tccli 3.0.1137.1__py2.py3-none-any.whl → 3.0.1139.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/command.py +1 -1
- tccli/help_command.py +1 -1
- tccli/services/__init__.py +3 -0
- tccli/services/aiart/aiart_client.py +53 -0
- tccli/services/aiart/v20221229/api.json +98 -0
- tccli/services/aiart/v20221229/examples.json +8 -0
- tccli/services/asr/v20190614/api.json +9 -0
- tccli/services/cbs/v20170312/api.json +5 -8
- tccli/services/cdwch/v20200915/api.json +1 -1
- tccli/services/ckafka/v20190819/api.json +25 -25
- tccli/services/ckafka/v20190819/examples.json +18 -18
- tccli/services/cls/v20201016/api.json +44 -5
- tccli/services/cls/v20201016/examples.json +1 -1
- tccli/services/cwp/cwp_client.py +61 -114
- tccli/services/cwp/v20180228/api.json +0 -70
- tccli/services/cwp/v20180228/examples.json +0 -8
- tccli/services/domain/v20180808/api.json +36 -0
- tccli/services/emr/v20190103/api.json +534 -15
- tccli/services/emr/v20190103/examples.json +4 -4
- tccli/services/ess/v20201111/api.json +4 -4
- tccli/services/ess/v20201111/examples.json +2 -2
- tccli/services/essbasic/v20210526/api.json +3 -3
- tccli/services/essbasic/v20210526/examples.json +2 -2
- tccli/services/ims/v20201229/api.json +2 -2
- tccli/services/ioa/v20220601/api.json +132 -92
- tccli/services/iotexplorer/v20190423/api.json +11 -0
- tccli/services/mps/v20190612/api.json +163 -115
- tccli/services/mps/v20190612/examples.json +11 -11
- tccli/services/ocr/v20181119/api.json +19 -0
- tccli/services/redis/v20180412/api.json +23 -23
- tccli/services/rum/v20210622/api.json +1 -0
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/ssl/ssl_client.py +53 -0
- tccli/services/ssl/v20191205/api.json +251 -5
- tccli/services/ssl/v20191205/examples.json +9 -1
- tccli/services/tdmq/v20200217/api.json +171 -22
- tccli/services/tdmq/v20200217/examples.json +6 -6
- tccli/services/thpc/v20230321/api.json +42 -21
- tccli/services/tke/v20180525/api.json +149 -71
- tccli/services/tke/v20180525/examples.json +69 -57
- tccli/services/trtc/v20190722/api.json +1 -1
- tccli/services/tsf/v20180326/api.json +1 -1
- tccli/services/vclm/__init__.py +4 -0
- tccli/services/vclm/v20240523/api.json +695 -0
- tccli/services/vclm/v20240523/examples.json +73 -0
- tccli/services/vclm/vclm_client.py +513 -0
- tccli/services/vdb/v20230616/api.json +20 -0
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/RECORD +53 -49
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1137.1.dist-info → tccli-3.0.1139.1.dist-info}/license_files/LICENSE +0 -0
tccli/services/cwp/cwp_client.py
CHANGED
@@ -14837,58 +14837,6 @@ def doSetLocalStorageExpire(args, parsed_globals):
|
|
14837
14837
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
14838
14838
|
|
14839
14839
|
|
14840
|
-
def doExportAttackLogs(args, parsed_globals):
|
14841
|
-
g_param = parse_global_arg(parsed_globals)
|
14842
|
-
|
14843
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
14844
|
-
cred = credential.CVMRoleCredential()
|
14845
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
14846
|
-
cred = credential.STSAssumeRoleCredential(
|
14847
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
14848
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
14849
|
-
)
|
14850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
14851
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
14852
|
-
else:
|
14853
|
-
cred = credential.Credential(
|
14854
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
14855
|
-
)
|
14856
|
-
http_profile = HttpProfile(
|
14857
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
14858
|
-
reqMethod="POST",
|
14859
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
14860
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
14861
|
-
)
|
14862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
14863
|
-
if g_param[OptionsDefine.Language]:
|
14864
|
-
profile.language = g_param[OptionsDefine.Language]
|
14865
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
14866
|
-
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
14867
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
14868
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
14869
|
-
model = models.ExportAttackLogsRequest()
|
14870
|
-
model.from_json_string(json.dumps(args))
|
14871
|
-
start_time = time.time()
|
14872
|
-
while True:
|
14873
|
-
rsp = client.ExportAttackLogs(model)
|
14874
|
-
result = rsp.to_json_string()
|
14875
|
-
try:
|
14876
|
-
json_obj = json.loads(result)
|
14877
|
-
except TypeError as e:
|
14878
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
14879
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
14880
|
-
break
|
14881
|
-
cur_time = time.time()
|
14882
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
14883
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
14884
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
14885
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
14886
|
-
else:
|
14887
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
14888
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
14889
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
14890
|
-
|
14891
|
-
|
14892
14840
|
def doDescribeUsualLoginPlaces(args, parsed_globals):
|
14893
14841
|
g_param = parse_global_arg(parsed_globals)
|
14894
14842
|
|
@@ -17749,7 +17697,7 @@ def doDescribeBaselineStrategyList(args, parsed_globals):
|
|
17749
17697
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17750
17698
|
|
17751
17699
|
|
17752
|
-
def
|
17700
|
+
def doDescribeScanMalwareSchedule(args, parsed_globals):
|
17753
17701
|
g_param = parse_global_arg(parsed_globals)
|
17754
17702
|
|
17755
17703
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17778,11 +17726,11 @@ def doModifyBaselineRuleIgnore(args, parsed_globals):
|
|
17778
17726
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
17779
17727
|
client._sdkVersion += ("_CLI_" + __version__)
|
17780
17728
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17781
|
-
model = models.
|
17729
|
+
model = models.DescribeScanMalwareScheduleRequest()
|
17782
17730
|
model.from_json_string(json.dumps(args))
|
17783
17731
|
start_time = time.time()
|
17784
17732
|
while True:
|
17785
|
-
rsp = client.
|
17733
|
+
rsp = client.DescribeScanMalwareSchedule(model)
|
17786
17734
|
result = rsp.to_json_string()
|
17787
17735
|
try:
|
17788
17736
|
json_obj = json.loads(result)
|
@@ -20089,6 +20037,58 @@ def doDescribeRansomDefenseEventsList(args, parsed_globals):
|
|
20089
20037
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
20090
20038
|
|
20091
20039
|
|
20040
|
+
def doExportLicenseDetail(args, parsed_globals):
|
20041
|
+
g_param = parse_global_arg(parsed_globals)
|
20042
|
+
|
20043
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
20044
|
+
cred = credential.CVMRoleCredential()
|
20045
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
20046
|
+
cred = credential.STSAssumeRoleCredential(
|
20047
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
20048
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
20049
|
+
)
|
20050
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
20051
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
20052
|
+
else:
|
20053
|
+
cred = credential.Credential(
|
20054
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
20055
|
+
)
|
20056
|
+
http_profile = HttpProfile(
|
20057
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
20058
|
+
reqMethod="POST",
|
20059
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
20060
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
20061
|
+
)
|
20062
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
20063
|
+
if g_param[OptionsDefine.Language]:
|
20064
|
+
profile.language = g_param[OptionsDefine.Language]
|
20065
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
20066
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
20067
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
20068
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
20069
|
+
model = models.ExportLicenseDetailRequest()
|
20070
|
+
model.from_json_string(json.dumps(args))
|
20071
|
+
start_time = time.time()
|
20072
|
+
while True:
|
20073
|
+
rsp = client.ExportLicenseDetail(model)
|
20074
|
+
result = rsp.to_json_string()
|
20075
|
+
try:
|
20076
|
+
json_obj = json.loads(result)
|
20077
|
+
except TypeError as e:
|
20078
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
20079
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
20080
|
+
break
|
20081
|
+
cur_time = time.time()
|
20082
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
20083
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
20084
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
20085
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
20086
|
+
else:
|
20087
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
20088
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
20089
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
20090
|
+
|
20091
|
+
|
20092
20092
|
def doExportAssetProcessInfoList(args, parsed_globals):
|
20093
20093
|
g_param = parse_global_arg(parsed_globals)
|
20094
20094
|
|
@@ -22429,58 +22429,6 @@ def doDeleteBaselineWeakPassword(args, parsed_globals):
|
|
22429
22429
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
22430
22430
|
|
22431
22431
|
|
22432
|
-
def doDescribeScanMalwareSchedule(args, parsed_globals):
|
22433
|
-
g_param = parse_global_arg(parsed_globals)
|
22434
|
-
|
22435
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
22436
|
-
cred = credential.CVMRoleCredential()
|
22437
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
22438
|
-
cred = credential.STSAssumeRoleCredential(
|
22439
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
22440
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
22441
|
-
)
|
22442
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
22443
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
22444
|
-
else:
|
22445
|
-
cred = credential.Credential(
|
22446
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
22447
|
-
)
|
22448
|
-
http_profile = HttpProfile(
|
22449
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
22450
|
-
reqMethod="POST",
|
22451
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
22452
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
22453
|
-
)
|
22454
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
22455
|
-
if g_param[OptionsDefine.Language]:
|
22456
|
-
profile.language = g_param[OptionsDefine.Language]
|
22457
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
22458
|
-
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
22459
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
22460
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
22461
|
-
model = models.DescribeScanMalwareScheduleRequest()
|
22462
|
-
model.from_json_string(json.dumps(args))
|
22463
|
-
start_time = time.time()
|
22464
|
-
while True:
|
22465
|
-
rsp = client.DescribeScanMalwareSchedule(model)
|
22466
|
-
result = rsp.to_json_string()
|
22467
|
-
try:
|
22468
|
-
json_obj = json.loads(result)
|
22469
|
-
except TypeError as e:
|
22470
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
22471
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
22472
|
-
break
|
22473
|
-
cur_time = time.time()
|
22474
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
22475
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
22476
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
22477
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
22478
|
-
else:
|
22479
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
22480
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
22481
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
22482
|
-
|
22483
|
-
|
22484
22432
|
def doDeleteNonlocalLoginPlaces(args, parsed_globals):
|
22485
22433
|
g_param = parse_global_arg(parsed_globals)
|
22486
22434
|
|
@@ -23729,7 +23677,7 @@ def doExportRiskDnsEventList(args, parsed_globals):
|
|
23729
23677
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
23730
23678
|
|
23731
23679
|
|
23732
|
-
def
|
23680
|
+
def doModifyBaselineRuleIgnore(args, parsed_globals):
|
23733
23681
|
g_param = parse_global_arg(parsed_globals)
|
23734
23682
|
|
23735
23683
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -23758,11 +23706,11 @@ def doExportLicenseDetail(args, parsed_globals):
|
|
23758
23706
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
23759
23707
|
client._sdkVersion += ("_CLI_" + __version__)
|
23760
23708
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
23761
|
-
model = models.
|
23709
|
+
model = models.ModifyBaselineRuleIgnoreRequest()
|
23762
23710
|
model.from_json_string(json.dumps(args))
|
23763
23711
|
start_time = time.time()
|
23764
23712
|
while True:
|
23765
|
-
rsp = client.
|
23713
|
+
rsp = client.ModifyBaselineRuleIgnore(model)
|
23766
23714
|
result = rsp.to_json_string()
|
23767
23715
|
try:
|
23768
23716
|
json_obj = json.loads(result)
|
@@ -27145,7 +27093,6 @@ ACTION_MAP = {
|
|
27145
27093
|
"DescribeBaselineTop": doDescribeBaselineTop,
|
27146
27094
|
"DescribeFastAnalysis": doDescribeFastAnalysis,
|
27147
27095
|
"SetLocalStorageExpire": doSetLocalStorageExpire,
|
27148
|
-
"ExportAttackLogs": doExportAttackLogs,
|
27149
27096
|
"DescribeUsualLoginPlaces": doDescribeUsualLoginPlaces,
|
27150
27097
|
"ExportFileTamperEvents": doExportFileTamperEvents,
|
27151
27098
|
"AddLoginWhiteLists": doAddLoginWhiteLists,
|
@@ -27201,7 +27148,7 @@ ACTION_MAP = {
|
|
27201
27148
|
"DescribeBashRules": doDescribeBashRules,
|
27202
27149
|
"DescribeAttackStatistics": doDescribeAttackStatistics,
|
27203
27150
|
"DescribeBaselineStrategyList": doDescribeBaselineStrategyList,
|
27204
|
-
"
|
27151
|
+
"DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
|
27205
27152
|
"ModifyMalwareWhiteList": doModifyMalwareWhiteList,
|
27206
27153
|
"DescribeWebHookRule": doDescribeWebHookRule,
|
27207
27154
|
"RetryVulFix": doRetryVulFix,
|
@@ -27246,6 +27193,7 @@ ACTION_MAP = {
|
|
27246
27193
|
"GetLocalStorageItem": doGetLocalStorageItem,
|
27247
27194
|
"ExportRansomDefenseMachineList": doExportRansomDefenseMachineList,
|
27248
27195
|
"DescribeRansomDefenseEventsList": doDescribeRansomDefenseEventsList,
|
27196
|
+
"ExportLicenseDetail": doExportLicenseDetail,
|
27249
27197
|
"ExportAssetProcessInfoList": doExportAssetProcessInfoList,
|
27250
27198
|
"DescribeMachinesSimple": doDescribeMachinesSimple,
|
27251
27199
|
"DescribeBashEvents": doDescribeBashEvents,
|
@@ -27291,7 +27239,6 @@ ACTION_MAP = {
|
|
27291
27239
|
"DescribeAssetTotalCount": doDescribeAssetTotalCount,
|
27292
27240
|
"DescribeHotVulTop": doDescribeHotVulTop,
|
27293
27241
|
"DeleteBaselineWeakPassword": doDeleteBaselineWeakPassword,
|
27294
|
-
"DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
|
27295
27242
|
"DeleteNonlocalLoginPlaces": doDeleteNonlocalLoginPlaces,
|
27296
27243
|
"ExportAssetSystemPackageList": doExportAssetSystemPackageList,
|
27297
27244
|
"EditReverseShellRules": doEditReverseShellRules,
|
@@ -27316,7 +27263,7 @@ ACTION_MAP = {
|
|
27316
27263
|
"ExportWebPageEventList": doExportWebPageEventList,
|
27317
27264
|
"DescribeBaselineHostRiskTop": doDescribeBaselineHostRiskTop,
|
27318
27265
|
"ExportRiskDnsEventList": doExportRiskDnsEventList,
|
27319
|
-
"
|
27266
|
+
"ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
|
27320
27267
|
"DescribeEmergencyResponseList": doDescribeEmergencyResponseList,
|
27321
27268
|
"DescribeAttackTrends": doDescribeAttackTrends,
|
27322
27269
|
"DescribeScreenDefenseTrends": doDescribeScreenDefenseTrends,
|
@@ -2681,13 +2681,6 @@
|
|
2681
2681
|
"output": "ExportAttackEventsResponse",
|
2682
2682
|
"status": "online"
|
2683
2683
|
},
|
2684
|
-
"ExportAttackLogs": {
|
2685
|
-
"document": "ExportAttackEvents接口替代\n\n导出网络攻击日志",
|
2686
|
-
"input": "ExportAttackLogsRequest",
|
2687
|
-
"name": "导出网络攻击日志",
|
2688
|
-
"output": "ExportAttackLogsResponse",
|
2689
|
-
"status": "deprecated"
|
2690
|
-
},
|
2691
2684
|
"ExportBaselineEffectHostList": {
|
2692
2685
|
"document": "导出基线影响主机列表",
|
2693
2686
|
"input": "ExportBaselineEffectHostListRequest",
|
@@ -38792,69 +38785,6 @@
|
|
38792
38785
|
],
|
38793
38786
|
"type": "object"
|
38794
38787
|
},
|
38795
|
-
"ExportAttackLogsRequest": {
|
38796
|
-
"document": "ExportAttackLogs请求参数结构体",
|
38797
|
-
"members": [
|
38798
|
-
{
|
38799
|
-
"disabled": false,
|
38800
|
-
"document": "过滤条件。\n<li>HttpMethod - String - 是否必填:否 - 攻击方法(POST|GET)</li>\n<li>DateRange - String - 是否必填:否 - 时间范围(存储最近3个月的数据),如最近一个月[\"2019-11-17\", \"2019-12-17\"]</li>\n<li>VulType - String 威胁类型 - 是否必填: 否</li>\n<li>SrcIp - String 攻击源IP - 是否必填: 否</li>\n<li>DstIp - String 攻击目标IP - 是否必填: 否</li>\n<li>SrcPort - String 攻击源端口 - 是否必填: 否</li>\n<li>DstPort - String 攻击目标端口 - 是否必填: 否</li>",
|
38801
|
-
"example": "[]",
|
38802
|
-
"member": "Filters",
|
38803
|
-
"name": "Filters",
|
38804
|
-
"required": false,
|
38805
|
-
"type": "list"
|
38806
|
-
},
|
38807
|
-
{
|
38808
|
-
"disabled": false,
|
38809
|
-
"document": "主机安全客户端ID",
|
38810
|
-
"example": "uuid",
|
38811
|
-
"member": "string",
|
38812
|
-
"name": "Uuid",
|
38813
|
-
"required": false,
|
38814
|
-
"type": "string"
|
38815
|
-
},
|
38816
|
-
{
|
38817
|
-
"disabled": false,
|
38818
|
-
"document": "云主机机器ID",
|
38819
|
-
"example": "quuid",
|
38820
|
-
"member": "string",
|
38821
|
-
"name": "Quuid",
|
38822
|
-
"required": false,
|
38823
|
-
"type": "string"
|
38824
|
-
}
|
38825
|
-
],
|
38826
|
-
"type": "object"
|
38827
|
-
},
|
38828
|
-
"ExportAttackLogsResponse": {
|
38829
|
-
"document": "ExportAttackLogs返回参数结构体",
|
38830
|
-
"members": [
|
38831
|
-
{
|
38832
|
-
"disabled": false,
|
38833
|
-
"document": "已废弃",
|
38834
|
-
"example": "xxx",
|
38835
|
-
"member": "string",
|
38836
|
-
"name": "DownloadUrl",
|
38837
|
-
"type": "string",
|
38838
|
-
"value_allowed_null": false
|
38839
|
-
},
|
38840
|
-
{
|
38841
|
-
"disabled": false,
|
38842
|
-
"document": "任务ID,需要到接口“异步导出任务”ExportTasks获取DownloadUrl下载地址",
|
38843
|
-
"example": "123456",
|
38844
|
-
"member": "string",
|
38845
|
-
"name": "TaskId",
|
38846
|
-
"type": "string",
|
38847
|
-
"value_allowed_null": false
|
38848
|
-
},
|
38849
|
-
{
|
38850
|
-
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
38851
|
-
"member": "string",
|
38852
|
-
"name": "RequestId",
|
38853
|
-
"type": "string"
|
38854
|
-
}
|
38855
|
-
],
|
38856
|
-
"type": "object"
|
38857
|
-
},
|
38858
38788
|
"ExportBaselineEffectHostListRequest": {
|
38859
38789
|
"document": "ExportBaselineEffectHostList请求参数结构体",
|
38860
38790
|
"members": [
|
@@ -3100,14 +3100,6 @@
|
|
3100
3100
|
"title": "导出网络攻击事件"
|
3101
3101
|
}
|
3102
3102
|
],
|
3103
|
-
"ExportAttackLogs": [
|
3104
|
-
{
|
3105
|
-
"document": "导出网络攻击日志",
|
3106
|
-
"input": "https://cwp.tencentcloudapi.com/?Action=ExportAttackLogs\n&<公共请求参数>",
|
3107
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"354f4ac3-8546-4516-8c8a-69e3ab73aa8a\",\n \"DownloadUrl\": \"http://download.url/xxx.csv\",\n \"TaskId\": \"1596595610\"\n }\n}",
|
3108
|
-
"title": "导出网络攻击日志"
|
3109
|
-
}
|
3110
|
-
],
|
3111
3103
|
"ExportBaselineEffectHostList": [
|
3112
3104
|
{
|
3113
3105
|
"document": "导出漏洞影响主机列表数据",
|
@@ -5600,6 +5600,16 @@
|
|
5600
5600
|
"type": "list",
|
5601
5601
|
"value_allowed_null": false
|
5602
5602
|
},
|
5603
|
+
{
|
5604
|
+
"disabled": false,
|
5605
|
+
"document": "域名预定成功详情",
|
5606
|
+
"example": "[{\"tencent.com\",\"P0011702977661022561\"}]",
|
5607
|
+
"member": "SucDomainInfo",
|
5608
|
+
"name": "SucDomains",
|
5609
|
+
"output_required": false,
|
5610
|
+
"type": "list",
|
5611
|
+
"value_allowed_null": false
|
5612
|
+
},
|
5603
5613
|
{
|
5604
5614
|
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
5605
5615
|
"member": "string",
|
@@ -5681,6 +5691,32 @@
|
|
5681
5691
|
],
|
5682
5692
|
"type": "object"
|
5683
5693
|
},
|
5694
|
+
"SucDomainInfo": {
|
5695
|
+
"document": "预释放域名预约参数补充成功信息",
|
5696
|
+
"members": [
|
5697
|
+
{
|
5698
|
+
"disabled": false,
|
5699
|
+
"document": "域名\n注意:此字段可能返回 null,表示取不到有效值。",
|
5700
|
+
"example": "tencent.com",
|
5701
|
+
"member": "string",
|
5702
|
+
"name": "Domain",
|
5703
|
+
"output_required": false,
|
5704
|
+
"type": "string",
|
5705
|
+
"value_allowed_null": true
|
5706
|
+
},
|
5707
|
+
{
|
5708
|
+
"disabled": false,
|
5709
|
+
"document": "业务ID\n注意:此字段可能返回 null,表示取不到有效值。",
|
5710
|
+
"example": "P0011702977661022561",
|
5711
|
+
"member": "string",
|
5712
|
+
"name": "BusinessId",
|
5713
|
+
"output_required": false,
|
5714
|
+
"type": "string",
|
5715
|
+
"value_allowed_null": true
|
5716
|
+
}
|
5717
|
+
],
|
5718
|
+
"usage": "out"
|
5719
|
+
},
|
5684
5720
|
"SyncCustomDnsHostRequest": {
|
5685
5721
|
"document": "SyncCustomDnsHost请求参数结构体",
|
5686
5722
|
"members": [
|