tccli 3.0.1137.1__py2.py3-none-any.whl → 3.0.1139.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/command.py +1 -1
  3. tccli/help_command.py +1 -1
  4. tccli/services/__init__.py +3 -0
  5. tccli/services/aiart/aiart_client.py +53 -0
  6. tccli/services/aiart/v20221229/api.json +98 -0
  7. tccli/services/aiart/v20221229/examples.json +8 -0
  8. tccli/services/asr/v20190614/api.json +9 -0
  9. tccli/services/cbs/v20170312/api.json +5 -8
  10. tccli/services/cdwch/v20200915/api.json +1 -1
  11. tccli/services/ckafka/v20190819/api.json +25 -25
  12. tccli/services/ckafka/v20190819/examples.json +18 -18
  13. tccli/services/cls/v20201016/api.json +44 -5
  14. tccli/services/cls/v20201016/examples.json +1 -1
  15. tccli/services/cwp/cwp_client.py +61 -114
  16. tccli/services/cwp/v20180228/api.json +0 -70
  17. tccli/services/cwp/v20180228/examples.json +0 -8
  18. tccli/services/domain/v20180808/api.json +36 -0
  19. tccli/services/emr/v20190103/api.json +534 -15
  20. tccli/services/emr/v20190103/examples.json +4 -4
  21. tccli/services/ess/v20201111/api.json +4 -4
  22. tccli/services/ess/v20201111/examples.json +2 -2
  23. tccli/services/essbasic/v20210526/api.json +3 -3
  24. tccli/services/essbasic/v20210526/examples.json +2 -2
  25. tccli/services/ims/v20201229/api.json +2 -2
  26. tccli/services/ioa/v20220601/api.json +132 -92
  27. tccli/services/iotexplorer/v20190423/api.json +11 -0
  28. tccli/services/mps/v20190612/api.json +163 -115
  29. tccli/services/mps/v20190612/examples.json +11 -11
  30. tccli/services/ocr/v20181119/api.json +19 -0
  31. tccli/services/redis/v20180412/api.json +23 -23
  32. tccli/services/rum/v20210622/api.json +1 -0
  33. tccli/services/scf/v20180416/examples.json +1 -1
  34. tccli/services/ssl/ssl_client.py +53 -0
  35. tccli/services/ssl/v20191205/api.json +251 -5
  36. tccli/services/ssl/v20191205/examples.json +9 -1
  37. tccli/services/tdmq/v20200217/api.json +171 -22
  38. tccli/services/tdmq/v20200217/examples.json +6 -6
  39. tccli/services/thpc/v20230321/api.json +42 -21
  40. tccli/services/tke/v20180525/api.json +149 -71
  41. tccli/services/tke/v20180525/examples.json +69 -57
  42. tccli/services/trtc/v20190722/api.json +1 -1
  43. tccli/services/tsf/v20180326/api.json +1 -1
  44. tccli/services/vclm/__init__.py +4 -0
  45. tccli/services/vclm/v20240523/api.json +695 -0
  46. tccli/services/vclm/v20240523/examples.json +73 -0
  47. tccli/services/vclm/vclm_client.py +513 -0
  48. tccli/services/vdb/v20230616/api.json +20 -0
  49. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/METADATA +2 -2
  50. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/RECORD +53 -49
  51. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/WHEEL +0 -0
  52. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/entry_points.txt +0 -0
  53. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/license_files/LICENSE +0 -0
@@ -14837,58 +14837,6 @@ def doSetLocalStorageExpire(args, parsed_globals):
14837
14837
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
14838
14838
 
14839
14839
 
14840
- def doExportAttackLogs(args, parsed_globals):
14841
- g_param = parse_global_arg(parsed_globals)
14842
-
14843
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
14844
- cred = credential.CVMRoleCredential()
14845
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
14846
- cred = credential.STSAssumeRoleCredential(
14847
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
14848
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
14849
- )
14850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
14851
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
14852
- else:
14853
- cred = credential.Credential(
14854
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
14855
- )
14856
- http_profile = HttpProfile(
14857
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
14858
- reqMethod="POST",
14859
- endpoint=g_param[OptionsDefine.Endpoint],
14860
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
14861
- )
14862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
14863
- if g_param[OptionsDefine.Language]:
14864
- profile.language = g_param[OptionsDefine.Language]
14865
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
14866
- client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
14867
- client._sdkVersion += ("_CLI_" + __version__)
14868
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
14869
- model = models.ExportAttackLogsRequest()
14870
- model.from_json_string(json.dumps(args))
14871
- start_time = time.time()
14872
- while True:
14873
- rsp = client.ExportAttackLogs(model)
14874
- result = rsp.to_json_string()
14875
- try:
14876
- json_obj = json.loads(result)
14877
- except TypeError as e:
14878
- json_obj = json.loads(result.decode('utf-8')) # python3.3
14879
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
14880
- break
14881
- cur_time = time.time()
14882
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
14883
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
14884
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
14885
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
14886
- else:
14887
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
14888
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
14889
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
14890
-
14891
-
14892
14840
  def doDescribeUsualLoginPlaces(args, parsed_globals):
14893
14841
  g_param = parse_global_arg(parsed_globals)
14894
14842
 
@@ -17749,7 +17697,7 @@ def doDescribeBaselineStrategyList(args, parsed_globals):
17749
17697
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17750
17698
 
17751
17699
 
17752
- def doModifyBaselineRuleIgnore(args, parsed_globals):
17700
+ def doDescribeScanMalwareSchedule(args, parsed_globals):
17753
17701
  g_param = parse_global_arg(parsed_globals)
17754
17702
 
17755
17703
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17778,11 +17726,11 @@ def doModifyBaselineRuleIgnore(args, parsed_globals):
17778
17726
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
17779
17727
  client._sdkVersion += ("_CLI_" + __version__)
17780
17728
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17781
- model = models.ModifyBaselineRuleIgnoreRequest()
17729
+ model = models.DescribeScanMalwareScheduleRequest()
17782
17730
  model.from_json_string(json.dumps(args))
17783
17731
  start_time = time.time()
17784
17732
  while True:
17785
- rsp = client.ModifyBaselineRuleIgnore(model)
17733
+ rsp = client.DescribeScanMalwareSchedule(model)
17786
17734
  result = rsp.to_json_string()
17787
17735
  try:
17788
17736
  json_obj = json.loads(result)
@@ -20089,6 +20037,58 @@ def doDescribeRansomDefenseEventsList(args, parsed_globals):
20089
20037
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
20090
20038
 
20091
20039
 
20040
+ def doExportLicenseDetail(args, parsed_globals):
20041
+ g_param = parse_global_arg(parsed_globals)
20042
+
20043
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
20044
+ cred = credential.CVMRoleCredential()
20045
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
20046
+ cred = credential.STSAssumeRoleCredential(
20047
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
20048
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
20049
+ )
20050
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
20051
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
20052
+ else:
20053
+ cred = credential.Credential(
20054
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
20055
+ )
20056
+ http_profile = HttpProfile(
20057
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
20058
+ reqMethod="POST",
20059
+ endpoint=g_param[OptionsDefine.Endpoint],
20060
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
20061
+ )
20062
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
20063
+ if g_param[OptionsDefine.Language]:
20064
+ profile.language = g_param[OptionsDefine.Language]
20065
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
20066
+ client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
20067
+ client._sdkVersion += ("_CLI_" + __version__)
20068
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
20069
+ model = models.ExportLicenseDetailRequest()
20070
+ model.from_json_string(json.dumps(args))
20071
+ start_time = time.time()
20072
+ while True:
20073
+ rsp = client.ExportLicenseDetail(model)
20074
+ result = rsp.to_json_string()
20075
+ try:
20076
+ json_obj = json.loads(result)
20077
+ except TypeError as e:
20078
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
20079
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
20080
+ break
20081
+ cur_time = time.time()
20082
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
20083
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
20084
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
20085
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
20086
+ else:
20087
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
20088
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
20089
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
20090
+
20091
+
20092
20092
  def doExportAssetProcessInfoList(args, parsed_globals):
20093
20093
  g_param = parse_global_arg(parsed_globals)
20094
20094
 
@@ -22429,58 +22429,6 @@ def doDeleteBaselineWeakPassword(args, parsed_globals):
22429
22429
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
22430
22430
 
22431
22431
 
22432
- def doDescribeScanMalwareSchedule(args, parsed_globals):
22433
- g_param = parse_global_arg(parsed_globals)
22434
-
22435
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
22436
- cred = credential.CVMRoleCredential()
22437
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
22438
- cred = credential.STSAssumeRoleCredential(
22439
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
22440
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
22441
- )
22442
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
22443
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
22444
- else:
22445
- cred = credential.Credential(
22446
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
22447
- )
22448
- http_profile = HttpProfile(
22449
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
22450
- reqMethod="POST",
22451
- endpoint=g_param[OptionsDefine.Endpoint],
22452
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
22453
- )
22454
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
22455
- if g_param[OptionsDefine.Language]:
22456
- profile.language = g_param[OptionsDefine.Language]
22457
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
22458
- client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
22459
- client._sdkVersion += ("_CLI_" + __version__)
22460
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
22461
- model = models.DescribeScanMalwareScheduleRequest()
22462
- model.from_json_string(json.dumps(args))
22463
- start_time = time.time()
22464
- while True:
22465
- rsp = client.DescribeScanMalwareSchedule(model)
22466
- result = rsp.to_json_string()
22467
- try:
22468
- json_obj = json.loads(result)
22469
- except TypeError as e:
22470
- json_obj = json.loads(result.decode('utf-8')) # python3.3
22471
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
22472
- break
22473
- cur_time = time.time()
22474
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
22475
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
22476
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
22477
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
22478
- else:
22479
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
22480
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
22481
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
22482
-
22483
-
22484
22432
  def doDeleteNonlocalLoginPlaces(args, parsed_globals):
22485
22433
  g_param = parse_global_arg(parsed_globals)
22486
22434
 
@@ -23729,7 +23677,7 @@ def doExportRiskDnsEventList(args, parsed_globals):
23729
23677
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
23730
23678
 
23731
23679
 
23732
- def doExportLicenseDetail(args, parsed_globals):
23680
+ def doModifyBaselineRuleIgnore(args, parsed_globals):
23733
23681
  g_param = parse_global_arg(parsed_globals)
23734
23682
 
23735
23683
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -23758,11 +23706,11 @@ def doExportLicenseDetail(args, parsed_globals):
23758
23706
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
23759
23707
  client._sdkVersion += ("_CLI_" + __version__)
23760
23708
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
23761
- model = models.ExportLicenseDetailRequest()
23709
+ model = models.ModifyBaselineRuleIgnoreRequest()
23762
23710
  model.from_json_string(json.dumps(args))
23763
23711
  start_time = time.time()
23764
23712
  while True:
23765
- rsp = client.ExportLicenseDetail(model)
23713
+ rsp = client.ModifyBaselineRuleIgnore(model)
23766
23714
  result = rsp.to_json_string()
23767
23715
  try:
23768
23716
  json_obj = json.loads(result)
@@ -27145,7 +27093,6 @@ ACTION_MAP = {
27145
27093
  "DescribeBaselineTop": doDescribeBaselineTop,
27146
27094
  "DescribeFastAnalysis": doDescribeFastAnalysis,
27147
27095
  "SetLocalStorageExpire": doSetLocalStorageExpire,
27148
- "ExportAttackLogs": doExportAttackLogs,
27149
27096
  "DescribeUsualLoginPlaces": doDescribeUsualLoginPlaces,
27150
27097
  "ExportFileTamperEvents": doExportFileTamperEvents,
27151
27098
  "AddLoginWhiteLists": doAddLoginWhiteLists,
@@ -27201,7 +27148,7 @@ ACTION_MAP = {
27201
27148
  "DescribeBashRules": doDescribeBashRules,
27202
27149
  "DescribeAttackStatistics": doDescribeAttackStatistics,
27203
27150
  "DescribeBaselineStrategyList": doDescribeBaselineStrategyList,
27204
- "ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
27151
+ "DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
27205
27152
  "ModifyMalwareWhiteList": doModifyMalwareWhiteList,
27206
27153
  "DescribeWebHookRule": doDescribeWebHookRule,
27207
27154
  "RetryVulFix": doRetryVulFix,
@@ -27246,6 +27193,7 @@ ACTION_MAP = {
27246
27193
  "GetLocalStorageItem": doGetLocalStorageItem,
27247
27194
  "ExportRansomDefenseMachineList": doExportRansomDefenseMachineList,
27248
27195
  "DescribeRansomDefenseEventsList": doDescribeRansomDefenseEventsList,
27196
+ "ExportLicenseDetail": doExportLicenseDetail,
27249
27197
  "ExportAssetProcessInfoList": doExportAssetProcessInfoList,
27250
27198
  "DescribeMachinesSimple": doDescribeMachinesSimple,
27251
27199
  "DescribeBashEvents": doDescribeBashEvents,
@@ -27291,7 +27239,6 @@ ACTION_MAP = {
27291
27239
  "DescribeAssetTotalCount": doDescribeAssetTotalCount,
27292
27240
  "DescribeHotVulTop": doDescribeHotVulTop,
27293
27241
  "DeleteBaselineWeakPassword": doDeleteBaselineWeakPassword,
27294
- "DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
27295
27242
  "DeleteNonlocalLoginPlaces": doDeleteNonlocalLoginPlaces,
27296
27243
  "ExportAssetSystemPackageList": doExportAssetSystemPackageList,
27297
27244
  "EditReverseShellRules": doEditReverseShellRules,
@@ -27316,7 +27263,7 @@ ACTION_MAP = {
27316
27263
  "ExportWebPageEventList": doExportWebPageEventList,
27317
27264
  "DescribeBaselineHostRiskTop": doDescribeBaselineHostRiskTop,
27318
27265
  "ExportRiskDnsEventList": doExportRiskDnsEventList,
27319
- "ExportLicenseDetail": doExportLicenseDetail,
27266
+ "ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
27320
27267
  "DescribeEmergencyResponseList": doDescribeEmergencyResponseList,
27321
27268
  "DescribeAttackTrends": doDescribeAttackTrends,
27322
27269
  "DescribeScreenDefenseTrends": doDescribeScreenDefenseTrends,
@@ -2681,13 +2681,6 @@
2681
2681
  "output": "ExportAttackEventsResponse",
2682
2682
  "status": "online"
2683
2683
  },
2684
- "ExportAttackLogs": {
2685
- "document": "ExportAttackEvents接口替代\n\n导出网络攻击日志",
2686
- "input": "ExportAttackLogsRequest",
2687
- "name": "导出网络攻击日志",
2688
- "output": "ExportAttackLogsResponse",
2689
- "status": "deprecated"
2690
- },
2691
2684
  "ExportBaselineEffectHostList": {
2692
2685
  "document": "导出基线影响主机列表",
2693
2686
  "input": "ExportBaselineEffectHostListRequest",
@@ -38792,69 +38785,6 @@
38792
38785
  ],
38793
38786
  "type": "object"
38794
38787
  },
38795
- "ExportAttackLogsRequest": {
38796
- "document": "ExportAttackLogs请求参数结构体",
38797
- "members": [
38798
- {
38799
- "disabled": false,
38800
- "document": "过滤条件。\n<li>HttpMethod - String - 是否必填:否 - 攻击方法(POST|GET)</li>\n<li>DateRange - String - 是否必填:否 - 时间范围(存储最近3个月的数据),如最近一个月[\"2019-11-17\", \"2019-12-17\"]</li>\n<li>VulType - String 威胁类型 - 是否必填: 否</li>\n<li>SrcIp - String 攻击源IP - 是否必填: 否</li>\n<li>DstIp - String 攻击目标IP - 是否必填: 否</li>\n<li>SrcPort - String 攻击源端口 - 是否必填: 否</li>\n<li>DstPort - String 攻击目标端口 - 是否必填: 否</li>",
38801
- "example": "[]",
38802
- "member": "Filters",
38803
- "name": "Filters",
38804
- "required": false,
38805
- "type": "list"
38806
- },
38807
- {
38808
- "disabled": false,
38809
- "document": "主机安全客户端ID",
38810
- "example": "uuid",
38811
- "member": "string",
38812
- "name": "Uuid",
38813
- "required": false,
38814
- "type": "string"
38815
- },
38816
- {
38817
- "disabled": false,
38818
- "document": "云主机机器ID",
38819
- "example": "quuid",
38820
- "member": "string",
38821
- "name": "Quuid",
38822
- "required": false,
38823
- "type": "string"
38824
- }
38825
- ],
38826
- "type": "object"
38827
- },
38828
- "ExportAttackLogsResponse": {
38829
- "document": "ExportAttackLogs返回参数结构体",
38830
- "members": [
38831
- {
38832
- "disabled": false,
38833
- "document": "已废弃",
38834
- "example": "xxx",
38835
- "member": "string",
38836
- "name": "DownloadUrl",
38837
- "type": "string",
38838
- "value_allowed_null": false
38839
- },
38840
- {
38841
- "disabled": false,
38842
- "document": "任务ID,需要到接口“异步导出任务”ExportTasks获取DownloadUrl下载地址",
38843
- "example": "123456",
38844
- "member": "string",
38845
- "name": "TaskId",
38846
- "type": "string",
38847
- "value_allowed_null": false
38848
- },
38849
- {
38850
- "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
38851
- "member": "string",
38852
- "name": "RequestId",
38853
- "type": "string"
38854
- }
38855
- ],
38856
- "type": "object"
38857
- },
38858
38788
  "ExportBaselineEffectHostListRequest": {
38859
38789
  "document": "ExportBaselineEffectHostList请求参数结构体",
38860
38790
  "members": [
@@ -3100,14 +3100,6 @@
3100
3100
  "title": "导出网络攻击事件"
3101
3101
  }
3102
3102
  ],
3103
- "ExportAttackLogs": [
3104
- {
3105
- "document": "导出网络攻击日志",
3106
- "input": "https://cwp.tencentcloudapi.com/?Action=ExportAttackLogs\n&<公共请求参数>",
3107
- "output": "{\n \"Response\": {\n \"RequestId\": \"354f4ac3-8546-4516-8c8a-69e3ab73aa8a\",\n \"DownloadUrl\": \"http://download.url/xxx.csv\",\n \"TaskId\": \"1596595610\"\n }\n}",
3108
- "title": "导出网络攻击日志"
3109
- }
3110
- ],
3111
3103
  "ExportBaselineEffectHostList": [
3112
3104
  {
3113
3105
  "document": "导出漏洞影响主机列表数据",
@@ -5600,6 +5600,16 @@
5600
5600
  "type": "list",
5601
5601
  "value_allowed_null": false
5602
5602
  },
5603
+ {
5604
+ "disabled": false,
5605
+ "document": "域名预定成功详情",
5606
+ "example": "[{\"tencent.com\",\"P0011702977661022561\"}]",
5607
+ "member": "SucDomainInfo",
5608
+ "name": "SucDomains",
5609
+ "output_required": false,
5610
+ "type": "list",
5611
+ "value_allowed_null": false
5612
+ },
5603
5613
  {
5604
5614
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
5605
5615
  "member": "string",
@@ -5681,6 +5691,32 @@
5681
5691
  ],
5682
5692
  "type": "object"
5683
5693
  },
5694
+ "SucDomainInfo": {
5695
+ "document": "预释放域名预约参数补充成功信息",
5696
+ "members": [
5697
+ {
5698
+ "disabled": false,
5699
+ "document": "域名\n注意:此字段可能返回 null,表示取不到有效值。",
5700
+ "example": "tencent.com",
5701
+ "member": "string",
5702
+ "name": "Domain",
5703
+ "output_required": false,
5704
+ "type": "string",
5705
+ "value_allowed_null": true
5706
+ },
5707
+ {
5708
+ "disabled": false,
5709
+ "document": "业务ID\n注意:此字段可能返回 null,表示取不到有效值。",
5710
+ "example": "P0011702977661022561",
5711
+ "member": "string",
5712
+ "name": "BusinessId",
5713
+ "output_required": false,
5714
+ "type": "string",
5715
+ "value_allowed_null": true
5716
+ }
5717
+ ],
5718
+ "usage": "out"
5719
+ },
5684
5720
  "SyncCustomDnsHostRequest": {
5685
5721
  "document": "SyncCustomDnsHost请求参数结构体",
5686
5722
  "members": [