tccli 3.0.1137.1__py2.py3-none-any.whl → 3.0.1139.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (53) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/command.py +1 -1
  3. tccli/help_command.py +1 -1
  4. tccli/services/__init__.py +3 -0
  5. tccli/services/aiart/aiart_client.py +53 -0
  6. tccli/services/aiart/v20221229/api.json +98 -0
  7. tccli/services/aiart/v20221229/examples.json +8 -0
  8. tccli/services/asr/v20190614/api.json +9 -0
  9. tccli/services/cbs/v20170312/api.json +5 -8
  10. tccli/services/cdwch/v20200915/api.json +1 -1
  11. tccli/services/ckafka/v20190819/api.json +25 -25
  12. tccli/services/ckafka/v20190819/examples.json +18 -18
  13. tccli/services/cls/v20201016/api.json +44 -5
  14. tccli/services/cls/v20201016/examples.json +1 -1
  15. tccli/services/cwp/cwp_client.py +61 -114
  16. tccli/services/cwp/v20180228/api.json +0 -70
  17. tccli/services/cwp/v20180228/examples.json +0 -8
  18. tccli/services/domain/v20180808/api.json +36 -0
  19. tccli/services/emr/v20190103/api.json +534 -15
  20. tccli/services/emr/v20190103/examples.json +4 -4
  21. tccli/services/ess/v20201111/api.json +4 -4
  22. tccli/services/ess/v20201111/examples.json +2 -2
  23. tccli/services/essbasic/v20210526/api.json +3 -3
  24. tccli/services/essbasic/v20210526/examples.json +2 -2
  25. tccli/services/ims/v20201229/api.json +2 -2
  26. tccli/services/ioa/v20220601/api.json +132 -92
  27. tccli/services/iotexplorer/v20190423/api.json +11 -0
  28. tccli/services/mps/v20190612/api.json +163 -115
  29. tccli/services/mps/v20190612/examples.json +11 -11
  30. tccli/services/ocr/v20181119/api.json +19 -0
  31. tccli/services/redis/v20180412/api.json +23 -23
  32. tccli/services/rum/v20210622/api.json +1 -0
  33. tccli/services/scf/v20180416/examples.json +1 -1
  34. tccli/services/ssl/ssl_client.py +53 -0
  35. tccli/services/ssl/v20191205/api.json +251 -5
  36. tccli/services/ssl/v20191205/examples.json +9 -1
  37. tccli/services/tdmq/v20200217/api.json +171 -22
  38. tccli/services/tdmq/v20200217/examples.json +6 -6
  39. tccli/services/thpc/v20230321/api.json +42 -21
  40. tccli/services/tke/v20180525/api.json +149 -71
  41. tccli/services/tke/v20180525/examples.json +69 -57
  42. tccli/services/trtc/v20190722/api.json +1 -1
  43. tccli/services/tsf/v20180326/api.json +1 -1
  44. tccli/services/vclm/__init__.py +4 -0
  45. tccli/services/vclm/v20240523/api.json +695 -0
  46. tccli/services/vclm/v20240523/examples.json +73 -0
  47. tccli/services/vclm/vclm_client.py +513 -0
  48. tccli/services/vdb/v20230616/api.json +20 -0
  49. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/METADATA +2 -2
  50. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/RECORD +53 -49
  51. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/WHEEL +0 -0
  52. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/entry_points.txt +0 -0
  53. {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/license_files/LICENSE +0 -0
@@ -14837,58 +14837,6 @@ def doSetLocalStorageExpire(args, parsed_globals):
14837
14837
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
14838
14838
 
14839
14839
 
14840
- def doExportAttackLogs(args, parsed_globals):
14841
- g_param = parse_global_arg(parsed_globals)
14842
-
14843
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
14844
- cred = credential.CVMRoleCredential()
14845
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
14846
- cred = credential.STSAssumeRoleCredential(
14847
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
14848
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
14849
- )
14850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
14851
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
14852
- else:
14853
- cred = credential.Credential(
14854
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
14855
- )
14856
- http_profile = HttpProfile(
14857
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
14858
- reqMethod="POST",
14859
- endpoint=g_param[OptionsDefine.Endpoint],
14860
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
14861
- )
14862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
14863
- if g_param[OptionsDefine.Language]:
14864
- profile.language = g_param[OptionsDefine.Language]
14865
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
14866
- client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
14867
- client._sdkVersion += ("_CLI_" + __version__)
14868
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
14869
- model = models.ExportAttackLogsRequest()
14870
- model.from_json_string(json.dumps(args))
14871
- start_time = time.time()
14872
- while True:
14873
- rsp = client.ExportAttackLogs(model)
14874
- result = rsp.to_json_string()
14875
- try:
14876
- json_obj = json.loads(result)
14877
- except TypeError as e:
14878
- json_obj = json.loads(result.decode('utf-8')) # python3.3
14879
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
14880
- break
14881
- cur_time = time.time()
14882
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
14883
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
14884
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
14885
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
14886
- else:
14887
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
14888
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
14889
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
14890
-
14891
-
14892
14840
  def doDescribeUsualLoginPlaces(args, parsed_globals):
14893
14841
  g_param = parse_global_arg(parsed_globals)
14894
14842
 
@@ -17749,7 +17697,7 @@ def doDescribeBaselineStrategyList(args, parsed_globals):
17749
17697
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17750
17698
 
17751
17699
 
17752
- def doModifyBaselineRuleIgnore(args, parsed_globals):
17700
+ def doDescribeScanMalwareSchedule(args, parsed_globals):
17753
17701
  g_param = parse_global_arg(parsed_globals)
17754
17702
 
17755
17703
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17778,11 +17726,11 @@ def doModifyBaselineRuleIgnore(args, parsed_globals):
17778
17726
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
17779
17727
  client._sdkVersion += ("_CLI_" + __version__)
17780
17728
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17781
- model = models.ModifyBaselineRuleIgnoreRequest()
17729
+ model = models.DescribeScanMalwareScheduleRequest()
17782
17730
  model.from_json_string(json.dumps(args))
17783
17731
  start_time = time.time()
17784
17732
  while True:
17785
- rsp = client.ModifyBaselineRuleIgnore(model)
17733
+ rsp = client.DescribeScanMalwareSchedule(model)
17786
17734
  result = rsp.to_json_string()
17787
17735
  try:
17788
17736
  json_obj = json.loads(result)
@@ -20089,6 +20037,58 @@ def doDescribeRansomDefenseEventsList(args, parsed_globals):
20089
20037
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
20090
20038
 
20091
20039
 
20040
+ def doExportLicenseDetail(args, parsed_globals):
20041
+ g_param = parse_global_arg(parsed_globals)
20042
+
20043
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
20044
+ cred = credential.CVMRoleCredential()
20045
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
20046
+ cred = credential.STSAssumeRoleCredential(
20047
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
20048
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
20049
+ )
20050
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
20051
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
20052
+ else:
20053
+ cred = credential.Credential(
20054
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
20055
+ )
20056
+ http_profile = HttpProfile(
20057
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
20058
+ reqMethod="POST",
20059
+ endpoint=g_param[OptionsDefine.Endpoint],
20060
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
20061
+ )
20062
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
20063
+ if g_param[OptionsDefine.Language]:
20064
+ profile.language = g_param[OptionsDefine.Language]
20065
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
20066
+ client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
20067
+ client._sdkVersion += ("_CLI_" + __version__)
20068
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
20069
+ model = models.ExportLicenseDetailRequest()
20070
+ model.from_json_string(json.dumps(args))
20071
+ start_time = time.time()
20072
+ while True:
20073
+ rsp = client.ExportLicenseDetail(model)
20074
+ result = rsp.to_json_string()
20075
+ try:
20076
+ json_obj = json.loads(result)
20077
+ except TypeError as e:
20078
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
20079
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
20080
+ break
20081
+ cur_time = time.time()
20082
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
20083
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
20084
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
20085
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
20086
+ else:
20087
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
20088
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
20089
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
20090
+
20091
+
20092
20092
  def doExportAssetProcessInfoList(args, parsed_globals):
20093
20093
  g_param = parse_global_arg(parsed_globals)
20094
20094
 
@@ -22429,58 +22429,6 @@ def doDeleteBaselineWeakPassword(args, parsed_globals):
22429
22429
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
22430
22430
 
22431
22431
 
22432
- def doDescribeScanMalwareSchedule(args, parsed_globals):
22433
- g_param = parse_global_arg(parsed_globals)
22434
-
22435
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
22436
- cred = credential.CVMRoleCredential()
22437
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
22438
- cred = credential.STSAssumeRoleCredential(
22439
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
22440
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
22441
- )
22442
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
22443
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
22444
- else:
22445
- cred = credential.Credential(
22446
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
22447
- )
22448
- http_profile = HttpProfile(
22449
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
22450
- reqMethod="POST",
22451
- endpoint=g_param[OptionsDefine.Endpoint],
22452
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
22453
- )
22454
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
22455
- if g_param[OptionsDefine.Language]:
22456
- profile.language = g_param[OptionsDefine.Language]
22457
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
22458
- client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
22459
- client._sdkVersion += ("_CLI_" + __version__)
22460
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
22461
- model = models.DescribeScanMalwareScheduleRequest()
22462
- model.from_json_string(json.dumps(args))
22463
- start_time = time.time()
22464
- while True:
22465
- rsp = client.DescribeScanMalwareSchedule(model)
22466
- result = rsp.to_json_string()
22467
- try:
22468
- json_obj = json.loads(result)
22469
- except TypeError as e:
22470
- json_obj = json.loads(result.decode('utf-8')) # python3.3
22471
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
22472
- break
22473
- cur_time = time.time()
22474
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
22475
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
22476
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
22477
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
22478
- else:
22479
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
22480
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
22481
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
22482
-
22483
-
22484
22432
  def doDeleteNonlocalLoginPlaces(args, parsed_globals):
22485
22433
  g_param = parse_global_arg(parsed_globals)
22486
22434
 
@@ -23729,7 +23677,7 @@ def doExportRiskDnsEventList(args, parsed_globals):
23729
23677
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
23730
23678
 
23731
23679
 
23732
- def doExportLicenseDetail(args, parsed_globals):
23680
+ def doModifyBaselineRuleIgnore(args, parsed_globals):
23733
23681
  g_param = parse_global_arg(parsed_globals)
23734
23682
 
23735
23683
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -23758,11 +23706,11 @@ def doExportLicenseDetail(args, parsed_globals):
23758
23706
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
23759
23707
  client._sdkVersion += ("_CLI_" + __version__)
23760
23708
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
23761
- model = models.ExportLicenseDetailRequest()
23709
+ model = models.ModifyBaselineRuleIgnoreRequest()
23762
23710
  model.from_json_string(json.dumps(args))
23763
23711
  start_time = time.time()
23764
23712
  while True:
23765
- rsp = client.ExportLicenseDetail(model)
23713
+ rsp = client.ModifyBaselineRuleIgnore(model)
23766
23714
  result = rsp.to_json_string()
23767
23715
  try:
23768
23716
  json_obj = json.loads(result)
@@ -27145,7 +27093,6 @@ ACTION_MAP = {
27145
27093
  "DescribeBaselineTop": doDescribeBaselineTop,
27146
27094
  "DescribeFastAnalysis": doDescribeFastAnalysis,
27147
27095
  "SetLocalStorageExpire": doSetLocalStorageExpire,
27148
- "ExportAttackLogs": doExportAttackLogs,
27149
27096
  "DescribeUsualLoginPlaces": doDescribeUsualLoginPlaces,
27150
27097
  "ExportFileTamperEvents": doExportFileTamperEvents,
27151
27098
  "AddLoginWhiteLists": doAddLoginWhiteLists,
@@ -27201,7 +27148,7 @@ ACTION_MAP = {
27201
27148
  "DescribeBashRules": doDescribeBashRules,
27202
27149
  "DescribeAttackStatistics": doDescribeAttackStatistics,
27203
27150
  "DescribeBaselineStrategyList": doDescribeBaselineStrategyList,
27204
- "ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
27151
+ "DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
27205
27152
  "ModifyMalwareWhiteList": doModifyMalwareWhiteList,
27206
27153
  "DescribeWebHookRule": doDescribeWebHookRule,
27207
27154
  "RetryVulFix": doRetryVulFix,
@@ -27246,6 +27193,7 @@ ACTION_MAP = {
27246
27193
  "GetLocalStorageItem": doGetLocalStorageItem,
27247
27194
  "ExportRansomDefenseMachineList": doExportRansomDefenseMachineList,
27248
27195
  "DescribeRansomDefenseEventsList": doDescribeRansomDefenseEventsList,
27196
+ "ExportLicenseDetail": doExportLicenseDetail,
27249
27197
  "ExportAssetProcessInfoList": doExportAssetProcessInfoList,
27250
27198
  "DescribeMachinesSimple": doDescribeMachinesSimple,
27251
27199
  "DescribeBashEvents": doDescribeBashEvents,
@@ -27291,7 +27239,6 @@ ACTION_MAP = {
27291
27239
  "DescribeAssetTotalCount": doDescribeAssetTotalCount,
27292
27240
  "DescribeHotVulTop": doDescribeHotVulTop,
27293
27241
  "DeleteBaselineWeakPassword": doDeleteBaselineWeakPassword,
27294
- "DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
27295
27242
  "DeleteNonlocalLoginPlaces": doDeleteNonlocalLoginPlaces,
27296
27243
  "ExportAssetSystemPackageList": doExportAssetSystemPackageList,
27297
27244
  "EditReverseShellRules": doEditReverseShellRules,
@@ -27316,7 +27263,7 @@ ACTION_MAP = {
27316
27263
  "ExportWebPageEventList": doExportWebPageEventList,
27317
27264
  "DescribeBaselineHostRiskTop": doDescribeBaselineHostRiskTop,
27318
27265
  "ExportRiskDnsEventList": doExportRiskDnsEventList,
27319
- "ExportLicenseDetail": doExportLicenseDetail,
27266
+ "ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
27320
27267
  "DescribeEmergencyResponseList": doDescribeEmergencyResponseList,
27321
27268
  "DescribeAttackTrends": doDescribeAttackTrends,
27322
27269
  "DescribeScreenDefenseTrends": doDescribeScreenDefenseTrends,
@@ -2681,13 +2681,6 @@
2681
2681
  "output": "ExportAttackEventsResponse",
2682
2682
  "status": "online"
2683
2683
  },
2684
- "ExportAttackLogs": {
2685
- "document": "ExportAttackEvents接口替代\n\n导出网络攻击日志",
2686
- "input": "ExportAttackLogsRequest",
2687
- "name": "导出网络攻击日志",
2688
- "output": "ExportAttackLogsResponse",
2689
- "status": "deprecated"
2690
- },
2691
2684
  "ExportBaselineEffectHostList": {
2692
2685
  "document": "导出基线影响主机列表",
2693
2686
  "input": "ExportBaselineEffectHostListRequest",
@@ -38792,69 +38785,6 @@
38792
38785
  ],
38793
38786
  "type": "object"
38794
38787
  },
38795
- "ExportAttackLogsRequest": {
38796
- "document": "ExportAttackLogs请求参数结构体",
38797
- "members": [
38798
- {
38799
- "disabled": false,
38800
- "document": "过滤条件。\n<li>HttpMethod - String - 是否必填:否 - 攻击方法(POST|GET)</li>\n<li>DateRange - String - 是否必填:否 - 时间范围(存储最近3个月的数据),如最近一个月[\"2019-11-17\", \"2019-12-17\"]</li>\n<li>VulType - String 威胁类型 - 是否必填: 否</li>\n<li>SrcIp - String 攻击源IP - 是否必填: 否</li>\n<li>DstIp - String 攻击目标IP - 是否必填: 否</li>\n<li>SrcPort - String 攻击源端口 - 是否必填: 否</li>\n<li>DstPort - String 攻击目标端口 - 是否必填: 否</li>",
38801
- "example": "[]",
38802
- "member": "Filters",
38803
- "name": "Filters",
38804
- "required": false,
38805
- "type": "list"
38806
- },
38807
- {
38808
- "disabled": false,
38809
- "document": "主机安全客户端ID",
38810
- "example": "uuid",
38811
- "member": "string",
38812
- "name": "Uuid",
38813
- "required": false,
38814
- "type": "string"
38815
- },
38816
- {
38817
- "disabled": false,
38818
- "document": "云主机机器ID",
38819
- "example": "quuid",
38820
- "member": "string",
38821
- "name": "Quuid",
38822
- "required": false,
38823
- "type": "string"
38824
- }
38825
- ],
38826
- "type": "object"
38827
- },
38828
- "ExportAttackLogsResponse": {
38829
- "document": "ExportAttackLogs返回参数结构体",
38830
- "members": [
38831
- {
38832
- "disabled": false,
38833
- "document": "已废弃",
38834
- "example": "xxx",
38835
- "member": "string",
38836
- "name": "DownloadUrl",
38837
- "type": "string",
38838
- "value_allowed_null": false
38839
- },
38840
- {
38841
- "disabled": false,
38842
- "document": "任务ID,需要到接口“异步导出任务”ExportTasks获取DownloadUrl下载地址",
38843
- "example": "123456",
38844
- "member": "string",
38845
- "name": "TaskId",
38846
- "type": "string",
38847
- "value_allowed_null": false
38848
- },
38849
- {
38850
- "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
38851
- "member": "string",
38852
- "name": "RequestId",
38853
- "type": "string"
38854
- }
38855
- ],
38856
- "type": "object"
38857
- },
38858
38788
  "ExportBaselineEffectHostListRequest": {
38859
38789
  "document": "ExportBaselineEffectHostList请求参数结构体",
38860
38790
  "members": [
@@ -3100,14 +3100,6 @@
3100
3100
  "title": "导出网络攻击事件"
3101
3101
  }
3102
3102
  ],
3103
- "ExportAttackLogs": [
3104
- {
3105
- "document": "导出网络攻击日志",
3106
- "input": "https://cwp.tencentcloudapi.com/?Action=ExportAttackLogs\n&<公共请求参数>",
3107
- "output": "{\n \"Response\": {\n \"RequestId\": \"354f4ac3-8546-4516-8c8a-69e3ab73aa8a\",\n \"DownloadUrl\": \"http://download.url/xxx.csv\",\n \"TaskId\": \"1596595610\"\n }\n}",
3108
- "title": "导出网络攻击日志"
3109
- }
3110
- ],
3111
3103
  "ExportBaselineEffectHostList": [
3112
3104
  {
3113
3105
  "document": "导出漏洞影响主机列表数据",
@@ -5600,6 +5600,16 @@
5600
5600
  "type": "list",
5601
5601
  "value_allowed_null": false
5602
5602
  },
5603
+ {
5604
+ "disabled": false,
5605
+ "document": "域名预定成功详情",
5606
+ "example": "[{\"tencent.com\",\"P0011702977661022561\"}]",
5607
+ "member": "SucDomainInfo",
5608
+ "name": "SucDomains",
5609
+ "output_required": false,
5610
+ "type": "list",
5611
+ "value_allowed_null": false
5612
+ },
5603
5613
  {
5604
5614
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
5605
5615
  "member": "string",
@@ -5681,6 +5691,32 @@
5681
5691
  ],
5682
5692
  "type": "object"
5683
5693
  },
5694
+ "SucDomainInfo": {
5695
+ "document": "预释放域名预约参数补充成功信息",
5696
+ "members": [
5697
+ {
5698
+ "disabled": false,
5699
+ "document": "域名\n注意:此字段可能返回 null,表示取不到有效值。",
5700
+ "example": "tencent.com",
5701
+ "member": "string",
5702
+ "name": "Domain",
5703
+ "output_required": false,
5704
+ "type": "string",
5705
+ "value_allowed_null": true
5706
+ },
5707
+ {
5708
+ "disabled": false,
5709
+ "document": "业务ID\n注意:此字段可能返回 null,表示取不到有效值。",
5710
+ "example": "P0011702977661022561",
5711
+ "member": "string",
5712
+ "name": "BusinessId",
5713
+ "output_required": false,
5714
+ "type": "string",
5715
+ "value_allowed_null": true
5716
+ }
5717
+ ],
5718
+ "usage": "out"
5719
+ },
5684
5720
  "SyncCustomDnsHostRequest": {
5685
5721
  "document": "SyncCustomDnsHost请求参数结构体",
5686
5722
  "members": [