tccli 3.0.1233.1__py2.py3-none-any.whl → 3.0.1235.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/cdb/v20170320/api.json +15 -15
  3. tccli/services/cls/v20201016/api.json +4 -4
  4. tccli/services/cwp/cwp_client.py +326 -8
  5. tccli/services/cwp/v20180228/api.json +488 -1
  6. tccli/services/cwp/v20180228/examples.json +48 -0
  7. tccli/services/ess/v20201111/api.json +1 -1
  8. tccli/services/essbasic/v20210526/api.json +11 -11
  9. tccli/services/faceid/v20180301/api.json +19 -0
  10. tccli/services/hunyuan/v20230901/api.json +12 -3
  11. tccli/services/iotexplorer/iotexplorer_client.py +106 -0
  12. tccli/services/iotexplorer/v20190423/api.json +173 -4
  13. tccli/services/iotexplorer/v20190423/examples.json +16 -0
  14. tccli/services/iotvideo/iotvideo_client.py +106 -0
  15. tccli/services/iotvideo/v20211125/api.json +169 -0
  16. tccli/services/iotvideo/v20211125/examples.json +16 -0
  17. tccli/services/ivld/v20210903/api.json +1 -1
  18. tccli/services/lighthouse/v20200324/api.json +59 -59
  19. tccli/services/lighthouse/v20200324/examples.json +4 -4
  20. tccli/services/lke/v20231130/api.json +2 -2
  21. tccli/services/memcached/v20190318/api.json +6 -6
  22. tccli/services/ocr/v20181119/api.json +5 -5
  23. tccli/services/ocr/v20181119/examples.json +7 -7
  24. tccli/services/privatedns/v20201028/api.json +8 -8
  25. tccli/services/smh/v20210712/api.json +7 -7
  26. tccli/services/smh/v20210712/examples.json +1 -1
  27. tccli/services/ssl/v20191205/api.json +46 -33
  28. tccli/services/ssl/v20191205/examples.json +15 -15
  29. tccli/services/tcbr/v20220217/api.json +71 -71
  30. tccli/services/tcbr/v20220217/examples.json +13 -31
  31. tccli/services/teo/v20220901/api.json +1 -1
  32. tccli/services/trocket/v20230308/api.json +19 -0
  33. tccli/services/tsf/v20180326/api.json +1577 -1408
  34. tccli/services/tsf/v20180326/examples.json +55 -61
  35. tccli/services/vpc/v20170312/api.json +9 -0
  36. tccli/services/wedata/v20210820/api.json +87 -0
  37. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/METADATA +2 -2
  38. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/RECORD +41 -41
  39. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/WHEEL +0 -0
  40. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/entry_points.txt +0 -0
  41. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/license_files/LICENSE +0 -0
@@ -385,6 +385,13 @@
385
385
  "output": "DeleteProtectDirResponse",
386
386
  "status": "online"
387
387
  },
388
+ "DeleteRaspRules": {
389
+ "document": "删除漏洞防御白名单",
390
+ "input": "DeleteRaspRulesRequest",
391
+ "name": "删除rasp白名单规则",
392
+ "output": "DeleteRaspRulesResponse",
393
+ "status": "online"
394
+ },
388
395
  "DeleteReverseShellEvents": {
389
396
  "document": "根据Ids删除反弹Shell事件",
390
397
  "input": "DeleteReverseShellEventsRequest",
@@ -1897,6 +1904,27 @@
1897
1904
  "output": "DescribeRansomDefenseTrendResponse",
1898
1905
  "status": "online"
1899
1906
  },
1907
+ "DescribeRaspMaxCpu": {
1908
+ "document": "查看漏洞防御最大cpu限制",
1909
+ "input": "DescribeRaspMaxCpuRequest",
1910
+ "name": "查询rasp最大cpu限制",
1911
+ "output": "DescribeRaspMaxCpuResponse",
1912
+ "status": "online"
1913
+ },
1914
+ "DescribeRaspRuleVuls": {
1915
+ "document": "获取漏洞防御白名单漏洞列表",
1916
+ "input": "DescribeRaspRuleVulsRequest",
1917
+ "name": "获取rasp白名单里的漏洞列表",
1918
+ "output": "DescribeRaspRuleVulsResponse",
1919
+ "status": "online"
1920
+ },
1921
+ "DescribeRaspRules": {
1922
+ "document": "查询漏洞防御白名单",
1923
+ "input": "DescribeRaspRulesRequest",
1924
+ "name": "获取rasp白名单列表",
1925
+ "output": "DescribeRaspRulesResponse",
1926
+ "status": "online"
1927
+ },
1900
1928
  "DescribeRecommendedProtectCpu": {
1901
1929
  "document": "查询推荐购买防护核数",
1902
1930
  "input": "DescribeRecommendedProtectCpuRequest",
@@ -3269,6 +3297,20 @@
3269
3297
  "output": "ModifyRansomDefenseStrategyStatusResponse",
3270
3298
  "status": "online"
3271
3299
  },
3300
+ "ModifyRaspMaxCpu": {
3301
+ "document": "编辑漏洞防御最大cpu配置",
3302
+ "input": "ModifyRaspMaxCpuRequest",
3303
+ "name": "编辑rasp最大cpu限制",
3304
+ "output": "ModifyRaspMaxCpuResponse",
3305
+ "status": "online"
3306
+ },
3307
+ "ModifyRaspRules": {
3308
+ "document": "添加漏洞防御白名单",
3309
+ "input": "ModifyRaspRulesRequest",
3310
+ "name": "编辑或者创建rasp白名单规则",
3311
+ "output": "ModifyRaspRulesResponse",
3312
+ "status": "online"
3313
+ },
3272
3314
  "ModifyReverseShellRulesAggregation": {
3273
3315
  "document": "编辑反弹Shell规则(支持多服务器选择)",
3274
3316
  "input": "ModifyReverseShellRulesAggregationRequest",
@@ -11698,7 +11740,7 @@
11698
11740
  },
11699
11741
  {
11700
11742
  "disabled": false,
11701
- "document": "自动生成的正则表达式",
11743
+ "document": "转义后的正则表达式",
11702
11744
  "example": "rm -rf /tmp/t*",
11703
11745
  "member": "string",
11704
11746
  "name": "RegexBashCmd",
@@ -11706,6 +11748,16 @@
11706
11748
  "type": "string",
11707
11749
  "value_allowed_null": false
11708
11750
  },
11751
+ {
11752
+ "disabled": false,
11753
+ "document": "转义后的正则表达式",
11754
+ "example": "/usr/sbin/tail",
11755
+ "member": "string",
11756
+ "name": "RegexExe",
11757
+ "output_required": false,
11758
+ "type": "string",
11759
+ "value_allowed_null": false
11760
+ },
11709
11761
  {
11710
11762
  "disabled": false,
11711
11763
  "document": "0:普通 1:专业版 2:旗舰版",
@@ -16276,6 +16328,33 @@
16276
16328
  ],
16277
16329
  "type": "object"
16278
16330
  },
16331
+ "DeleteRaspRulesRequest": {
16332
+ "document": "DeleteRaspRules请求参数结构体",
16333
+ "members": [
16334
+ {
16335
+ "disabled": false,
16336
+ "document": "待删除的规则ID数组 (最大100条)",
16337
+ "example": "[31]",
16338
+ "member": "uint64",
16339
+ "name": "IDs",
16340
+ "required": true,
16341
+ "type": "list"
16342
+ }
16343
+ ],
16344
+ "type": "object"
16345
+ },
16346
+ "DeleteRaspRulesResponse": {
16347
+ "document": "DeleteRaspRules返回参数结构体",
16348
+ "members": [
16349
+ {
16350
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
16351
+ "member": "string",
16352
+ "name": "RequestId",
16353
+ "type": "string"
16354
+ }
16355
+ ],
16356
+ "type": "object"
16357
+ },
16279
16358
  "DeleteReverseShellEventsRequest": {
16280
16359
  "document": "DeleteReverseShellEvents请求参数结构体",
16281
16360
  "members": [
@@ -31179,6 +31258,181 @@
31179
31258
  ],
31180
31259
  "type": "object"
31181
31260
  },
31261
+ "DescribeRaspMaxCpuRequest": {
31262
+ "document": "DescribeRaspMaxCpu请求参数结构体",
31263
+ "members": [],
31264
+ "type": "object"
31265
+ },
31266
+ "DescribeRaspMaxCpuResponse": {
31267
+ "document": "DescribeRaspMaxCpu返回参数结构体",
31268
+ "members": [
31269
+ {
31270
+ "disabled": false,
31271
+ "document": "rasp当前最大cpu限制,0<cpu<=100,默认100表示不限制",
31272
+ "example": "100",
31273
+ "member": "uint64",
31274
+ "name": "RaspMaxCpu",
31275
+ "output_required": true,
31276
+ "type": "int",
31277
+ "value_allowed_null": false
31278
+ },
31279
+ {
31280
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
31281
+ "member": "string",
31282
+ "name": "RequestId",
31283
+ "type": "string"
31284
+ }
31285
+ ],
31286
+ "type": "object"
31287
+ },
31288
+ "DescribeRaspRuleVulsRequest": {
31289
+ "document": "DescribeRaspRuleVuls请求参数结构体",
31290
+ "members": [
31291
+ {
31292
+ "disabled": false,
31293
+ "document": "过滤条件。Name=WhiteType的必选,0:表示自定义范围的漏洞列表,1:表示全部请求范围的列表",
31294
+ "example": "[{\"Name\":\"WhiteType\",\"Values\":[\"0\"]}]",
31295
+ "member": "Filter",
31296
+ "name": "Filters",
31297
+ "required": true,
31298
+ "type": "list"
31299
+ },
31300
+ {
31301
+ "disabled": false,
31302
+ "document": "返回数量,默认为10,最大值为1000。",
31303
+ "example": "10",
31304
+ "member": "uint64",
31305
+ "name": "Limit",
31306
+ "required": false,
31307
+ "type": "int"
31308
+ },
31309
+ {
31310
+ "disabled": false,
31311
+ "document": "偏移量,默认为0。",
31312
+ "example": "0",
31313
+ "member": "uint64",
31314
+ "name": "Offset",
31315
+ "required": false,
31316
+ "type": "int"
31317
+ }
31318
+ ],
31319
+ "type": "object"
31320
+ },
31321
+ "DescribeRaspRuleVulsResponse": {
31322
+ "document": "DescribeRaspRuleVuls返回参数结构体",
31323
+ "members": [
31324
+ {
31325
+ "disabled": false,
31326
+ "document": "列表内容",
31327
+ "example": "[ \t\t\t{ \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\" \t\t\t} \t\t]",
31328
+ "member": "RaspRuleVul",
31329
+ "name": "List",
31330
+ "output_required": true,
31331
+ "type": "list",
31332
+ "value_allowed_null": false
31333
+ },
31334
+ {
31335
+ "disabled": false,
31336
+ "document": "总条数",
31337
+ "example": "1",
31338
+ "member": "uint64",
31339
+ "name": "TotalCount",
31340
+ "output_required": true,
31341
+ "type": "int",
31342
+ "value_allowed_null": false
31343
+ },
31344
+ {
31345
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
31346
+ "member": "string",
31347
+ "name": "RequestId",
31348
+ "type": "string"
31349
+ }
31350
+ ],
31351
+ "type": "object"
31352
+ },
31353
+ "DescribeRaspRulesRequest": {
31354
+ "document": "DescribeRaspRules请求参数结构体",
31355
+ "members": [
31356
+ {
31357
+ "disabled": false,
31358
+ "document": "返回数量,默认为10,最大值为100。",
31359
+ "example": "10",
31360
+ "member": "uint64",
31361
+ "name": "Limit",
31362
+ "required": false,
31363
+ "type": "int"
31364
+ },
31365
+ {
31366
+ "disabled": false,
31367
+ "document": "偏移量,默认为0。",
31368
+ "example": "0",
31369
+ "member": "uint64",
31370
+ "name": "Offset",
31371
+ "required": false,
31372
+ "type": "int"
31373
+ },
31374
+ {
31375
+ "disabled": false,
31376
+ "document": "过滤条件。\n<li>Keywords - String - 是否必填:否 - 关键字(进程名称)</li>",
31377
+ "example": "[{\"Name\":\"Keywords\",\"Values\":[\"加白内容\"]}]",
31378
+ "member": "Filter",
31379
+ "name": "Filters",
31380
+ "required": false,
31381
+ "type": "list"
31382
+ },
31383
+ {
31384
+ "disabled": false,
31385
+ "document": "排序字段,目前有:CreateTime、ModifyTime,默认按照ModifyTime排序",
31386
+ "example": "ModifyTime",
31387
+ "member": "string",
31388
+ "name": "By",
31389
+ "required": false,
31390
+ "type": "string"
31391
+ },
31392
+ {
31393
+ "disabled": false,
31394
+ "document": "排序升序还是倒序,DESC有ASC、",
31395
+ "example": "ASC",
31396
+ "member": "string",
31397
+ "name": "Order",
31398
+ "required": false,
31399
+ "type": "string"
31400
+ }
31401
+ ],
31402
+ "type": "object"
31403
+ },
31404
+ "DescribeRaspRulesResponse": {
31405
+ "document": "DescribeRaspRules返回参数结构体",
31406
+ "members": [
31407
+ {
31408
+ "disabled": false,
31409
+ "document": "列表内容",
31410
+ "example": "[ \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"Id\": 2, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"URLRegexp\": \"\", \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\", \t\t\t\t\"WhiteType\": 1 \t\t\t}, \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"CveID\": \"CVE-2016-5003\", \t\t\t\t\"Id\": 3, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 1, \t\t\t\t\"URLRegexp\": \"\", \t\t\t\t\"VulVulsID\": 18878, \t\t\t\t\"VulVulsName\": \"Apache Archiva Apache XML-RPC库安全漏洞(CVE-2016-5003)\", \t\t\t\t\"WhiteType\": 1 \t\t\t}, \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:28:05\", \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"Id\": 1, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:28:05\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"URLRegexp\": \"abc\", \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\", \t\t\t\t\"WhiteType\": 0 \t\t\t} \t\t]",
31411
+ "member": "RaspRule",
31412
+ "name": "List",
31413
+ "output_required": true,
31414
+ "type": "list",
31415
+ "value_allowed_null": false
31416
+ },
31417
+ {
31418
+ "disabled": false,
31419
+ "document": "总条数",
31420
+ "example": "3",
31421
+ "member": "uint64",
31422
+ "name": "TotalCount",
31423
+ "output_required": true,
31424
+ "type": "int",
31425
+ "value_allowed_null": false
31426
+ },
31427
+ {
31428
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
31429
+ "member": "string",
31430
+ "name": "RequestId",
31431
+ "type": "string"
31432
+ }
31433
+ ],
31434
+ "type": "object"
31435
+ },
31182
31436
  "DescribeRecommendedProtectCpuRequest": {
31183
31437
  "document": "DescribeRecommendedProtectCpu请求参数结构体",
31184
31438
  "members": [],
@@ -48892,6 +49146,87 @@
48892
49146
  ],
48893
49147
  "type": "object"
48894
49148
  },
49149
+ "ModifyRaspMaxCpuRequest": {
49150
+ "document": "ModifyRaspMaxCpu请求参数结构体",
49151
+ "members": [
49152
+ {
49153
+ "disabled": false,
49154
+ "document": "rasp当前最大cpu限制,0<cpu<=100,默认100表示不限制",
49155
+ "example": "80",
49156
+ "member": "uint64",
49157
+ "name": "RaspMaxCpu",
49158
+ "required": false,
49159
+ "type": "int"
49160
+ }
49161
+ ],
49162
+ "type": "object"
49163
+ },
49164
+ "ModifyRaspMaxCpuResponse": {
49165
+ "document": "ModifyRaspMaxCpu返回参数结构体",
49166
+ "members": [
49167
+ {
49168
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
49169
+ "member": "string",
49170
+ "name": "RequestId",
49171
+ "type": "string"
49172
+ }
49173
+ ],
49174
+ "type": "object"
49175
+ },
49176
+ "ModifyRaspRulesRequest": {
49177
+ "document": "ModifyRaspRules请求参数结构体",
49178
+ "members": [
49179
+ {
49180
+ "disabled": false,
49181
+ "document": "规则ID(新增时请留空,编辑时候必传)",
49182
+ "example": "34",
49183
+ "member": "uint64",
49184
+ "name": "Id",
49185
+ "required": false,
49186
+ "type": "int"
49187
+ },
49188
+ {
49189
+ "disabled": false,
49190
+ "document": "漏洞id数组",
49191
+ "example": "2",
49192
+ "member": "uint64",
49193
+ "name": "VulVulsIDs",
49194
+ "required": false,
49195
+ "type": "list"
49196
+ },
49197
+ {
49198
+ "disabled": false,
49199
+ "document": "自定义请求范围加白正则表达式,选择全部请求范围时候为空,否则不能为空,base64编码",
49200
+ "example": "LiovdXNyL2Jpbi8=",
49201
+ "member": "string",
49202
+ "name": "URLRegexp",
49203
+ "required": false,
49204
+ "type": "string"
49205
+ },
49206
+ {
49207
+ "disabled": false,
49208
+ "document": "加白方式,0:自定义请求范围加白。1:全部请求加白",
49209
+ "example": "0",
49210
+ "member": "uint64",
49211
+ "name": "WhiteType",
49212
+ "required": false,
49213
+ "type": "int"
49214
+ }
49215
+ ],
49216
+ "type": "object"
49217
+ },
49218
+ "ModifyRaspRulesResponse": {
49219
+ "document": "ModifyRaspRules返回参数结构体",
49220
+ "members": [
49221
+ {
49222
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
49223
+ "member": "string",
49224
+ "name": "RequestId",
49225
+ "type": "string"
49226
+ }
49227
+ ],
49228
+ "type": "object"
49229
+ },
48895
49230
  "ModifyReverseShellRulesAggregationRequest": {
48896
49231
  "document": "ModifyReverseShellRulesAggregation请求参数结构体",
48897
49232
  "members": [
@@ -53150,6 +53485,158 @@
53150
53485
  ],
53151
53486
  "usage": "both"
53152
53487
  },
53488
+ "RaspRule": {
53489
+ "document": "rasp白名单规则",
53490
+ "members": [
53491
+ {
53492
+ "disabled": false,
53493
+ "document": "规则ID",
53494
+ "example": "222",
53495
+ "member": "uint64",
53496
+ "name": "Id",
53497
+ "output_required": true,
53498
+ "type": "int",
53499
+ "value_allowed_null": false
53500
+ },
53501
+ {
53502
+ "disabled": false,
53503
+ "document": "自定义请求url范围正则表达式,为空则保存不成功",
53504
+ "example": "regexp",
53505
+ "member": "string",
53506
+ "name": "URLRegexp",
53507
+ "output_required": true,
53508
+ "type": "string",
53509
+ "value_allowed_null": false
53510
+ },
53511
+ {
53512
+ "disabled": false,
53513
+ "document": "漏洞id",
53514
+ "example": "100",
53515
+ "member": "uint64",
53516
+ "name": "VulVulsID",
53517
+ "output_required": true,
53518
+ "type": "int",
53519
+ "value_allowed_null": false
53520
+ },
53521
+ {
53522
+ "disabled": false,
53523
+ "document": "漏洞名称",
53524
+ "example": "vulVulName",
53525
+ "member": "string",
53526
+ "name": "VulVulsName",
53527
+ "output_required": true,
53528
+ "type": "string",
53529
+ "value_allowed_null": false
53530
+ },
53531
+ {
53532
+ "disabled": false,
53533
+ "document": "cve_id",
53534
+ "example": "CVE-2015-7975",
53535
+ "member": "string",
53536
+ "name": "CveID",
53537
+ "output_required": false,
53538
+ "type": "string",
53539
+ "value_allowed_null": false
53540
+ },
53541
+ {
53542
+ "disabled": false,
53543
+ "document": "漏洞防御类型,从漏洞表富化, 1:支持组件漏洞防御,组件漏洞没有正则加白。2:支持正则防御",
53544
+ "example": "1",
53545
+ "member": "uint64",
53546
+ "name": "SupportDefense",
53547
+ "output_required": true,
53548
+ "type": "int",
53549
+ "value_allowed_null": false
53550
+ },
53551
+ {
53552
+ "disabled": false,
53553
+ "document": "加白范围,0:全部请求加白,1:自定义请求范围加白",
53554
+ "example": "1",
53555
+ "member": "uint64",
53556
+ "name": "WhiteType",
53557
+ "output_required": true,
53558
+ "type": "int",
53559
+ "value_allowed_null": false
53560
+ },
53561
+ {
53562
+ "disabled": false,
53563
+ "document": "状态 0: 有效",
53564
+ "example": "0",
53565
+ "member": "uint64",
53566
+ "name": "Status",
53567
+ "output_required": true,
53568
+ "type": "int",
53569
+ "value_allowed_null": false
53570
+ },
53571
+ {
53572
+ "disabled": false,
53573
+ "document": "创建时间",
53574
+ "example": "2020-01-08 09:15:00",
53575
+ "member": "string",
53576
+ "name": "CreateTime",
53577
+ "output_required": true,
53578
+ "type": "string",
53579
+ "value_allowed_null": false
53580
+ },
53581
+ {
53582
+ "disabled": false,
53583
+ "document": "修改时间",
53584
+ "example": "2020-01-08 09:15:00",
53585
+ "member": "string",
53586
+ "name": "ModifyTime",
53587
+ "output_required": true,
53588
+ "type": "string",
53589
+ "value_allowed_null": false
53590
+ }
53591
+ ],
53592
+ "usage": "out"
53593
+ },
53594
+ "RaspRuleVul": {
53595
+ "document": "rasp白名单漏洞列表",
53596
+ "members": [
53597
+ {
53598
+ "disabled": false,
53599
+ "document": "漏洞id",
53600
+ "example": "104845",
53601
+ "member": "uint64",
53602
+ "name": "VulVulsID",
53603
+ "output_required": true,
53604
+ "type": "int",
53605
+ "value_allowed_null": false
53606
+ },
53607
+ {
53608
+ "disabled": false,
53609
+ "document": "漏洞名称",
53610
+ "example": "JetBrains TeamCity 安全漏洞",
53611
+ "member": "string",
53612
+ "name": "VulVulsName",
53613
+ "output_required": true,
53614
+ "type": "string",
53615
+ "value_allowed_null": false
53616
+ },
53617
+ {
53618
+ "disabled": false,
53619
+ "document": "cve_id",
53620
+ "example": "CVE-2023-42793",
53621
+ "member": "string",
53622
+ "name": "CveID",
53623
+ "output_required": false,
53624
+ "type": "string",
53625
+ "value_allowed_null": false
53626
+ },
53627
+ {
53628
+ "disabled": false,
53629
+ "document": "漏洞防御类型,从漏洞表富化, 1:支持组件漏洞防御,组件漏洞没有正则加白。2:支持正则防御",
53630
+ "example": "1",
53631
+ "member": "uint64",
53632
+ "name": "SupportDefense",
53633
+ "output_required": true,
53634
+ "type": "int",
53635
+ "value_allowed_null": false
53636
+ }
53637
+ ],
53638
+ "usage": "out"
53639
+ },
53153
53640
  "RecordInfo": {
53154
53641
  "document": "客户端异常信息结构",
53155
53642
  "members": [
@@ -440,6 +440,14 @@
440
440
  "title": "示例"
441
441
  }
442
442
  ],
443
+ "DeleteRaspRules": [
444
+ {
445
+ "document": "删除漏洞防御白名单",
446
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRaspRules\n<公共请求参数>\n\n{\n \"IDs\": [\n 6,\n 7\n ]\n}",
447
+ "output": "{\n \"Response\": {\n \"RequestId\": \"97052fad-2402-49a2-86d8-7fb97c6c64af\"\n }\n}",
448
+ "title": "删除漏洞防御白名单"
449
+ }
450
+ ],
443
451
  "DeleteReverseShellEvents": [
444
452
  {
445
453
  "document": "删除反弹Shell事件",
@@ -2174,6 +2182,30 @@
2174
2182
  "title": "获取全网勒索态势"
2175
2183
  }
2176
2184
  ],
2185
+ "DescribeRaspMaxCpu": [
2186
+ {
2187
+ "document": "查询漏洞防御cpu配置",
2188
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspMaxCpu\n<公共请求参数>\n\n{}",
2189
+ "output": "{\n \"Response\": {\n \"RaspMaxCpu\": 100,\n \"RequestId\": \"e3f0687f-2874-4022-8af6-330dc4c3872b\"\n }\n}",
2190
+ "title": "查询漏洞防御cpu配置"
2191
+ }
2192
+ ],
2193
+ "DescribeRaspRuleVuls": [
2194
+ {
2195
+ "document": "获取漏洞防御白名单漏洞列表",
2196
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRuleVuls\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"WhiteType\",\n \"Values\": [\n \"0\"\n ]\n }\n ]\n}",
2197
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CveID\": \"CVE-2012-4453\",\n \"SupportDefense\": 2,\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\"\n }\n ],\n \"RequestId\": \"30738e90-7f04-4196-8872-84d27ba02c45\",\n \"TotalCount\": 1\n }\n}",
2198
+ "title": "获取漏洞防御白名单漏洞列表"
2199
+ }
2200
+ ],
2201
+ "DescribeRaspRules": [
2202
+ {
2203
+ "document": "查询漏洞防御白名单",
2204
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRules\n<公共请求参数>\n\n{}",
2205
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CreateTime\": \"2024-10-17 17:32:13\",\n \"CveID\": \"CVE-2012-4453\",\n \"Id\": 2,\n \"ModifyTime\": \"2024-10-17 17:32:13\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\",\n \"WhiteType\": 1\n },\n {\n \"CreateTime\": \"2024-10-17 17:32:13\",\n \"CveID\": \"CVE-2016-5003\",\n \"Id\": 3,\n \"ModifyTime\": \"2024-10-17 17:32:13\",\n \"Status\": 0,\n \"SupportDefense\": 1,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 18878,\n \"VulVulsName\": \"Apache Archiva Apache XML-RPC库安全漏洞(CVE-2016-5003)\",\n \"WhiteType\": 1\n },\n {\n \"CreateTime\": \"2024-10-17 17:28:05\",\n \"CveID\": \"CVE-2012-4453\",\n \"Id\": 1,\n \"ModifyTime\": \"2024-10-17 17:28:05\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"regexp\",\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\",\n \"WhiteType\": 0\n }\n ],\n \"RequestId\": \"2214a590-b84b-4a97-acdd-8de9331ccfc9\",\n \"TotalCount\": 3\n }\n}",
2206
+ "title": "查询漏洞防御白名单"
2207
+ }
2208
+ ],
2177
2209
  "DescribeRecommendedProtectCpu": [
2178
2210
  {
2179
2211
  "document": "",
@@ -3760,6 +3792,22 @@
3760
3792
  "title": "批量修改防勒索策略状态"
3761
3793
  }
3762
3794
  ],
3795
+ "ModifyRaspMaxCpu": [
3796
+ {
3797
+ "document": "设置漏洞防御cpu配置",
3798
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspMaxCpu\n<公共请求参数>\n\n{\n \"RaspMaxCpu\": 80\n}",
3799
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c65ee0af-cd41-4cba-bee4-8820a196bae0\"\n }\n}",
3800
+ "title": "设置漏洞防御cpu配置"
3801
+ }
3802
+ ],
3803
+ "ModifyRaspRules": [
3804
+ {
3805
+ "document": "添加漏洞防御白名单",
3806
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspRules\n<公共请求参数>\n\n{\n \"VulVulsIDs\": [\n 1,\n 18878\n ],\n \"WhiteType\": 1\n}",
3807
+ "output": "{\n \"Response\": {\n \"RequestId\": \"01d1e534-0292-4eac-9a95-746f0f6f60ad\"\n }\n}",
3808
+ "title": "添加漏洞防御白名单"
3809
+ }
3810
+ ],
3763
3811
  "ModifyReverseShellRulesAggregation": [
3764
3812
  {
3765
3813
  "document": "增加正则规则",
@@ -14677,7 +14677,7 @@
14677
14677
  },
14678
14678
  {
14679
14679
  "disabled": false,
14680
- "document": "模板的H5预览链接,有效期5分钟。\n可以通过浏览器打开此链接预览模板,或者嵌入到iframe中预览模板。\n注意:此字段可能返回 null,表示取不到有效值。",
14680
+ "document": "模板的 H5 预览链接,有效期为 5 分钟。\n您可以通过浏览器直接打开此链接预览模板,或将其嵌入到 iframe 中进行预览。\n\n注意:只有在请求接口时将 <b>WithPreviewUrl </b>参数设置为 true,才会生成预览链接。\n注意:此字段可能返回 null,表示取不到有效值。",
14681
14681
  "example": "https://embed.beta.qian.tencent.cn/document-url-preview?channel=PROXYCHANNEL&scene=SINGLEPAGE&code=yDSxNUUckptbbq64UEly7FaCkhsBlSLj&codeType=QUICK&businessType=TEMPLATE&businessId=yDSLVUUckpo3pub6UE5dPdv8pkDsrbEn&channel=PROXYCHANNEL",
14682
14682
  "member": "string",
14683
14683
  "name": "PreviewUrl",