+ "CVSS": 0,
187
+ "CWPVersion": 4,
188
+ "Component": "Nginx",
189
+ "EMGCVulType": 0,
190
+ "FirstTime": "2023-09-26 16:34:50",
191
+ "From": "云安全中心",
192
+ "HandleTaskId": "",
193
+ "Index": "f71a76c67fdfdcfed6164d37a163f3ee",
194
+ "InstanceId": "ins-p1jyrg75",
195
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
196
+ "InstanceType": "CVM",
197
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
198
+ "Level": "high",
199
+ "Nick": "",
200
+ "PCMGRId": "",
201
+ "POCId": "62fb737e4fcabde555e911e4cab32b6a",
202
+ "Payload": "nginx/1.14.1",
203
+ "Port": "80",
204
+ "RecentTime": "2023-09-27 11:49:10",
205
+ "RiskId": "367a544eab01c874b7db69491d78e6d2",
206
+ "Status": 0,
207
+ "TaskId": "",
208
+ "Uin": "",
209
+ "VULName": "nginx 越界写入漏洞(CVE-2022-41742)",
210
+ "VULType": "处理逻辑错误",
211
+ "VULURL": ""
212
+ },
213
+ {
214
+ "AffectAsset": "81.69.38.139",
215
+ "AppId": "1300448058",
216
+ "AppName": "Nginx",
217
+ "AppVersion": "-",
218
+ "CVE": "CVE-2022-41742",
219
+ "CVSS": 0,
220
+ "CWPVersion": 4,
221
+ "Component": "Nginx",
222
+ "EMGCVulType": 0,
223
+ "FirstTime": "2023-09-26 16:34:50",
224
+ "From": "云安全中心",
225
+ "HandleTaskId": "",
226
+ "Index": "8b915d789892bf6ecc516f4e98912c39",
227
+ "InstanceId": "ins-17ye5faf",
228
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
229
+ "InstanceType": "CVM",
230
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
231
+ "Level": "high",
232
+ "Nick": "",
233
+ "PCMGRId": "",
234
+ "POCId": "62fb737e4fcabde555e911e4cab32b6a",
235
+ "Payload": "nginx/1.14.1",
236
+ "Port": "80",
237
+ "RecentTime": "2023-09-27 11:49:10",
238
+ "RiskId": "367a544eab01c874b7db69491d78e6d2",
239
+ "Status": 0,
240
+ "TaskId": "",
241
+ "Uin": "",
242
+ "VULName": "nginx 越界写入漏洞(CVE-2022-41742)",
243
+ "VULType": "处理逻辑错误",
244
+ "VULURL": ""
245
+ },
246
+ {
247
+ "AffectAsset": "42.192.123.209",
248
+ "AppId": "1300448058",
249
+ "AppName": "-",
250
+ "AppVersion": "-",
251
+ "CVE": "-",
252
+ "CVSS": 0,
253
+ "CWPVersion": 4,
254
+ "Component": "",
255
+ "EMGCVulType": 0,
256
+ "FirstTime": "2023-09-26 16:41:07",
257
+ "From": "云安全中心",
258
+ "HandleTaskId": "",
259
+ "Index": "9f7b3ab47fcf97820bdd1d20cec0f5da",
260
+ "InstanceId": "ins-p1jyrg75",
261
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
262
+ "InstanceType": "CVM",
263
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
264
+ "Level": "high",
265
+ "Nick": "",
266
+ "PCMGRId": "",
267
+ "POCId": "85fa1a25269ee51318abe17dbd7319be",
268
+ "Payload": "username:, password:, nlstResult:['pub'] ",
269
+ "Port": "80",
270
+ "RecentTime": "2023-09-27 11:55:39",
271
+ "RiskId": "3fd56b7aa90aa2d82dc5a09e16a3dc6c",
272
+ "Status": 0,
273
+ "TaskId": "",
274
+ "Uin": "",
275
+ "VULName": "检测到目标FTP服务可匿名访问",
276
+ "VULType": "未授权访问",
277
+ "VULURL": "http://42.192.123.209/"
278
+ },
279
+ {
280
+ "AffectAsset": "42.192.123.209",
281
+ "AppId": "1300448058",
282
+ "AppName": "Nginx",
283
+ "AppVersion": "-",
284
+ "CVE": "CVE-2021-23017",
285
+ "CVSS": 0,
286
+ "CWPVersion": 4,
287
+ "Component": "Nginx",
288
+ "EMGCVulType": 0,
289
+ "FirstTime": "2023-09-26 16:34:50",
290
+ "From": "云安全中心",
291
+ "HandleTaskId": "",
292
+ "Index": "5af1a3e8be94b821f9f88ba1275e0eb1",
293
+ "InstanceId": "ins-p1jyrg75",
294
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
295
+ "InstanceType": "CVM",
296
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
297
+ "Level": "high",
298
+ "Nick": "",
299
+ "PCMGRId": "",
300
+ "POCId": "b6b554295a36babb8f5dd308ab91e7a0",
301
+ "Payload": "nginx/1.14.1",
302
+ "Port": "80",
303
+ "RecentTime": "2023-09-27 11:49:10",
304
+ "RiskId": "4a2c3dfabf00f0f67e2bf6af373eb0d8",
305
+ "Status": 0,
306
+ "TaskId": "",
307
+ "Uin": "",
308
+ "VULName": "nginx 安全漏洞(CVE-2021-23017)",
309
+ "VULType": "其他",
310
+ "VULURL": ""
311
+ },
312
+ {
313
+ "AffectAsset": "81.69.38.139",
314
+ "AppId": "1300448058",
315
+ "AppName": "Nginx",
316
+ "AppVersion": "-",
317
+ "CVE": "CVE-2021-23017",
318
+ "CVSS": 0,
319
+ "CWPVersion": 4,
320
+ "Component": "Nginx",
321
+ "EMGCVulType": 0,
322
+ "FirstTime": "2023-09-26 16:34:50",
323
+ "From": "云安全中心",
324
+ "HandleTaskId": "",
325
+ "Index": "5324188b8413cec59971463187276526",
326
+ "InstanceId": "ins-17ye5faf",
327
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
328
+ "InstanceType": "CVM",
329
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
330
+ "Level": "high",
331
+ "Nick": "",
332
+ "PCMGRId": "",
333
+ "POCId": "b6b554295a36babb8f5dd308ab91e7a0",
334
+ "Payload": "nginx/1.14.1",
335
+ "Port": "80",
336
+ "RecentTime": "2023-09-27 11:49:10",
337
+ "RiskId": "4a2c3dfabf00f0f67e2bf6af373eb0d8",
338
+ "Status": 0,
339
+ "TaskId": "",
340
+ "Uin": "",
341
+ "VULName": "nginx 安全漏洞(CVE-2021-23017)",
342
+ "VULType": "其他",
343
+ "VULURL": ""
344
+ }
345
+ ],
346
+ "FromLists": [
347
+ {
348
+ "Text": "云安全中心",
349
+ "Value": "0"
350
+ },
351
+ {
352
+ "Text": "主机检测",
353
+ "Value": "1"
354
+ },
355
+ {
356
+ "Text": "容器检测",
357
+ "Value": "5"
358
+ }
359
+ ],
360
+ "InstanceTypeLists": [
361
+ {
362
+ "Text": "CVM",
363
+ "Value": "CVM"
364
+ }
365
+ ],
366
+ "LevelLists": [
367
+ {
368
+ "Text": "严重",
369
+ "Value": "extreme"
370
+ },
371
+ {
372
+ "Text": "高危",
373
+ "Value": "high"
374
+ },
375
+ {
376
+ "Text": "中危",
377
+ "Value": "middle"
378
+ },
379
+ {
380
+ "Text": "低危",
381
+ "Value": "low"
382
+ },
383
+ {
384
+ "Text": "提示",
385
+ "Value": "info"
386
+ }
387
+ ],
388
+ "RequestId": "3c68de67-9f7e-442d-b1f0-81191bd1026e",
389
+ "StatusLists": [
390
+ {
391
+ "Text": "未处理",
392
+ "Value": "0"
393
+ },
394
+ {
395
+ "Text": "标记已处置",
396
+ "Value": "1"
397
+ },
398
+ {
399
+ "Text": "已忽略",
400
+ "Value": "2"
401
+ },
402
+ {
403
+ "Text": "已修复",
404
+ "Value": "3"
405
+ }
406
+ ],
407
+ "Tags": [
408
+ {
409
+ "Text": "该漏洞存在在野利用或在野攻击",
410
+ "Value": "KNOWN_EXPLOITED"
411
+ },
412
+ {
413
+ "Text": "该漏洞仅能本地利用",
414
+ "Value": "LOCAL"
415
+ },
416
+ {
417
+ "Text": "该漏洞可作为系统组件漏洞检出",
418
+ "Value": "SYS"
419
+ },
420
+ {
421
+ "Text": "该漏洞可作为应用组件漏洞检出",
422
+ "Value": "APP"
423
+ },
424
+ {
425
+ "Text": "应急",
426
+ "Value": "IS_EMERGENCY"
427
+ },
428
+ {
429
+ "Text": "该漏洞可以远程利用",
430
+ "Value": "NETWORK"
431
+ },
432
+ {
433
+ "Text": "该漏洞有poc",
434
+ "Value": "POC"
435
+ },
436
+ {
437
+ "Text": "必修",
438
+ "Value": "IS_SUGGEST"
439
+ },
440
+ {
441
+ "Text": "该漏洞有exp",
442
+ "Value": "EXP"
443
+ }
444
+ ],
445
+ "TotalCount": 1102,
446
+ "VULTypeLists": [
447
+ {
448
+ "Text": "处理逻辑错误",
449
+ "Value": "处理逻辑错误"
450
+ }
451
+ ]
452
+ }
453
+ }
454
+ ```
455
+