tccli 3.0.1137.1__py2.py3-none-any.whl → 3.0.1139.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/command.py +1 -1
- tccli/help_command.py +1 -1
- tccli/services/__init__.py +3 -0
- tccli/services/aiart/aiart_client.py +53 -0
- tccli/services/aiart/v20221229/api.json +98 -0
- tccli/services/aiart/v20221229/examples.json +8 -0
- tccli/services/asr/v20190614/api.json +9 -0
- tccli/services/cbs/v20170312/api.json +5 -8
- tccli/services/cdwch/v20200915/api.json +1 -1
- tccli/services/ckafka/v20190819/api.json +25 -25
- tccli/services/ckafka/v20190819/examples.json +18 -18
- tccli/services/cls/v20201016/api.json +44 -5
- tccli/services/cls/v20201016/examples.json +1 -1
- tccli/services/cwp/cwp_client.py +61 -114
- tccli/services/cwp/v20180228/api.json +0 -70
- tccli/services/cwp/v20180228/examples.json +0 -8
- tccli/services/domain/v20180808/api.json +36 -0
- tccli/services/emr/v20190103/api.json +534 -15
- tccli/services/emr/v20190103/examples.json +4 -4
- tccli/services/ess/v20201111/api.json +4 -4
- tccli/services/ess/v20201111/examples.json +2 -2
- tccli/services/essbasic/v20210526/api.json +3 -3
- tccli/services/essbasic/v20210526/examples.json +2 -2
- tccli/services/ims/v20201229/api.json +2 -2
- tccli/services/ioa/v20220601/api.json +132 -92
- tccli/services/iotexplorer/v20190423/api.json +11 -0
- tccli/services/mps/v20190612/api.json +163 -115
- tccli/services/mps/v20190612/examples.json +11 -11
- tccli/services/ocr/v20181119/api.json +19 -0
- tccli/services/redis/v20180412/api.json +23 -23
- tccli/services/rum/v20210622/api.json +1 -0
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/ssl/ssl_client.py +53 -0
- tccli/services/ssl/v20191205/api.json +251 -5
- tccli/services/ssl/v20191205/examples.json +9 -1
- tccli/services/tdmq/v20200217/api.json +171 -22
- tccli/services/tdmq/v20200217/examples.json +6 -6
- tccli/services/thpc/v20230321/api.json +42 -21
- tccli/services/tke/v20180525/api.json +149 -71
- tccli/services/tke/v20180525/examples.json +69 -57
- tccli/services/trtc/v20190722/api.json +1 -1
- tccli/services/tsf/v20180326/api.json +1 -1
- tccli/services/vclm/__init__.py +4 -0
- tccli/services/vclm/v20240523/api.json +695 -0
- tccli/services/vclm/v20240523/examples.json +73 -0
- tccli/services/vclm/vclm_client.py +513 -0
- tccli/services/vdb/v20230616/api.json +20 -0
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/RECORD +53 -49
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/cwp/cwp_client.py
CHANGED
@@ -14837,58 +14837,6 @@ def doSetLocalStorageExpire(args, parsed_globals):
|
|
14837
14837
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
14838
14838
|
|
14839
14839
|
|
14840
|
-
def doExportAttackLogs(args, parsed_globals):
|
14841
|
-
g_param = parse_global_arg(parsed_globals)
|
14842
|
-
|
14843
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
14844
|
-
cred = credential.CVMRoleCredential()
|
14845
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14846
|
-
cred = credential.STSAssumeRoleCredential(
|
14847
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14848
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14849
|
-
)
|
14850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14851
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
14852
|
-
else:
|
14853
|
-
cred = credential.Credential(
|
14854
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
14855
|
-
)
|
14856
|
-
http_profile = HttpProfile(
|
14857
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
14858
|
-
reqMethod="POST",
|
14859
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
14860
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
14861
|
-
)
|
14862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
14863
|
-
if g_param[OptionsDefine.Language]:
|
14864
|
-
profile.language = g_param[OptionsDefine.Language]
|
14865
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
14866
|
-
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
14867
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
14868
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
14869
|
-
model = models.ExportAttackLogsRequest()
|
14870
|
-
model.from_json_string(json.dumps(args))
|
14871
|
-
start_time = time.time()
|
14872
|
-
while True:
|
14873
|
-
rsp = client.ExportAttackLogs(model)
|
14874
|
-
result = rsp.to_json_string()
|
14875
|
-
try:
|
14876
|
-
json_obj = json.loads(result)
|
14877
|
-
except TypeError as e:
|
14878
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
14879
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
14880
|
-
break
|
14881
|
-
cur_time = time.time()
|
14882
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
14883
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
14884
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
14885
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
14886
|
-
else:
|
14887
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
14888
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
14889
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
14890
|
-
|
14891
|
-
|
14892
14840
|
def doDescribeUsualLoginPlaces(args, parsed_globals):
|
14893
14841
|
g_param = parse_global_arg(parsed_globals)
|
14894
14842
|
|
@@ -17749,7 +17697,7 @@ def doDescribeBaselineStrategyList(args, parsed_globals):
|
|
17749
17697
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17750
17698
|
|
17751
17699
|
|
17752
|
-
def
|
17700
|
+
def doDescribeScanMalwareSchedule(args, parsed_globals):
|
17753
17701
|
g_param = parse_global_arg(parsed_globals)
|
17754
17702
|
|
17755
17703
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17778,11 +17726,11 @@ def doModifyBaselineRuleIgnore(args, parsed_globals):
|
|
17778
17726
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
17779
17727
|
client._sdkVersion += ("_CLI_" + __version__)
|
17780
17728
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17781
|
-
model = models.
|
17729
|
+
model = models.DescribeScanMalwareScheduleRequest()
|
17782
17730
|
model.from_json_string(json.dumps(args))
|
17783
17731
|
start_time = time.time()
|
17784
17732
|
while True:
|
17785
|
-
rsp = client.
|
17733
|
+
rsp = client.DescribeScanMalwareSchedule(model)
|
17786
17734
|
result = rsp.to_json_string()
|
17787
17735
|
try:
|
17788
17736
|
json_obj = json.loads(result)
|
@@ -20089,6 +20037,58 @@ def doDescribeRansomDefenseEventsList(args, parsed_globals):
|
|
20089
20037
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
20090
20038
|
|
20091
20039
|
|
20040
|
+
def doExportLicenseDetail(args, parsed_globals):
|
20041
|
+
g_param = parse_global_arg(parsed_globals)
|
20042
|
+
|
20043
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
20044
|
+
cred = credential.CVMRoleCredential()
|
20045
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
20046
|
+
cred = credential.STSAssumeRoleCredential(
|
20047
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
20048
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
20049
|
+
)
|
20050
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
20051
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
20052
|
+
else:
|
20053
|
+
cred = credential.Credential(
|
20054
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
20055
|
+
)
|
20056
|
+
http_profile = HttpProfile(
|
20057
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
20058
|
+
reqMethod="POST",
|
20059
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
20060
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
20061
|
+
)
|
20062
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
20063
|
+
if g_param[OptionsDefine.Language]:
|
20064
|
+
profile.language = g_param[OptionsDefine.Language]
|
20065
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
20066
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
20067
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
20068
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
20069
|
+
model = models.ExportLicenseDetailRequest()
|
20070
|
+
model.from_json_string(json.dumps(args))
|
20071
|
+
start_time = time.time()
|
20072
|
+
while True:
|
20073
|
+
rsp = client.ExportLicenseDetail(model)
|
20074
|
+
result = rsp.to_json_string()
|
20075
|
+
try:
|
20076
|
+
json_obj = json.loads(result)
|
20077
|
+
except TypeError as e:
|
20078
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
20079
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
20080
|
+
break
|
20081
|
+
cur_time = time.time()
|
20082
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
20083
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
20084
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
20085
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
20086
|
+
else:
|
20087
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
20088
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
20089
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
20090
|
+
|
20091
|
+
|
20092
20092
|
def doExportAssetProcessInfoList(args, parsed_globals):
|
20093
20093
|
g_param = parse_global_arg(parsed_globals)
|
20094
20094
|
|
@@ -22429,58 +22429,6 @@ def doDeleteBaselineWeakPassword(args, parsed_globals):
|
|
22429
22429
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
22430
22430
|
|
22431
22431
|
|
22432
|
-
def doDescribeScanMalwareSchedule(args, parsed_globals):
|
22433
|
-
g_param = parse_global_arg(parsed_globals)
|
22434
|
-
|
22435
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
22436
|
-
cred = credential.CVMRoleCredential()
|
22437
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
22438
|
-
cred = credential.STSAssumeRoleCredential(
|
22439
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
22440
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
22441
|
-
)
|
22442
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
22443
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
22444
|
-
else:
|
22445
|
-
cred = credential.Credential(
|
22446
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
22447
|
-
)
|
22448
|
-
http_profile = HttpProfile(
|
22449
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
22450
|
-
reqMethod="POST",
|
22451
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
22452
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
22453
|
-
)
|
22454
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
22455
|
-
if g_param[OptionsDefine.Language]:
|
22456
|
-
profile.language = g_param[OptionsDefine.Language]
|
22457
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
22458
|
-
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
22459
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
22460
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
22461
|
-
model = models.DescribeScanMalwareScheduleRequest()
|
22462
|
-
model.from_json_string(json.dumps(args))
|
22463
|
-
start_time = time.time()
|
22464
|
-
while True:
|
22465
|
-
rsp = client.DescribeScanMalwareSchedule(model)
|
22466
|
-
result = rsp.to_json_string()
|
22467
|
-
try:
|
22468
|
-
json_obj = json.loads(result)
|
22469
|
-
except TypeError as e:
|
22470
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
22471
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
22472
|
-
break
|
22473
|
-
cur_time = time.time()
|
22474
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
22475
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
22476
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
22477
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
22478
|
-
else:
|
22479
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
22480
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
22481
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
22482
|
-
|
22483
|
-
|
22484
22432
|
def doDeleteNonlocalLoginPlaces(args, parsed_globals):
|
22485
22433
|
g_param = parse_global_arg(parsed_globals)
|
22486
22434
|
|
@@ -23729,7 +23677,7 @@ def doExportRiskDnsEventList(args, parsed_globals):
|
|
23729
23677
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
23730
23678
|
|
23731
23679
|
|
23732
|
-
def
|
23680
|
+
def doModifyBaselineRuleIgnore(args, parsed_globals):
|
23733
23681
|
g_param = parse_global_arg(parsed_globals)
|
23734
23682
|
|
23735
23683
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -23758,11 +23706,11 @@ def doExportLicenseDetail(args, parsed_globals):
|
|
23758
23706
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
23759
23707
|
client._sdkVersion += ("_CLI_" + __version__)
|
23760
23708
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
23761
|
-
model = models.
|
23709
|
+
model = models.ModifyBaselineRuleIgnoreRequest()
|
23762
23710
|
model.from_json_string(json.dumps(args))
|
23763
23711
|
start_time = time.time()
|
23764
23712
|
while True:
|
23765
|
-
rsp = client.
|
23713
|
+
rsp = client.ModifyBaselineRuleIgnore(model)
|
23766
23714
|
result = rsp.to_json_string()
|
23767
23715
|
try:
|
23768
23716
|
json_obj = json.loads(result)
|
@@ -27145,7 +27093,6 @@ ACTION_MAP = {
|
|
27145
27093
|
"DescribeBaselineTop": doDescribeBaselineTop,
|
27146
27094
|
"DescribeFastAnalysis": doDescribeFastAnalysis,
|
27147
27095
|
"SetLocalStorageExpire": doSetLocalStorageExpire,
|
27148
|
-
"ExportAttackLogs": doExportAttackLogs,
|
27149
27096
|
"DescribeUsualLoginPlaces": doDescribeUsualLoginPlaces,
|
27150
27097
|
"ExportFileTamperEvents": doExportFileTamperEvents,
|
27151
27098
|
"AddLoginWhiteLists": doAddLoginWhiteLists,
|
@@ -27201,7 +27148,7 @@ ACTION_MAP = {
|
|
27201
27148
|
"DescribeBashRules": doDescribeBashRules,
|
27202
27149
|
"DescribeAttackStatistics": doDescribeAttackStatistics,
|
27203
27150
|
"DescribeBaselineStrategyList": doDescribeBaselineStrategyList,
|
27204
|
-
"
|
27151
|
+
"DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
|
27205
27152
|
"ModifyMalwareWhiteList": doModifyMalwareWhiteList,
|
27206
27153
|
"DescribeWebHookRule": doDescribeWebHookRule,
|
27207
27154
|
"RetryVulFix": doRetryVulFix,
|
@@ -27246,6 +27193,7 @@ ACTION_MAP = {
|
|
27246
27193
|
"GetLocalStorageItem": doGetLocalStorageItem,
|
27247
27194
|
"ExportRansomDefenseMachineList": doExportRansomDefenseMachineList,
|
27248
27195
|
"DescribeRansomDefenseEventsList": doDescribeRansomDefenseEventsList,
|
27196
|
+
"ExportLicenseDetail": doExportLicenseDetail,
|
27249
27197
|
"ExportAssetProcessInfoList": doExportAssetProcessInfoList,
|
27250
27198
|
"DescribeMachinesSimple": doDescribeMachinesSimple,
|
27251
27199
|
"DescribeBashEvents": doDescribeBashEvents,
|
@@ -27291,7 +27239,6 @@ ACTION_MAP = {
|
|
27291
27239
|
"DescribeAssetTotalCount": doDescribeAssetTotalCount,
|
27292
27240
|
"DescribeHotVulTop": doDescribeHotVulTop,
|
27293
27241
|
"DeleteBaselineWeakPassword": doDeleteBaselineWeakPassword,
|
27294
|
-
"DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
|
27295
27242
|
"DeleteNonlocalLoginPlaces": doDeleteNonlocalLoginPlaces,
|
27296
27243
|
"ExportAssetSystemPackageList": doExportAssetSystemPackageList,
|
27297
27244
|
"EditReverseShellRules": doEditReverseShellRules,
|
@@ -27316,7 +27263,7 @@ ACTION_MAP = {
|
|
27316
27263
|
"ExportWebPageEventList": doExportWebPageEventList,
|
27317
27264
|
"DescribeBaselineHostRiskTop": doDescribeBaselineHostRiskTop,
|
27318
27265
|
"ExportRiskDnsEventList": doExportRiskDnsEventList,
|
27319
|
-
"
|
27266
|
+
"ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
|
27320
27267
|
"DescribeEmergencyResponseList": doDescribeEmergencyResponseList,
|
27321
27268
|
"DescribeAttackTrends": doDescribeAttackTrends,
|
27322
27269
|
"DescribeScreenDefenseTrends": doDescribeScreenDefenseTrends,
|
@@ -2681,13 +2681,6 @@
|
|
2681
2681
|
"output": "ExportAttackEventsResponse",
|
2682
2682
|
"status": "online"
|
2683
2683
|
},
|
2684
|
-
"ExportAttackLogs": {
|
2685
|
-
"document": "ExportAttackEvents接口替代\n\n导出网络攻击日志",
|
2686
|
-
"input": "ExportAttackLogsRequest",
|
2687
|
-
"name": "导出网络攻击日志",
|
2688
|
-
"output": "ExportAttackLogsResponse",
|
2689
|
-
"status": "deprecated"
|
2690
|
-
},
|
2691
2684
|
"ExportBaselineEffectHostList": {
|
2692
2685
|
"document": "导出基线影响主机列表",
|
2693
2686
|
"input": "ExportBaselineEffectHostListRequest",
|
@@ -38792,69 +38785,6 @@
|
|
38792
38785
|
],
|
38793
38786
|
"type": "object"
|
38794
38787
|
},
|
38795
|
-
"ExportAttackLogsRequest": {
|
38796
|
-
"document": "ExportAttackLogs请求参数结构体",
|
38797
|
-
"members": [
|
38798
|
-
{
|
38799
|
-
"disabled": false,
|
38800
|
-
"document": "过滤条件。\n<li>HttpMethod - String - 是否必填:否 - 攻击方法(POST|GET)</li>\n<li>DateRange - String - 是否必填:否 - 时间范围(存储最近3个月的数据),如最近一个月[\"2019-11-17\", \"2019-12-17\"]</li>\n<li>VulType - String 威胁类型 - 是否必填: 否</li>\n<li>SrcIp - String 攻击源IP - 是否必填: 否</li>\n<li>DstIp - String 攻击目标IP - 是否必填: 否</li>\n<li>SrcPort - String 攻击源端口 - 是否必填: 否</li>\n<li>DstPort - String 攻击目标端口 - 是否必填: 否</li>",
|
38801
|
-
"example": "[]",
|
38802
|
-
"member": "Filters",
|
38803
|
-
"name": "Filters",
|
38804
|
-
"required": false,
|
38805
|
-
"type": "list"
|
38806
|
-
},
|
38807
|
-
{
|
38808
|
-
"disabled": false,
|
38809
|
-
"document": "主机安全客户端ID",
|
38810
|
-
"example": "uuid",
|
38811
|
-
"member": "string",
|
38812
|
-
"name": "Uuid",
|
38813
|
-
"required": false,
|
38814
|
-
"type": "string"
|
38815
|
-
},
|
38816
|
-
{
|
38817
|
-
"disabled": false,
|
38818
|
-
"document": "云主机机器ID",
|
38819
|
-
"example": "quuid",
|
38820
|
-
"member": "string",
|
38821
|
-
"name": "Quuid",
|
38822
|
-
"required": false,
|
38823
|
-
"type": "string"
|
38824
|
-
}
|
38825
|
-
],
|
38826
|
-
"type": "object"
|
38827
|
-
},
|
38828
|
-
"ExportAttackLogsResponse": {
|
38829
|
-
"document": "ExportAttackLogs返回参数结构体",
|
38830
|
-
"members": [
|
38831
|
-
{
|
38832
|
-
"disabled": false,
|
38833
|
-
"document": "已废弃",
|
38834
|
-
"example": "xxx",
|
38835
|
-
"member": "string",
|
38836
|
-
"name": "DownloadUrl",
|
38837
|
-
"type": "string",
|
38838
|
-
"value_allowed_null": false
|
38839
|
-
},
|
38840
|
-
{
|
38841
|
-
"disabled": false,
|
38842
|
-
"document": "任务ID,需要到接口“异步导出任务”ExportTasks获取DownloadUrl下载地址",
|
38843
|
-
"example": "123456",
|
38844
|
-
"member": "string",
|
38845
|
-
"name": "TaskId",
|
38846
|
-
"type": "string",
|
38847
|
-
"value_allowed_null": false
|
38848
|
-
},
|
38849
|
-
{
|
38850
|
-
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
38851
|
-
"member": "string",
|
38852
|
-
"name": "RequestId",
|
38853
|
-
"type": "string"
|
38854
|
-
}
|
38855
|
-
],
|
38856
|
-
"type": "object"
|
38857
|
-
},
|
38858
38788
|
"ExportBaselineEffectHostListRequest": {
|
38859
38789
|
"document": "ExportBaselineEffectHostList请求参数结构体",
|
38860
38790
|
"members": [
|
@@ -3100,14 +3100,6 @@
|
|
3100
3100
|
"title": "导出网络攻击事件"
|
3101
3101
|
}
|
3102
3102
|
],
|
3103
|
-
"ExportAttackLogs": [
|
3104
|
-
{
|
3105
|
-
"document": "导出网络攻击日志",
|
3106
|
-
"input": "https://cwp.tencentcloudapi.com/?Action=ExportAttackLogs\n&<公共请求参数>",
|
3107
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"354f4ac3-8546-4516-8c8a-69e3ab73aa8a\",\n \"DownloadUrl\": \"http://download.url/xxx.csv\",\n \"TaskId\": \"1596595610\"\n }\n}",
|
3108
|
-
"title": "导出网络攻击日志"
|
3109
|
-
}
|
3110
|
-
],
|
3111
3103
|
"ExportBaselineEffectHostList": [
|
3112
3104
|
{
|
3113
3105
|
"document": "导出漏洞影响主机列表数据",
|
@@ -5600,6 +5600,16 @@
|
|
5600
5600
|
"type": "list",
|
5601
5601
|
"value_allowed_null": false
|
5602
5602
|
},
|
5603
|
+
{
|
5604
|
+
"disabled": false,
|
5605
|
+
"document": "域名预定成功详情",
|
5606
|
+
"example": "[{\"tencent.com\",\"P0011702977661022561\"}]",
|
5607
|
+
"member": "SucDomainInfo",
|
5608
|
+
"name": "SucDomains",
|
5609
|
+
"output_required": false,
|
5610
|
+
"type": "list",
|
5611
|
+
"value_allowed_null": false
|
5612
|
+
},
|
5603
5613
|
{
|
5604
5614
|
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
5605
5615
|
"member": "string",
|
@@ -5681,6 +5691,32 @@
|
|
5681
5691
|
],
|
5682
5692
|
"type": "object"
|
5683
5693
|
},
|
5694
|
+
"SucDomainInfo": {
|
5695
|
+
"document": "预释放域名预约参数补充成功信息",
|
5696
|
+
"members": [
|
5697
|
+
{
|
5698
|
+
"disabled": false,
|
5699
|
+
"document": "域名\n注意:此字段可能返回 null,表示取不到有效值。",
|
5700
|
+
"example": "tencent.com",
|
5701
|
+
"member": "string",
|
5702
|
+
"name": "Domain",
|
5703
|
+
"output_required": false,
|
5704
|
+
"type": "string",
|
5705
|
+
"value_allowed_null": true
|
5706
|
+
},
|
5707
|
+
{
|
5708
|
+
"disabled": false,
|
5709
|
+
"document": "业务ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
5710
|
+
"example": "P0011702977661022561",
|
5711
|
+
"member": "string",
|
5712
|
+
"name": "BusinessId",
|
5713
|
+
"output_required": false,
|
5714
|
+
"type": "string",
|
5715
|
+
"value_allowed_null": true
|
5716
|
+
}
|
5717
|
+
],
|
5718
|
+
"usage": "out"
|
5719
|
+
},
|
5684
5720
|
"SyncCustomDnsHostRequest": {
|
5685
5721
|
"document": "SyncCustomDnsHost请求参数结构体",
|
5686
5722
|
"members": [
|