tccli 3.0.1089.1__py2.py3-none-any.whl → 3.0.1091.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/examples/ccc/v20200210/UploadIvrAudio.md +16 -1
- tccli/examples/csip/v20221121/DescribeAssetViewVulRiskList.md +5 -302
- tccli/examples/gs/v20191118/StartPublishStreamToCSS.md +20 -0
- tccli/examples/mongodb/v20190725/FlashBackDBInstance.md +29 -0
- tccli/examples/organization/v20210331/AddOrganizationNode.md +1 -1
- tccli/examples/organization/v20210331/BindOrganizationMemberAuthAccount.md +3 -3
- tccli/examples/organization/v20210331/CancelOrganizationMemberAuthAccount.md +3 -3
- tccli/examples/organization/v20210331/CheckAccountDelete.md +5 -5
- tccli/examples/organization/v20210331/CreateOrganizationMember.md +2 -2
- tccli/examples/organization/v20210331/CreateOrganizationMemberAuthIdentity.md +1 -1
- tccli/examples/organization/v20210331/CreateOrganizationMemberPolicy.md +5 -5
- tccli/examples/organization/v20210331/CreateOrganizationMembersPolicy.md +2 -2
- tccli/examples/organization/v20210331/DeleteOrganizationMembers.md +1 -1
- tccli/examples/organization/v20210331/DeleteOrganizationNodes.md +1 -1
- tccli/examples/organization/v20210331/DeleteShareUnitResources.md +1 -1
- tccli/examples/organization/v20210331/DescribeOrganizationMemberAuthAccounts.md +2 -2
- tccli/examples/organization/v20210331/DescribeOrganizationMemberPolicies.md +1 -1
- tccli/examples/organization/v20210331/MoveOrganizationNodeMembers.md +2 -2
- tccli/examples/organization/v20210331/QuitOrganization.md +1 -1
- tccli/examples/organization/v20210331/UpdateOrganizationMember.md +2 -2
- tccli/examples/organization/v20210331/UpdateOrganizationMemberEmailBind.md +3 -3
- tccli/examples/organization/v20210331/UpdateOrganizationNode.md +3 -2
- tccli/examples/sqlserver/v20180328/DescribeDBInstancesAttribute.md +7 -1
- tccli/examples/ssl/v20191205/DeployCertificateInstance.md +28 -3
- tccli/examples/tione/v20211111/CreateBatchTask.md +1 -0
- tccli/services/aiart/v20221229/api.json +1 -1
- tccli/services/asr/v20190614/api.json +6 -6
- tccli/services/bri/v20190328/api.json +2 -2
- tccli/services/captcha/v20190722/api.json +75 -31
- tccli/services/ccc/v20200210/api.json +10 -0
- tccli/services/ccc/v20200210/examples.json +1 -1
- tccli/services/cfg/v20210820/api.json +30 -33
- tccli/services/csip/v20221121/api.json +17 -11
- tccli/services/csip/v20221121/examples.json +1 -1
- tccli/services/dts/v20211206/api.json +22 -2
- tccli/services/ess/v20201111/api.json +19 -1
- tccli/services/essbasic/v20210526/api.json +31 -13
- tccli/services/faceid/v20180301/api.json +4 -4
- tccli/services/gs/gs_client.py +53 -0
- tccli/services/gs/v20191118/api.json +43 -0
- tccli/services/gs/v20191118/examples.json +8 -0
- tccli/services/iss/v20230517/api.json +38 -0
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/v20200324/api.json +1 -1
- tccli/services/live/v20180801/api.json +12 -12
- tccli/services/mongodb/mongodb_client.py +67 -14
- tccli/services/mongodb/v20190725/api.json +161 -0
- tccli/services/mongodb/v20190725/examples.json +8 -0
- tccli/services/monitor/monitor_client.py +0 -53
- tccli/services/monitor/v20180724/api.json +0 -52
- tccli/services/monitor/v20180724/examples.json +0 -8
- tccli/services/organization/v20210331/api.json +128 -119
- tccli/services/organization/v20210331/examples.json +24 -24
- tccli/services/soe/v20180724/api.json +13 -13
- tccli/services/sqlserver/v20180328/api.json +46 -0
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssl/v20191205/api.json +11 -2
- tccli/services/ssl/v20191205/examples.json +9 -3
- tccli/services/tione/v20211111/api.json +36 -3
- tccli/services/tione/v20211111/examples.json +1 -1
- tccli/services/trtc/v20190722/api.json +36 -9
- {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/RECORD +67 -65
- {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1089.1.dist-info → tccli-3.0.1091.1.dist-info}/license_files/LICENSE +0 -0
@@ -135,7 +135,7 @@
|
|
135
135
|
{
|
136
136
|
"disabled": false,
|
137
137
|
"document": "应用名称\n注意:此字段可能返回 null,表示取不到有效值。",
|
138
|
-
"example": "
|
138
|
+
"example": " [\"innercfg\", \"zhiyan\"]",
|
139
139
|
"member": "string",
|
140
140
|
"name": "ServiceNameList",
|
141
141
|
"output_required": true,
|
@@ -146,7 +146,7 @@
|
|
146
146
|
{
|
147
147
|
"disabled": false,
|
148
148
|
"document": "地域ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
149
|
-
"example": "
|
149
|
+
"example": "1",
|
150
150
|
"member": "int64",
|
151
151
|
"name": "RegionId",
|
152
152
|
"output_required": false,
|
@@ -208,7 +208,7 @@
|
|
208
208
|
{
|
209
209
|
"disabled": false,
|
210
210
|
"document": "任务ID",
|
211
|
-
"example": "
|
211
|
+
"example": "5689",
|
212
212
|
"member": "int64",
|
213
213
|
"name": "TaskId",
|
214
214
|
"required": true,
|
@@ -403,7 +403,7 @@
|
|
403
403
|
{
|
404
404
|
"disabled": false,
|
405
405
|
"document": "更新时间,固定格式%Y-%m-%d %H:%M:%S",
|
406
|
-
"example": "
|
406
|
+
"example": "\"2024-03-09 20:59:59\"",
|
407
407
|
"member": "string",
|
408
408
|
"name": "TaskUpdateTime",
|
409
409
|
"required": false,
|
@@ -430,7 +430,7 @@
|
|
430
430
|
{
|
431
431
|
"disabled": false,
|
432
432
|
"document": "演练ID",
|
433
|
-
"example": "
|
433
|
+
"example": "5871",
|
434
434
|
"member": "uint64",
|
435
435
|
"name": "TaskId",
|
436
436
|
"required": false,
|
@@ -439,7 +439,7 @@
|
|
439
439
|
{
|
440
440
|
"disabled": false,
|
441
441
|
"document": "关联应用ID筛选",
|
442
|
-
"example": "
|
442
|
+
"example": "\"app-faee9ba9\"",
|
443
443
|
"member": "string",
|
444
444
|
"name": "ApplicationId",
|
445
445
|
"required": false,
|
@@ -448,7 +448,7 @@
|
|
448
448
|
{
|
449
449
|
"disabled": false,
|
450
450
|
"document": "关联应用筛选",
|
451
|
-
"example": "
|
451
|
+
"example": "\"yh-test001\"",
|
452
452
|
"member": "string",
|
453
453
|
"name": "ApplicationName",
|
454
454
|
"required": false,
|
@@ -457,7 +457,7 @@
|
|
457
457
|
{
|
458
458
|
"disabled": false,
|
459
459
|
"document": "任务状态筛选--支持多选 任务状态(1001 -- 未开始 1002 -- 进行中 1003 -- 暂停中 1004 -- 任务结束)",
|
460
|
-
"example": "
|
460
|
+
"example": "[1001, 1002]",
|
461
461
|
"member": "uint64",
|
462
462
|
"name": "TaskStatusList",
|
463
463
|
"required": false,
|
@@ -660,7 +660,7 @@
|
|
660
660
|
{
|
661
661
|
"disabled": false,
|
662
662
|
"document": "经验来源 0-自建 1-专家推荐",
|
663
|
-
"example": "
|
663
|
+
"example": "0",
|
664
664
|
"member": "int64",
|
665
665
|
"name": "TemplateSource",
|
666
666
|
"required": false,
|
@@ -669,7 +669,7 @@
|
|
669
669
|
{
|
670
670
|
"disabled": false,
|
671
671
|
"document": "经验ID",
|
672
|
-
"example": "
|
672
|
+
"example": "1870",
|
673
673
|
"member": "int64",
|
674
674
|
"name": "TemplateIdList",
|
675
675
|
"required": false,
|
@@ -1254,7 +1254,7 @@
|
|
1254
1254
|
{
|
1255
1255
|
"disabled": false,
|
1256
1256
|
"document": "关联的演练计划ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
1257
|
-
"example": "
|
1257
|
+
"example": "2458",
|
1258
1258
|
"member": "int64",
|
1259
1259
|
"name": "TaskPlanId",
|
1260
1260
|
"output_required": true,
|
@@ -1265,7 +1265,7 @@
|
|
1265
1265
|
{
|
1266
1266
|
"disabled": false,
|
1267
1267
|
"document": "关联的演练计划名称\n注意:此字段可能返回 null,表示取不到有效值。",
|
1268
|
-
"example": "
|
1268
|
+
"example": " \"运营端计划\"",
|
1269
1269
|
"member": "string",
|
1270
1270
|
"name": "TaskPlanTitle",
|
1271
1271
|
"output_required": true,
|
@@ -1276,7 +1276,7 @@
|
|
1276
1276
|
{
|
1277
1277
|
"disabled": false,
|
1278
1278
|
"document": "关联的应用ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
1279
|
-
"example": "
|
1279
|
+
"example": "\"app-faee9ba9\"",
|
1280
1280
|
"member": "string",
|
1281
1281
|
"name": "ApplicationId",
|
1282
1282
|
"output_required": false,
|
@@ -1287,7 +1287,7 @@
|
|
1287
1287
|
{
|
1288
1288
|
"disabled": false,
|
1289
1289
|
"document": "关联的应用名称\n注意:此字段可能返回 null,表示取不到有效值。",
|
1290
|
-
"example": "
|
1290
|
+
"example": "\"yh-test001\"",
|
1291
1291
|
"member": "string",
|
1292
1292
|
"name": "ApplicationName",
|
1293
1293
|
"output_required": false,
|
@@ -1298,7 +1298,7 @@
|
|
1298
1298
|
{
|
1299
1299
|
"disabled": false,
|
1300
1300
|
"document": "关联的告警指标\n注意:此字段可能返回 null,表示取不到有效值。",
|
1301
|
-
"example": "
|
1301
|
+
"example": "\t[\"policy-3pklm3so\"]",
|
1302
1302
|
"member": "string",
|
1303
1303
|
"name": "AlarmPolicy",
|
1304
1304
|
"output_required": false,
|
@@ -1320,7 +1320,7 @@
|
|
1320
1320
|
{
|
1321
1321
|
"disabled": false,
|
1322
1322
|
"document": "关联的隐患验证项ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
1323
|
-
"example": "
|
1323
|
+
"example": "3001",
|
1324
1324
|
"member": "uint64",
|
1325
1325
|
"name": "VerifyId",
|
1326
1326
|
"output_required": false,
|
@@ -1763,28 +1763,25 @@
|
|
1763
1763
|
"member": "uint64",
|
1764
1764
|
"name": "TaskGroupActionOrder",
|
1765
1765
|
"required": false,
|
1766
|
-
"type": "int"
|
1767
|
-
"value_allowed_null": false
|
1766
|
+
"type": "int"
|
1768
1767
|
},
|
1769
1768
|
{
|
1770
1769
|
"disabled": false,
|
1771
1770
|
"document": "动作通用参数,需要json序列化传入,可以从查询经验详情接口获取,不填默认使用经验中动作参数",
|
1772
|
-
"example": "
|
1771
|
+
"example": "\"{\\\"timeout\\\":200,\\\"percentage\\\":80}\"",
|
1773
1772
|
"member": "string",
|
1774
1773
|
"name": "TaskGroupActionGeneralConfiguration",
|
1775
1774
|
"required": false,
|
1776
|
-
"type": "string"
|
1777
|
-
"value_allowed_null": false
|
1775
|
+
"type": "string"
|
1778
1776
|
},
|
1779
1777
|
{
|
1780
1778
|
"disabled": false,
|
1781
1779
|
"document": "动作自定义参数,需要json序列化传入,可以从查询经验详情接口获取,不填默认使用经验中动作参数",
|
1782
|
-
"example": "
|
1780
|
+
"example": "\"{\\\"PreTimeWait\\\":60,\\\"ActionTimeout\\\":180}\"",
|
1783
1781
|
"member": "string",
|
1784
1782
|
"name": "TaskGroupActionCustomConfiguration",
|
1785
1783
|
"required": false,
|
1786
|
-
"type": "string"
|
1787
|
-
"value_allowed_null": false
|
1784
|
+
"type": "string"
|
1788
1785
|
}
|
1789
1786
|
],
|
1790
1787
|
"usage": "in"
|
@@ -2104,7 +2101,7 @@
|
|
2104
2101
|
{
|
2105
2102
|
"disabled": false,
|
2106
2103
|
"document": "演练是否符合预期 1-符合预期 2-不符合预期\n注意:此字段可能返回 null,表示取不到有效值。",
|
2107
|
-
"example": "
|
2104
|
+
"example": "1",
|
2108
2105
|
"member": "int64",
|
2109
2106
|
"name": "TaskExpect",
|
2110
2107
|
"output_required": false,
|
@@ -2114,7 +2111,7 @@
|
|
2114
2111
|
{
|
2115
2112
|
"disabled": false,
|
2116
2113
|
"document": "关联应用ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
2117
|
-
"example": "
|
2114
|
+
"example": "\"app-faee9ba9\"",
|
2118
2115
|
"member": "string",
|
2119
2116
|
"name": "ApplicationId",
|
2120
2117
|
"output_required": false,
|
@@ -2124,7 +2121,7 @@
|
|
2124
2121
|
{
|
2125
2122
|
"disabled": false,
|
2126
2123
|
"document": "关联应用名称\n注意:此字段可能返回 null,表示取不到有效值。",
|
2127
|
-
"example": "
|
2124
|
+
"example": "\"yh-test001\"",
|
2128
2125
|
"member": "string",
|
2129
2126
|
"name": "ApplicationName",
|
2130
2127
|
"output_required": false,
|
@@ -2134,7 +2131,7 @@
|
|
2134
2131
|
{
|
2135
2132
|
"disabled": false,
|
2136
2133
|
"document": "验证项ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
2137
|
-
"example": "
|
2134
|
+
"example": "3001",
|
2138
2135
|
"member": "uint64",
|
2139
2136
|
"name": "VerifyId",
|
2140
2137
|
"output_required": false,
|
@@ -2144,7 +2141,7 @@
|
|
2144
2141
|
{
|
2145
2142
|
"disabled": false,
|
2146
2143
|
"document": "状态类型: 0 -- 无状态,1 -- 成功,2-- 失败,3--终止\n注意:此字段可能返回 null,表示取不到有效值。",
|
2147
|
-
"example": "
|
2144
|
+
"example": "1",
|
2148
2145
|
"member": "uint64",
|
2149
2146
|
"name": "TaskStatusType",
|
2150
2147
|
"output_required": false,
|
@@ -2459,7 +2456,7 @@
|
|
2459
2456
|
{
|
2460
2457
|
"disabled": false,
|
2461
2458
|
"document": "经验来源 0-自建 1-专家推荐\n注意:此字段可能返回 null,表示取不到有效值。",
|
2462
|
-
"example": "
|
2459
|
+
"example": "0",
|
2463
2460
|
"member": "int64",
|
2464
2461
|
"name": "TemplateSource",
|
2465
2462
|
"output_required": false,
|
@@ -2479,7 +2476,7 @@
|
|
2479
2476
|
{
|
2480
2477
|
"disabled": false,
|
2481
2478
|
"document": "告警指标\n注意:此字段可能返回 null,表示取不到有效值。",
|
2482
|
-
"example": "
|
2479
|
+
"example": "[\"policy-3pklm3so\"]",
|
2483
2480
|
"member": "string",
|
2484
2481
|
"name": "AlarmPolicy",
|
2485
2482
|
"output_required": false,
|
@@ -2836,7 +2833,7 @@
|
|
2836
2833
|
{
|
2837
2834
|
"disabled": false,
|
2838
2835
|
"document": "经验库来源 0-自建经验 1-专家推荐\n注意:此字段可能返回 null,表示取不到有效值。",
|
2839
|
-
"example": "
|
2836
|
+
"example": "0",
|
2840
2837
|
"member": "int64",
|
2841
2838
|
"name": "TemplateSource",
|
2842
2839
|
"output_required": false,
|
@@ -2944,7 +2941,7 @@
|
|
2944
2941
|
{
|
2945
2942
|
"disabled": false,
|
2946
2943
|
"document": "混沌演练ID\n",
|
2947
|
-
"example": "
|
2944
|
+
"example": "5871",
|
2948
2945
|
"member": "int64",
|
2949
2946
|
"name": "TaskId",
|
2950
2947
|
"required": true,
|
@@ -1786,7 +1786,7 @@
|
|
1786
1786
|
{
|
1787
1787
|
"disabled": false,
|
1788
1788
|
"document": "风险ID",
|
1789
|
-
"example": "
|
1789
|
+
"example": "dffe78dexxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
|
1790
1790
|
"member": "string",
|
1791
1791
|
"name": "RiskId",
|
1792
1792
|
"output_required": true,
|
@@ -1916,7 +1916,7 @@
|
|
1916
1916
|
{
|
1917
1917
|
"disabled": false,
|
1918
1918
|
"document": "pocid",
|
1919
|
-
"example": "
|
1919
|
+
"example": "c808d8ebxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
|
1920
1920
|
"member": "string",
|
1921
1921
|
"name": "POCId",
|
1922
1922
|
"output_required": true,
|
@@ -1946,7 +1946,7 @@
|
|
1946
1946
|
{
|
1947
1947
|
"disabled": false,
|
1948
1948
|
"document": "实例uuid",
|
1949
|
-
"example": "69b75e3e-
|
1949
|
+
"example": "69b75e3e-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
|
1950
1950
|
"member": "string",
|
1951
1951
|
"name": "InstanceUUID",
|
1952
1952
|
"output_required": true,
|
@@ -1986,7 +1986,7 @@
|
|
1986
1986
|
{
|
1987
1987
|
"disabled": false,
|
1988
1988
|
"document": "前端索引id\n注意:此字段可能返回 null,表示取不到有效值。",
|
1989
|
-
"example": "
|
1989
|
+
"example": "78de8b51xxxxxxxxxxxxxxxxxxxxxxxx",
|
1990
1990
|
"member": "string",
|
1991
1991
|
"name": "Index",
|
1992
1992
|
"output_required": true,
|
@@ -11090,33 +11090,39 @@
|
|
11090
11090
|
"members": [
|
11091
11091
|
{
|
11092
11092
|
"disabled": false,
|
11093
|
-
"document": "
|
11093
|
+
"document": "过滤的项\n注意:此字段可能返回 null,表示取不到有效值。",
|
11094
11094
|
"example": "Appid",
|
11095
11095
|
"member": "string",
|
11096
11096
|
"name": "Name",
|
11097
|
+
"output_required": true,
|
11097
11098
|
"required": true,
|
11098
|
-
"type": "string"
|
11099
|
+
"type": "string",
|
11100
|
+
"value_allowed_null": true
|
11099
11101
|
},
|
11100
11102
|
{
|
11101
11103
|
"disabled": false,
|
11102
|
-
"document": "
|
11104
|
+
"document": "过滤的值\n注意:此字段可能返回 null,表示取不到有效值。",
|
11103
11105
|
"example": "[\"1300448058\"]",
|
11104
11106
|
"member": "string",
|
11105
11107
|
"name": "Values",
|
11108
|
+
"output_required": true,
|
11106
11109
|
"required": true,
|
11107
|
-
"type": "list"
|
11110
|
+
"type": "list",
|
11111
|
+
"value_allowed_null": true
|
11108
11112
|
},
|
11109
11113
|
{
|
11110
11114
|
"disabled": false,
|
11111
|
-
"document": "中台定义:\n1等于 2大于 3小于 4大于等于 5小于等于 6不等于 9模糊匹配 13非模糊匹配 14按位与\n精确匹配填 7 模糊匹配填9 \n",
|
11115
|
+
"document": "中台定义:\n1等于 2大于 3小于 4大于等于 5小于等于 6不等于 9模糊匹配 13非模糊匹配 14按位与\n精确匹配填 7 模糊匹配填9 \n\n注意:此字段可能返回 null,表示取不到有效值。",
|
11112
11116
|
"example": "9",
|
11113
11117
|
"member": "int64",
|
11114
11118
|
"name": "OperatorType",
|
11119
|
+
"output_required": false,
|
11115
11120
|
"required": false,
|
11116
|
-
"type": "int"
|
11121
|
+
"type": "int",
|
11122
|
+
"value_allowed_null": true
|
11117
11123
|
}
|
11118
11124
|
],
|
11119
|
-
"usage": "
|
11125
|
+
"usage": "both"
|
11120
11126
|
}
|
11121
11127
|
},
|
11122
11128
|
"version": "1.0"
|
@@ -44,7 +44,7 @@
|
|
44
44
|
{
|
45
45
|
"document": "success1",
|
46
46
|
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetViewVulRiskList\n<公共请求参数>\n\n{}",
|
47
|
-
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2c7c6f118db22f829991424d7a\",\n \"InstanceId\": \"ins-kja8dy5r\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-47de-4bce-b979-57166dc89c72\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"774b28af351a041b41f246ca43a50b59\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"e1399eb478bb080626419625f762d23e\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8eb0e9c322279c2efa3b82a491c\",\n \"Payload\": \"OpenSSH/8.0\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23a853529b3be8cf554629e4533\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"fed411b4775d7f46cd192a45e2877f0b\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2019-9511\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"3b4a757f4f20274df5afbf45a9fd961b\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"654f82856a1f02e61941529f4d7bb642\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"28d5b79163e64cd046e6537131ea9e08\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2019-9511)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"f71a76c67fdfdcfed6164d37a163f3ee\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2022-41742\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"8b915d789892bf6ecc516f4e98912c39\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"62fb737e4fcabde555e911e4cab32b6a\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"367a544eab01c874b7db69491d78e6d2\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 越界写入漏洞(CVE-2022-41742)\",\n \"VULType\": \"处理逻辑错误\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"-\",\n \"AppVersion\": \"-\",\n \"CVE\": \"-\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:41:07\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"9f7b3ab47fcf97820bdd1d20cec0f5da\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"85fa1a25269ee51318abe17dbd7319be\",\n \"Payload\": \"username:, password:, nlstResult:['pub'] \",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:55:39\",\n \"RiskId\": \"3fd56b7aa90aa2d82dc5a09e16a3dc6c\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"检测到目标FTP服务可匿名访问\",\n \"VULType\": \"未授权访问\",\n \"VULURL\": \"http://42.192.123.209/\"\n },\n {\n \"AffectAsset\": \"42.192.123.209\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5af1a3e8be94b821f9f88ba1275e0eb1\",\n \"InstanceId\": \"ins-p1jyrg75\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"bdc338d2-eaaf-4b17-9708-9e9bd26806ae\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n },\n {\n \"AffectAsset\": \"81.69.38.139\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"Nginx\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2021-23017\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"Nginx\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"5324188b8413cec59971463187276526\",\n \"InstanceId\": \"ins-17ye5faf\",\n \"InstanceName\": \"[autotest][勿删]自动化测试VPC\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"9910883f-ca69-41b8-8f41-6b399b30a053\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"b6b554295a36babb8f5dd308ab91e7a0\",\n \"Payload\": \"nginx/1.14.1\",\n \"Port\": \"80\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"4a2c3dfabf00f0f67e2bf6af373eb0d8\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"nginx 安全漏洞(CVE-2021-23017)\",\n \"VULType\": \"其他\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
|
47
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AffectAsset\": \"182.254.145.158\",\n \"AppId\": \"1300448058\",\n \"AppName\": \"OpenSSH\",\n \"AppVersion\": \"-\",\n \"CVE\": \"CVE-2020-15778\",\n \"CVSS\": 0,\n \"CWPVersion\": 4,\n \"Component\": \"OpenSSH\",\n \"EMGCVulType\": 0,\n \"FirstTime\": \"2023-09-26 16:34:50\",\n \"From\": \"云安全中心\",\n \"HandleTaskId\": \"\",\n \"Index\": \"360bfa2cxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\n \"InstanceId\": \"ins-xxx\",\n \"InstanceName\": \"[autotest][勿删]自动化测试NAT1\",\n \"InstanceType\": \"CVM\",\n \"InstanceUUID\": \"7bb60327-xxxx-xxxx-xxxx-xxxxxxxxxxxx\",\n \"Level\": \"high\",\n \"Nick\": \"\",\n \"PCMGRId\": \"\",\n \"POCId\": \"c808d8ebxxxxxxxxxxxxxxxxxxxxxxxxxxxx\",\n \"Payload\": \"OpenSSH/7.4\",\n \"Port\": \"22\",\n \"RecentTime\": \"2023-09-27 11:49:10\",\n \"RiskId\": \"1498f23axxxxxxxxxxxxxxxxxxxxxxxxxxx\",\n \"Status\": 0,\n \"TaskId\": \"\",\n \"Uin\": \"\",\n \"VULName\": \"OpenSSH 命令注入漏洞(CVE-2020-15778)\",\n \"VULType\": \"命令注入\",\n \"VULURL\": \"\"\n }\n ],\n \"FromLists\": [\n {\n \"Text\": \"云安全中心\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"主机检测\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"容器检测\",\n \"Value\": \"5\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Text\": \"CVM\",\n \"Value\": \"CVM\"\n }\n ],\n \"LevelLists\": [\n {\n \"Text\": \"严重\",\n \"Value\": \"extreme\"\n },\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n },\n {\n \"Text\": \"提示\",\n \"Value\": \"info\"\n }\n ],\n \"RequestId\": \"3c68de67-9f7e-442d-b1f0-81191bd1026e\",\n \"StatusLists\": [\n {\n \"Text\": \"未处理\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"标记已处置\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"已忽略\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"已修复\",\n \"Value\": \"3\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n }\n ],\n \"TotalCount\": 1102,\n \"VULTypeLists\": [\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"处理逻辑错误\"\n }\n ]\n }\n}",
|
48
48
|
"title": "success1"
|
49
49
|
}
|
50
50
|
],
|
@@ -1518,6 +1518,15 @@
|
|
1518
1518
|
"required": false,
|
1519
1519
|
"type": "string"
|
1520
1520
|
},
|
1521
|
+
{
|
1522
|
+
"disabled": false,
|
1523
|
+
"document": "源端tdsql连接方式:proxy-通过tdsql proxy主机访问各个set节点,注意只有在自研上云的网络环境下才能通过这种方式连接,SrcInfos中只需要提供proxy主机信息。set-直连set节点,如选择直连set方式,需要正确填写proxy主机信息及所有set节点信息。源端是tdsqlmysql类型必填。",
|
1524
|
+
"example": "proxy",
|
1525
|
+
"member": "string",
|
1526
|
+
"name": "SrcConnectType",
|
1527
|
+
"required": false,
|
1528
|
+
"type": "string"
|
1529
|
+
},
|
1521
1530
|
{
|
1522
1531
|
"disabled": false,
|
1523
1532
|
"document": "源端信息,单节点数据库使用,且SrcNodeType传single",
|
@@ -2374,6 +2383,17 @@
|
|
2374
2383
|
"required": false,
|
2375
2384
|
"type": "string",
|
2376
2385
|
"value_allowed_null": true
|
2386
|
+
},
|
2387
|
+
{
|
2388
|
+
"disabled": false,
|
2389
|
+
"document": "tdsql连接方式:proxy-通过tdsql proxy主机访问各个set节点,注意只有在自研上云的网络环境下才能通过这种方式连接,Info中只需要提供proxy主机信息。set-直连set节点,如选择直连set方式,Info中需要正确填写proxy主机信息及所有set节点信息。源端是tdsqlmysql类型必填。\n注意:此字段可能返回 null,表示取不到有效值。",
|
2390
|
+
"example": "proxy",
|
2391
|
+
"member": "string",
|
2392
|
+
"name": "ConnectType",
|
2393
|
+
"output_required": false,
|
2394
|
+
"required": false,
|
2395
|
+
"type": "string",
|
2396
|
+
"value_allowed_null": true
|
2377
2397
|
}
|
2378
2398
|
],
|
2379
2399
|
"usage": "both"
|
@@ -2383,7 +2403,7 @@
|
|
2383
2403
|
"members": [
|
2384
2404
|
{
|
2385
2405
|
"disabled": false,
|
2386
|
-
"document": "表示节点角色,针对分布式数据库,如mongodb中的mongos
|
2406
|
+
"document": "表示节点角色,针对分布式数据库,如mongodb中的mongos节点。tdsqlmysql的可选项:proxy表示节点类型为主机,set表示节点类型为节点。proxy类型必须填在数组第一项。tdsqlmysql类型的源/目标配置必填。\n注意:此字段可能返回 null,表示取不到有效值。",
|
2387
2407
|
"example": "mongos",
|
2388
2408
|
"member": "string",
|
2389
2409
|
"name": "Role",
|
@@ -2603,7 +2623,7 @@
|
|
2603
2623
|
},
|
2604
2624
|
{
|
2605
2625
|
"disabled": false,
|
2606
|
-
"document": "tdsql
|
2626
|
+
"document": "tdsql的分片id。如节点类型为set必填。\n注意:此字段可能返回 null,表示取不到有效值。",
|
2607
2627
|
"example": "set_1693279393_1",
|
2608
2628
|
"member": "string",
|
2609
2629
|
"name": "SetId",
|
@@ -1124,6 +1124,15 @@
|
|
1124
1124
|
"name": "LicenseType",
|
1125
1125
|
"required": false,
|
1126
1126
|
"type": "int"
|
1127
|
+
},
|
1128
|
+
{
|
1129
|
+
"disabled": false,
|
1130
|
+
"document": "开通成功后前端页面跳转的url,此字段的用法场景请联系客户经理确认。\n\n注:`仅支持H5开通场景`, `跳转链接仅支持 https:// , qianapp:// 开头`\n\n跳转场景:\n<ul><li>**贵方H5 -> 腾讯电子签H5 -> 贵方H5** : JumpUrl格式: https://YOUR_CUSTOM_URL/xxxx,只需满足 https:// 开头的正确且合规的网址即可。</li>\n<li>**贵方原生App -> 腾讯电子签H5 -> 贵方原生App** : JumpUrl格式: qianapp://YOUR_CUSTOM_URL,只需满足 qianapp:// 开头的URL即可。`APP实现方,需要拦截Webview地址跳转,发现url是qianapp:// 开头时跳转到原生页面。`APP拦截地址跳转可参考:<a href='https://stackoverflow.com/questions/41693263/android-webview-err-unknown-url-scheme'>Android</a>,<a href='https://razorpay.com/docs/payments/payment-gateway/web-integration/standard/webview/upi-intent-ios/'>IOS</a> </li></ul>\n\n成功结果返回:\n若贵方需要在跳转回时通过链接query参数提示开通成功,JumpUrl中的query应携带如下参数:`appendResult=qian`。这样腾讯电子签H5会在跳转回的url后面会添加query参数提示贵方签署成功,比如 qianapp://YOUR_CUSTOM_URL?action=sign&result=success&from=tencent_ess",
|
1131
|
+
"example": "无",
|
1132
|
+
"member": "string",
|
1133
|
+
"name": "JumpUrl",
|
1134
|
+
"required": false,
|
1135
|
+
"type": "string"
|
1127
1136
|
}
|
1128
1137
|
],
|
1129
1138
|
"usage": "in"
|
@@ -1721,7 +1730,7 @@
|
|
1721
1730
|
},
|
1722
1731
|
{
|
1723
1732
|
"disabled": false,
|
1724
|
-
"document": "控件唯一ID。\n\n**在绝对定位方式方式下**,ComponentId为控件的ID,长度不能超过30,只能由中文、字母、数字和下划线组成,可以在后续的操作中使用该名称来引用控件。\n\n**在关键字定位方式下**,ComponentId不仅为控件的ID,也是关键字整词。此方式下可以通过\"^\"来决定是否使用关键字整词匹配能力。\n\n例:\n\n- 如传入的关键字<font color=\"red\">\"^甲方签署^\"</font >,则会在PDF文件中有且仅有\"甲方签署\"关键字的地方(<font color=\"red\">前后不能有其他字符</font >)进行对应操作。\n- 如传入的关键字为<font color=\"red\">\"甲方签署</font >\",则PDF文件中每个出现关键字的位置(<font color=\"red\">前后可以有其他字符</font >)都会执行相应操作。\n
|
1733
|
+
"document": "控件唯一ID。\n\n**在绝对定位方式方式下**,ComponentId为控件的ID,长度不能超过30,只能由中文、字母、数字和下划线组成,可以在后续的操作中使用该名称来引用控件。\n\n**在关键字定位方式下**,ComponentId不仅为控件的ID,也是关键字整词。此方式下可以通过\"^\"来决定是否使用关键字整词匹配能力。\n\n例:\n\n- 如传入的关键字<font color=\"red\">\"^甲方签署^\"</font >,则会在PDF文件中有且仅有\"甲方签署\"关键字的地方(<font color=\"red\">前后不能有其他字符</font >)进行对应操作。\n- 如传入的关键字为<font color=\"red\">\"甲方签署</font >\",则PDF文件中每个出现关键字的位置(<font color=\"red\">前后可以有其他字符</font >)都会执行相应操作。\n\n\n注:`控件ID可以在一个PDF中不可重复`\n\n<a href=\"https://qcloudimg.tencent-cloud.cn/raw/93178569d07b4d7dbbe0967ae679e35c.png\" target=\"_blank\">点击查看ComponentId在模板编辑页面的位置</a>\n",
|
1725
1734
|
"example": "无",
|
1726
1735
|
"member": "string",
|
1727
1736
|
"name": "ComponentId",
|
@@ -5636,6 +5645,15 @@
|
|
5636
5645
|
"name": "Agent",
|
5637
5646
|
"required": false,
|
5638
5647
|
"type": "object"
|
5648
|
+
},
|
5649
|
+
{
|
5650
|
+
"disabled": false,
|
5651
|
+
"document": "调用方自定义的个性化字段(可自定义此字段的值),并以base64方式编码,支持的最大数据大小为 20480长度。 在个人自动签的开通、关闭等回调信息场景中,该字段的信息将原封不动地透传给贵方。 ",
|
5652
|
+
"example": "无",
|
5653
|
+
"member": "string",
|
5654
|
+
"name": "UserData",
|
5655
|
+
"required": false,
|
5656
|
+
"type": "string"
|
5639
5657
|
}
|
5640
5658
|
],
|
5641
5659
|
"type": "object"
|