tccli 3.0.1168.1__py2.py3-none-any.whl → 3.0.1170.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (35) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/aiart/v20221229/api.json +18 -0
  3. tccli/services/cls/cls_client.py +224 -12
  4. tccli/services/cls/v20201016/api.json +346 -6
  5. tccli/services/cls/v20201016/examples.json +32 -0
  6. tccli/services/cwp/cwp_client.py +118 -65
  7. tccli/services/cwp/v20180228/api.json +135 -2
  8. tccli/services/cwp/v20180228/examples.json +8 -0
  9. tccli/services/emr/emr_client.py +163 -4
  10. tccli/services/emr/v20190103/api.json +880 -11
  11. tccli/services/emr/v20190103/examples.json +24 -0
  12. tccli/services/essbasic/v20210526/api.json +1 -1
  13. tccli/services/hunyuan/v20230901/api.json +2 -2
  14. tccli/services/ioa/v20220601/api.json +5 -5
  15. tccli/services/organization/organization_client.py +167 -8
  16. tccli/services/organization/v20210331/api.json +307 -0
  17. tccli/services/organization/v20210331/examples.json +24 -0
  18. tccli/services/pts/v20210728/api.json +10 -10
  19. tccli/services/pts/v20210728/examples.json +14 -14
  20. tccli/services/smh/smh_client.py +281 -16
  21. tccli/services/smh/v20210712/api.json +806 -2
  22. tccli/services/smh/v20210712/examples.json +40 -0
  23. tccli/services/tcss/v20201101/api.json +156 -53
  24. tccli/services/tcss/v20201101/examples.json +39 -9
  25. tccli/services/trocket/trocket_client.py +53 -0
  26. tccli/services/trocket/v20230308/api.json +71 -0
  27. tccli/services/trocket/v20230308/examples.json +8 -0
  28. tccli/services/trtc/v20190722/api.json +7 -7
  29. tccli/services/vod/v20180717/api.json +12 -0
  30. tccli/services/waf/v20180125/api.json +12 -6
  31. {tccli-3.0.1168.1.dist-info → tccli-3.0.1170.1.dist-info}/METADATA +2 -2
  32. {tccli-3.0.1168.1.dist-info → tccli-3.0.1170.1.dist-info}/RECORD +35 -35
  33. {tccli-3.0.1168.1.dist-info → tccli-3.0.1170.1.dist-info}/WHEEL +0 -0
  34. {tccli-3.0.1168.1.dist-info → tccli-3.0.1170.1.dist-info}/entry_points.txt +0 -0
  35. {tccli-3.0.1168.1.dist-info → tccli-3.0.1170.1.dist-info}/license_files/LICENSE +0 -0
@@ -3657,6 +3657,58 @@ def doDescribeMachineLicenseDetail(args, parsed_globals):
3657
3657
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3658
3658
 
3659
3659
 
3660
+ def doExportScanTaskDetails(args, parsed_globals):
3661
+ g_param = parse_global_arg(parsed_globals)
3662
+
3663
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3664
+ cred = credential.CVMRoleCredential()
3665
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3666
+ cred = credential.STSAssumeRoleCredential(
3667
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
+ )
3670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
+ else:
3673
+ cred = credential.Credential(
3674
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3675
+ )
3676
+ http_profile = HttpProfile(
3677
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3678
+ reqMethod="POST",
3679
+ endpoint=g_param[OptionsDefine.Endpoint],
3680
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
+ )
3682
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3683
+ if g_param[OptionsDefine.Language]:
3684
+ profile.language = g_param[OptionsDefine.Language]
3685
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3686
+ client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
3687
+ client._sdkVersion += ("_CLI_" + __version__)
3688
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3689
+ model = models.ExportScanTaskDetailsRequest()
3690
+ model.from_json_string(json.dumps(args))
3691
+ start_time = time.time()
3692
+ while True:
3693
+ rsp = client.ExportScanTaskDetails(model)
3694
+ result = rsp.to_json_string()
3695
+ try:
3696
+ json_obj = json.loads(result)
3697
+ except TypeError as e:
3698
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3699
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3700
+ break
3701
+ cur_time = time.time()
3702
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3703
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3704
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3705
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3706
+ else:
3707
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3708
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3709
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3710
+
3711
+
3660
3712
  def doSwitchBashRules(args, parsed_globals):
3661
3713
  g_param = parse_global_arg(parsed_globals)
3662
3714
 
@@ -10105,7 +10157,7 @@ def doDeleteReverseShellEvents(args, parsed_globals):
10105
10157
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
10106
10158
 
10107
10159
 
10108
- def doExportScanTaskDetails(args, parsed_globals):
10160
+ def doModifyReverseShellRulesAggregation(args, parsed_globals):
10109
10161
  g_param = parse_global_arg(parsed_globals)
10110
10162
 
10111
10163
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -10134,11 +10186,11 @@ def doExportScanTaskDetails(args, parsed_globals):
10134
10186
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
10135
10187
  client._sdkVersion += ("_CLI_" + __version__)
10136
10188
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
10137
- model = models.ExportScanTaskDetailsRequest()
10189
+ model = models.ModifyReverseShellRulesAggregationRequest()
10138
10190
  model.from_json_string(json.dumps(args))
10139
10191
  start_time = time.time()
10140
10192
  while True:
10141
- rsp = client.ExportScanTaskDetails(model)
10193
+ rsp = client.ModifyReverseShellRulesAggregation(model)
10142
10194
  result = rsp.to_json_string()
10143
10195
  try:
10144
10196
  json_obj = json.loads(result)
@@ -17697,7 +17749,7 @@ def doDescribeBaselineStrategyList(args, parsed_globals):
17697
17749
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17698
17750
 
17699
17751
 
17700
- def doDescribeScanMalwareSchedule(args, parsed_globals):
17752
+ def doModifyBaselineRuleIgnore(args, parsed_globals):
17701
17753
  g_param = parse_global_arg(parsed_globals)
17702
17754
 
17703
17755
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17726,11 +17778,11 @@ def doDescribeScanMalwareSchedule(args, parsed_globals):
17726
17778
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
17727
17779
  client._sdkVersion += ("_CLI_" + __version__)
17728
17780
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17729
- model = models.DescribeScanMalwareScheduleRequest()
17781
+ model = models.ModifyBaselineRuleIgnoreRequest()
17730
17782
  model.from_json_string(json.dumps(args))
17731
17783
  start_time = time.time()
17732
17784
  while True:
17733
- rsp = client.DescribeScanMalwareSchedule(model)
17785
+ rsp = client.ModifyBaselineRuleIgnore(model)
17734
17786
  result = rsp.to_json_string()
17735
17787
  try:
17736
17788
  json_obj = json.loads(result)
@@ -20037,58 +20089,6 @@ def doDescribeRansomDefenseEventsList(args, parsed_globals):
20037
20089
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
20038
20090
 
20039
20091
 
20040
- def doExportLicenseDetail(args, parsed_globals):
20041
- g_param = parse_global_arg(parsed_globals)
20042
-
20043
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
20044
- cred = credential.CVMRoleCredential()
20045
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
20046
- cred = credential.STSAssumeRoleCredential(
20047
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
20048
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
20049
- )
20050
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
20051
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
20052
- else:
20053
- cred = credential.Credential(
20054
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
20055
- )
20056
- http_profile = HttpProfile(
20057
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
20058
- reqMethod="POST",
20059
- endpoint=g_param[OptionsDefine.Endpoint],
20060
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
20061
- )
20062
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
20063
- if g_param[OptionsDefine.Language]:
20064
- profile.language = g_param[OptionsDefine.Language]
20065
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
20066
- client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
20067
- client._sdkVersion += ("_CLI_" + __version__)
20068
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
20069
- model = models.ExportLicenseDetailRequest()
20070
- model.from_json_string(json.dumps(args))
20071
- start_time = time.time()
20072
- while True:
20073
- rsp = client.ExportLicenseDetail(model)
20074
- result = rsp.to_json_string()
20075
- try:
20076
- json_obj = json.loads(result)
20077
- except TypeError as e:
20078
- json_obj = json.loads(result.decode('utf-8')) # python3.3
20079
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
20080
- break
20081
- cur_time = time.time()
20082
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
20083
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
20084
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
20085
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
20086
- else:
20087
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
20088
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
20089
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
20090
-
20091
-
20092
20092
  def doExportAssetProcessInfoList(args, parsed_globals):
20093
20093
  g_param = parse_global_arg(parsed_globals)
20094
20094
 
@@ -22429,6 +22429,58 @@ def doDeleteBaselineWeakPassword(args, parsed_globals):
22429
22429
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
22430
22430
 
22431
22431
 
22432
+ def doDescribeScanMalwareSchedule(args, parsed_globals):
22433
+ g_param = parse_global_arg(parsed_globals)
22434
+
22435
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
22436
+ cred = credential.CVMRoleCredential()
22437
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
22438
+ cred = credential.STSAssumeRoleCredential(
22439
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
22440
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
22441
+ )
22442
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
22443
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
22444
+ else:
22445
+ cred = credential.Credential(
22446
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
22447
+ )
22448
+ http_profile = HttpProfile(
22449
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
22450
+ reqMethod="POST",
22451
+ endpoint=g_param[OptionsDefine.Endpoint],
22452
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
22453
+ )
22454
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
22455
+ if g_param[OptionsDefine.Language]:
22456
+ profile.language = g_param[OptionsDefine.Language]
22457
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
22458
+ client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
22459
+ client._sdkVersion += ("_CLI_" + __version__)
22460
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
22461
+ model = models.DescribeScanMalwareScheduleRequest()
22462
+ model.from_json_string(json.dumps(args))
22463
+ start_time = time.time()
22464
+ while True:
22465
+ rsp = client.DescribeScanMalwareSchedule(model)
22466
+ result = rsp.to_json_string()
22467
+ try:
22468
+ json_obj = json.loads(result)
22469
+ except TypeError as e:
22470
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
22471
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
22472
+ break
22473
+ cur_time = time.time()
22474
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
22475
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
22476
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
22477
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
22478
+ else:
22479
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
22480
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
22481
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
22482
+
22483
+
22432
22484
  def doDeleteNonlocalLoginPlaces(args, parsed_globals):
22433
22485
  g_param = parse_global_arg(parsed_globals)
22434
22486
 
@@ -23677,7 +23729,7 @@ def doExportRiskDnsEventList(args, parsed_globals):
23677
23729
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
23678
23730
 
23679
23731
 
23680
- def doModifyBaselineRuleIgnore(args, parsed_globals):
23732
+ def doExportLicenseDetail(args, parsed_globals):
23681
23733
  g_param = parse_global_arg(parsed_globals)
23682
23734
 
23683
23735
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -23706,11 +23758,11 @@ def doModifyBaselineRuleIgnore(args, parsed_globals):
23706
23758
  client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
23707
23759
  client._sdkVersion += ("_CLI_" + __version__)
23708
23760
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
23709
- model = models.ModifyBaselineRuleIgnoreRequest()
23761
+ model = models.ExportLicenseDetailRequest()
23710
23762
  model.from_json_string(json.dumps(args))
23711
23763
  start_time = time.time()
23712
23764
  while True:
23713
- rsp = client.ModifyBaselineRuleIgnore(model)
23765
+ rsp = client.ExportLicenseDetail(model)
23714
23766
  result = rsp.to_json_string()
23715
23767
  try:
23716
23768
  json_obj = json.loads(result)
@@ -26878,6 +26930,7 @@ ACTION_MAP = {
26878
26930
  "DescribeLicense": doDescribeLicense,
26879
26931
  "ExportBashPolicies": doExportBashPolicies,
26880
26932
  "DescribeMachineLicenseDetail": doDescribeMachineLicenseDetail,
26933
+ "ExportScanTaskDetails": doExportScanTaskDetails,
26881
26934
  "SwitchBashRules": doSwitchBashRules,
26882
26935
  "DescribeAssetUserList": doDescribeAssetUserList,
26883
26936
  "DescribeAssetWebLocationInfo": doDescribeAssetWebLocationInfo,
@@ -27002,7 +27055,7 @@ ACTION_MAP = {
27002
27055
  "ScanAsset": doScanAsset,
27003
27056
  "ModifyBruteAttackRules": doModifyBruteAttackRules,
27004
27057
  "DeleteReverseShellEvents": doDeleteReverseShellEvents,
27005
- "ExportScanTaskDetails": doExportScanTaskDetails,
27058
+ "ModifyReverseShellRulesAggregation": doModifyReverseShellRulesAggregation,
27006
27059
  "DescribeJavaMemShellPluginInfo": doDescribeJavaMemShellPluginInfo,
27007
27060
  "ExportAssetInitServiceList": doExportAssetInitServiceList,
27008
27061
  "ModifyLoginWhiteInfo": doModifyLoginWhiteInfo,
@@ -27148,7 +27201,7 @@ ACTION_MAP = {
27148
27201
  "DescribeBashRules": doDescribeBashRules,
27149
27202
  "DescribeAttackStatistics": doDescribeAttackStatistics,
27150
27203
  "DescribeBaselineStrategyList": doDescribeBaselineStrategyList,
27151
- "DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
27204
+ "ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
27152
27205
  "ModifyMalwareWhiteList": doModifyMalwareWhiteList,
27153
27206
  "DescribeWebHookRule": doDescribeWebHookRule,
27154
27207
  "RetryVulFix": doRetryVulFix,
@@ -27193,7 +27246,6 @@ ACTION_MAP = {
27193
27246
  "GetLocalStorageItem": doGetLocalStorageItem,
27194
27247
  "ExportRansomDefenseMachineList": doExportRansomDefenseMachineList,
27195
27248
  "DescribeRansomDefenseEventsList": doDescribeRansomDefenseEventsList,
27196
- "ExportLicenseDetail": doExportLicenseDetail,
27197
27249
  "ExportAssetProcessInfoList": doExportAssetProcessInfoList,
27198
27250
  "DescribeMachinesSimple": doDescribeMachinesSimple,
27199
27251
  "DescribeBashEvents": doDescribeBashEvents,
@@ -27239,6 +27291,7 @@ ACTION_MAP = {
27239
27291
  "DescribeAssetTotalCount": doDescribeAssetTotalCount,
27240
27292
  "DescribeHotVulTop": doDescribeHotVulTop,
27241
27293
  "DeleteBaselineWeakPassword": doDeleteBaselineWeakPassword,
27294
+ "DescribeScanMalwareSchedule": doDescribeScanMalwareSchedule,
27242
27295
  "DeleteNonlocalLoginPlaces": doDeleteNonlocalLoginPlaces,
27243
27296
  "ExportAssetSystemPackageList": doExportAssetSystemPackageList,
27244
27297
  "EditReverseShellRules": doEditReverseShellRules,
@@ -27263,7 +27316,7 @@ ACTION_MAP = {
27263
27316
  "ExportWebPageEventList": doExportWebPageEventList,
27264
27317
  "DescribeBaselineHostRiskTop": doDescribeBaselineHostRiskTop,
27265
27318
  "ExportRiskDnsEventList": doExportRiskDnsEventList,
27266
- "ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
27319
+ "ExportLicenseDetail": doExportLicenseDetail,
27267
27320
  "DescribeEmergencyResponseList": doDescribeEmergencyResponseList,
27268
27321
  "DescribeAttackTrends": doDescribeAttackTrends,
27269
27322
  "DescribeScreenDefenseTrends": doDescribeScreenDefenseTrends,
@@ -92,11 +92,11 @@
92
92
  "status": "online"
93
93
  },
94
94
  "CreateCloudProtectServiceOrderRecord": {
95
- "document": "云护航服务使用完成后,该接口可以确认收货",
95
+ "document": "云护航计费产品已下线\n\n云护航服务使用完成后,该接口可以确认收货",
96
96
  "input": "CreateCloudProtectServiceOrderRecordRequest",
97
97
  "name": "云护航服务确认收货",
98
98
  "output": "CreateCloudProtectServiceOrderRecordResponse",
99
- "status": "online"
99
+ "status": "deprecated"
100
100
  },
101
101
  "CreateEmergencyVulScan": {
102
102
  "document": "创建应急漏洞扫描任务",
@@ -3283,6 +3283,13 @@
3283
3283
  "output": "ModifyRansomDefenseStrategyStatusResponse",
3284
3284
  "status": "online"
3285
3285
  },
3286
+ "ModifyReverseShellRulesAggregation": {
3287
+ "document": "编辑反弹Shell规则(支持多服务器选择)",
3288
+ "input": "ModifyReverseShellRulesAggregationRequest",
3289
+ "name": "编辑反弹Shell规则(支持多服务器选择)-聚合版本-支持正则",
3290
+ "output": "ModifyReverseShellRulesAggregationResponse",
3291
+ "status": "online"
3292
+ },
3286
3293
  "ModifyRiskDnsPolicy": {
3287
3294
  "document": "更改恶意请求策略",
3288
3295
  "input": "ModifyRiskDnsPolicyRequest",
@@ -48470,6 +48477,132 @@
48470
48477
  ],
48471
48478
  "type": "object"
48472
48479
  },
48480
+ "ModifyReverseShellRulesAggregationRequest": {
48481
+ "document": "ModifyReverseShellRulesAggregation请求参数结构体",
48482
+ "members": [
48483
+ {
48484
+ "disabled": false,
48485
+ "document": "规则ID(新增时请留空)",
48486
+ "example": "1",
48487
+ "member": "uint64",
48488
+ "name": "Id",
48489
+ "required": false,
48490
+ "type": "int"
48491
+ },
48492
+ {
48493
+ "disabled": false,
48494
+ "document": "客户端ID数组",
48495
+ "example": "[]",
48496
+ "member": "string",
48497
+ "name": "Uuids",
48498
+ "required": false,
48499
+ "type": "list"
48500
+ },
48501
+ {
48502
+ "disabled": false,
48503
+ "document": "主机IP",
48504
+ "example": "xxx",
48505
+ "member": "string",
48506
+ "name": "HostIp",
48507
+ "required": false,
48508
+ "type": "string"
48509
+ },
48510
+ {
48511
+ "disabled": false,
48512
+ "document": "目标IP",
48513
+ "example": "xxx",
48514
+ "member": "string",
48515
+ "name": "DestIp",
48516
+ "required": false,
48517
+ "type": "string"
48518
+ },
48519
+ {
48520
+ "disabled": false,
48521
+ "document": "目标端口",
48522
+ "example": "xxx",
48523
+ "member": "string",
48524
+ "name": "DestPort",
48525
+ "required": false,
48526
+ "type": "string"
48527
+ },
48528
+ {
48529
+ "disabled": false,
48530
+ "document": "进程名",
48531
+ "example": "xxx",
48532
+ "member": "string",
48533
+ "name": "ProcessName",
48534
+ "required": false,
48535
+ "type": "string"
48536
+ },
48537
+ {
48538
+ "disabled": false,
48539
+ "document": "是否全局规则(默认否)",
48540
+ "example": "1",
48541
+ "member": "uint64",
48542
+ "name": "IsGlobal",
48543
+ "required": false,
48544
+ "type": "int"
48545
+ },
48546
+ {
48547
+ "disabled": false,
48548
+ "document": "事件列表和详情点击加白时关联的事件id (新增规则时请留空)",
48549
+ "example": "12",
48550
+ "member": "uint64",
48551
+ "name": "EventId",
48552
+ "required": false,
48553
+ "type": "int"
48554
+ },
48555
+ {
48556
+ "disabled": false,
48557
+ "document": "加白方式, 0:常规加白 1:正则加白",
48558
+ "example": "1",
48559
+ "member": "uint64",
48560
+ "name": "WhiteType",
48561
+ "required": false,
48562
+ "type": "int"
48563
+ },
48564
+ {
48565
+ "disabled": false,
48566
+ "document": "正则表达式",
48567
+ "example": "*abc*",
48568
+ "member": "string",
48569
+ "name": "RuleRegexp",
48570
+ "required": false,
48571
+ "type": "string"
48572
+ },
48573
+ {
48574
+ "disabled": false,
48575
+ "document": "处理历史事件, 0:不处理 1:处理",
48576
+ "example": "1",
48577
+ "member": "uint64",
48578
+ "name": "HandleHistory",
48579
+ "required": false,
48580
+ "type": "int"
48581
+ },
48582
+ {
48583
+ "disabled": false,
48584
+ "document": "批次id",
48585
+ "example": "85c909fe-c87c-11e9-a100-5cb90191ae78",
48586
+ "member": "string",
48587
+ "name": "GroupID",
48588
+ "required": false,
48589
+ "type": "string"
48590
+ }
48591
+ ],
48592
+ "type": "object"
48593
+ },
48594
+ "ModifyReverseShellRulesAggregationResponse": {
48595
+ "document": "ModifyReverseShellRulesAggregation返回参数结构体",
48596
+ "members": [
48597
+ {
48598
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
48599
+ "member": "string",
48600
+ "name": "RequestId",
48601
+ "type": "string"
48602
+ }
48603
+ ],
48604
+ "type": "object"
48605
+ },
48473
48606
  "ModifyRiskDnsPolicyRequest": {
48474
48607
  "document": "ModifyRiskDnsPolicy请求参数结构体",
48475
48608
  "members": [
@@ -3806,6 +3806,14 @@
3806
3806
  "title": "批量修改防勒索策略状态"
3807
3807
  }
3808
3808
  ],
3809
+ "ModifyReverseShellRulesAggregation": [
3810
+ {
3811
+ "document": "增加正则规则",
3812
+ "input": "POST / HTTP/1.1\nHost: xxx\nContent-Type: application/json\nX-TC-Action: ModifyReverseShellRulesAggregation\n<公共请求参数>\n\n{\n \"IsGlobal\": 1,\n \"WhiteType\": 1,\n \"RuleRegexp\": \"xxx\",\n \"HandleHistory\": 1,\n \"GroupID\": \"\"\n}",
3813
+ "output": "{\n \"Response\": {\n \"RequestId\": \"1\"\n }\n}",
3814
+ "title": "增加正则规则"
3815
+ }
3816
+ ],
3809
3817
  "ModifyRiskDnsPolicy": [
3810
3818
  {
3811
3819
  "document": "",