tccli 3.0.1088.1__py2.py3-none-any.whl → 3.0.1090.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/examples/ccc/v20200210/DescribeIvrAudioList.md +32 -0
- tccli/examples/ccc/v20200210/UploadIvrAudio.md +22 -0
- tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +455 -0
- tccli/examples/mongodb/v20190725/FlashBackDBInstance.md +29 -0
- tccli/examples/ssl/v20191205/DeployCertificateInstance.md +3 -3
- tccli/services/bri/v20190328/api.json +2 -2
- tccli/services/ccc/ccc_client.py +110 -4
- tccli/services/ccc/v20200210/api.json +248 -0
- tccli/services/ccc/v20200210/examples.json +16 -0
- tccli/services/csip/csip_client.py +53 -0
- tccli/services/csip/v20221121/api.json +518 -0
- tccli/services/csip/v20221121/examples.json +8 -0
- tccli/services/cvm/v20170312/api.json +1 -1
- tccli/services/ess/v20201111/api.json +18 -0
- tccli/services/essbasic/v20210526/api.json +18 -0
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/v20200324/api.json +1 -1
- tccli/services/live/v20180801/api.json +33 -0
- tccli/services/mongodb/mongodb_client.py +67 -14
- tccli/services/mongodb/v20190725/api.json +161 -0
- tccli/services/mongodb/v20190725/examples.json +8 -0
- tccli/services/ssl/v20191205/api.json +11 -2
- tccli/services/ssl/v20191205/examples.json +2 -2
- tccli/services/vpc/v20170312/api.json +10 -0
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/RECORD +30 -26
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1088.1.dist-info → tccli-3.0.1090.1.dist-info}/license_files/LICENSE +0 -0
@@ -35,6 +35,13 @@
|
|
35
35
|
"output": "DeleteRiskScanTaskResponse",
|
36
36
|
"status": "online"
|
37
37
|
},
|
38
|
+
"DescribeAssetViewVulRiskList": {
|
39
|
+
"document": "获取资产视角的漏洞风险列表",
|
40
|
+
"input": "DescribeAssetViewVulRiskListRequest",
|
41
|
+
"name": "漏洞管理-资产视角的漏洞风险列表",
|
42
|
+
"output": "DescribeAssetViewVulRiskListResponse",
|
43
|
+
"status": "online"
|
44
|
+
},
|
38
45
|
"DescribeCVMAssetInfo": {
|
39
46
|
"document": "cvm详情",
|
40
47
|
"input": "DescribeCVMAssetInfoRequest",
|
@@ -1703,6 +1710,392 @@
|
|
1703
1710
|
],
|
1704
1711
|
"usage": "out"
|
1705
1712
|
},
|
1713
|
+
"AssetViewVULRiskData": {
|
1714
|
+
"document": "资产视角的漏洞风险对象",
|
1715
|
+
"members": [
|
1716
|
+
{
|
1717
|
+
"disabled": false,
|
1718
|
+
"document": "影响资产",
|
1719
|
+
"example": "1.1.1.1",
|
1720
|
+
"member": "string",
|
1721
|
+
"name": "AffectAsset",
|
1722
|
+
"output_required": true,
|
1723
|
+
"type": "string",
|
1724
|
+
"value_allowed_null": false
|
1725
|
+
},
|
1726
|
+
{
|
1727
|
+
"disabled": false,
|
1728
|
+
"document": "风险等级,low-低危,high-高危,middle-中危,info-提示,extreme-严重。",
|
1729
|
+
"example": "high",
|
1730
|
+
"member": "string",
|
1731
|
+
"name": "Level",
|
1732
|
+
"output_required": true,
|
1733
|
+
"type": "string",
|
1734
|
+
"value_allowed_null": false
|
1735
|
+
},
|
1736
|
+
{
|
1737
|
+
"disabled": false,
|
1738
|
+
"document": "资产类型",
|
1739
|
+
"example": "CVM",
|
1740
|
+
"member": "string",
|
1741
|
+
"name": "InstanceType",
|
1742
|
+
"output_required": true,
|
1743
|
+
"type": "string",
|
1744
|
+
"value_allowed_null": false
|
1745
|
+
},
|
1746
|
+
{
|
1747
|
+
"disabled": false,
|
1748
|
+
"document": "组件",
|
1749
|
+
"example": "Nginx",
|
1750
|
+
"member": "string",
|
1751
|
+
"name": "Component",
|
1752
|
+
"output_required": true,
|
1753
|
+
"type": "string",
|
1754
|
+
"value_allowed_null": false
|
1755
|
+
},
|
1756
|
+
{
|
1757
|
+
"disabled": false,
|
1758
|
+
"document": "最近识别时间",
|
1759
|
+
"example": "2022-10-10 00:00:00",
|
1760
|
+
"member": "string",
|
1761
|
+
"name": "RecentTime",
|
1762
|
+
"output_required": true,
|
1763
|
+
"type": "string",
|
1764
|
+
"value_allowed_null": false
|
1765
|
+
},
|
1766
|
+
{
|
1767
|
+
"disabled": false,
|
1768
|
+
"document": "首次识别时间",
|
1769
|
+
"example": "2022-10-10 00:00:00",
|
1770
|
+
"member": "string",
|
1771
|
+
"name": "FirstTime",
|
1772
|
+
"output_required": true,
|
1773
|
+
"type": "string",
|
1774
|
+
"value_allowed_null": false
|
1775
|
+
},
|
1776
|
+
{
|
1777
|
+
"disabled": false,
|
1778
|
+
"document": "状态,0未处理、1标记已处置、2已忽略,3已处置 ,4 处置中 ,5 检测中 ,6部分已处置",
|
1779
|
+
"example": "0",
|
1780
|
+
"member": "uint64",
|
1781
|
+
"name": "Status",
|
1782
|
+
"output_required": true,
|
1783
|
+
"type": "int",
|
1784
|
+
"value_allowed_null": false
|
1785
|
+
},
|
1786
|
+
{
|
1787
|
+
"disabled": false,
|
1788
|
+
"document": "风险ID",
|
1789
|
+
"example": "dffe78de8b51a46a131fd0d49687ed0a",
|
1790
|
+
"member": "string",
|
1791
|
+
"name": "RiskId",
|
1792
|
+
"output_required": true,
|
1793
|
+
"type": "string",
|
1794
|
+
"value_allowed_null": false
|
1795
|
+
},
|
1796
|
+
{
|
1797
|
+
"disabled": false,
|
1798
|
+
"document": "实例id",
|
1799
|
+
"example": "ins-xxx",
|
1800
|
+
"member": "string",
|
1801
|
+
"name": "InstanceId",
|
1802
|
+
"output_required": true,
|
1803
|
+
"type": "string",
|
1804
|
+
"value_allowed_null": false
|
1805
|
+
},
|
1806
|
+
{
|
1807
|
+
"disabled": false,
|
1808
|
+
"document": "实例名",
|
1809
|
+
"example": "未命名",
|
1810
|
+
"member": "string",
|
1811
|
+
"name": "InstanceName",
|
1812
|
+
"output_required": true,
|
1813
|
+
"type": "string",
|
1814
|
+
"value_allowed_null": false
|
1815
|
+
},
|
1816
|
+
{
|
1817
|
+
"disabled": false,
|
1818
|
+
"document": "用户appid",
|
1819
|
+
"example": "1234",
|
1820
|
+
"member": "string",
|
1821
|
+
"name": "AppId",
|
1822
|
+
"output_required": true,
|
1823
|
+
"type": "string",
|
1824
|
+
"value_allowed_null": false
|
1825
|
+
},
|
1826
|
+
{
|
1827
|
+
"disabled": false,
|
1828
|
+
"document": "用户昵称\n注意:此字段可能返回 null,表示取不到有效值。",
|
1829
|
+
"example": "test",
|
1830
|
+
"member": "string",
|
1831
|
+
"name": "Nick",
|
1832
|
+
"output_required": true,
|
1833
|
+
"type": "string",
|
1834
|
+
"value_allowed_null": true
|
1835
|
+
},
|
1836
|
+
{
|
1837
|
+
"disabled": false,
|
1838
|
+
"document": "用户uin\n注意:此字段可能返回 null,表示取不到有效值。",
|
1839
|
+
"example": "1234",
|
1840
|
+
"member": "string",
|
1841
|
+
"name": "Uin",
|
1842
|
+
"output_required": true,
|
1843
|
+
"type": "string",
|
1844
|
+
"value_allowed_null": true
|
1845
|
+
},
|
1846
|
+
{
|
1847
|
+
"disabled": false,
|
1848
|
+
"document": "漏洞类型",
|
1849
|
+
"example": "命令注入",
|
1850
|
+
"member": "string",
|
1851
|
+
"name": "VULType",
|
1852
|
+
"output_required": true,
|
1853
|
+
"type": "string",
|
1854
|
+
"value_allowed_null": false
|
1855
|
+
},
|
1856
|
+
{
|
1857
|
+
"disabled": false,
|
1858
|
+
"document": "端口",
|
1859
|
+
"example": "80",
|
1860
|
+
"member": "string",
|
1861
|
+
"name": "Port",
|
1862
|
+
"output_required": true,
|
1863
|
+
"type": "string",
|
1864
|
+
"value_allowed_null": false
|
1865
|
+
},
|
1866
|
+
{
|
1867
|
+
"disabled": false,
|
1868
|
+
"document": "漏洞影响组件",
|
1869
|
+
"example": "OpenSSH",
|
1870
|
+
"member": "string",
|
1871
|
+
"name": "AppName",
|
1872
|
+
"output_required": true,
|
1873
|
+
"type": "string",
|
1874
|
+
"value_allowed_null": false
|
1875
|
+
},
|
1876
|
+
{
|
1877
|
+
"disabled": false,
|
1878
|
+
"document": "漏洞影响版本",
|
1879
|
+
"example": "1.0",
|
1880
|
+
"member": "string",
|
1881
|
+
"name": "AppVersion",
|
1882
|
+
"output_required": true,
|
1883
|
+
"type": "string",
|
1884
|
+
"value_allowed_null": false
|
1885
|
+
},
|
1886
|
+
{
|
1887
|
+
"disabled": false,
|
1888
|
+
"document": "风险点",
|
1889
|
+
"example": "https://xxxx.com",
|
1890
|
+
"member": "string",
|
1891
|
+
"name": "VULURL",
|
1892
|
+
"output_required": true,
|
1893
|
+
"type": "string",
|
1894
|
+
"value_allowed_null": false
|
1895
|
+
},
|
1896
|
+
{
|
1897
|
+
"disabled": false,
|
1898
|
+
"document": "漏洞名称",
|
1899
|
+
"example": "OpenSSH 命令注入漏洞(CVE-2020-15778)",
|
1900
|
+
"member": "string",
|
1901
|
+
"name": "VULName",
|
1902
|
+
"output_required": true,
|
1903
|
+
"type": "string",
|
1904
|
+
"value_allowed_null": false
|
1905
|
+
},
|
1906
|
+
{
|
1907
|
+
"disabled": false,
|
1908
|
+
"document": "cve",
|
1909
|
+
"example": "CVE-2016-3115",
|
1910
|
+
"member": "string",
|
1911
|
+
"name": "CVE",
|
1912
|
+
"output_required": true,
|
1913
|
+
"type": "string",
|
1914
|
+
"value_allowed_null": false
|
1915
|
+
},
|
1916
|
+
{
|
1917
|
+
"disabled": false,
|
1918
|
+
"document": "pocid",
|
1919
|
+
"example": "c808d8eb0e9c322279c2efa3b82a491c",
|
1920
|
+
"member": "string",
|
1921
|
+
"name": "POCId",
|
1922
|
+
"output_required": true,
|
1923
|
+
"type": "string",
|
1924
|
+
"value_allowed_null": false
|
1925
|
+
},
|
1926
|
+
{
|
1927
|
+
"disabled": false,
|
1928
|
+
"document": "扫描来源",
|
1929
|
+
"example": "1",
|
1930
|
+
"member": "string",
|
1931
|
+
"name": "From",
|
1932
|
+
"output_required": true,
|
1933
|
+
"type": "string",
|
1934
|
+
"value_allowed_null": false
|
1935
|
+
},
|
1936
|
+
{
|
1937
|
+
"disabled": false,
|
1938
|
+
"document": "主机版本",
|
1939
|
+
"example": "3",
|
1940
|
+
"member": "int64",
|
1941
|
+
"name": "CWPVersion",
|
1942
|
+
"output_required": true,
|
1943
|
+
"type": "int",
|
1944
|
+
"value_allowed_null": false
|
1945
|
+
},
|
1946
|
+
{
|
1947
|
+
"disabled": false,
|
1948
|
+
"document": "实例uuid",
|
1949
|
+
"example": "69b75e3e-5601-46e5-9fb9-7f386a757a5d",
|
1950
|
+
"member": "string",
|
1951
|
+
"name": "InstanceUUID",
|
1952
|
+
"output_required": true,
|
1953
|
+
"type": "string",
|
1954
|
+
"value_allowed_null": false
|
1955
|
+
},
|
1956
|
+
{
|
1957
|
+
"disabled": false,
|
1958
|
+
"document": "攻击载荷",
|
1959
|
+
"example": "OpenSSH/8.0",
|
1960
|
+
"member": "string",
|
1961
|
+
"name": "Payload",
|
1962
|
+
"output_required": true,
|
1963
|
+
"type": "string",
|
1964
|
+
"value_allowed_null": false
|
1965
|
+
},
|
1966
|
+
{
|
1967
|
+
"disabled": false,
|
1968
|
+
"document": "应急漏洞类型,1-应急漏洞,0-非应急漏洞\n注意:此字段可能返回 null,表示取不到有效值。",
|
1969
|
+
"example": "1",
|
1970
|
+
"member": "int64",
|
1971
|
+
"name": "EMGCVulType",
|
1972
|
+
"output_required": true,
|
1973
|
+
"type": "int",
|
1974
|
+
"value_allowed_null": true
|
1975
|
+
},
|
1976
|
+
{
|
1977
|
+
"disabled": false,
|
1978
|
+
"document": "CVSS评分\n注意:此字段可能返回 null,表示取不到有效值。",
|
1979
|
+
"example": "8",
|
1980
|
+
"member": "float",
|
1981
|
+
"name": "CVSS",
|
1982
|
+
"output_required": true,
|
1983
|
+
"type": "float",
|
1984
|
+
"value_allowed_null": true
|
1985
|
+
},
|
1986
|
+
{
|
1987
|
+
"disabled": false,
|
1988
|
+
"document": "前端索引id\n注意:此字段可能返回 null,表示取不到有效值。",
|
1989
|
+
"example": "78de8b51a46a131fd0d49687ed0a",
|
1990
|
+
"member": "string",
|
1991
|
+
"name": "Index",
|
1992
|
+
"output_required": true,
|
1993
|
+
"type": "string",
|
1994
|
+
"value_allowed_null": true
|
1995
|
+
},
|
1996
|
+
{
|
1997
|
+
"disabled": false,
|
1998
|
+
"document": "pcmgrId\n注意:此字段可能返回 null,表示取不到有效值。",
|
1999
|
+
"example": "无",
|
2000
|
+
"member": "string",
|
2001
|
+
"name": "PCMGRId",
|
2002
|
+
"output_required": true,
|
2003
|
+
"type": "string",
|
2004
|
+
"value_allowed_null": true
|
2005
|
+
},
|
2006
|
+
{
|
2007
|
+
"disabled": false,
|
2008
|
+
"document": "报告id\n注意:此字段可能返回 null,表示取不到有效值。",
|
2009
|
+
"example": "无",
|
2010
|
+
"member": "string",
|
2011
|
+
"name": "LogId",
|
2012
|
+
"output_required": false,
|
2013
|
+
"type": "string",
|
2014
|
+
"value_allowed_null": true
|
2015
|
+
},
|
2016
|
+
{
|
2017
|
+
"disabled": false,
|
2018
|
+
"document": "任务id\n注意:此字段可能返回 null,表示取不到有效值。",
|
2019
|
+
"example": "无",
|
2020
|
+
"member": "string",
|
2021
|
+
"name": "TaskId",
|
2022
|
+
"output_required": false,
|
2023
|
+
"type": "string",
|
2024
|
+
"value_allowed_null": true
|
2025
|
+
},
|
2026
|
+
{
|
2027
|
+
"disabled": false,
|
2028
|
+
"document": "漏洞标签\n注意:此字段可能返回 null,表示取不到有效值。",
|
2029
|
+
"example": "必修",
|
2030
|
+
"member": "string",
|
2031
|
+
"name": "VulTag",
|
2032
|
+
"output_required": false,
|
2033
|
+
"type": "list",
|
2034
|
+
"value_allowed_null": true
|
2035
|
+
},
|
2036
|
+
{
|
2037
|
+
"disabled": false,
|
2038
|
+
"document": "漏洞披露时间\n注意:此字段可能返回 null,表示取不到有效值。",
|
2039
|
+
"example": "无",
|
2040
|
+
"member": "string",
|
2041
|
+
"name": "DisclosureTime",
|
2042
|
+
"output_required": false,
|
2043
|
+
"type": "string",
|
2044
|
+
"value_allowed_null": true
|
2045
|
+
},
|
2046
|
+
{
|
2047
|
+
"disabled": false,
|
2048
|
+
"document": "攻击热度\n注意:此字段可能返回 null,表示取不到有效值。",
|
2049
|
+
"example": "无",
|
2050
|
+
"member": "uint64",
|
2051
|
+
"name": "AttackHeat",
|
2052
|
+
"output_required": false,
|
2053
|
+
"type": "int",
|
2054
|
+
"value_allowed_null": true
|
2055
|
+
},
|
2056
|
+
{
|
2057
|
+
"disabled": false,
|
2058
|
+
"document": "是否必修漏洞1是,0不是\n注意:此字段可能返回 null,表示取不到有效值。",
|
2059
|
+
"example": "无",
|
2060
|
+
"member": "int64",
|
2061
|
+
"name": "IsSuggest",
|
2062
|
+
"output_required": false,
|
2063
|
+
"type": "int",
|
2064
|
+
"value_allowed_null": true
|
2065
|
+
},
|
2066
|
+
{
|
2067
|
+
"disabled": false,
|
2068
|
+
"document": "处置任务ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
2069
|
+
"example": "无",
|
2070
|
+
"member": "string",
|
2071
|
+
"name": "HandleTaskId",
|
2072
|
+
"output_required": false,
|
2073
|
+
"type": "string",
|
2074
|
+
"value_allowed_null": true
|
2075
|
+
},
|
2076
|
+
{
|
2077
|
+
"disabled": false,
|
2078
|
+
"document": "引擎来源\n注意:此字段可能返回 null,表示取不到有效值。",
|
2079
|
+
"example": "nsfocus_vul",
|
2080
|
+
"member": "string",
|
2081
|
+
"name": "EngineSource",
|
2082
|
+
"output_required": false,
|
2083
|
+
"type": "string",
|
2084
|
+
"value_allowed_null": true
|
2085
|
+
},
|
2086
|
+
{
|
2087
|
+
"disabled": false,
|
2088
|
+
"document": "新的漏洞风险id(同全网漏洞表的riskid)\n注意:此字段可能返回 null,表示取不到有效值。",
|
2089
|
+
"example": "无",
|
2090
|
+
"member": "string",
|
2091
|
+
"name": "VulRiskId",
|
2092
|
+
"output_required": false,
|
2093
|
+
"type": "string",
|
2094
|
+
"value_allowed_null": true
|
2095
|
+
}
|
2096
|
+
],
|
2097
|
+
"usage": "out"
|
2098
|
+
},
|
1706
2099
|
"AssetViewWeakPassRisk": {
|
1707
2100
|
"document": "资产视角的弱口令风险",
|
1708
2101
|
"members": [
|
@@ -3691,6 +4084,131 @@
|
|
3691
4084
|
],
|
3692
4085
|
"type": "object"
|
3693
4086
|
},
|
4087
|
+
"DescribeAssetViewVulRiskListRequest": {
|
4088
|
+
"document": "DescribeAssetViewVulRiskList请求参数结构体",
|
4089
|
+
"members": [
|
4090
|
+
{
|
4091
|
+
"disabled": false,
|
4092
|
+
"document": "集团账号的成员id",
|
4093
|
+
"example": "[]{\"mem-6wfo0fzks3\",\"mem-85fo0fzks4\"}",
|
4094
|
+
"member": "string",
|
4095
|
+
"name": "MemberId",
|
4096
|
+
"required": false,
|
4097
|
+
"type": "list"
|
4098
|
+
},
|
4099
|
+
{
|
4100
|
+
"disabled": false,
|
4101
|
+
"document": "过滤内容",
|
4102
|
+
"example": "无",
|
4103
|
+
"member": "Filter",
|
4104
|
+
"name": "Filter",
|
4105
|
+
"required": false,
|
4106
|
+
"type": "object"
|
4107
|
+
},
|
4108
|
+
{
|
4109
|
+
"disabled": false,
|
4110
|
+
"document": "资产标签",
|
4111
|
+
"example": "无",
|
4112
|
+
"member": "AssetTag",
|
4113
|
+
"name": "Tags",
|
4114
|
+
"required": false,
|
4115
|
+
"type": "list"
|
4116
|
+
}
|
4117
|
+
],
|
4118
|
+
"type": "object"
|
4119
|
+
},
|
4120
|
+
"DescribeAssetViewVulRiskListResponse": {
|
4121
|
+
"document": "DescribeAssetViewVulRiskList返回参数结构体",
|
4122
|
+
"members": [
|
4123
|
+
{
|
4124
|
+
"disabled": false,
|
4125
|
+
"document": "总条数",
|
4126
|
+
"example": "10",
|
4127
|
+
"member": "int64",
|
4128
|
+
"name": "TotalCount",
|
4129
|
+
"output_required": true,
|
4130
|
+
"type": "int",
|
4131
|
+
"value_allowed_null": false
|
4132
|
+
},
|
4133
|
+
{
|
4134
|
+
"disabled": false,
|
4135
|
+
"document": "资产视角的漏洞风险列表\n注意:此字段可能返回 null,表示取不到有效值。",
|
4136
|
+
"example": "无",
|
4137
|
+
"member": "AssetViewVULRiskData",
|
4138
|
+
"name": "Data",
|
4139
|
+
"output_required": true,
|
4140
|
+
"type": "list",
|
4141
|
+
"value_allowed_null": true
|
4142
|
+
},
|
4143
|
+
{
|
4144
|
+
"disabled": false,
|
4145
|
+
"document": "状态列表",
|
4146
|
+
"example": "无",
|
4147
|
+
"member": "FilterDataObject",
|
4148
|
+
"name": "StatusLists",
|
4149
|
+
"output_required": true,
|
4150
|
+
"type": "list",
|
4151
|
+
"value_allowed_null": false
|
4152
|
+
},
|
4153
|
+
{
|
4154
|
+
"disabled": false,
|
4155
|
+
"document": "危险等级列表",
|
4156
|
+
"example": "无",
|
4157
|
+
"member": "FilterDataObject",
|
4158
|
+
"name": "LevelLists",
|
4159
|
+
"output_required": true,
|
4160
|
+
"type": "list",
|
4161
|
+
"value_allowed_null": false
|
4162
|
+
},
|
4163
|
+
{
|
4164
|
+
"disabled": false,
|
4165
|
+
"document": "来源列表",
|
4166
|
+
"example": "无",
|
4167
|
+
"member": "FilterDataObject",
|
4168
|
+
"name": "FromLists",
|
4169
|
+
"output_required": true,
|
4170
|
+
"type": "list",
|
4171
|
+
"value_allowed_null": false
|
4172
|
+
},
|
4173
|
+
{
|
4174
|
+
"disabled": false,
|
4175
|
+
"document": "漏洞类型列表",
|
4176
|
+
"example": "无",
|
4177
|
+
"member": "FilterDataObject",
|
4178
|
+
"name": "VULTypeLists",
|
4179
|
+
"output_required": true,
|
4180
|
+
"type": "list",
|
4181
|
+
"value_allowed_null": false
|
4182
|
+
},
|
4183
|
+
{
|
4184
|
+
"disabled": false,
|
4185
|
+
"document": "资产类型列表",
|
4186
|
+
"example": "无",
|
4187
|
+
"member": "FilterDataObject",
|
4188
|
+
"name": "InstanceTypeLists",
|
4189
|
+
"output_required": true,
|
4190
|
+
"type": "list",
|
4191
|
+
"value_allowed_null": false
|
4192
|
+
},
|
4193
|
+
{
|
4194
|
+
"disabled": false,
|
4195
|
+
"document": "tag枚举\n注意:此字段可能返回 null,表示取不到有效值。",
|
4196
|
+
"example": "无",
|
4197
|
+
"member": "FilterDataObject",
|
4198
|
+
"name": "Tags",
|
4199
|
+
"output_required": true,
|
4200
|
+
"type": "list",
|
4201
|
+
"value_allowed_null": true
|
4202
|
+
},
|
4203
|
+
{
|
4204
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
4205
|
+
"member": "string",
|
4206
|
+
"name": "RequestId",
|
4207
|
+
"type": "string"
|
4208
|
+
}
|
4209
|
+
],
|
4210
|
+
"type": "object"
|
4211
|
+
},
|
3694
4212
|
"DescribeCVMAssetInfoRequest": {
|
3695
4213
|
"document": "DescribeCVMAssetInfo请求参数结构体",
|
3696
4214
|
"members": [
|
@@ -40,6 +40,14 @@
|
|
40
40
|
"title": "删除风险中心扫描任务"
|
41
41
|
}
|
42
42
|
],
|
43
|
+
"DescribeAssetViewVulRiskList": [
|
44
|
+
{
|
45
|
+
"document": "success1",
|
46
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{}",
|
47
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2c7c6f118db22f829991424d7a\",\n \"InstanceId\": \"ins-kja8dy5r\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-47de-4bce-b979-57166dc89c72\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"774b28af351a041b41f246ca43a50b59\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"e1399eb478bb080626419625f762d23e\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"fed411b4775d7f46cd192a45e2877f0b\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"3b4a757f4f20274df5afbf45a9fd961b\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"f71a76c67fdfdcfed6164d37a163f3ee\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"8b915d789892bf6ecc516f4e98912c39\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"-\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:41:07\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"9f7b3ab47fcf97820bdd1d20cec0f5da\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"85fa1a25269ee51318abe17dbd7319be\",\n \"Payload\": \"username:, password:, nlstResult:['pub'] \",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:55:39\",\n \"RiskId\": \"3fd56b7aa90aa2d82dc5a09e16a3dc6c\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"检测到目标FTP服务可匿名访问\",\n \"VULType\": \"未授权访问\",\n \"VULURL\": \"http://42.192.123.209/\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5af1a3e8be94b821f9f88ba1275e0eb1\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5324188b8413cec59971463187276526\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
|
48
|
+
"title": "success1"
|
49
|
+
}
|
50
|
+
],
|
43
51
|
"DescribeCVMAssetInfo": [
|
44
52
|
{
|
45
53
|
"document": "接口测试",
|
@@ -610,7 +610,7 @@
|
|
610
610
|
"status": "online"
|
611
611
|
},
|
612
612
|
"ResetInstance": {
|
613
|
-
"document": "本接口 (ResetInstance) 用于重装指定实例上的操作系统。\n\n* 如果指定了`ImageId`参数,则使用指定的镜像重装;否则按照当前实例使用的镜像进行重装。\n* 系统盘将会被格式化,并重置;请确保系统盘中无重要文件。\n*
|
613
|
+
"document": "本接口 (ResetInstance) 用于重装指定实例上的操作系统。\n\n* 如果指定了`ImageId`参数,则使用指定的镜像重装;否则按照当前实例使用的镜像进行重装。\n* 系统盘将会被格式化,并重置;请确保系统盘中无重要文件。\n* 密码不指定将会通过站内信下发随机密码。\n* 目前只支持[系统盘类型](https://cloud.tencent.com/document/api/213/9452#SystemDisk)是`CLOUD_BASIC`、`CLOUD_PREMIUM`、`CLOUD_SSD`、`CLOUD_BSSD`类型的实例使用该接口实现操作系统切换。\n* 实例操作结果可以通过调用 [DescribeInstances](https://cloud.tencent.com/document/api/213/15728#.E7.A4.BA.E4.BE.8B3-.E6.9F.A5.E8.AF.A2.E5.AE.9E.E4.BE.8B.E7.9A.84.E6.9C.80.E6.96.B0.E6.93.8D.E4.BD.9C.E6.83.85.E5.86.B5) 接口查询,如果实例的最新操作状态(LatestOperationState)为“SUCCESS”,则代表操作成功。",
|
614
614
|
"input": "ResetInstanceRequest",
|
615
615
|
"name": "重装实例",
|
616
616
|
"output": "ResetInstanceResponse",
|
@@ -1124,6 +1124,15 @@
|
|
1124
1124
|
"name": "LicenseType",
|
1125
1125
|
"required": false,
|
1126
1126
|
"type": "int"
|
1127
|
+
},
|
1128
|
+
{
|
1129
|
+
"disabled": false,
|
1130
|
+
"document": "开通成功后前端页面跳转的url,此字段的用法场景请联系客户经理确认。\n\n注:`仅支持H5开通场景`, `跳转链接仅支持 https:// , qianapp:// 开头`\n\n跳转场景:\n<ul><li>**贵方H5 -> 腾讯电子签H5 -> 贵方H5** : JumpUrl格式: https://YOUR_CUSTOM_URL/xxxx,只需满足 https:// 开头的正确且合规的网址即可。</li>\n<li>**贵方原生App -> 腾讯电子签H5 -> 贵方原生App** : JumpUrl格式: qianapp://YOUR_CUSTOM_URL,只需满足 qianapp:// 开头的URL即可。`APP实现方,需要拦截Webview地址跳转,发现url是qianapp:// 开头时跳转到原生页面。`APP拦截地址跳转可参考:<a href='https://stackoverflow.com/questions/41693263/android-webview-err-unknown-url-scheme'>Android</a>,<a href='https://razorpay.com/docs/payments/payment-gateway/web-integration/standard/webview/upi-intent-ios/'>IOS</a> </li></ul>\n\n成功结果返回:\n若贵方需要在跳转回时通过链接query参数提示开通成功,JumpUrl中的query应携带如下参数:`appendResult=qian`。这样腾讯电子签H5会在跳转回的url后面会添加query参数提示贵方签署成功,比如 qianapp://YOUR_CUSTOM_URL?action=sign&result=success&from=tencent_ess",
|
1131
|
+
"example": "无",
|
1132
|
+
"member": "string",
|
1133
|
+
"name": "JumpUrl",
|
1134
|
+
"required": false,
|
1135
|
+
"type": "string"
|
1127
1136
|
}
|
1128
1137
|
],
|
1129
1138
|
"usage": "in"
|
@@ -5636,6 +5645,15 @@
|
|
5636
5645
|
"name": "Agent",
|
5637
5646
|
"required": false,
|
5638
5647
|
"type": "object"
|
5648
|
+
},
|
5649
|
+
{
|
5650
|
+
"disabled": false,
|
5651
|
+
"document": "调用方自定义的个性化字段(可自定义此字段的值),并以base64方式编码,支持的最大数据大小为 20480长度。 在个人自动签的开通、关闭等回调信息场景中,该字段的信息将原封不动地透传给贵方。 ",
|
5652
|
+
"example": "无",
|
5653
|
+
"member": "string",
|
5654
|
+
"name": "UserData",
|
5655
|
+
"required": false,
|
5656
|
+
"type": "string"
|
5639
5657
|
}
|
5640
5658
|
],
|
5641
5659
|
"type": "object"
|