tccli 3.0.1233.1__py2.py3-none-any.whl → 3.0.1235.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/cdb/v20170320/api.json +15 -15
- tccli/services/cls/v20201016/api.json +4 -4
- tccli/services/cwp/cwp_client.py +326 -8
- tccli/services/cwp/v20180228/api.json +488 -1
- tccli/services/cwp/v20180228/examples.json +48 -0
- tccli/services/ess/v20201111/api.json +1 -1
- tccli/services/essbasic/v20210526/api.json +11 -11
- tccli/services/faceid/v20180301/api.json +19 -0
- tccli/services/hunyuan/v20230901/api.json +12 -3
- tccli/services/iotexplorer/iotexplorer_client.py +106 -0
- tccli/services/iotexplorer/v20190423/api.json +173 -4
- tccli/services/iotexplorer/v20190423/examples.json +16 -0
- tccli/services/iotvideo/iotvideo_client.py +106 -0
- tccli/services/iotvideo/v20211125/api.json +169 -0
- tccli/services/iotvideo/v20211125/examples.json +16 -0
- tccli/services/ivld/v20210903/api.json +1 -1
- tccli/services/lighthouse/v20200324/api.json +59 -59
- tccli/services/lighthouse/v20200324/examples.json +4 -4
- tccli/services/lke/v20231130/api.json +2 -2
- tccli/services/memcached/v20190318/api.json +6 -6
- tccli/services/ocr/v20181119/api.json +5 -5
- tccli/services/ocr/v20181119/examples.json +7 -7
- tccli/services/privatedns/v20201028/api.json +8 -8
- tccli/services/smh/v20210712/api.json +7 -7
- tccli/services/smh/v20210712/examples.json +1 -1
- tccli/services/ssl/v20191205/api.json +46 -33
- tccli/services/ssl/v20191205/examples.json +15 -15
- tccli/services/tcbr/v20220217/api.json +71 -71
- tccli/services/tcbr/v20220217/examples.json +13 -31
- tccli/services/teo/v20220901/api.json +1 -1
- tccli/services/trocket/v20230308/api.json +19 -0
- tccli/services/tsf/v20180326/api.json +1577 -1408
- tccli/services/tsf/v20180326/examples.json +55 -61
- tccli/services/vpc/v20170312/api.json +9 -0
- tccli/services/wedata/v20210820/api.json +87 -0
- {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/RECORD +41 -41
- {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/license_files/LICENSE +0 -0
tccli/__init__.py
CHANGED
@@ -1 +1 @@
|
|
1
|
-
__version__ = '3.0.
|
1
|
+
__version__ = '3.0.1235.1'
|
@@ -5804,7 +5804,7 @@
|
|
5804
5804
|
{
|
5805
5805
|
"disabled": false,
|
5806
5806
|
"document": "参数列表,参数格式如 ParamList.0.Name=auto_increment&ParamList.0.Value=1。可通过 [查询默认的可设置参数列表](https://cloud.tencent.com/document/api/236/32662) 查询支持设置的参数。",
|
5807
|
-
"example": "[]",
|
5807
|
+
"example": "[{\"Name\": \"auto_increment_increment\",\"Value\": \"1\"}]",
|
5808
5808
|
"member": "ParamInfo",
|
5809
5809
|
"name": "ParamList",
|
5810
5810
|
"required": false,
|
@@ -5849,7 +5849,7 @@
|
|
5849
5849
|
{
|
5850
5850
|
"disabled": false,
|
5851
5851
|
"document": "安全组参数,可使用 [查询项目安全组信息](https://cloud.tencent.com/document/api/236/15850) 接口查询某个项目的安全组详情。",
|
5852
|
-
"example": "[]",
|
5852
|
+
"example": "[\"sg-9stjvjn1\"]",
|
5853
5853
|
"member": "string",
|
5854
5854
|
"name": "SecurityGroup",
|
5855
5855
|
"required": false,
|
@@ -5885,7 +5885,7 @@
|
|
5885
5885
|
{
|
5886
5886
|
"disabled": false,
|
5887
5887
|
"document": "实例标签信息。",
|
5888
|
-
"example": "[]",
|
5888
|
+
"example": "[{\"TagKey\": \"march\",\"TagValue\": [\"march1\"]}]",
|
5889
5889
|
"member": "TagInfo",
|
5890
5890
|
"name": "ResourceTags",
|
5891
5891
|
"required": false,
|
@@ -5930,7 +5930,7 @@
|
|
5930
5930
|
{
|
5931
5931
|
"disabled": false,
|
5932
5932
|
"document": "告警策略id数组。腾讯云可观测平台DescribeAlarmPolicy接口返回的OriginId。",
|
5933
|
-
"example": "[]",
|
5933
|
+
"example": "[7957756]",
|
5934
5934
|
"member": "int64",
|
5935
5935
|
"name": "AlarmPolicyList",
|
5936
5936
|
"required": false,
|
@@ -5984,7 +5984,7 @@
|
|
5984
5984
|
{
|
5985
5985
|
"disabled": false,
|
5986
5986
|
"document": "告警策略名数组,例如:[\"policy-uyoee9wg\"],AlarmPolicyList不为空时该参数无效。",
|
5987
|
-
"example": "[]",
|
5987
|
+
"example": "[\"policy-uyoee9wg\"]",
|
5988
5988
|
"member": "string",
|
5989
5989
|
"name": "AlarmPolicyIdList",
|
5990
5990
|
"required": false,
|
@@ -6011,7 +6011,7 @@
|
|
6011
6011
|
{
|
6012
6012
|
"disabled": false,
|
6013
6013
|
"document": "指定实例的IP列表。仅支持主实例指定,按实例顺序,不足则按未指定处理。",
|
6014
|
-
"example": "[]",
|
6014
|
+
"example": "[\"172.1.1.1\"]",
|
6015
6015
|
"member": "string",
|
6016
6016
|
"name": "Vips",
|
6017
6017
|
"required": false,
|
@@ -6037,7 +6037,7 @@
|
|
6037
6037
|
},
|
6038
6038
|
{
|
6039
6039
|
"disabled": false,
|
6040
|
-
"document": "
|
6040
|
+
"document": "硬盘类型,单节点(云盘版)或者集群版实例可以指定此参数。CLOUD_SSD 表示 SSD 云硬盘,CLOUD_HSSD 表示增强型 SSD 云硬盘。\n说明:单节点(云盘版)、集群版实例硬盘类型所支持的地域略有不同,具体支持情况请参考 [地域和可用区](https://cloud.tencent.com/document/product/236/8458)。",
|
6041
6041
|
"example": "CLOUD_SSD",
|
6042
6042
|
"member": "string",
|
6043
6043
|
"name": "DiskType",
|
@@ -6238,7 +6238,7 @@
|
|
6238
6238
|
{
|
6239
6239
|
"disabled": false,
|
6240
6240
|
"document": "参数列表,参数格式如 ParamList.0.Name=auto_increment&ParamList.0.Value=1。可通过 [查询默认的可设置参数列表](https://cloud.tencent.com/document/api/236/32662) 查询支持设置的参数。",
|
6241
|
-
"example": "[]",
|
6241
|
+
"example": "[{\"Name\": \"auto_increment_increment\",\"Value\": \"1\"}]",
|
6242
6242
|
"member": "ParamInfo",
|
6243
6243
|
"name": "ParamList",
|
6244
6244
|
"required": false,
|
@@ -6274,7 +6274,7 @@
|
|
6274
6274
|
{
|
6275
6275
|
"disabled": false,
|
6276
6276
|
"document": "安全组参数,可使用 [查询项目安全组信息](https://cloud.tencent.com/document/api/236/15850) 接口查询某个项目的安全组详情。",
|
6277
|
-
"example": "[]",
|
6277
|
+
"example": "[\"sg-9stjvjn1\"]",
|
6278
6278
|
"member": "string",
|
6279
6279
|
"name": "SecurityGroup",
|
6280
6280
|
"required": false,
|
@@ -6283,7 +6283,7 @@
|
|
6283
6283
|
{
|
6284
6284
|
"disabled": false,
|
6285
6285
|
"document": "只读实例参数。购买只读实例时,该参数必传。",
|
6286
|
-
"example": "{}",
|
6286
|
+
"example": "{\"RoGroupMode\": \"allinone\",\"RoGroupName\": \"jersey\",\"RoMaxDelayTime\": \"5\",\"MinRoInGroup\": \"1\",\"RoOfflineDelay\": \"1\"}",
|
6287
6287
|
"member": "RoGroup",
|
6288
6288
|
"name": "RoGroup",
|
6289
6289
|
"required": false,
|
@@ -6301,7 +6301,7 @@
|
|
6301
6301
|
{
|
6302
6302
|
"disabled": false,
|
6303
6303
|
"document": "实例标签信息。",
|
6304
|
-
"example": "[]",
|
6304
|
+
"example": "[{\"TagKey\": \"march\",\"TagValue\": [\"march1\"]}]",
|
6305
6305
|
"member": "TagInfo",
|
6306
6306
|
"name": "ResourceTags",
|
6307
6307
|
"required": false,
|
@@ -6346,7 +6346,7 @@
|
|
6346
6346
|
{
|
6347
6347
|
"disabled": false,
|
6348
6348
|
"document": "告警策略id数组。腾讯云可观测平台DescribeAlarmPolicy接口返回的OriginId。",
|
6349
|
-
"example": "[]",
|
6349
|
+
"example": "[7957756]",
|
6350
6350
|
"member": "int64",
|
6351
6351
|
"name": "AlarmPolicyList",
|
6352
6352
|
"required": false,
|
@@ -6400,7 +6400,7 @@
|
|
6400
6400
|
{
|
6401
6401
|
"disabled": false,
|
6402
6402
|
"document": "告警策略名数组,例如:[\"policy-uyoee9wg\"],AlarmPolicyList不为空时该参数无效。",
|
6403
|
-
"example": "[]",
|
6403
|
+
"example": "[\"policy-uyoee9wg\"]",
|
6404
6404
|
"member": "string",
|
6405
6405
|
"name": "AlarmPolicyIdList",
|
6406
6406
|
"required": false,
|
@@ -6427,7 +6427,7 @@
|
|
6427
6427
|
{
|
6428
6428
|
"disabled": false,
|
6429
6429
|
"document": "指定实例的IP列表。仅支持主实例指定,按实例顺序,不足则按未指定处理。",
|
6430
|
-
"example": "[]",
|
6430
|
+
"example": "[\"172.1.1.1\"]",
|
6431
6431
|
"member": "string",
|
6432
6432
|
"name": "Vips",
|
6433
6433
|
"required": false,
|
@@ -6453,7 +6453,7 @@
|
|
6453
6453
|
},
|
6454
6454
|
{
|
6455
6455
|
"disabled": false,
|
6456
|
-
"document": "
|
6456
|
+
"document": "磁盘类型,单节点(云盘版)或者集群版实例可以指定此参数。CLOUD_SSD 表示 SSD 云硬盘,CLOUD_HSSD 表示增强型 SSD 云硬盘。\n说明:单节点(云盘版)、集群版实例硬盘类型所支持的地域略有不同,具体支持情况请参考 [地域和可用区](https://cloud.tencent.com/document/product/236/8458)。",
|
6457
6457
|
"example": "CLOUD_SSD",
|
6458
6458
|
"member": "string",
|
6459
6459
|
"name": "DiskType",
|
@@ -10012,7 +10012,7 @@
|
|
10012
10012
|
{
|
10013
10013
|
"disabled": false,
|
10014
10014
|
"document": "协议类型,支持的协议类型包括 plaintext、sasl_plaintext 或 sasl_ssl。建议使用 sasl_ssl,此协议会进行连接加密同时需要用户认证。\n入参必填\n注意:此字段可能返回 null,表示取不到有效值。",
|
10015
|
-
"example": "
|
10015
|
+
"example": "sasl_ssl",
|
10016
10016
|
"member": "string",
|
10017
10017
|
"name": "Protocol",
|
10018
10018
|
"output_required": true,
|
@@ -10023,7 +10023,7 @@
|
|
10023
10023
|
{
|
10024
10024
|
"disabled": false,
|
10025
10025
|
"document": "加密类型,支持 PLAIN、SCRAM-SHA-256 或 SCRAM-SHA-512。\n当Protocol为sasl_plaintext或sasl_ssl时必填\n注意:此字段可能返回 null,表示取不到有效值。",
|
10026
|
-
"example": "
|
10026
|
+
"example": "PLAIN",
|
10027
10027
|
"member": "string",
|
10028
10028
|
"name": "Mechanism",
|
10029
10029
|
"output_required": true,
|
@@ -10034,7 +10034,7 @@
|
|
10034
10034
|
{
|
10035
10035
|
"disabled": false,
|
10036
10036
|
"document": "用户名。\n当Protocol为sasl_plaintext或sasl_ssl时必填\n注意:此字段可能返回 null,表示取不到有效值。",
|
10037
|
-
"example": "
|
10037
|
+
"example": "name",
|
10038
10038
|
"member": "string",
|
10039
10039
|
"name": "UserName",
|
10040
10040
|
"output_required": true,
|
@@ -10045,7 +10045,7 @@
|
|
10045
10045
|
{
|
10046
10046
|
"disabled": false,
|
10047
10047
|
"document": "用户密码。\n当Protocol为sasl_plaintext或sasl_ssl时必填\n注意:此字段可能返回 null,表示取不到有效值。",
|
10048
|
-
"example": "
|
10048
|
+
"example": "axxxxxx",
|
10049
10049
|
"member": "string",
|
10050
10050
|
"name": "Password",
|
10051
10051
|
"output_required": true,
|
tccli/services/cwp/cwp_client.py
CHANGED
@@ -2461,6 +2461,58 @@ def doDescribeBaselineRuleDetectList(args, parsed_globals):
|
|
2461
2461
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2462
2462
|
|
2463
2463
|
|
2464
|
+
def doModifyRaspMaxCpu(args, parsed_globals):
|
2465
|
+
g_param = parse_global_arg(parsed_globals)
|
2466
|
+
|
2467
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
2468
|
+
cred = credential.CVMRoleCredential()
|
2469
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
2470
|
+
cred = credential.STSAssumeRoleCredential(
|
2471
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
2472
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
2473
|
+
)
|
2474
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
2475
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
2476
|
+
else:
|
2477
|
+
cred = credential.Credential(
|
2478
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
2479
|
+
)
|
2480
|
+
http_profile = HttpProfile(
|
2481
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
2482
|
+
reqMethod="POST",
|
2483
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
2484
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
2485
|
+
)
|
2486
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
2487
|
+
if g_param[OptionsDefine.Language]:
|
2488
|
+
profile.language = g_param[OptionsDefine.Language]
|
2489
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
2490
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
2491
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
2492
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
2493
|
+
model = models.ModifyRaspMaxCpuRequest()
|
2494
|
+
model.from_json_string(json.dumps(args))
|
2495
|
+
start_time = time.time()
|
2496
|
+
while True:
|
2497
|
+
rsp = client.ModifyRaspMaxCpu(model)
|
2498
|
+
result = rsp.to_json_string()
|
2499
|
+
try:
|
2500
|
+
json_obj = json.loads(result)
|
2501
|
+
except TypeError as e:
|
2502
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
2503
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
2504
|
+
break
|
2505
|
+
cur_time = time.time()
|
2506
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
2507
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
2508
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
2509
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
2510
|
+
else:
|
2511
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
2512
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
2513
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
2514
|
+
|
2515
|
+
|
2464
2516
|
def doDeleteTags(args, parsed_globals):
|
2465
2517
|
g_param = parse_global_arg(parsed_globals)
|
2466
2518
|
|
@@ -5789,6 +5841,58 @@ def doDescribeAssetTypeTop(args, parsed_globals):
|
|
5789
5841
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5790
5842
|
|
5791
5843
|
|
5844
|
+
def doDescribeRaspRuleVuls(args, parsed_globals):
|
5845
|
+
g_param = parse_global_arg(parsed_globals)
|
5846
|
+
|
5847
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5848
|
+
cred = credential.CVMRoleCredential()
|
5849
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5850
|
+
cred = credential.STSAssumeRoleCredential(
|
5851
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5852
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5853
|
+
)
|
5854
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5855
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5856
|
+
else:
|
5857
|
+
cred = credential.Credential(
|
5858
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5859
|
+
)
|
5860
|
+
http_profile = HttpProfile(
|
5861
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5862
|
+
reqMethod="POST",
|
5863
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5864
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5865
|
+
)
|
5866
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5867
|
+
if g_param[OptionsDefine.Language]:
|
5868
|
+
profile.language = g_param[OptionsDefine.Language]
|
5869
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5870
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
5871
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5872
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5873
|
+
model = models.DescribeRaspRuleVulsRequest()
|
5874
|
+
model.from_json_string(json.dumps(args))
|
5875
|
+
start_time = time.time()
|
5876
|
+
while True:
|
5877
|
+
rsp = client.DescribeRaspRuleVuls(model)
|
5878
|
+
result = rsp.to_json_string()
|
5879
|
+
try:
|
5880
|
+
json_obj = json.loads(result)
|
5881
|
+
except TypeError as e:
|
5882
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5883
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5884
|
+
break
|
5885
|
+
cur_time = time.time()
|
5886
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5887
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5888
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5889
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5890
|
+
else:
|
5891
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5892
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5893
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5894
|
+
|
5895
|
+
|
5792
5896
|
def doExportRansomDefenseStrategyMachines(args, parsed_globals):
|
5793
5897
|
g_param = parse_global_arg(parsed_globals)
|
5794
5898
|
|
@@ -8181,7 +8285,7 @@ def doExportBaselineWeakPasswordList(args, parsed_globals):
|
|
8181
8285
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8182
8286
|
|
8183
8287
|
|
8184
|
-
def
|
8288
|
+
def doDescribeBaselineStrategyList(args, parsed_globals):
|
8185
8289
|
g_param = parse_global_arg(parsed_globals)
|
8186
8290
|
|
8187
8291
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -8210,11 +8314,11 @@ def doDescribeAssetUserKeyList(args, parsed_globals):
|
|
8210
8314
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
8211
8315
|
client._sdkVersion += ("_CLI_" + __version__)
|
8212
8316
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8213
|
-
model = models.
|
8317
|
+
model = models.DescribeBaselineStrategyListRequest()
|
8214
8318
|
model.from_json_string(json.dumps(args))
|
8215
8319
|
start_time = time.time()
|
8216
8320
|
while True:
|
8217
|
-
rsp = client.
|
8321
|
+
rsp = client.DescribeBaselineStrategyList(model)
|
8218
8322
|
result = rsp.to_json_string()
|
8219
8323
|
try:
|
8220
8324
|
json_obj = json.loads(result)
|
@@ -11665,6 +11769,58 @@ def doEditTags(args, parsed_globals):
|
|
11665
11769
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
11666
11770
|
|
11667
11771
|
|
11772
|
+
def doDescribeRaspRules(args, parsed_globals):
|
11773
|
+
g_param = parse_global_arg(parsed_globals)
|
11774
|
+
|
11775
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
11776
|
+
cred = credential.CVMRoleCredential()
|
11777
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
11778
|
+
cred = credential.STSAssumeRoleCredential(
|
11779
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
11780
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
11781
|
+
)
|
11782
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
11783
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
11784
|
+
else:
|
11785
|
+
cred = credential.Credential(
|
11786
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
11787
|
+
)
|
11788
|
+
http_profile = HttpProfile(
|
11789
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
11790
|
+
reqMethod="POST",
|
11791
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
11792
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
11793
|
+
)
|
11794
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
11795
|
+
if g_param[OptionsDefine.Language]:
|
11796
|
+
profile.language = g_param[OptionsDefine.Language]
|
11797
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
11798
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
11799
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
11800
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
11801
|
+
model = models.DescribeRaspRulesRequest()
|
11802
|
+
model.from_json_string(json.dumps(args))
|
11803
|
+
start_time = time.time()
|
11804
|
+
while True:
|
11805
|
+
rsp = client.DescribeRaspRules(model)
|
11806
|
+
result = rsp.to_json_string()
|
11807
|
+
try:
|
11808
|
+
json_obj = json.loads(result)
|
11809
|
+
except TypeError as e:
|
11810
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
11811
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
11812
|
+
break
|
11813
|
+
cur_time = time.time()
|
11814
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
11815
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
11816
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
11817
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
11818
|
+
else:
|
11819
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
11820
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
11821
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
11822
|
+
|
11823
|
+
|
11668
11824
|
def doCreateLogExport(args, parsed_globals):
|
11669
11825
|
g_param = parse_global_arg(parsed_globals)
|
11670
11826
|
|
@@ -16501,6 +16657,58 @@ def doDescribeAssetDatabaseCount(args, parsed_globals):
|
|
16501
16657
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16502
16658
|
|
16503
16659
|
|
16660
|
+
def doDescribeRaspMaxCpu(args, parsed_globals):
|
16661
|
+
g_param = parse_global_arg(parsed_globals)
|
16662
|
+
|
16663
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
16664
|
+
cred = credential.CVMRoleCredential()
|
16665
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
16666
|
+
cred = credential.STSAssumeRoleCredential(
|
16667
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
16668
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
16669
|
+
)
|
16670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
16671
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
16672
|
+
else:
|
16673
|
+
cred = credential.Credential(
|
16674
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
16675
|
+
)
|
16676
|
+
http_profile = HttpProfile(
|
16677
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
16678
|
+
reqMethod="POST",
|
16679
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
16680
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
16681
|
+
)
|
16682
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
16683
|
+
if g_param[OptionsDefine.Language]:
|
16684
|
+
profile.language = g_param[OptionsDefine.Language]
|
16685
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
16686
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
16687
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
16688
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
16689
|
+
model = models.DescribeRaspMaxCpuRequest()
|
16690
|
+
model.from_json_string(json.dumps(args))
|
16691
|
+
start_time = time.time()
|
16692
|
+
while True:
|
16693
|
+
rsp = client.DescribeRaspMaxCpu(model)
|
16694
|
+
result = rsp.to_json_string()
|
16695
|
+
try:
|
16696
|
+
json_obj = json.loads(result)
|
16697
|
+
except TypeError as e:
|
16698
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
16699
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
16700
|
+
break
|
16701
|
+
cur_time = time.time()
|
16702
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
16703
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
16704
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
16705
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
16706
|
+
else:
|
16707
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
16708
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
16709
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16710
|
+
|
16711
|
+
|
16504
16712
|
def doDescribeLogHistogram(args, parsed_globals):
|
16505
16713
|
g_param = parse_global_arg(parsed_globals)
|
16506
16714
|
|
@@ -17697,7 +17905,7 @@ def doDescribeAttackStatistics(args, parsed_globals):
|
|
17697
17905
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17698
17906
|
|
17699
17907
|
|
17700
|
-
def
|
17908
|
+
def doDescribeAssetUserKeyList(args, parsed_globals):
|
17701
17909
|
g_param = parse_global_arg(parsed_globals)
|
17702
17910
|
|
17703
17911
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17726,11 +17934,11 @@ def doDescribeBaselineStrategyList(args, parsed_globals):
|
|
17726
17934
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
17727
17935
|
client._sdkVersion += ("_CLI_" + __version__)
|
17728
17936
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17729
|
-
model = models.
|
17937
|
+
model = models.DescribeAssetUserKeyListRequest()
|
17730
17938
|
model.from_json_string(json.dumps(args))
|
17731
17939
|
start_time = time.time()
|
17732
17940
|
while True:
|
17733
|
-
rsp = client.
|
17941
|
+
rsp = client.DescribeAssetUserKeyList(model)
|
17734
17942
|
result = rsp.to_json_string()
|
17735
17943
|
try:
|
17736
17944
|
json_obj = json.loads(result)
|
@@ -18009,6 +18217,58 @@ def doDeleteBashRules(args, parsed_globals):
|
|
18009
18217
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
18010
18218
|
|
18011
18219
|
|
18220
|
+
def doModifyRaspRules(args, parsed_globals):
|
18221
|
+
g_param = parse_global_arg(parsed_globals)
|
18222
|
+
|
18223
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
18224
|
+
cred = credential.CVMRoleCredential()
|
18225
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
18226
|
+
cred = credential.STSAssumeRoleCredential(
|
18227
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
18228
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
18229
|
+
)
|
18230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
18231
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
18232
|
+
else:
|
18233
|
+
cred = credential.Credential(
|
18234
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
18235
|
+
)
|
18236
|
+
http_profile = HttpProfile(
|
18237
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
18238
|
+
reqMethod="POST",
|
18239
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
18240
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
18241
|
+
)
|
18242
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
18243
|
+
if g_param[OptionsDefine.Language]:
|
18244
|
+
profile.language = g_param[OptionsDefine.Language]
|
18245
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
18246
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
18247
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
18248
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
18249
|
+
model = models.ModifyRaspRulesRequest()
|
18250
|
+
model.from_json_string(json.dumps(args))
|
18251
|
+
start_time = time.time()
|
18252
|
+
while True:
|
18253
|
+
rsp = client.ModifyRaspRules(model)
|
18254
|
+
result = rsp.to_json_string()
|
18255
|
+
try:
|
18256
|
+
json_obj = json.loads(result)
|
18257
|
+
except TypeError as e:
|
18258
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
18259
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
18260
|
+
break
|
18261
|
+
cur_time = time.time()
|
18262
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
18263
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
18264
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
18265
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
18266
|
+
else:
|
18267
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
18268
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
18269
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
18270
|
+
|
18271
|
+
|
18012
18272
|
def doSyncAssetScan(args, parsed_globals):
|
18013
18273
|
g_param = parse_global_arg(parsed_globals)
|
18014
18274
|
|
@@ -22741,6 +23001,58 @@ def doDescribeAssetUserInfo(args, parsed_globals):
|
|
22741
23001
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
22742
23002
|
|
22743
23003
|
|
23004
|
+
def doDeleteRaspRules(args, parsed_globals):
|
23005
|
+
g_param = parse_global_arg(parsed_globals)
|
23006
|
+
|
23007
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
23008
|
+
cred = credential.CVMRoleCredential()
|
23009
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
23010
|
+
cred = credential.STSAssumeRoleCredential(
|
23011
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
23012
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
23013
|
+
)
|
23014
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
23015
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
23016
|
+
else:
|
23017
|
+
cred = credential.Credential(
|
23018
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
23019
|
+
)
|
23020
|
+
http_profile = HttpProfile(
|
23021
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
23022
|
+
reqMethod="POST",
|
23023
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
23024
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
23025
|
+
)
|
23026
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
23027
|
+
if g_param[OptionsDefine.Language]:
|
23028
|
+
profile.language = g_param[OptionsDefine.Language]
|
23029
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
23030
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
23031
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
23032
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
23033
|
+
model = models.DeleteRaspRulesRequest()
|
23034
|
+
model.from_json_string(json.dumps(args))
|
23035
|
+
start_time = time.time()
|
23036
|
+
while True:
|
23037
|
+
rsp = client.DeleteRaspRules(model)
|
23038
|
+
result = rsp.to_json_string()
|
23039
|
+
try:
|
23040
|
+
json_obj = json.loads(result)
|
23041
|
+
except TypeError as e:
|
23042
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
23043
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
23044
|
+
break
|
23045
|
+
cur_time = time.time()
|
23046
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
23047
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
23048
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
23049
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
23050
|
+
else:
|
23051
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
23052
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
23053
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
23054
|
+
|
23055
|
+
|
22744
23056
|
def doDeleteMalwares(args, parsed_globals):
|
22745
23057
|
g_param = parse_global_arg(parsed_globals)
|
22746
23058
|
|
@@ -26803,6 +27115,7 @@ ACTION_MAP = {
|
|
26803
27115
|
"DescribeAssetLoadInfo": doDescribeAssetLoadInfo,
|
26804
27116
|
"FixBaselineDetect": doFixBaselineDetect,
|
26805
27117
|
"DescribeBaselineRuleDetectList": doDescribeBaselineRuleDetectList,
|
27118
|
+
"ModifyRaspMaxCpu": doModifyRaspMaxCpu,
|
26806
27119
|
"DeleteTags": doDeleteTags,
|
26807
27120
|
"DeleteLicenseRecordAll": doDeleteLicenseRecordAll,
|
26808
27121
|
"DescribeOverviewStatistics": doDescribeOverviewStatistics,
|
@@ -26867,6 +27180,7 @@ ACTION_MAP = {
|
|
26867
27180
|
"DescribePrivilegeEvents": doDescribePrivilegeEvents,
|
26868
27181
|
"DescribeMachineInfo": doDescribeMachineInfo,
|
26869
27182
|
"DescribeAssetTypeTop": doDescribeAssetTypeTop,
|
27183
|
+
"DescribeRaspRuleVuls": doDescribeRaspRuleVuls,
|
26870
27184
|
"ExportRansomDefenseStrategyMachines": doExportRansomDefenseStrategyMachines,
|
26871
27185
|
"DescribeLogStorageStatistic": doDescribeLogStorageStatistic,
|
26872
27186
|
"DescribeIgnoreHostAndItemConfig": doDescribeIgnoreHostAndItemConfig,
|
@@ -26913,7 +27227,7 @@ ACTION_MAP = {
|
|
26913
27227
|
"DescribeBaselineItemRiskTop": doDescribeBaselineItemRiskTop,
|
26914
27228
|
"ExportAssetAppList": doExportAssetAppList,
|
26915
27229
|
"ExportBaselineWeakPasswordList": doExportBaselineWeakPasswordList,
|
26916
|
-
"
|
27230
|
+
"DescribeBaselineStrategyList": doDescribeBaselineStrategyList,
|
26917
27231
|
"ExportAssetPortInfoList": doExportAssetPortInfoList,
|
26918
27232
|
"ExportAssetMachineList": doExportAssetMachineList,
|
26919
27233
|
"DescribeLogStorageRecord": doDescribeLogStorageRecord,
|
@@ -26980,6 +27294,7 @@ ACTION_MAP = {
|
|
26980
27294
|
"DescribeScreenMachineRegions": doDescribeScreenMachineRegions,
|
26981
27295
|
"DescribeBaselineHostIgnoreList": doDescribeBaselineHostIgnoreList,
|
26982
27296
|
"EditTags": doEditTags,
|
27297
|
+
"DescribeRaspRules": doDescribeRaspRules,
|
26983
27298
|
"CreateLogExport": doCreateLogExport,
|
26984
27299
|
"DescribeLoginWhiteCombinedList": doDescribeLoginWhiteCombinedList,
|
26985
27300
|
"ExportNonlocalLoginPlaces": doExportNonlocalLoginPlaces,
|
@@ -27073,6 +27388,7 @@ ACTION_MAP = {
|
|
27073
27388
|
"DeleteLicenseRecord": doDeleteLicenseRecord,
|
27074
27389
|
"DescribeSecurityDynamics": doDescribeSecurityDynamics,
|
27075
27390
|
"DescribeAssetDatabaseCount": doDescribeAssetDatabaseCount,
|
27391
|
+
"DescribeRaspMaxCpu": doDescribeRaspMaxCpu,
|
27076
27392
|
"DescribeLogHistogram": doDescribeLogHistogram,
|
27077
27393
|
"DescribeMachineFileTamperRules": doDescribeMachineFileTamperRules,
|
27078
27394
|
"ModifyLicenseOrder": doModifyLicenseOrder,
|
@@ -27096,12 +27412,13 @@ ACTION_MAP = {
|
|
27096
27412
|
"ModifyWebPageProtectSetting": doModifyWebPageProtectSetting,
|
27097
27413
|
"DescribeBashRules": doDescribeBashRules,
|
27098
27414
|
"DescribeAttackStatistics": doDescribeAttackStatistics,
|
27099
|
-
"
|
27415
|
+
"DescribeAssetUserKeyList": doDescribeAssetUserKeyList,
|
27100
27416
|
"ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
|
27101
27417
|
"ModifyMalwareWhiteList": doModifyMalwareWhiteList,
|
27102
27418
|
"DescribeWebHookRule": doDescribeWebHookRule,
|
27103
27419
|
"RetryVulFix": doRetryVulFix,
|
27104
27420
|
"DeleteBashRules": doDeleteBashRules,
|
27421
|
+
"ModifyRaspRules": doModifyRaspRules,
|
27105
27422
|
"SyncAssetScan": doSyncAssetScan,
|
27106
27423
|
"DescribeAssetRecentMachineInfo": doDescribeAssetRecentMachineInfo,
|
27107
27424
|
"DescribeVulEffectModules": doDescribeVulEffectModules,
|
@@ -27193,6 +27510,7 @@ ACTION_MAP = {
|
|
27193
27510
|
"ExportPrivilegeEvents": doExportPrivilegeEvents,
|
27194
27511
|
"ModifyRiskEventsStatus": doModifyRiskEventsStatus,
|
27195
27512
|
"DescribeAssetUserInfo": doDescribeAssetUserInfo,
|
27513
|
+
"DeleteRaspRules": doDeleteRaspRules,
|
27196
27514
|
"DeleteMalwares": doDeleteMalwares,
|
27197
27515
|
"ExportVulDefencePluginEvent": doExportVulDefencePluginEvent,
|
27198
27516
|
"ScanVulSetting": doScanVulSetting,
|