tccli 3.0.1088.1__py2.py3-none-any.whl → 3.0.1089.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/examples/ccc/v20200210/DescribeIvrAudioList.md +32 -0
- tccli/examples/ccc/v20200210/UploadIvrAudio.md +22 -0
- tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +455 -0
- tccli/services/ccc/ccc_client.py +110 -4
- tccli/services/ccc/v20200210/api.json +248 -0
- tccli/services/ccc/v20200210/examples.json +16 -0
- tccli/services/csip/csip_client.py +53 -0
- tccli/services/csip/v20221121/api.json +518 -0
- tccli/services/csip/v20221121/examples.json +8 -0
- tccli/services/cvm/v20170312/api.json +1 -1
- tccli/services/live/v20180801/api.json +33 -0
- tccli/services/vpc/v20170312/api.json +10 -0
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1089.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1089.1.dist-info}/RECORD +18 -15
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1089.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1089.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1089.1.dist-info}/license_files/LICENSE +0 -0
tccli/__init__.py
CHANGED
@@ -1 +1 @@
|
|
1
|
-
__version__ = '3.0.
|
1
|
+
__version__ = '3.0.1089.1'
|
@@ -0,0 +1,32 @@
|
|
1
|
+
**Example 1: 查询IVR音频文件列表示例**
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Input:
|
6
|
+
|
7
|
+
```
|
8
|
+
tccli ccc DescribeIvrAudioList --cli-unfold-argument \
|
9
|
+
--SdkAppId 160000000 \
|
10
|
+
--CustomFileName abc \
|
11
|
+
--PageSize 1 \
|
12
|
+
--PageNumber 0
|
13
|
+
```
|
14
|
+
|
15
|
+
Output:
|
16
|
+
```
|
17
|
+
{
|
18
|
+
"Response": {
|
19
|
+
"TotalCount": 1,
|
20
|
+
"FileInfo": [
|
21
|
+
{
|
22
|
+
"FileId": 1,
|
23
|
+
"CustomFileName": "abc",
|
24
|
+
"AudioFileName": "a.mp3",
|
25
|
+
"Status": 0
|
26
|
+
}
|
27
|
+
],
|
28
|
+
"RequestId": "abc"
|
29
|
+
}
|
30
|
+
}
|
31
|
+
```
|
32
|
+
|
@@ -0,0 +1,22 @@
|
|
1
|
+
**Example 1: 上传IVR音频文件**
|
2
|
+
|
3
|
+
|
4
|
+
|
5
|
+
Input:
|
6
|
+
|
7
|
+
```
|
8
|
+
tccli ccc UploadIvrAudio --cli-unfold-argument \
|
9
|
+
--SdkAppId 0 \
|
10
|
+
--AudioList.0.CustomFileName abc \
|
11
|
+
--AudioList.0.AudioUrl http://xxxx.com/a.mp3
|
12
|
+
```
|
13
|
+
|
14
|
+
Output:
|
15
|
+
```
|
16
|
+
{
|
17
|
+
"Response": {
|
18
|
+
"RequestId": "abc"
|
19
|
+
}
|
20
|
+
}
|
21
|
+
```
|
22
|
+
|
@@ -0,0 +1,455 @@
|
|
1
|
+
**Example 1: success1**
|
2
|
+
|
3
|
+
success1
|
4
|
+
|
5
|
+
Input:
|
6
|
+
|
7
|
+
```
|
8
|
+
tccli csip DescribeAssetViewVulRiskList --cli-unfold-argument ```
|
9
|
+
|
10
|
+
Output:
|
11
|
+
```
|
12
|
+
{
|
13
|
+
"Response": {
|
14
|
+
"Data": [
|
15
|
+
{
|
16
|
+
"AffectAsset": "182.254.145.158",
|
17
|
+
"AppId": "1300448058",
|
18
|
+
"AppName": "OpenSSH",
|
19
|
+
"AppVersion": "-",
|
20
|
+
"CVE": "CVE-2020-15778",
|
21
|
+
"CVSS": 0,
|
22
|
+
"CWPVersion": 4,
|
23
|
+
"Component": "OpenSSH",
|
24
|
+
"EMGCVulType": 0,
|
25
|
+
"FirstTime": "2023-09-26 16:34:50",
|
26
|
+
"From": "云安全中心",
|
27
|
+
"HandleTaskId": "",
|
28
|
+
"Index": "360bfa2c7c6f118db22f829991424d7a",
|
29
|
+
"InstanceId": "ins-kja8dy5r",
|
30
|
+
"InstanceName": "[autotest][勿删]自动化测试NAT1",
|
31
|
+
"InstanceType": "CVM",
|
32
|
+
"InstanceUUID": "7bb60327-47de-4bce-b979-57166dc89c72",
|
33
|
+
"Level": "high",
|
34
|
+
"Nick": "",
|
35
|
+
"PCMGRId": "",
|
36
|
+
"POCId": "c808d8eb0e9c322279c2efa3b82a491c",
|
37
|
+
"Payload": "OpenSSH/7.4",
|
38
|
+
"Port": "22",
|
39
|
+
"RecentTime": "2023-09-27 11:49:10",
|
40
|
+
"RiskId": "1498f23a853529b3be8cf554629e4533",
|
41
|
+
"Status": 0,
|
42
|
+
"TaskId": "",
|
43
|
+
"Uin": "",
|
44
|
+
"VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
|
45
|
+
"VULType": "命令注入",
|
46
|
+
"VULURL": ""
|
47
|
+
},
|
48
|
+
{
|
49
|
+
"AffectAsset": "42.192.123.209",
|
50
|
+
"AppId": "1300448058",
|
51
|
+
"AppName": "OpenSSH",
|
52
|
+
"AppVersion": "-",
|
53
|
+
"CVE": "CVE-2020-15778",
|
54
|
+
"CVSS": 0,
|
55
|
+
"CWPVersion": 4,
|
56
|
+
"Component": "OpenSSH",
|
57
|
+
"EMGCVulType": 0,
|
58
|
+
"FirstTime": "2023-09-26 16:34:50",
|
59
|
+
"From": "云安全中心",
|
60
|
+
"HandleTaskId": "",
|
61
|
+
"Index": "774b28af351a041b41f246ca43a50b59",
|
62
|
+
"InstanceId": "ins-p1jyrg75",
|
63
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
64
|
+
"InstanceType": "CVM",
|
65
|
+
"InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
|
66
|
+
"Level": "high",
|
67
|
+
"Nick": "",
|
68
|
+
"PCMGRId": "",
|
69
|
+
"POCId": "c808d8eb0e9c322279c2efa3b82a491c",
|
70
|
+
"Payload": "OpenSSH/8.0",
|
71
|
+
"Port": "22",
|
72
|
+
"RecentTime": "2023-09-27 11:49:10",
|
73
|
+
"RiskId": "1498f23a853529b3be8cf554629e4533",
|
74
|
+
"Status": 0,
|
75
|
+
"TaskId": "",
|
76
|
+
"Uin": "",
|
77
|
+
"VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
|
78
|
+
"VULType": "命令注入",
|
79
|
+
"VULURL": ""
|
80
|
+
},
|
81
|
+
{
|
82
|
+
"AffectAsset": "81.69.38.139",
|
83
|
+
"AppId": "1300448058",
|
84
|
+
"AppName": "OpenSSH",
|
85
|
+
"AppVersion": "-",
|
86
|
+
"CVE": "CVE-2020-15778",
|
87
|
+
"CVSS": 0,
|
88
|
+
"CWPVersion": 4,
|
89
|
+
"Component": "OpenSSH",
|
90
|
+
"EMGCVulType": 0,
|
91
|
+
"FirstTime": "2023-09-26 16:34:50",
|
92
|
+
"From": "云安全中心",
|
93
|
+
"HandleTaskId": "",
|
94
|
+
"Index": "e1399eb478bb080626419625f762d23e",
|
95
|
+
"InstanceId": "ins-17ye5faf",
|
96
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
97
|
+
"InstanceType": "CVM",
|
98
|
+
"InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
|
99
|
+
"Level": "high",
|
100
|
+
"Nick": "",
|
101
|
+
"PCMGRId": "",
|
102
|
+
"POCId": "c808d8eb0e9c322279c2efa3b82a491c",
|
103
|
+
"Payload": "OpenSSH/8.0",
|
104
|
+
"Port": "22",
|
105
|
+
"RecentTime": "2023-09-27 11:49:10",
|
106
|
+
"RiskId": "1498f23a853529b3be8cf554629e4533",
|
107
|
+
"Status": 0,
|
108
|
+
"TaskId": "",
|
109
|
+
"Uin": "",
|
110
|
+
"VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
|
111
|
+
"VULType": "命令注入",
|
112
|
+
"VULURL": ""
|
113
|
+
},
|
114
|
+
{
|
115
|
+
"AffectAsset": "42.192.123.209",
|
116
|
+
"AppId": "1300448058",
|
117
|
+
"AppName": "Nginx",
|
118
|
+
"AppVersion": "-",
|
119
|
+
"CVE": "CVE-2019-9511",
|
120
|
+
"CVSS": 0,
|
121
|
+
"CWPVersion": 4,
|
122
|
+
"Component": "Nginx",
|
123
|
+
"EMGCVulType": 0,
|
124
|
+
"FirstTime": "2023-09-26 16:34:50",
|
125
|
+
"From": "云安全中心",
|
126
|
+
"HandleTaskId": "",
|
127
|
+
"Index": "fed411b4775d7f46cd192a45e2877f0b",
|
128
|
+
"InstanceId": "ins-p1jyrg75",
|
129
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
130
|
+
"InstanceType": "CVM",
|
131
|
+
"InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
|
132
|
+
"Level": "high",
|
133
|
+
"Nick": "",
|
134
|
+
"PCMGRId": "",
|
135
|
+
"POCId": "654f82856a1f02e61941529f4d7bb642",
|
136
|
+
"Payload": "nginx/1.14.1",
|
137
|
+
"Port": "80",
|
138
|
+
"RecentTime": "2023-09-27 11:49:10",
|
139
|
+
"RiskId": "28d5b79163e64cd046e6537131ea9e08",
|
140
|
+
"Status": 0,
|
141
|
+
"TaskId": "",
|
142
|
+
"Uin": "",
|
143
|
+
"VULName": "nginx 安全漏洞(CVE-2019-9511)",
|
144
|
+
"VULType": "其他",
|
145
|
+
"VULURL": ""
|
146
|
+
},
|
147
|
+
{
|
148
|
+
"AffectAsset": "81.69.38.139",
|
149
|
+
"AppId": "1300448058",
|
150
|
+
"AppName": "Nginx",
|
151
|
+
"AppVersion": "-",
|
152
|
+
"CVE": "CVE-2019-9511",
|
153
|
+
"CVSS": 0,
|
154
|
+
"CWPVersion": 4,
|
155
|
+
"Component": "Nginx",
|
156
|
+
"EMGCVulType": 0,
|
157
|
+
"FirstTime": "2023-09-26 16:34:50",
|
158
|
+
"From": "云安全中心",
|
159
|
+
"HandleTaskId": "",
|
160
|
+
"Index": "3b4a757f4f20274df5afbf45a9fd961b",
|
161
|
+
"InstanceId": "ins-17ye5faf",
|
162
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
163
|
+
"InstanceType": "CVM",
|
164
|
+
"InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
|
165
|
+
"Level": "high",
|
166
|
+
"Nick": "",
|
167
|
+
"PCMGRId": "",
|
168
|
+
"POCId": "654f82856a1f02e61941529f4d7bb642",
|
169
|
+
"Payload": "nginx/1.14.1",
|
170
|
+
"Port": "80",
|
171
|
+
"RecentTime": "2023-09-27 11:49:10",
|
172
|
+
"RiskId": "28d5b79163e64cd046e6537131ea9e08",
|
173
|
+
"Status": 0,
|
174
|
+
"TaskId": "",
|
175
|
+
"Uin": "",
|
176
|
+
"VULName": "nginx 安全漏洞(CVE-2019-9511)",
|
177
|
+
"VULType": "其他",
|
178
|
+
"VULURL": ""
|
179
|
+
},
|
180
|
+
{
|
181
|
+
"AffectAsset": "42.192.123.209",
|
182
|
+
"AppId": "1300448058",
|
183
|
+
"AppName": "Nginx",
|
184
|
+
"AppVersion": "-",
|
185
|
+
"CVE": "CVE-2022-41742",
|
186
|
+
"CVSS": 0,
|
187
|
+
"CWPVersion": 4,
|
188
|
+
"Component": "Nginx",
|
189
|
+
"EMGCVulType": 0,
|
190
|
+
"FirstTime": "2023-09-26 16:34:50",
|
191
|
+
"From": "云安全中心",
|
192
|
+
"HandleTaskId": "",
|
193
|
+
"Index": "f71a76c67fdfdcfed6164d37a163f3ee",
|
194
|
+
"InstanceId": "ins-p1jyrg75",
|
195
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
196
|
+
"InstanceType": "CVM",
|
197
|
+
"InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
|
198
|
+
"Level": "high",
|
199
|
+
"Nick": "",
|
200
|
+
"PCMGRId": "",
|
201
|
+
"POCId": "62fb737e4fcabde555e911e4cab32b6a",
|
202
|
+
"Payload": "nginx/1.14.1",
|
203
|
+
"Port": "80",
|
204
|
+
"RecentTime": "2023-09-27 11:49:10",
|
205
|
+
"RiskId": "367a544eab01c874b7db69491d78e6d2",
|
206
|
+
"Status": 0,
|
207
|
+
"TaskId": "",
|
208
|
+
"Uin": "",
|
209
|
+
"VULName": "nginx 越界写入漏洞(CVE-2022-41742)",
|
210
|
+
"VULType": "处理逻辑错误",
|
211
|
+
"VULURL": ""
|
212
|
+
},
|
213
|
+
{
|
214
|
+
"AffectAsset": "81.69.38.139",
|
215
|
+
"AppId": "1300448058",
|
216
|
+
"AppName": "Nginx",
|
217
|
+
"AppVersion": "-",
|
218
|
+
"CVE": "CVE-2022-41742",
|
219
|
+
"CVSS": 0,
|
220
|
+
"CWPVersion": 4,
|
221
|
+
"Component": "Nginx",
|
222
|
+
"EMGCVulType": 0,
|
223
|
+
"FirstTime": "2023-09-26 16:34:50",
|
224
|
+
"From": "云安全中心",
|
225
|
+
"HandleTaskId": "",
|
226
|
+
"Index": "8b915d789892bf6ecc516f4e98912c39",
|
227
|
+
"InstanceId": "ins-17ye5faf",
|
228
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
229
|
+
"InstanceType": "CVM",
|
230
|
+
"InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
|
231
|
+
"Level": "high",
|
232
|
+
"Nick": "",
|
233
|
+
"PCMGRId": "",
|
234
|
+
"POCId": "62fb737e4fcabde555e911e4cab32b6a",
|
235
|
+
"Payload": "nginx/1.14.1",
|
236
|
+
"Port": "80",
|
237
|
+
"RecentTime": "2023-09-27 11:49:10",
|
238
|
+
"RiskId": "367a544eab01c874b7db69491d78e6d2",
|
239
|
+
"Status": 0,
|
240
|
+
"TaskId": "",
|
241
|
+
"Uin": "",
|
242
|
+
"VULName": "nginx 越界写入漏洞(CVE-2022-41742)",
|
243
|
+
"VULType": "处理逻辑错误",
|
244
|
+
"VULURL": ""
|
245
|
+
},
|
246
|
+
{
|
247
|
+
"AffectAsset": "42.192.123.209",
|
248
|
+
"AppId": "1300448058",
|
249
|
+
"AppName": "-",
|
250
|
+
"AppVersion": "-",
|
251
|
+
"CVE": "-",
|
252
|
+
"CVSS": 0,
|
253
|
+
"CWPVersion": 4,
|
254
|
+
"Component": "",
|
255
|
+
"EMGCVulType": 0,
|
256
|
+
"FirstTime": "2023-09-26 16:41:07",
|
257
|
+
"From": "云安全中心",
|
258
|
+
"HandleTaskId": "",
|
259
|
+
"Index": "9f7b3ab47fcf97820bdd1d20cec0f5da",
|
260
|
+
"InstanceId": "ins-p1jyrg75",
|
261
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
262
|
+
"InstanceType": "CVM",
|
263
|
+
"InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
|
264
|
+
"Level": "high",
|
265
|
+
"Nick": "",
|
266
|
+
"PCMGRId": "",
|
267
|
+
"POCId": "85fa1a25269ee51318abe17dbd7319be",
|
268
|
+
"Payload": "username:, password:, nlstResult:['pub'] ",
|
269
|
+
"Port": "80",
|
270
|
+
"RecentTime": "2023-09-27 11:55:39",
|
271
|
+
"RiskId": "3fd56b7aa90aa2d82dc5a09e16a3dc6c",
|
272
|
+
"Status": 0,
|
273
|
+
"TaskId": "",
|
274
|
+
"Uin": "",
|
275
|
+
"VULName": "检测到目标FTP服务可匿名访问",
|
276
|
+
"VULType": "未授权访问",
|
277
|
+
"VULURL": "http://42.192.123.209/"
|
278
|
+
},
|
279
|
+
{
|
280
|
+
"AffectAsset": "42.192.123.209",
|
281
|
+
"AppId": "1300448058",
|
282
|
+
"AppName": "Nginx",
|
283
|
+
"AppVersion": "-",
|
284
|
+
"CVE": "CVE-2021-23017",
|
285
|
+
"CVSS": 0,
|
286
|
+
"CWPVersion": 4,
|
287
|
+
"Component": "Nginx",
|
288
|
+
"EMGCVulType": 0,
|
289
|
+
"FirstTime": "2023-09-26 16:34:50",
|
290
|
+
"From": "云安全中心",
|
291
|
+
"HandleTaskId": "",
|
292
|
+
"Index": "5af1a3e8be94b821f9f88ba1275e0eb1",
|
293
|
+
"InstanceId": "ins-p1jyrg75",
|
294
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
295
|
+
"InstanceType": "CVM",
|
296
|
+
"InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
|
297
|
+
"Level": "high",
|
298
|
+
"Nick": "",
|
299
|
+
"PCMGRId": "",
|
300
|
+
"POCId": "b6b554295a36babb8f5dd308ab91e7a0",
|
301
|
+
"Payload": "nginx/1.14.1",
|
302
|
+
"Port": "80",
|
303
|
+
"RecentTime": "2023-09-27 11:49:10",
|
304
|
+
"RiskId": "4a2c3dfabf00f0f67e2bf6af373eb0d8",
|
305
|
+
"Status": 0,
|
306
|
+
"TaskId": "",
|
307
|
+
"Uin": "",
|
308
|
+
"VULName": "nginx 安全漏洞(CVE-2021-23017)",
|
309
|
+
"VULType": "其他",
|
310
|
+
"VULURL": ""
|
311
|
+
},
|
312
|
+
{
|
313
|
+
"AffectAsset": "81.69.38.139",
|
314
|
+
"AppId": "1300448058",
|
315
|
+
"AppName": "Nginx",
|
316
|
+
"AppVersion": "-",
|
317
|
+
"CVE": "CVE-2021-23017",
|
318
|
+
"CVSS": 0,
|
319
|
+
"CWPVersion": 4,
|
320
|
+
"Component": "Nginx",
|
321
|
+
"EMGCVulType": 0,
|
322
|
+
"FirstTime": "2023-09-26 16:34:50",
|
323
|
+
"From": "云安全中心",
|
324
|
+
"HandleTaskId": "",
|
325
|
+
"Index": "5324188b8413cec59971463187276526",
|
326
|
+
"InstanceId": "ins-17ye5faf",
|
327
|
+
"InstanceName": "[autotest][勿删]自动化测试VPC",
|
328
|
+
"InstanceType": "CVM",
|
329
|
+
"InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
|
330
|
+
"Level": "high",
|
331
|
+
"Nick": "",
|
332
|
+
"PCMGRId": "",
|
333
|
+
"POCId": "b6b554295a36babb8f5dd308ab91e7a0",
|
334
|
+
"Payload": "nginx/1.14.1",
|
335
|
+
"Port": "80",
|
336
|
+
"RecentTime": "2023-09-27 11:49:10",
|
337
|
+
"RiskId": "4a2c3dfabf00f0f67e2bf6af373eb0d8",
|
338
|
+
"Status": 0,
|
339
|
+
"TaskId": "",
|
340
|
+
"Uin": "",
|
341
|
+
"VULName": "nginx 安全漏洞(CVE-2021-23017)",
|
342
|
+
"VULType": "其他",
|
343
|
+
"VULURL": ""
|
344
|
+
}
|
345
|
+
],
|
346
|
+
"FromLists": [
|
347
|
+
{
|
348
|
+
"Text": "云安全中心",
|
349
|
+
"Value": "0"
|
350
|
+
},
|
351
|
+
{
|
352
|
+
"Text": "主机检测",
|
353
|
+
"Value": "1"
|
354
|
+
},
|
355
|
+
{
|
356
|
+
"Text": "容器检测",
|
357
|
+
"Value": "5"
|
358
|
+
}
|
359
|
+
],
|
360
|
+
"InstanceTypeLists": [
|
361
|
+
{
|
362
|
+
"Text": "CVM",
|
363
|
+
"Value": "CVM"
|
364
|
+
}
|
365
|
+
],
|
366
|
+
"LevelLists": [
|
367
|
+
{
|
368
|
+
"Text": "严重",
|
369
|
+
"Value": "extreme"
|
370
|
+
},
|
371
|
+
{
|
372
|
+
"Text": "高危",
|
373
|
+
"Value": "high"
|
374
|
+
},
|
375
|
+
{
|
376
|
+
"Text": "中危",
|
377
|
+
"Value": "middle"
|
378
|
+
},
|
379
|
+
{
|
380
|
+
"Text": "低危",
|
381
|
+
"Value": "low"
|
382
|
+
},
|
383
|
+
{
|
384
|
+
"Text": "提示",
|
385
|
+
"Value": "info"
|
386
|
+
}
|
387
|
+
],
|
388
|
+
"RequestId": "3c68de67-9f7e-442d-b1f0-81191bd1026e",
|
389
|
+
"StatusLists": [
|
390
|
+
{
|
391
|
+
"Text": "未处理",
|
392
|
+
"Value": "0"
|
393
|
+
},
|
394
|
+
{
|
395
|
+
"Text": "标记已处置",
|
396
|
+
"Value": "1"
|
397
|
+
},
|
398
|
+
{
|
399
|
+
"Text": "已忽略",
|
400
|
+
"Value": "2"
|
401
|
+
},
|
402
|
+
{
|
403
|
+
"Text": "已修复",
|
404
|
+
"Value": "3"
|
405
|
+
}
|
406
|
+
],
|
407
|
+
"Tags": [
|
408
|
+
{
|
409
|
+
"Text": "该漏洞存在在野利用或在野攻击",
|
410
|
+
"Value": "KNOWN_EXPLOITED"
|
411
|
+
},
|
412
|
+
{
|
413
|
+
"Text": "该漏洞仅能本地利用",
|
414
|
+
"Value": "LOCAL"
|
415
|
+
},
|
416
|
+
{
|
417
|
+
"Text": "该漏洞可作为系统组件漏洞检出",
|
418
|
+
"Value": "SYS"
|
419
|
+
},
|
420
|
+
{
|
421
|
+
"Text": "该漏洞可作为应用组件漏洞检出",
|
422
|
+
"Value": "APP"
|
423
|
+
},
|
424
|
+
{
|
425
|
+
"Text": "应急",
|
426
|
+
"Value": "IS_EMERGENCY"
|
427
|
+
},
|
428
|
+
{
|
429
|
+
"Text": "该漏洞可以远程利用",
|
430
|
+
"Value": "NETWORK"
|
431
|
+
},
|
432
|
+
{
|
433
|
+
"Text": "该漏洞有poc",
|
434
|
+
"Value": "POC"
|
435
|
+
},
|
436
|
+
{
|
437
|
+
"Text": "必修",
|
438
|
+
"Value": "IS_SUGGEST"
|
439
|
+
},
|
440
|
+
{
|
441
|
+
"Text": "该漏洞有exp",
|
442
|
+
"Value": "EXP"
|
443
|
+
}
|
444
|
+
],
|
445
|
+
"TotalCount": 1102,
|
446
|
+
"VULTypeLists": [
|
447
|
+
{
|
448
|
+
"Text": "处理逻辑错误",
|
449
|
+
"Value": "处理逻辑错误"
|
450
|
+
}
|
451
|
+
]
|
452
|
+
}
|
453
|
+
}
|
454
|
+
```
|
455
|
+
|
tccli/services/ccc/ccc_client.py
CHANGED
@@ -589,6 +589,58 @@ def doDescribeIMCdrs(args, parsed_globals):
|
|
589
589
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
590
590
|
|
591
591
|
|
592
|
+
def doCreatePredictiveDialingCampaign(args, parsed_globals):
|
593
|
+
g_param = parse_global_arg(parsed_globals)
|
594
|
+
|
595
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
596
|
+
cred = credential.CVMRoleCredential()
|
597
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
598
|
+
cred = credential.STSAssumeRoleCredential(
|
599
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
600
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
601
|
+
)
|
602
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
603
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
604
|
+
else:
|
605
|
+
cred = credential.Credential(
|
606
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
607
|
+
)
|
608
|
+
http_profile = HttpProfile(
|
609
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
610
|
+
reqMethod="POST",
|
611
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
612
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
613
|
+
)
|
614
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
615
|
+
if g_param[OptionsDefine.Language]:
|
616
|
+
profile.language = g_param[OptionsDefine.Language]
|
617
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
618
|
+
client = mod.CccClient(cred, g_param[OptionsDefine.Region], profile)
|
619
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
620
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
621
|
+
model = models.CreatePredictiveDialingCampaignRequest()
|
622
|
+
model.from_json_string(json.dumps(args))
|
623
|
+
start_time = time.time()
|
624
|
+
while True:
|
625
|
+
rsp = client.CreatePredictiveDialingCampaign(model)
|
626
|
+
result = rsp.to_json_string()
|
627
|
+
try:
|
628
|
+
json_obj = json.loads(result)
|
629
|
+
except TypeError as e:
|
630
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
631
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
632
|
+
break
|
633
|
+
cur_time = time.time()
|
634
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
635
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
636
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
637
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
638
|
+
else:
|
639
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
640
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
641
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
642
|
+
|
643
|
+
|
592
644
|
def doDeleteStaff(args, parsed_globals):
|
593
645
|
g_param = parse_global_arg(parsed_globals)
|
594
646
|
|
@@ -1369,7 +1421,7 @@ def doStopAutoCalloutTask(args, parsed_globals):
|
|
1369
1421
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1370
1422
|
|
1371
1423
|
|
1372
|
-
def
|
1424
|
+
def doDescribeIvrAudioList(args, parsed_globals):
|
1373
1425
|
g_param = parse_global_arg(parsed_globals)
|
1374
1426
|
|
1375
1427
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -1398,11 +1450,11 @@ def doCreatePredictiveDialingCampaign(args, parsed_globals):
|
|
1398
1450
|
client = mod.CccClient(cred, g_param[OptionsDefine.Region], profile)
|
1399
1451
|
client._sdkVersion += ("_CLI_" + __version__)
|
1400
1452
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1401
|
-
model = models.
|
1453
|
+
model = models.DescribeIvrAudioListRequest()
|
1402
1454
|
model.from_json_string(json.dumps(args))
|
1403
1455
|
start_time = time.time()
|
1404
1456
|
while True:
|
1405
|
-
rsp = client.
|
1457
|
+
rsp = client.DescribeIvrAudioList(model)
|
1406
1458
|
result = rsp.to_json_string()
|
1407
1459
|
try:
|
1408
1460
|
json_obj = json.loads(result)
|
@@ -1473,6 +1525,58 @@ def doCreateCarrierPrivilegeNumberApplicant(args, parsed_globals):
|
|
1473
1525
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1474
1526
|
|
1475
1527
|
|
1528
|
+
def doUploadIvrAudio(args, parsed_globals):
|
1529
|
+
g_param = parse_global_arg(parsed_globals)
|
1530
|
+
|
1531
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1532
|
+
cred = credential.CVMRoleCredential()
|
1533
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1534
|
+
cred = credential.STSAssumeRoleCredential(
|
1535
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1536
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1537
|
+
)
|
1538
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1539
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1540
|
+
else:
|
1541
|
+
cred = credential.Credential(
|
1542
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1543
|
+
)
|
1544
|
+
http_profile = HttpProfile(
|
1545
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1546
|
+
reqMethod="POST",
|
1547
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1548
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1549
|
+
)
|
1550
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1551
|
+
if g_param[OptionsDefine.Language]:
|
1552
|
+
profile.language = g_param[OptionsDefine.Language]
|
1553
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1554
|
+
client = mod.CccClient(cred, g_param[OptionsDefine.Region], profile)
|
1555
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1556
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1557
|
+
model = models.UploadIvrAudioRequest()
|
1558
|
+
model.from_json_string(json.dumps(args))
|
1559
|
+
start_time = time.time()
|
1560
|
+
while True:
|
1561
|
+
rsp = client.UploadIvrAudio(model)
|
1562
|
+
result = rsp.to_json_string()
|
1563
|
+
try:
|
1564
|
+
json_obj = json.loads(result)
|
1565
|
+
except TypeError as e:
|
1566
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1567
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1568
|
+
break
|
1569
|
+
cur_time = time.time()
|
1570
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1571
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1572
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1573
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1574
|
+
else:
|
1575
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1576
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1577
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1578
|
+
|
1579
|
+
|
1476
1580
|
def doDescribeActiveCarrierPrivilegeNumber(args, parsed_globals):
|
1477
1581
|
g_param = parse_global_arg(parsed_globals)
|
1478
1582
|
|
@@ -2847,6 +2951,7 @@ ACTION_MAP = {
|
|
2847
2951
|
"BindStaffSkillGroupList": doBindStaffSkillGroupList,
|
2848
2952
|
"BindNumberCallOutSkillGroup": doBindNumberCallOutSkillGroup,
|
2849
2953
|
"DescribeIMCdrs": doDescribeIMCdrs,
|
2954
|
+
"CreatePredictiveDialingCampaign": doCreatePredictiveDialingCampaign,
|
2850
2955
|
"DeleteStaff": doDeleteStaff,
|
2851
2956
|
"ModifyStaff": doModifyStaff,
|
2852
2957
|
"CreateExtension": doCreateExtension,
|
@@ -2862,8 +2967,9 @@ ACTION_MAP = {
|
|
2862
2967
|
"ResumePredictiveDialingCampaign": doResumePredictiveDialingCampaign,
|
2863
2968
|
"DescribeSkillGroupInfoList": doDescribeSkillGroupInfoList,
|
2864
2969
|
"StopAutoCalloutTask": doStopAutoCalloutTask,
|
2865
|
-
"
|
2970
|
+
"DescribeIvrAudioList": doDescribeIvrAudioList,
|
2866
2971
|
"CreateCarrierPrivilegeNumberApplicant": doCreateCarrierPrivilegeNumberApplicant,
|
2972
|
+
"UploadIvrAudio": doUploadIvrAudio,
|
2867
2973
|
"DescribeActiveCarrierPrivilegeNumber": doDescribeActiveCarrierPrivilegeNumber,
|
2868
2974
|
"DescribeChatMessages": doDescribeChatMessages,
|
2869
2975
|
"DescribeCCCBuyInfoList": doDescribeCCCBuyInfoList,
|