tccli 3.0.1088.1__py2.py3-none-any.whl → 3.0.1090.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/ccc/v20200210/DescribeIvrAudioList.md +32 -0
  3. tccli/examples/ccc/v20200210/UploadIvrAudio.md +22 -0
  4. tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +455 -0
  5. tccli/examples/mongodb/v20190725/FlashBackDBInstance.md +29 -0
  6. tccli/examples/ssl/v20191205/DeployCertificateInstance.md +3 -3
  7. tccli/services/bri/v20190328/api.json +2 -2
  8. tccli/services/ccc/ccc_client.py +110 -4
  9. tccli/services/ccc/v20200210/api.json +248 -0
  10. tccli/services/ccc/v20200210/examples.json +16 -0
  11. tccli/services/csip/csip_client.py +53 -0
  12. tccli/services/csip/v20221121/api.json +518 -0
  13. tccli/services/csip/v20221121/examples.json +8 -0
  14. tccli/services/cvm/v20170312/api.json +1 -1
  15. tccli/services/ess/v20201111/api.json +18 -0
  16. tccli/services/essbasic/v20210526/api.json +18 -0
  17. tccli/services/lcic/v20220817/api.json +5 -5
  18. tccli/services/lighthouse/v20200324/api.json +1 -1
  19. tccli/services/live/v20180801/api.json +33 -0
  20. tccli/services/mongodb/mongodb_client.py +67 -14
  21. tccli/services/mongodb/v20190725/api.json +161 -0
  22. tccli/services/mongodb/v20190725/examples.json +8 -0
  23. tccli/services/ssl/v20191205/api.json +11 -2
  24. tccli/services/ssl/v20191205/examples.json +2 -2
  25. tccli/services/vpc/v20170312/api.json +10 -0
  26. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/METADATA +2 -2
  27. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/RECORD +30 -26
  28. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/WHEEL +0 -0
  29. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/entry_points.txt +0 -0
  30. {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/license_files/LICENSE +0 -0
tccli/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = '3.0.1088.1'
1
+ __version__ = '3.0.1090.1'
@@ -0,0 +1,32 @@
1
+ **Example 1: 查询IVR音频文件列表示例**
2
+
3
+
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli ccc DescribeIvrAudioList --cli-unfold-argument \
9
+ --SdkAppId 160000000 \
10
+ --CustomFileName abc \
11
+ --PageSize 1 \
12
+ --PageNumber 0
13
+ ```
14
+
15
+ Output:
16
+ ```
17
+ {
18
+ "Response": {
19
+ "TotalCount": 1,
20
+ "FileInfo": [
21
+ {
22
+ "FileId": 1,
23
+ "CustomFileName": "abc",
24
+ "AudioFileName": "a.mp3",
25
+ "Status": 0
26
+ }
27
+ ],
28
+ "RequestId": "abc"
29
+ }
30
+ }
31
+ ```
32
+
@@ -0,0 +1,22 @@
1
+ **Example 1: 上传IVR音频文件**
2
+
3
+
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli ccc UploadIvrAudio --cli-unfold-argument \
9
+ --SdkAppId 0 \
10
+ --AudioList.0.CustomFileName abc \
11
+ --AudioList.0.AudioUrl http://xxxx.com/a.mp3
12
+ ```
13
+
14
+ Output:
15
+ ```
16
+ {
17
+ "Response": {
18
+ "RequestId": "abc"
19
+ }
20
+ }
21
+ ```
22
+
@@ -0,0 +1,455 @@
1
+ **Example 1: success1**
2
+
3
+ success1
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli csip DescribeAssetViewVulRiskList --cli-unfold-argument ```
9
+
10
+ Output:
11
+ ```
12
+ {
13
+ "Response": {
14
+ "Data": [
15
+ {
16
+ "AffectAsset": "182.254.145.158",
17
+ "AppId": "1300448058",
18
+ "AppName": "OpenSSH",
19
+ "AppVersion": "-",
20
+ "CVE": "CVE-2020-15778",
21
+ "CVSS": 0,
22
+ "CWPVersion": 4,
23
+ "Component": "OpenSSH",
24
+ "EMGCVulType": 0,
25
+ "FirstTime": "2023-09-26 16:34:50",
26
+ "From": "云安全中心",
27
+ "HandleTaskId": "",
28
+ "Index": "360bfa2c7c6f118db22f829991424d7a",
29
+ "InstanceId": "ins-kja8dy5r",
30
+ "InstanceName": "[autotest][勿删]自动化测试NAT1",
31
+ "InstanceType": "CVM",
32
+ "InstanceUUID": "7bb60327-47de-4bce-b979-57166dc89c72",
33
+ "Level": "high",
34
+ "Nick": "",
35
+ "PCMGRId": "",
36
+ "POCId": "c808d8eb0e9c322279c2efa3b82a491c",
37
+ "Payload": "OpenSSH/7.4",
38
+ "Port": "22",
39
+ "RecentTime": "2023-09-27 11:49:10",
40
+ "RiskId": "1498f23a853529b3be8cf554629e4533",
41
+ "Status": 0,
42
+ "TaskId": "",
43
+ "Uin": "",
44
+ "VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
45
+ "VULType": "命令注入",
46
+ "VULURL": ""
47
+ },
48
+ {
49
+ "AffectAsset": "42.192.123.209",
50
+ "AppId": "1300448058",
51
+ "AppName": "OpenSSH",
52
+ "AppVersion": "-",
53
+ "CVE": "CVE-2020-15778",
54
+ "CVSS": 0,
55
+ "CWPVersion": 4,
56
+ "Component": "OpenSSH",
57
+ "EMGCVulType": 0,
58
+ "FirstTime": "2023-09-26 16:34:50",
59
+ "From": "云安全中心",
60
+ "HandleTaskId": "",
61
+ "Index": "774b28af351a041b41f246ca43a50b59",
62
+ "InstanceId": "ins-p1jyrg75",
63
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
64
+ "InstanceType": "CVM",
65
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
66
+ "Level": "high",
67
+ "Nick": "",
68
+ "PCMGRId": "",
69
+ "POCId": "c808d8eb0e9c322279c2efa3b82a491c",
70
+ "Payload": "OpenSSH/8.0",
71
+ "Port": "22",
72
+ "RecentTime": "2023-09-27 11:49:10",
73
+ "RiskId": "1498f23a853529b3be8cf554629e4533",
74
+ "Status": 0,
75
+ "TaskId": "",
76
+ "Uin": "",
77
+ "VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
78
+ "VULType": "命令注入",
79
+ "VULURL": ""
80
+ },
81
+ {
82
+ "AffectAsset": "81.69.38.139",
83
+ "AppId": "1300448058",
84
+ "AppName": "OpenSSH",
85
+ "AppVersion": "-",
86
+ "CVE": "CVE-2020-15778",
87
+ "CVSS": 0,
88
+ "CWPVersion": 4,
89
+ "Component": "OpenSSH",
90
+ "EMGCVulType": 0,
91
+ "FirstTime": "2023-09-26 16:34:50",
92
+ "From": "云安全中心",
93
+ "HandleTaskId": "",
94
+ "Index": "e1399eb478bb080626419625f762d23e",
95
+ "InstanceId": "ins-17ye5faf",
96
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
97
+ "InstanceType": "CVM",
98
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
99
+ "Level": "high",
100
+ "Nick": "",
101
+ "PCMGRId": "",
102
+ "POCId": "c808d8eb0e9c322279c2efa3b82a491c",
103
+ "Payload": "OpenSSH/8.0",
104
+ "Port": "22",
105
+ "RecentTime": "2023-09-27 11:49:10",
106
+ "RiskId": "1498f23a853529b3be8cf554629e4533",
107
+ "Status": 0,
108
+ "TaskId": "",
109
+ "Uin": "",
110
+ "VULName": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
111
+ "VULType": "命令注入",
112
+ "VULURL": ""
113
+ },
114
+ {
115
+ "AffectAsset": "42.192.123.209",
116
+ "AppId": "1300448058",
117
+ "AppName": "Nginx",
118
+ "AppVersion": "-",
119
+ "CVE": "CVE-2019-9511",
120
+ "CVSS": 0,
121
+ "CWPVersion": 4,
122
+ "Component": "Nginx",
123
+ "EMGCVulType": 0,
124
+ "FirstTime": "2023-09-26 16:34:50",
125
+ "From": "云安全中心",
126
+ "HandleTaskId": "",
127
+ "Index": "fed411b4775d7f46cd192a45e2877f0b",
128
+ "InstanceId": "ins-p1jyrg75",
129
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
130
+ "InstanceType": "CVM",
131
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
132
+ "Level": "high",
133
+ "Nick": "",
134
+ "PCMGRId": "",
135
+ "POCId": "654f82856a1f02e61941529f4d7bb642",
136
+ "Payload": "nginx/1.14.1",
137
+ "Port": "80",
138
+ "RecentTime": "2023-09-27 11:49:10",
139
+ "RiskId": "28d5b79163e64cd046e6537131ea9e08",
140
+ "Status": 0,
141
+ "TaskId": "",
142
+ "Uin": "",
143
+ "VULName": "nginx 安全漏洞(CVE-2019-9511)",
144
+ "VULType": "其他",
145
+ "VULURL": ""
146
+ },
147
+ {
148
+ "AffectAsset": "81.69.38.139",
149
+ "AppId": "1300448058",
150
+ "AppName": "Nginx",
151
+ "AppVersion": "-",
152
+ "CVE": "CVE-2019-9511",
153
+ "CVSS": 0,
154
+ "CWPVersion": 4,
155
+ "Component": "Nginx",
156
+ "EMGCVulType": 0,
157
+ "FirstTime": "2023-09-26 16:34:50",
158
+ "From": "云安全中心",
159
+ "HandleTaskId": "",
160
+ "Index": "3b4a757f4f20274df5afbf45a9fd961b",
161
+ "InstanceId": "ins-17ye5faf",
162
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
163
+ "InstanceType": "CVM",
164
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
165
+ "Level": "high",
166
+ "Nick": "",
167
+ "PCMGRId": "",
168
+ "POCId": "654f82856a1f02e61941529f4d7bb642",
169
+ "Payload": "nginx/1.14.1",
170
+ "Port": "80",
171
+ "RecentTime": "2023-09-27 11:49:10",
172
+ "RiskId": "28d5b79163e64cd046e6537131ea9e08",
173
+ "Status": 0,
174
+ "TaskId": "",
175
+ "Uin": "",
176
+ "VULName": "nginx 安全漏洞(CVE-2019-9511)",
177
+ "VULType": "其他",
178
+ "VULURL": ""
179
+ },
180
+ {
181
+ "AffectAsset": "42.192.123.209",
182
+ "AppId": "1300448058",
183
+ "AppName": "Nginx",
184
+ "AppVersion": "-",
185
+ "CVE": "CVE-2022-41742",
186
+ "CVSS": 0,
187
+ "CWPVersion": 4,
188
+ "Component": "Nginx",
189
+ "EMGCVulType": 0,
190
+ "FirstTime": "2023-09-26 16:34:50",
191
+ "From": "云安全中心",
192
+ "HandleTaskId": "",
193
+ "Index": "f71a76c67fdfdcfed6164d37a163f3ee",
194
+ "InstanceId": "ins-p1jyrg75",
195
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
196
+ "InstanceType": "CVM",
197
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
198
+ "Level": "high",
199
+ "Nick": "",
200
+ "PCMGRId": "",
201
+ "POCId": "62fb737e4fcabde555e911e4cab32b6a",
202
+ "Payload": "nginx/1.14.1",
203
+ "Port": "80",
204
+ "RecentTime": "2023-09-27 11:49:10",
205
+ "RiskId": "367a544eab01c874b7db69491d78e6d2",
206
+ "Status": 0,
207
+ "TaskId": "",
208
+ "Uin": "",
209
+ "VULName": "nginx 越界写入漏洞(CVE-2022-41742)",
210
+ "VULType": "处理逻辑错误",
211
+ "VULURL": ""
212
+ },
213
+ {
214
+ "AffectAsset": "81.69.38.139",
215
+ "AppId": "1300448058",
216
+ "AppName": "Nginx",
217
+ "AppVersion": "-",
218
+ "CVE": "CVE-2022-41742",
219
+ "CVSS": 0,
220
+ "CWPVersion": 4,
221
+ "Component": "Nginx",
222
+ "EMGCVulType": 0,
223
+ "FirstTime": "2023-09-26 16:34:50",
224
+ "From": "云安全中心",
225
+ "HandleTaskId": "",
226
+ "Index": "8b915d789892bf6ecc516f4e98912c39",
227
+ "InstanceId": "ins-17ye5faf",
228
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
229
+ "InstanceType": "CVM",
230
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
231
+ "Level": "high",
232
+ "Nick": "",
233
+ "PCMGRId": "",
234
+ "POCId": "62fb737e4fcabde555e911e4cab32b6a",
235
+ "Payload": "nginx/1.14.1",
236
+ "Port": "80",
237
+ "RecentTime": "2023-09-27 11:49:10",
238
+ "RiskId": "367a544eab01c874b7db69491d78e6d2",
239
+ "Status": 0,
240
+ "TaskId": "",
241
+ "Uin": "",
242
+ "VULName": "nginx 越界写入漏洞(CVE-2022-41742)",
243
+ "VULType": "处理逻辑错误",
244
+ "VULURL": ""
245
+ },
246
+ {
247
+ "AffectAsset": "42.192.123.209",
248
+ "AppId": "1300448058",
249
+ "AppName": "-",
250
+ "AppVersion": "-",
251
+ "CVE": "-",
252
+ "CVSS": 0,
253
+ "CWPVersion": 4,
254
+ "Component": "",
255
+ "EMGCVulType": 0,
256
+ "FirstTime": "2023-09-26 16:41:07",
257
+ "From": "云安全中心",
258
+ "HandleTaskId": "",
259
+ "Index": "9f7b3ab47fcf97820bdd1d20cec0f5da",
260
+ "InstanceId": "ins-p1jyrg75",
261
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
262
+ "InstanceType": "CVM",
263
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
264
+ "Level": "high",
265
+ "Nick": "",
266
+ "PCMGRId": "",
267
+ "POCId": "85fa1a25269ee51318abe17dbd7319be",
268
+ "Payload": "username:, password:, nlstResult:['pub'] ",
269
+ "Port": "80",
270
+ "RecentTime": "2023-09-27 11:55:39",
271
+ "RiskId": "3fd56b7aa90aa2d82dc5a09e16a3dc6c",
272
+ "Status": 0,
273
+ "TaskId": "",
274
+ "Uin": "",
275
+ "VULName": "检测到目标FTP服务可匿名访问",
276
+ "VULType": "未授权访问",
277
+ "VULURL": "http://42.192.123.209/"
278
+ },
279
+ {
280
+ "AffectAsset": "42.192.123.209",
281
+ "AppId": "1300448058",
282
+ "AppName": "Nginx",
283
+ "AppVersion": "-",
284
+ "CVE": "CVE-2021-23017",
285
+ "CVSS": 0,
286
+ "CWPVersion": 4,
287
+ "Component": "Nginx",
288
+ "EMGCVulType": 0,
289
+ "FirstTime": "2023-09-26 16:34:50",
290
+ "From": "云安全中心",
291
+ "HandleTaskId": "",
292
+ "Index": "5af1a3e8be94b821f9f88ba1275e0eb1",
293
+ "InstanceId": "ins-p1jyrg75",
294
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
295
+ "InstanceType": "CVM",
296
+ "InstanceUUID": "bdc338d2-eaaf-4b17-9708-9e9bd26806ae",
297
+ "Level": "high",
298
+ "Nick": "",
299
+ "PCMGRId": "",
300
+ "POCId": "b6b554295a36babb8f5dd308ab91e7a0",
301
+ "Payload": "nginx/1.14.1",
302
+ "Port": "80",
303
+ "RecentTime": "2023-09-27 11:49:10",
304
+ "RiskId": "4a2c3dfabf00f0f67e2bf6af373eb0d8",
305
+ "Status": 0,
306
+ "TaskId": "",
307
+ "Uin": "",
308
+ "VULName": "nginx 安全漏洞(CVE-2021-23017)",
309
+ "VULType": "其他",
310
+ "VULURL": ""
311
+ },
312
+ {
313
+ "AffectAsset": "81.69.38.139",
314
+ "AppId": "1300448058",
315
+ "AppName": "Nginx",
316
+ "AppVersion": "-",
317
+ "CVE": "CVE-2021-23017",
318
+ "CVSS": 0,
319
+ "CWPVersion": 4,
320
+ "Component": "Nginx",
321
+ "EMGCVulType": 0,
322
+ "FirstTime": "2023-09-26 16:34:50",
323
+ "From": "云安全中心",
324
+ "HandleTaskId": "",
325
+ "Index": "5324188b8413cec59971463187276526",
326
+ "InstanceId": "ins-17ye5faf",
327
+ "InstanceName": "[autotest][勿删]自动化测试VPC",
328
+ "InstanceType": "CVM",
329
+ "InstanceUUID": "9910883f-ca69-41b8-8f41-6b399b30a053",
330
+ "Level": "high",
331
+ "Nick": "",
332
+ "PCMGRId": "",
333
+ "POCId": "b6b554295a36babb8f5dd308ab91e7a0",
334
+ "Payload": "nginx/1.14.1",
335
+ "Port": "80",
336
+ "RecentTime": "2023-09-27 11:49:10",
337
+ "RiskId": "4a2c3dfabf00f0f67e2bf6af373eb0d8",
338
+ "Status": 0,
339
+ "TaskId": "",
340
+ "Uin": "",
341
+ "VULName": "nginx 安全漏洞(CVE-2021-23017)",
342
+ "VULType": "其他",
343
+ "VULURL": ""
344
+ }
345
+ ],
346
+ "FromLists": [
347
+ {
348
+ "Text": "云安全中心",
349
+ "Value": "0"
350
+ },
351
+ {
352
+ "Text": "主机检测",
353
+ "Value": "1"
354
+ },
355
+ {
356
+ "Text": "容器检测",
357
+ "Value": "5"
358
+ }
359
+ ],
360
+ "InstanceTypeLists": [
361
+ {
362
+ "Text": "CVM",
363
+ "Value": "CVM"
364
+ }
365
+ ],
366
+ "LevelLists": [
367
+ {
368
+ "Text": "严重",
369
+ "Value": "extreme"
370
+ },
371
+ {
372
+ "Text": "高危",
373
+ "Value": "high"
374
+ },
375
+ {
376
+ "Text": "中危",
377
+ "Value": "middle"
378
+ },
379
+ {
380
+ "Text": "低危",
381
+ "Value": "low"
382
+ },
383
+ {
384
+ "Text": "提示",
385
+ "Value": "info"
386
+ }
387
+ ],
388
+ "RequestId": "3c68de67-9f7e-442d-b1f0-81191bd1026e",
389
+ "StatusLists": [
390
+ {
391
+ "Text": "未处理",
392
+ "Value": "0"
393
+ },
394
+ {
395
+ "Text": "标记已处置",
396
+ "Value": "1"
397
+ },
398
+ {
399
+ "Text": "已忽略",
400
+ "Value": "2"
401
+ },
402
+ {
403
+ "Text": "已修复",
404
+ "Value": "3"
405
+ }
406
+ ],
407
+ "Tags": [
408
+ {
409
+ "Text": "该漏洞存在在野利用或在野攻击",
410
+ "Value": "KNOWN_EXPLOITED"
411
+ },
412
+ {
413
+ "Text": "该漏洞仅能本地利用",
414
+ "Value": "LOCAL"
415
+ },
416
+ {
417
+ "Text": "该漏洞可作为系统组件漏洞检出",
418
+ "Value": "SYS"
419
+ },
420
+ {
421
+ "Text": "该漏洞可作为应用组件漏洞检出",
422
+ "Value": "APP"
423
+ },
424
+ {
425
+ "Text": "应急",
426
+ "Value": "IS_EMERGENCY"
427
+ },
428
+ {
429
+ "Text": "该漏洞可以远程利用",
430
+ "Value": "NETWORK"
431
+ },
432
+ {
433
+ "Text": "该漏洞有poc",
434
+ "Value": "POC"
435
+ },
436
+ {
437
+ "Text": "必修",
438
+ "Value": "IS_SUGGEST"
439
+ },
440
+ {
441
+ "Text": "该漏洞有exp",
442
+ "Value": "EXP"
443
+ }
444
+ ],
445
+ "TotalCount": 1102,
446
+ "VULTypeLists": [
447
+ {
448
+ "Text": "处理逻辑错误",
449
+ "Value": "处理逻辑错误"
450
+ }
451
+ ]
452
+ }
453
+ }
454
+ ```
455
+
@@ -0,0 +1,29 @@
1
+ **Example 1: 执行按key回档**
2
+
3
+
4
+
5
+ Input:
6
+
7
+ ```
8
+ tccli mongodb FlashBackDBInstance --cli-unfold-argument \
9
+ --InstanceId cmgo-igjysqkr \
10
+ --TargetFlashbackTime 2023-08-04 14:00:00 \
11
+ --TargetDatabases.0.DBName my_test \
12
+ --TargetDatabases.0.Collections.0.CollectionName my_test1 \
13
+ --TargetDatabases.0.Collections.0.KeyValues.0.Key name \
14
+ --TargetDatabases.0.Collections.0.KeyValues.0.Value abc \
15
+ --TargetDatabases.0.Collections.0.TargetResultCollectionName my_test_bak0804143230 \
16
+ --TargetDatabases.0.Collections.0.FilterKey name \
17
+ --TargetInstanceId cmgo-05173fe7
18
+ ```
19
+
20
+ Output:
21
+ ```
22
+ {
23
+ "Response": {
24
+ "FlowId": 1234567,
25
+ "RequestId": "abc"
26
+ }
27
+ }
28
+ ```
29
+
@@ -1,6 +1,6 @@
1
1
  **Example 1: 证书部署到clb云资源实例列表**
2
2
 
3
- 证书部署到clb云资源实例列表
3
+ 证书部署到clb云资源实例列表, 若部署的监听器开启了SNI,则InstanceIdList传参需要到域名, 若未开启SNI, InstanceIdList只需要到监听器
4
4
 
5
5
  Input:
6
6
 
@@ -14,9 +14,9 @@ Output:
14
14
  ```
15
15
  {
16
16
  "Response": {
17
- "DeployStatus": 0,
18
17
  "DeployRecordId": 1,
19
- "RequestId": "xx"
18
+ "DeployStatus": 0,
19
+ "RequestId": "abc"
20
20
  }
21
21
  }
22
22
  ```
@@ -1,11 +1,11 @@
1
1
  {
2
2
  "actions": {
3
3
  "DescribeBRI": {
4
- "document": "输入业务名 (bri_num, bri_dev, bri_ip, bri_apk, bri_url, bri_social 六种之一) 及其 相应字段, 获取业务风险分数和标签。\n\n当业务名为bri_num时,必须填PhoneNumber字段.\n\n当业务名为bri_dev时, 必须填Imei字段.\n\n当业务名为bri_ip时,必须填IP字段.\n\n当业务名为bri_apk时,必须填 (PackageName,CertMd5,FileSize) 三个字段 或者 FileMd5一个字段.\n\n当业务名为bri_url时,必须填Url字段.\n\n当业务名为bri_social时,必须填QQ和Wechat字段两者其中一个或者两个.",
4
+ "document": "产品不在使用,业务已经下线\n\n输入业务名 (bri_num, bri_dev, bri_ip, bri_apk, bri_url, bri_social 六种之一) 及其 相应字段, 获取业务风险分数和标签。\n\n当业务名为bri_num时,必须填PhoneNumber字段.\n\n当业务名为bri_dev时, 必须填Imei字段.\n\n当业务名为bri_ip时,必须填IP字段.\n\n当业务名为bri_apk时,必须填 (PackageName,CertMd5,FileSize) 三个字段 或者 FileMd5一个字段.\n\n当业务名为bri_url时,必须填Url字段.\n\n当业务名为bri_social时,必须填QQ和Wechat字段两者其中一个或者两个.",
5
5
  "input": "DescribeBRIRequest",
6
6
  "name": "获取业务风险情报",
7
7
  "output": "DescribeBRIResponse",
8
- "status": "online"
8
+ "status": "deprecated"
9
9
  }
10
10
  },
11
11
  "metadata": {