tccli 3.0.1089.1__py2.py3-none-any.whl → 3.0.1091.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (67) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/ccc/v20200210/UploadIvrAudio.md +16 -1
  3. tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +5 -302
  4. tccli/examples/gs/v20191118/StartPublishStreamToCSS.md +20 -0
  5. tccli/examples/mongodb/v20190725/FlashBackDBInstance.md +29 -0
  6. tccli/examples/organization/v20210331/AddOrganizationNode.md +1 -1
  7. tccli/examples/organization/v20210331/BindOrganizationMemberAuthAccount.md +3 -3
  8. tccli/examples/organization/v20210331/CancelOrganizationMemberAuthAccount.md +3 -3
  9. tccli/examples/organization/v20210331/CheckAccountDelete.md +5 -5
  10. tccli/examples/organization/v20210331/CreateOrganizationMember.md +2 -2
  11. tccli/examples/organization/v20210331/CreateOrganizationMemberAuthIdentity.md +1 -1
  12. tccli/examples/organization/v20210331/CreateOrganizationMemberPolicy.md +5 -5
  13. tccli/examples/organization/v20210331/CreateOrganizationMembersPolicy.md +2 -2
  14. tccli/examples/organization/v20210331/DeleteOrganizationMembers.md +1 -1
  15. tccli/examples/organization/v20210331/DeleteOrganizationNodes.md +1 -1
  16. tccli/examples/organization/v20210331/DeleteShareUnitResources.md +1 -1
  17. tccli/examples/organization/v20210331/DescribeOrganizationMemberAuthAccounts.md +2 -2
  18. tccli/examples/organization/v20210331/DescribeOrganizationMemberPolicies.md +1 -1
  19. tccli/examples/organization/v20210331/MoveOrganizationNodeMembers.md +2 -2
  20. tccli/examples/organization/v20210331/QuitOrganization.md +1 -1
  21. tccli/examples/organization/v20210331/UpdateOrganizationMember.md +2 -2
  22. tccli/examples/organization/v20210331/UpdateOrganizationMemberEmailBind.md +3 -3
  23. tccli/examples/organization/v20210331/UpdateOrganizationNode.md +3 -2
  24. tccli/examples/sqlserver/v20180328/DescribeDBInstancesAttribute.md +7 -1
  25. tccli/examples/ssl/v20191205/DeployCertificateInstance.md +28 -3
  26. tccli/examples/tione/v20211111/CreateBatchTask.md +1 -0
  27. tccli/services/aiart/v20221229/api.json +1 -1
  28. tccli/services/asr/v20190614/api.json +6 -6
  29. tccli/services/bri/v20190328/api.json +2 -2
  30. tccli/services/captcha/v20190722/api.json +75 -31
  31. tccli/services/ccc/v20200210/api.json +10 -0
  32. tccli/services/ccc/v20200210/examples.json +1 -1
  33. tccli/services/cfg/v20210820/api.json +30 -33
  34. tccli/services/csip/v20221121/api.json +17 -11
  35. tccli/services/csip/v20221121/examples.json +1 -1
  36. tccli/services/dts/v20211206/api.json +22 -2
  37. tccli/services/ess/v20201111/api.json +19 -1
  38. tccli/services/essbasic/v20210526/api.json +31 -13
  39. tccli/services/faceid/v20180301/api.json +4 -4
  40. tccli/services/gs/gs_client.py +53 -0
  41. tccli/services/gs/v20191118/api.json +43 -0
  42. tccli/services/gs/v20191118/examples.json +8 -0
  43. tccli/services/iss/v20230517/api.json +38 -0
  44. tccli/services/lcic/v20220817/api.json +5 -5
  45. tccli/services/lighthouse/v20200324/api.json +1 -1
  46. tccli/services/live/v20180801/api.json +12 -12
  47. tccli/services/mongodb/mongodb_client.py +67 -14
  48. tccli/services/mongodb/v20190725/api.json +161 -0
  49. tccli/services/mongodb/v20190725/examples.json +8 -0
  50. tccli/services/monitor/monitor_client.py +0 -53
  51. tccli/services/monitor/v20180724/api.json +0 -52
  52. tccli/services/monitor/v20180724/examples.json +0 -8
  53. tccli/services/organization/v20210331/api.json +128 -119
  54. tccli/services/organization/v20210331/examples.json +24 -24
  55. tccli/services/soe/v20180724/api.json +13 -13
  56. tccli/services/sqlserver/v20180328/api.json +46 -0
  57. tccli/services/sqlserver/v20180328/examples.json +1 -1
  58. tccli/services/ssl/v20191205/api.json +11 -2
  59. tccli/services/ssl/v20191205/examples.json +9 -3
  60. tccli/services/tione/v20211111/api.json +36 -3
  61. tccli/services/tione/v20211111/examples.json +1 -1
  62. tccli/services/trtc/v20190722/api.json +36 -9
  63. {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/METADATA +2 -2
  64. {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/RECORD +67 -65
  65. {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/WHEEL +0 -0
  66. {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/entry_points.txt +0 -0
  67. {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/license_files/LICENSE +0 -0
@@ -135,7 +135,7 @@
135
135
  {
136
136
  "disabled": false,
137
137
  "document": "应用名称\n注意:此字段可能返回 null,表示取不到有效值。",
138
- "example": "",
138
+ "example": " [\"innercfg\", \"zhiyan\"]",
139
139
  "member": "string",
140
140
  "name": "ServiceNameList",
141
141
  "output_required": true,
@@ -146,7 +146,7 @@
146
146
  {
147
147
  "disabled": false,
148
148
  "document": "地域ID\n注意:此字段可能返回 null,表示取不到有效值。",
149
- "example": "",
149
+ "example": "1",
150
150
  "member": "int64",
151
151
  "name": "RegionId",
152
152
  "output_required": false,
@@ -208,7 +208,7 @@
208
208
  {
209
209
  "disabled": false,
210
210
  "document": "任务ID",
211
- "example": "",
211
+ "example": "5689",
212
212
  "member": "int64",
213
213
  "name": "TaskId",
214
214
  "required": true,
@@ -403,7 +403,7 @@
403
403
  {
404
404
  "disabled": false,
405
405
  "document": "更新时间,固定格式%Y-%m-%d %H:%M:%S",
406
- "example": "",
406
+ "example": "\"2024-03-09 20:59:59\"",
407
407
  "member": "string",
408
408
  "name": "TaskUpdateTime",
409
409
  "required": false,
@@ -430,7 +430,7 @@
430
430
  {
431
431
  "disabled": false,
432
432
  "document": "演练ID",
433
- "example": "",
433
+ "example": "5871",
434
434
  "member": "uint64",
435
435
  "name": "TaskId",
436
436
  "required": false,
@@ -439,7 +439,7 @@
439
439
  {
440
440
  "disabled": false,
441
441
  "document": "关联应用ID筛选",
442
- "example": "",
442
+ "example": "\"app-faee9ba9\"",
443
443
  "member": "string",
444
444
  "name": "ApplicationId",
445
445
  "required": false,
@@ -448,7 +448,7 @@
448
448
  {
449
449
  "disabled": false,
450
450
  "document": "关联应用筛选",
451
- "example": "",
451
+ "example": "\"yh-test001\"",
452
452
  "member": "string",
453
453
  "name": "ApplicationName",
454
454
  "required": false,
@@ -457,7 +457,7 @@
457
457
  {
458
458
  "disabled": false,
459
459
  "document": "任务状态筛选--支持多选 任务状态(1001 -- 未开始 1002 -- 进行中 1003 -- 暂停中 1004 -- 任务结束)",
460
- "example": "",
460
+ "example": "[1001, 1002]",
461
461
  "member": "uint64",
462
462
  "name": "TaskStatusList",
463
463
  "required": false,
@@ -660,7 +660,7 @@
660
660
  {
661
661
  "disabled": false,
662
662
  "document": "经验来源 0-自建 1-专家推荐",
663
- "example": "",
663
+ "example": "0",
664
664
  "member": "int64",
665
665
  "name": "TemplateSource",
666
666
  "required": false,
@@ -669,7 +669,7 @@
669
669
  {
670
670
  "disabled": false,
671
671
  "document": "经验ID",
672
- "example": "",
672
+ "example": "1870",
673
673
  "member": "int64",
674
674
  "name": "TemplateIdList",
675
675
  "required": false,
@@ -1254,7 +1254,7 @@
1254
1254
  {
1255
1255
  "disabled": false,
1256
1256
  "document": "关联的演练计划ID\n注意:此字段可能返回 null,表示取不到有效值。",
1257
- "example": "",
1257
+ "example": "2458",
1258
1258
  "member": "int64",
1259
1259
  "name": "TaskPlanId",
1260
1260
  "output_required": true,
@@ -1265,7 +1265,7 @@
1265
1265
  {
1266
1266
  "disabled": false,
1267
1267
  "document": "关联的演练计划名称\n注意:此字段可能返回 null,表示取不到有效值。",
1268
- "example": "",
1268
+ "example": " \"运营端计划\"",
1269
1269
  "member": "string",
1270
1270
  "name": "TaskPlanTitle",
1271
1271
  "output_required": true,
@@ -1276,7 +1276,7 @@
1276
1276
  {
1277
1277
  "disabled": false,
1278
1278
  "document": "关联的应用ID\n注意:此字段可能返回 null,表示取不到有效值。",
1279
- "example": "",
1279
+ "example": "\"app-faee9ba9\"",
1280
1280
  "member": "string",
1281
1281
  "name": "ApplicationId",
1282
1282
  "output_required": false,
@@ -1287,7 +1287,7 @@
1287
1287
  {
1288
1288
  "disabled": false,
1289
1289
  "document": "关联的应用名称\n注意:此字段可能返回 null,表示取不到有效值。",
1290
- "example": "",
1290
+ "example": "\"yh-test001\"",
1291
1291
  "member": "string",
1292
1292
  "name": "ApplicationName",
1293
1293
  "output_required": false,
@@ -1298,7 +1298,7 @@
1298
1298
  {
1299
1299
  "disabled": false,
1300
1300
  "document": "关联的告警指标\n注意:此字段可能返回 null,表示取不到有效值。",
1301
- "example": "",
1301
+ "example": "\t[\"policy-3pklm3so\"]",
1302
1302
  "member": "string",
1303
1303
  "name": "AlarmPolicy",
1304
1304
  "output_required": false,
@@ -1320,7 +1320,7 @@
1320
1320
  {
1321
1321
  "disabled": false,
1322
1322
  "document": "关联的隐患验证项ID\n注意:此字段可能返回 null,表示取不到有效值。",
1323
- "example": "",
1323
+ "example": "3001",
1324
1324
  "member": "uint64",
1325
1325
  "name": "VerifyId",
1326
1326
  "output_required": false,
@@ -1763,28 +1763,25 @@
1763
1763
  "member": "uint64",
1764
1764
  "name": "TaskGroupActionOrder",
1765
1765
  "required": false,
1766
- "type": "int",
1767
- "value_allowed_null": false
1766
+ "type": "int"
1768
1767
  },
1769
1768
  {
1770
1769
  "disabled": false,
1771
1770
  "document": "动作通用参数,需要json序列化传入,可以从查询经验详情接口获取,不填默认使用经验中动作参数",
1772
- "example": "",
1771
+ "example": "\"{\\\"timeout\\\":200,\\\"percentage\\\":80}\"",
1773
1772
  "member": "string",
1774
1773
  "name": "TaskGroupActionGeneralConfiguration",
1775
1774
  "required": false,
1776
- "type": "string",
1777
- "value_allowed_null": false
1775
+ "type": "string"
1778
1776
  },
1779
1777
  {
1780
1778
  "disabled": false,
1781
1779
  "document": "动作自定义参数,需要json序列化传入,可以从查询经验详情接口获取,不填默认使用经验中动作参数",
1782
- "example": "",
1780
+ "example": "\"{\\\"PreTimeWait\\\":60,\\\"ActionTimeout\\\":180}\"",
1783
1781
  "member": "string",
1784
1782
  "name": "TaskGroupActionCustomConfiguration",
1785
1783
  "required": false,
1786
- "type": "string",
1787
- "value_allowed_null": false
1784
+ "type": "string"
1788
1785
  }
1789
1786
  ],
1790
1787
  "usage": "in"
@@ -2104,7 +2101,7 @@
2104
2101
  {
2105
2102
  "disabled": false,
2106
2103
  "document": "演练是否符合预期 1-符合预期 2-不符合预期\n注意:此字段可能返回 null,表示取不到有效值。",
2107
- "example": "",
2104
+ "example": "1",
2108
2105
  "member": "int64",
2109
2106
  "name": "TaskExpect",
2110
2107
  "output_required": false,
@@ -2114,7 +2111,7 @@
2114
2111
  {
2115
2112
  "disabled": false,
2116
2113
  "document": "关联应用ID\n注意:此字段可能返回 null,表示取不到有效值。",
2117
- "example": "",
2114
+ "example": "\"app-faee9ba9\"",
2118
2115
  "member": "string",
2119
2116
  "name": "ApplicationId",
2120
2117
  "output_required": false,
@@ -2124,7 +2121,7 @@
2124
2121
  {
2125
2122
  "disabled": false,
2126
2123
  "document": "关联应用名称\n注意:此字段可能返回 null,表示取不到有效值。",
2127
- "example": "",
2124
+ "example": "\"yh-test001\"",
2128
2125
  "member": "string",
2129
2126
  "name": "ApplicationName",
2130
2127
  "output_required": false,
@@ -2134,7 +2131,7 @@
2134
2131
  {
2135
2132
  "disabled": false,
2136
2133
  "document": "验证项ID\n注意:此字段可能返回 null,表示取不到有效值。",
2137
- "example": "",
2134
+ "example": "3001",
2138
2135
  "member": "uint64",
2139
2136
  "name": "VerifyId",
2140
2137
  "output_required": false,
@@ -2144,7 +2141,7 @@
2144
2141
  {
2145
2142
  "disabled": false,
2146
2143
  "document": "状态类型: 0 -- 无状态,1 -- 成功,2-- 失败,3--终止\n注意:此字段可能返回 null,表示取不到有效值。",
2147
- "example": "",
2144
+ "example": "1",
2148
2145
  "member": "uint64",
2149
2146
  "name": "TaskStatusType",
2150
2147
  "output_required": false,
@@ -2459,7 +2456,7 @@
2459
2456
  {
2460
2457
  "disabled": false,
2461
2458
  "document": "经验来源 0-自建 1-专家推荐\n注意:此字段可能返回 null,表示取不到有效值。",
2462
- "example": "",
2459
+ "example": "0",
2463
2460
  "member": "int64",
2464
2461
  "name": "TemplateSource",
2465
2462
  "output_required": false,
@@ -2479,7 +2476,7 @@
2479
2476
  {
2480
2477
  "disabled": false,
2481
2478
  "document": "告警指标\n注意:此字段可能返回 null,表示取不到有效值。",
2482
- "example": "",
2479
+ "example": "[\"policy-3pklm3so\"]",
2483
2480
  "member": "string",
2484
2481
  "name": "AlarmPolicy",
2485
2482
  "output_required": false,
@@ -2836,7 +2833,7 @@
2836
2833
  {
2837
2834
  "disabled": false,
2838
2835
  "document": "经验库来源 0-自建经验 1-专家推荐\n注意:此字段可能返回 null,表示取不到有效值。",
2839
- "example": "",
2836
+ "example": "0",
2840
2837
  "member": "int64",
2841
2838
  "name": "TemplateSource",
2842
2839
  "output_required": false,
@@ -2944,7 +2941,7 @@
2944
2941
  {
2945
2942
  "disabled": false,
2946
2943
  "document": "混沌演练ID\n",
2947
- "example": "",
2944
+ "example": "5871",
2948
2945
  "member": "int64",
2949
2946
  "name": "TaskId",
2950
2947
  "required": true,
@@ -1786,7 +1786,7 @@
1786
1786
  {
1787
1787
  "disabled": false,
1788
1788
  "document": "风险ID",
1789
- "example": "dffe78de8b51a46a131fd0d49687ed0a",
1789
+ "example": "dffe78dexxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
1790
1790
  "member": "string",
1791
1791
  "name": "RiskId",
1792
1792
  "output_required": true,
@@ -1916,7 +1916,7 @@
1916
1916
  {
1917
1917
  "disabled": false,
1918
1918
  "document": "pocid",
1919
- "example": "c808d8eb0e9c322279c2efa3b82a491c",
1919
+ "example": "c808d8ebxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
1920
1920
  "member": "string",
1921
1921
  "name": "POCId",
1922
1922
  "output_required": true,
@@ -1946,7 +1946,7 @@
1946
1946
  {
1947
1947
  "disabled": false,
1948
1948
  "document": "实例uuid",
1949
- "example": "69b75e3e-5601-46e5-9fb9-7f386a757a5d",
1949
+ "example": "69b75e3e-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
1950
1950
  "member": "string",
1951
1951
  "name": "InstanceUUID",
1952
1952
  "output_required": true,
@@ -1986,7 +1986,7 @@
1986
1986
  {
1987
1987
  "disabled": false,
1988
1988
  "document": "前端索引id\n注意:此字段可能返回 null,表示取不到有效值。",
1989
- "example": "78de8b51a46a131fd0d49687ed0a",
1989
+ "example": "78de8b51xxxxxxxxxxxxxxxxxxxxxxxx",
1990
1990
  "member": "string",
1991
1991
  "name": "Index",
1992
1992
  "output_required": true,
@@ -11090,33 +11090,39 @@
11090
11090
  "members": [
11091
11091
  {
11092
11092
  "disabled": false,
11093
- "document": "过滤的项",
11093
+ "document": "过滤的项\n注意:此字段可能返回 null,表示取不到有效值。",
11094
11094
  "example": "Appid",
11095
11095
  "member": "string",
11096
11096
  "name": "Name",
11097
+ "output_required": true,
11097
11098
  "required": true,
11098
- "type": "string"
11099
+ "type": "string",
11100
+ "value_allowed_null": true
11099
11101
  },
11100
11102
  {
11101
11103
  "disabled": false,
11102
- "document": "过滤的值",
11104
+ "document": "过滤的值\n注意:此字段可能返回 null,表示取不到有效值。",
11103
11105
  "example": "[\"1300448058\"]",
11104
11106
  "member": "string",
11105
11107
  "name": "Values",
11108
+ "output_required": true,
11106
11109
  "required": true,
11107
- "type": "list"
11110
+ "type": "list",
11111
+ "value_allowed_null": true
11108
11112
  },
11109
11113
  {
11110
11114
  "disabled": false,
11111
- "document": "中台定义:\n1等于 2大于 3小于 4大于等于 5小于等于 6不等于 9模糊匹配 13非模糊匹配 14按位与\n精确匹配填 7 模糊匹配填9 \n",
11115
+ "document": "中台定义:\n1等于 2大于 3小于 4大于等于 5小于等于 6不等于 9模糊匹配 13非模糊匹配 14按位与\n精确匹配填 7 模糊匹配填9 \n\n注意:此字段可能返回 null,表示取不到有效值。",
11112
11116
  "example": "9",
11113
11117
  "member": "int64",
11114
11118
  "name": "OperatorType",
11119
+ "output_required": false,
11115
11120
  "required": false,
11116
- "type": "int"
11121
+ "type": "int",
11122
+ "value_allowed_null": true
11117
11123
  }
11118
11124
  ],
11119
- "usage": "in"
11125
+ "usage": "both"
11120
11126
  }
11121
11127
  },
11122
11128
  "version": "1.0"
@@ -44,7 +44,7 @@
44
44
  {
45
45
  "document": "success1",
46
46
  "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{}",
47
- "output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2c7c6f118db22f829991424d7a\",\n \"InstanceId\": \"ins-kja8dy5r\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-47de-4bce-b979-57166dc89c72\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"774b28af351a041b41f246ca43a50b59\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"e1399eb478bb080626419625f762d23e\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"fed411b4775d7f46cd192a45e2877f0b\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"3b4a757f4f20274df5afbf45a9fd961b\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"f71a76c67fdfdcfed6164d37a163f3ee\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"8b915d789892bf6ecc516f4e98912c39\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"-\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:41:07\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"9f7b3ab47fcf97820bdd1d20cec0f5da\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"85fa1a25269ee51318abe17dbd7319be\",\n \"Payload\": \"username:, password:, nlstResult:['pub'] \",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:55:39\",\n \"RiskId\": \"3fd56b7aa90aa2d82dc5a09e16a3dc6c\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"检测到目标FTP服务可匿名访问\",\n \"VULType\": \"未授权访问\",\n \"VULURL\": \"http://42.192.123.209/\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5af1a3e8be94b821f9f88ba1275e0eb1\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5324188b8413cec59971463187276526\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
47
+ "output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2cxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\n \"InstanceId\": \"ins-xxx\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8ebxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23axxxxxxxxxxxxxxxxxxxxxxxxxxx\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
48
48
  "title": "success1"
49
49
  }
50
50
  ],
@@ -1518,6 +1518,15 @@
1518
1518
  "required": false,
1519
1519
  "type": "string"
1520
1520
  },
1521
+ {
1522
+ "disabled": false,
1523
+ "document": "源端tdsql连接方式:proxy-通过tdsql proxy主机访问各个set节点,注意只有在自研上云的网络环境下才能通过这种方式连接,SrcInfos中只需要提供proxy主机信息。set-直连set节点,如选择直连set方式,需要正确填写proxy主机信息及所有set节点信息。源端是tdsqlmysql类型必填。",
1524
+ "example": "proxy",
1525
+ "member": "string",
1526
+ "name": "SrcConnectType",
1527
+ "required": false,
1528
+ "type": "string"
1529
+ },
1521
1530
  {
1522
1531
  "disabled": false,
1523
1532
  "document": "源端信息,单节点数据库使用,且SrcNodeType传single",
@@ -2374,6 +2383,17 @@
2374
2383
  "required": false,
2375
2384
  "type": "string",
2376
2385
  "value_allowed_null": true
2386
+ },
2387
+ {
2388
+ "disabled": false,
2389
+ "document": "tdsql连接方式:proxy-通过tdsql proxy主机访问各个set节点,注意只有在自研上云的网络环境下才能通过这种方式连接,Info中只需要提供proxy主机信息。set-直连set节点,如选择直连set方式,Info中需要正确填写proxy主机信息及所有set节点信息。源端是tdsqlmysql类型必填。\n注意:此字段可能返回 null,表示取不到有效值。",
2390
+ "example": "proxy",
2391
+ "member": "string",
2392
+ "name": "ConnectType",
2393
+ "output_required": false,
2394
+ "required": false,
2395
+ "type": "string",
2396
+ "value_allowed_null": true
2377
2397
  }
2378
2398
  ],
2379
2399
  "usage": "both"
@@ -2383,7 +2403,7 @@
2383
2403
  "members": [
2384
2404
  {
2385
2405
  "disabled": false,
2386
- "document": "表示节点角色,针对分布式数据库,如mongodb中的mongos节点。如数据库是tdsql,枚举值为:proxyset\n注意:此字段可能返回 null,表示取不到有效值。",
2406
+ "document": "表示节点角色,针对分布式数据库,如mongodb中的mongos节点。tdsqlmysql的可选项:proxy表示节点类型为主机,set表示节点类型为节点。proxy类型必须填在数组第一项。tdsqlmysql类型的源/目标配置必填。\n注意:此字段可能返回 null,表示取不到有效值。",
2387
2407
  "example": "mongos",
2388
2408
  "member": "string",
2389
2409
  "name": "Role",
@@ -2603,7 +2623,7 @@
2603
2623
  },
2604
2624
  {
2605
2625
  "disabled": false,
2606
- "document": "tdsql分片id。tdsql set节点必填\n注意:此字段可能返回 null,表示取不到有效值。",
2626
+ "document": "tdsql的分片id。如节点类型为set必填。\n注意:此字段可能返回 null,表示取不到有效值。",
2607
2627
  "example": "set_1693279393_1",
2608
2628
  "member": "string",
2609
2629
  "name": "SetId",
@@ -1124,6 +1124,15 @@
1124
1124
  "name": "LicenseType",
1125
1125
  "required": false,
1126
1126
  "type": "int"
1127
+ },
1128
+ {
1129
+ "disabled": false,
1130
+ "document": "开通成功后前端页面跳转的url,此字段的用法场景请联系客户经理确认。\n\n注:`仅支持H5开通场景`, `跳转链接仅支持 https:// , qianapp:// 开头`\n\n跳转场景:\n<ul><li>**贵方H5 -> 腾讯电子签H5 -> 贵方H5** : JumpUrl格式: https://YOUR_CUSTOM_URL/xxxx,只需满足 https:// 开头的正确且合规的网址即可。</li>\n<li>**贵方原生App -> 腾讯电子签H5 -> 贵方原生App** : JumpUrl格式: qianapp://YOUR_CUSTOM_URL,只需满足 qianapp:// 开头的URL即可。`APP实现方,需要拦截Webview地址跳转,发现url是qianapp:// 开头时跳转到原生页面。`APP拦截地址跳转可参考:<a href='https://stackoverflow.com/questions/41693263/android-webview-err-unknown-url-scheme'>Android</a>,<a href='https://razorpay.com/docs/payments/payment-gateway/web-integration/standard/webview/upi-intent-ios/'>IOS</a> </li></ul>\n\n成功结果返回:\n若贵方需要在跳转回时通过链接query参数提示开通成功,JumpUrl中的query应携带如下参数:`appendResult=qian`。这样腾讯电子签H5会在跳转回的url后面会添加query参数提示贵方签署成功,比如 qianapp://YOUR_CUSTOM_URL?action=sign&result=success&from=tencent_ess",
1131
+ "example": "无",
1132
+ "member": "string",
1133
+ "name": "JumpUrl",
1134
+ "required": false,
1135
+ "type": "string"
1127
1136
  }
1128
1137
  ],
1129
1138
  "usage": "in"
@@ -1721,7 +1730,7 @@
1721
1730
  },
1722
1731
  {
1723
1732
  "disabled": false,
1724
- "document": "控件唯一ID。\n\n**在绝对定位方式方式下**,ComponentId为控件的ID,长度不能超过30,只能由中文、字母、数字和下划线组成,可以在后续的操作中使用该名称来引用控件。\n\n**在关键字定位方式下**,ComponentId不仅为控件的ID,也是关键字整词。此方式下可以通过\"^\"来决定是否使用关键字整词匹配能力。\n\n例:\n\n- 如传入的关键字<font color=\"red\">\"^甲方签署^\"</font >,则会在PDF文件中有且仅有\"甲方签署\"关键字的地方(<font color=\"red\">前后不能有其他字符</font >)进行对应操作。\n- 如传入的关键字为<font color=\"red\">\"甲方签署</font >\",则PDF文件中每个出现关键字的位置(<font color=\"red\">前后可以有其他字符</font >)都会执行相应操作。\n- 如传入的关键字为<font color=\"red\">\"^甲方签署</font >\",则PDF文件中每个出现关键字的位置(<font color=\"red\">前面不能有其他字符</font >)都会执行相应操作。\n- 如传入的关键字为<font color=\"red\">\"甲方签署^</font >\",则PDF文件中每个出现关键字的位置(<font color=\"red\">后面不能有其他字符</font >)都会执行相应操作。\n\n\n注:`控件ID可以在一个PDF中不可重复`\n\n<a href=\"https://qcloudimg.tencent-cloud.cn/raw/93178569d07b4d7dbbe0967ae679e35c.png\" target=\"_blank\">点击查看ComponentId在模板编辑页面的位置</a>\n",
1733
+ "document": "控件唯一ID。\n\n**在绝对定位方式方式下**,ComponentId为控件的ID,长度不能超过30,只能由中文、字母、数字和下划线组成,可以在后续的操作中使用该名称来引用控件。\n\n**在关键字定位方式下**,ComponentId不仅为控件的ID,也是关键字整词。此方式下可以通过\"^\"来决定是否使用关键字整词匹配能力。\n\n例:\n\n- 如传入的关键字<font color=\"red\">\"^甲方签署^\"</font >,则会在PDF文件中有且仅有\"甲方签署\"关键字的地方(<font color=\"red\">前后不能有其他字符</font >)进行对应操作。\n- 如传入的关键字为<font color=\"red\">\"甲方签署</font >\",则PDF文件中每个出现关键字的位置(<font color=\"red\">前后可以有其他字符</font >)都会执行相应操作。\n\n\n注:`控件ID可以在一个PDF中不可重复`\n\n<a href=\"https://qcloudimg.tencent-cloud.cn/raw/93178569d07b4d7dbbe0967ae679e35c.png\" target=\"_blank\">点击查看ComponentId在模板编辑页面的位置</a>\n",
1725
1734
  "example": "无",
1726
1735
  "member": "string",
1727
1736
  "name": "ComponentId",
@@ -5636,6 +5645,15 @@
5636
5645
  "name": "Agent",
5637
5646
  "required": false,
5638
5647
  "type": "object"
5648
+ },
5649
+ {
5650
+ "disabled": false,
5651
+ "document": "调用方自定义的个性化字段(可自定义此字段的值),并以base64方式编码,支持的最大数据大小为 20480长度。 在个人自动签的开通、关闭等回调信息场景中,该字段的信息将原封不动地透传给贵方。 ",
5652
+ "example": "无",
5653
+ "member": "string",
5654
+ "name": "UserData",
5655
+ "required": false,
5656
+ "type": "string"
5639
5657
  }
5640
5658
  ],
5641
5659
  "type": "object"