tccli 3.0.1233.1__py2.py3-none-any.whl → 3.0.1235.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (41) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/cdb/v20170320/api.json +15 -15
  3. tccli/services/cls/v20201016/api.json +4 -4
  4. tccli/services/cwp/cwp_client.py +326 -8
  5. tccli/services/cwp/v20180228/api.json +488 -1
  6. tccli/services/cwp/v20180228/examples.json +48 -0
  7. tccli/services/ess/v20201111/api.json +1 -1
  8. tccli/services/essbasic/v20210526/api.json +11 -11
  9. tccli/services/faceid/v20180301/api.json +19 -0
  10. tccli/services/hunyuan/v20230901/api.json +12 -3
  11. tccli/services/iotexplorer/iotexplorer_client.py +106 -0
  12. tccli/services/iotexplorer/v20190423/api.json +173 -4
  13. tccli/services/iotexplorer/v20190423/examples.json +16 -0
  14. tccli/services/iotvideo/iotvideo_client.py +106 -0
  15. tccli/services/iotvideo/v20211125/api.json +169 -0
  16. tccli/services/iotvideo/v20211125/examples.json +16 -0
  17. tccli/services/ivld/v20210903/api.json +1 -1
  18. tccli/services/lighthouse/v20200324/api.json +59 -59
  19. tccli/services/lighthouse/v20200324/examples.json +4 -4
  20. tccli/services/lke/v20231130/api.json +2 -2
  21. tccli/services/memcached/v20190318/api.json +6 -6
  22. tccli/services/ocr/v20181119/api.json +5 -5
  23. tccli/services/ocr/v20181119/examples.json +7 -7
  24. tccli/services/privatedns/v20201028/api.json +8 -8
  25. tccli/services/smh/v20210712/api.json +7 -7
  26. tccli/services/smh/v20210712/examples.json +1 -1
  27. tccli/services/ssl/v20191205/api.json +46 -33
  28. tccli/services/ssl/v20191205/examples.json +15 -15
  29. tccli/services/tcbr/v20220217/api.json +71 -71
  30. tccli/services/tcbr/v20220217/examples.json +13 -31
  31. tccli/services/teo/v20220901/api.json +1 -1
  32. tccli/services/trocket/v20230308/api.json +19 -0
  33. tccli/services/tsf/v20180326/api.json +1577 -1408
  34. tccli/services/tsf/v20180326/examples.json +55 -61
  35. tccli/services/vpc/v20170312/api.json +9 -0
  36. tccli/services/wedata/v20210820/api.json +87 -0
  37. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/METADATA +2 -2
  38. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/RECORD +41 -41
  39. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/WHEEL +0 -0
  40. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/entry_points.txt +0 -0
  41. {tccli-3.0.1233.1.dist-info → tccli-3.0.1235.1.dist-info}/license_files/LICENSE +0 -0
@@ -385,6 +385,13 @@
385
385
  "output": "DeleteProtectDirResponse",
386
386
  "status": "online"
387
387
  },
388
+ "DeleteRaspRules": {
389
+ "document": "删除漏洞防御白名单",
390
+ "input": "DeleteRaspRulesRequest",
391
+ "name": "删除rasp白名单规则",
392
+ "output": "DeleteRaspRulesResponse",
393
+ "status": "online"
394
+ },
388
395
  "DeleteReverseShellEvents": {
389
396
  "document": "根据Ids删除反弹Shell事件",
390
397
  "input": "DeleteReverseShellEventsRequest",
@@ -1897,6 +1904,27 @@
1897
1904
  "output": "DescribeRansomDefenseTrendResponse",
1898
1905
  "status": "online"
1899
1906
  },
1907
+ "DescribeRaspMaxCpu": {
1908
+ "document": "查看漏洞防御最大cpu限制",
1909
+ "input": "DescribeRaspMaxCpuRequest",
1910
+ "name": "查询rasp最大cpu限制",
1911
+ "output": "DescribeRaspMaxCpuResponse",
1912
+ "status": "online"
1913
+ },
1914
+ "DescribeRaspRuleVuls": {
1915
+ "document": "获取漏洞防御白名单漏洞列表",
1916
+ "input": "DescribeRaspRuleVulsRequest",
1917
+ "name": "获取rasp白名单里的漏洞列表",
1918
+ "output": "DescribeRaspRuleVulsResponse",
1919
+ "status": "online"
1920
+ },
1921
+ "DescribeRaspRules": {
1922
+ "document": "查询漏洞防御白名单",
1923
+ "input": "DescribeRaspRulesRequest",
1924
+ "name": "获取rasp白名单列表",
1925
+ "output": "DescribeRaspRulesResponse",
1926
+ "status": "online"
1927
+ },
1900
1928
  "DescribeRecommendedProtectCpu": {
1901
1929
  "document": "查询推荐购买防护核数",
1902
1930
  "input": "DescribeRecommendedProtectCpuRequest",
@@ -3269,6 +3297,20 @@
3269
3297
  "output": "ModifyRansomDefenseStrategyStatusResponse",
3270
3298
  "status": "online"
3271
3299
  },
3300
+ "ModifyRaspMaxCpu": {
3301
+ "document": "编辑漏洞防御最大cpu配置",
3302
+ "input": "ModifyRaspMaxCpuRequest",
3303
+ "name": "编辑rasp最大cpu限制",
3304
+ "output": "ModifyRaspMaxCpuResponse",
3305
+ "status": "online"
3306
+ },
3307
+ "ModifyRaspRules": {
3308
+ "document": "添加漏洞防御白名单",
3309
+ "input": "ModifyRaspRulesRequest",
3310
+ "name": "编辑或者创建rasp白名单规则",
3311
+ "output": "ModifyRaspRulesResponse",
3312
+ "status": "online"
3313
+ },
3272
3314
  "ModifyReverseShellRulesAggregation": {
3273
3315
  "document": "编辑反弹Shell规则(支持多服务器选择)",
3274
3316
  "input": "ModifyReverseShellRulesAggregationRequest",
@@ -11698,7 +11740,7 @@
11698
11740
  },
11699
11741
  {
11700
11742
  "disabled": false,
11701
- "document": "自动生成的正则表达式",
11743
+ "document": "转义后的正则表达式",
11702
11744
  "example": "rm -rf /tmp/t*",
11703
11745
  "member": "string",
11704
11746
  "name": "RegexBashCmd",
@@ -11706,6 +11748,16 @@
11706
11748
  "type": "string",
11707
11749
  "value_allowed_null": false
11708
11750
  },
11751
+ {
11752
+ "disabled": false,
11753
+ "document": "转义后的正则表达式",
11754
+ "example": "/usr/sbin/tail",
11755
+ "member": "string",
11756
+ "name": "RegexExe",
11757
+ "output_required": false,
11758
+ "type": "string",
11759
+ "value_allowed_null": false
11760
+ },
11709
11761
  {
11710
11762
  "disabled": false,
11711
11763
  "document": "0:普通 1:专业版 2:旗舰版",
@@ -16276,6 +16328,33 @@
16276
16328
  ],
16277
16329
  "type": "object"
16278
16330
  },
16331
+ "DeleteRaspRulesRequest": {
16332
+ "document": "DeleteRaspRules请求参数结构体",
16333
+ "members": [
16334
+ {
16335
+ "disabled": false,
16336
+ "document": "待删除的规则ID数组 (最大100条)",
16337
+ "example": "[31]",
16338
+ "member": "uint64",
16339
+ "name": "IDs",
16340
+ "required": true,
16341
+ "type": "list"
16342
+ }
16343
+ ],
16344
+ "type": "object"
16345
+ },
16346
+ "DeleteRaspRulesResponse": {
16347
+ "document": "DeleteRaspRules返回参数结构体",
16348
+ "members": [
16349
+ {
16350
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
16351
+ "member": "string",
16352
+ "name": "RequestId",
16353
+ "type": "string"
16354
+ }
16355
+ ],
16356
+ "type": "object"
16357
+ },
16279
16358
  "DeleteReverseShellEventsRequest": {
16280
16359
  "document": "DeleteReverseShellEvents请求参数结构体",
16281
16360
  "members": [
@@ -31179,6 +31258,181 @@
31179
31258
  ],
31180
31259
  "type": "object"
31181
31260
  },
31261
+ "DescribeRaspMaxCpuRequest": {
31262
+ "document": "DescribeRaspMaxCpu请求参数结构体",
31263
+ "members": [],
31264
+ "type": "object"
31265
+ },
31266
+ "DescribeRaspMaxCpuResponse": {
31267
+ "document": "DescribeRaspMaxCpu返回参数结构体",
31268
+ "members": [
31269
+ {
31270
+ "disabled": false,
31271
+ "document": "rasp当前最大cpu限制,0<cpu<=100,默认100表示不限制",
31272
+ "example": "100",
31273
+ "member": "uint64",
31274
+ "name": "RaspMaxCpu",
31275
+ "output_required": true,
31276
+ "type": "int",
31277
+ "value_allowed_null": false
31278
+ },
31279
+ {
31280
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
31281
+ "member": "string",
31282
+ "name": "RequestId",
31283
+ "type": "string"
31284
+ }
31285
+ ],
31286
+ "type": "object"
31287
+ },
31288
+ "DescribeRaspRuleVulsRequest": {
31289
+ "document": "DescribeRaspRuleVuls请求参数结构体",
31290
+ "members": [
31291
+ {
31292
+ "disabled": false,
31293
+ "document": "过滤条件。Name=WhiteType的必选,0:表示自定义范围的漏洞列表,1:表示全部请求范围的列表",
31294
+ "example": "[{\"Name\":\"WhiteType\",\"Values\":[\"0\"]}]",
31295
+ "member": "Filter",
31296
+ "name": "Filters",
31297
+ "required": true,
31298
+ "type": "list"
31299
+ },
31300
+ {
31301
+ "disabled": false,
31302
+ "document": "返回数量,默认为10,最大值为1000。",
31303
+ "example": "10",
31304
+ "member": "uint64",
31305
+ "name": "Limit",
31306
+ "required": false,
31307
+ "type": "int"
31308
+ },
31309
+ {
31310
+ "disabled": false,
31311
+ "document": "偏移量,默认为0。",
31312
+ "example": "0",
31313
+ "member": "uint64",
31314
+ "name": "Offset",
31315
+ "required": false,
31316
+ "type": "int"
31317
+ }
31318
+ ],
31319
+ "type": "object"
31320
+ },
31321
+ "DescribeRaspRuleVulsResponse": {
31322
+ "document": "DescribeRaspRuleVuls返回参数结构体",
31323
+ "members": [
31324
+ {
31325
+ "disabled": false,
31326
+ "document": "列表内容",
31327
+ "example": "[ \t\t\t{ \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\" \t\t\t} \t\t]",
31328
+ "member": "RaspRuleVul",
31329
+ "name": "List",
31330
+ "output_required": true,
31331
+ "type": "list",
31332
+ "value_allowed_null": false
31333
+ },
31334
+ {
31335
+ "disabled": false,
31336
+ "document": "总条数",
31337
+ "example": "1",
31338
+ "member": "uint64",
31339
+ "name": "TotalCount",
31340
+ "output_required": true,
31341
+ "type": "int",
31342
+ "value_allowed_null": false
31343
+ },
31344
+ {
31345
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
31346
+ "member": "string",
31347
+ "name": "RequestId",
31348
+ "type": "string"
31349
+ }
31350
+ ],
31351
+ "type": "object"
31352
+ },
31353
+ "DescribeRaspRulesRequest": {
31354
+ "document": "DescribeRaspRules请求参数结构体",
31355
+ "members": [
31356
+ {
31357
+ "disabled": false,
31358
+ "document": "返回数量,默认为10,最大值为100。",
31359
+ "example": "10",
31360
+ "member": "uint64",
31361
+ "name": "Limit",
31362
+ "required": false,
31363
+ "type": "int"
31364
+ },
31365
+ {
31366
+ "disabled": false,
31367
+ "document": "偏移量,默认为0。",
31368
+ "example": "0",
31369
+ "member": "uint64",
31370
+ "name": "Offset",
31371
+ "required": false,
31372
+ "type": "int"
31373
+ },
31374
+ {
31375
+ "disabled": false,
31376
+ "document": "过滤条件。\n<li>Keywords - String - 是否必填:否 - 关键字(进程名称)</li>",
31377
+ "example": "[{\"Name\":\"Keywords\",\"Values\":[\"加白内容\"]}]",
31378
+ "member": "Filter",
31379
+ "name": "Filters",
31380
+ "required": false,
31381
+ "type": "list"
31382
+ },
31383
+ {
31384
+ "disabled": false,
31385
+ "document": "排序字段,目前有:CreateTime、ModifyTime,默认按照ModifyTime排序",
31386
+ "example": "ModifyTime",
31387
+ "member": "string",
31388
+ "name": "By",
31389
+ "required": false,
31390
+ "type": "string"
31391
+ },
31392
+ {
31393
+ "disabled": false,
31394
+ "document": "排序升序还是倒序,DESC有ASC、",
31395
+ "example": "ASC",
31396
+ "member": "string",
31397
+ "name": "Order",
31398
+ "required": false,
31399
+ "type": "string"
31400
+ }
31401
+ ],
31402
+ "type": "object"
31403
+ },
31404
+ "DescribeRaspRulesResponse": {
31405
+ "document": "DescribeRaspRules返回参数结构体",
31406
+ "members": [
31407
+ {
31408
+ "disabled": false,
31409
+ "document": "列表内容",
31410
+ "example": "[ \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"Id\": 2, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"URLRegexp\": \"\", \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\", \t\t\t\t\"WhiteType\": 1 \t\t\t}, \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"CveID\": \"CVE-2016-5003\", \t\t\t\t\"Id\": 3, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 1, \t\t\t\t\"URLRegexp\": \"\", \t\t\t\t\"VulVulsID\": 18878, \t\t\t\t\"VulVulsName\": \"Apache Archiva Apache XML-RPC库安全漏洞(CVE-2016-5003)\", \t\t\t\t\"WhiteType\": 1 \t\t\t}, \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:28:05\", \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"Id\": 1, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:28:05\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"URLRegexp\": \"abc\", \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\", \t\t\t\t\"WhiteType\": 0 \t\t\t} \t\t]",
31411
+ "member": "RaspRule",
31412
+ "name": "List",
31413
+ "output_required": true,
31414
+ "type": "list",
31415
+ "value_allowed_null": false
31416
+ },
31417
+ {
31418
+ "disabled": false,
31419
+ "document": "总条数",
31420
+ "example": "3",
31421
+ "member": "uint64",
31422
+ "name": "TotalCount",
31423
+ "output_required": true,
31424
+ "type": "int",
31425
+ "value_allowed_null": false
31426
+ },
31427
+ {
31428
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
31429
+ "member": "string",
31430
+ "name": "RequestId",
31431
+ "type": "string"
31432
+ }
31433
+ ],
31434
+ "type": "object"
31435
+ },
31182
31436
  "DescribeRecommendedProtectCpuRequest": {
31183
31437
  "document": "DescribeRecommendedProtectCpu请求参数结构体",
31184
31438
  "members": [],
@@ -48892,6 +49146,87 @@
48892
49146
  ],
48893
49147
  "type": "object"
48894
49148
  },
49149
+ "ModifyRaspMaxCpuRequest": {
49150
+ "document": "ModifyRaspMaxCpu请求参数结构体",
49151
+ "members": [
49152
+ {
49153
+ "disabled": false,
49154
+ "document": "rasp当前最大cpu限制,0<cpu<=100,默认100表示不限制",
49155
+ "example": "80",
49156
+ "member": "uint64",
49157
+ "name": "RaspMaxCpu",
49158
+ "required": false,
49159
+ "type": "int"
49160
+ }
49161
+ ],
49162
+ "type": "object"
49163
+ },
49164
+ "ModifyRaspMaxCpuResponse": {
49165
+ "document": "ModifyRaspMaxCpu返回参数结构体",
49166
+ "members": [
49167
+ {
49168
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
49169
+ "member": "string",
49170
+ "name": "RequestId",
49171
+ "type": "string"
49172
+ }
49173
+ ],
49174
+ "type": "object"
49175
+ },
49176
+ "ModifyRaspRulesRequest": {
49177
+ "document": "ModifyRaspRules请求参数结构体",
49178
+ "members": [
49179
+ {
49180
+ "disabled": false,
49181
+ "document": "规则ID(新增时请留空,编辑时候必传)",
49182
+ "example": "34",
49183
+ "member": "uint64",
49184
+ "name": "Id",
49185
+ "required": false,
49186
+ "type": "int"
49187
+ },
49188
+ {
49189
+ "disabled": false,
49190
+ "document": "漏洞id数组",
49191
+ "example": "2",
49192
+ "member": "uint64",
49193
+ "name": "VulVulsIDs",
49194
+ "required": false,
49195
+ "type": "list"
49196
+ },
49197
+ {
49198
+ "disabled": false,
49199
+ "document": "自定义请求范围加白正则表达式,选择全部请求范围时候为空,否则不能为空,base64编码",
49200
+ "example": "LiovdXNyL2Jpbi8=",
49201
+ "member": "string",
49202
+ "name": "URLRegexp",
49203
+ "required": false,
49204
+ "type": "string"
49205
+ },
49206
+ {
49207
+ "disabled": false,
49208
+ "document": "加白方式,0:自定义请求范围加白。1:全部请求加白",
49209
+ "example": "0",
49210
+ "member": "uint64",
49211
+ "name": "WhiteType",
49212
+ "required": false,
49213
+ "type": "int"
49214
+ }
49215
+ ],
49216
+ "type": "object"
49217
+ },
49218
+ "ModifyRaspRulesResponse": {
49219
+ "document": "ModifyRaspRules返回参数结构体",
49220
+ "members": [
49221
+ {
49222
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
49223
+ "member": "string",
49224
+ "name": "RequestId",
49225
+ "type": "string"
49226
+ }
49227
+ ],
49228
+ "type": "object"
49229
+ },
48895
49230
  "ModifyReverseShellRulesAggregationRequest": {
48896
49231
  "document": "ModifyReverseShellRulesAggregation请求参数结构体",
48897
49232
  "members": [
@@ -53150,6 +53485,158 @@
53150
53485
  ],
53151
53486
  "usage": "both"
53152
53487
  },
53488
+ "RaspRule": {
53489
+ "document": "rasp白名单规则",
53490
+ "members": [
53491
+ {
53492
+ "disabled": false,
53493
+ "document": "规则ID",
53494
+ "example": "222",
53495
+ "member": "uint64",
53496
+ "name": "Id",
53497
+ "output_required": true,
53498
+ "type": "int",
53499
+ "value_allowed_null": false
53500
+ },
53501
+ {
53502
+ "disabled": false,
53503
+ "document": "自定义请求url范围正则表达式,为空则保存不成功",
53504
+ "example": "regexp",
53505
+ "member": "string",
53506
+ "name": "URLRegexp",
53507
+ "output_required": true,
53508
+ "type": "string",
53509
+ "value_allowed_null": false
53510
+ },
53511
+ {
53512
+ "disabled": false,
53513
+ "document": "漏洞id",
53514
+ "example": "100",
53515
+ "member": "uint64",
53516
+ "name": "VulVulsID",
53517
+ "output_required": true,
53518
+ "type": "int",
53519
+ "value_allowed_null": false
53520
+ },
53521
+ {
53522
+ "disabled": false,
53523
+ "document": "漏洞名称",
53524
+ "example": "vulVulName",
53525
+ "member": "string",
53526
+ "name": "VulVulsName",
53527
+ "output_required": true,
53528
+ "type": "string",
53529
+ "value_allowed_null": false
53530
+ },
53531
+ {
53532
+ "disabled": false,
53533
+ "document": "cve_id",
53534
+ "example": "CVE-2015-7975",
53535
+ "member": "string",
53536
+ "name": "CveID",
53537
+ "output_required": false,
53538
+ "type": "string",
53539
+ "value_allowed_null": false
53540
+ },
53541
+ {
53542
+ "disabled": false,
53543
+ "document": "漏洞防御类型,从漏洞表富化, 1:支持组件漏洞防御,组件漏洞没有正则加白。2:支持正则防御",
53544
+ "example": "1",
53545
+ "member": "uint64",
53546
+ "name": "SupportDefense",
53547
+ "output_required": true,
53548
+ "type": "int",
53549
+ "value_allowed_null": false
53550
+ },
53551
+ {
53552
+ "disabled": false,
53553
+ "document": "加白范围,0:全部请求加白,1:自定义请求范围加白",
53554
+ "example": "1",
53555
+ "member": "uint64",
53556
+ "name": "WhiteType",
53557
+ "output_required": true,
53558
+ "type": "int",
53559
+ "value_allowed_null": false
53560
+ },
53561
+ {
53562
+ "disabled": false,
53563
+ "document": "状态 0: 有效",
53564
+ "example": "0",
53565
+ "member": "uint64",
53566
+ "name": "Status",
53567
+ "output_required": true,
53568
+ "type": "int",
53569
+ "value_allowed_null": false
53570
+ },
53571
+ {
53572
+ "disabled": false,
53573
+ "document": "创建时间",
53574
+ "example": "2020-01-08 09:15:00",
53575
+ "member": "string",
53576
+ "name": "CreateTime",
53577
+ "output_required": true,
53578
+ "type": "string",
53579
+ "value_allowed_null": false
53580
+ },
53581
+ {
53582
+ "disabled": false,
53583
+ "document": "修改时间",
53584
+ "example": "2020-01-08 09:15:00",
53585
+ "member": "string",
53586
+ "name": "ModifyTime",
53587
+ "output_required": true,
53588
+ "type": "string",
53589
+ "value_allowed_null": false
53590
+ }
53591
+ ],
53592
+ "usage": "out"
53593
+ },
53594
+ "RaspRuleVul": {
53595
+ "document": "rasp白名单漏洞列表",
53596
+ "members": [
53597
+ {
53598
+ "disabled": false,
53599
+ "document": "漏洞id",
53600
+ "example": "104845",
53601
+ "member": "uint64",
53602
+ "name": "VulVulsID",
53603
+ "output_required": true,
53604
+ "type": "int",
53605
+ "value_allowed_null": false
53606
+ },
53607
+ {
53608
+ "disabled": false,
53609
+ "document": "漏洞名称",
53610
+ "example": "JetBrains TeamCity 安全漏洞",
53611
+ "member": "string",
53612
+ "name": "VulVulsName",
53613
+ "output_required": true,
53614
+ "type": "string",
53615
+ "value_allowed_null": false
53616
+ },
53617
+ {
53618
+ "disabled": false,
53619
+ "document": "cve_id",
53620
+ "example": "CVE-2023-42793",
53621
+ "member": "string",
53622
+ "name": "CveID",
53623
+ "output_required": false,
53624
+ "type": "string",
53625
+ "value_allowed_null": false
53626
+ },
53627
+ {
53628
+ "disabled": false,
53629
+ "document": "漏洞防御类型,从漏洞表富化, 1:支持组件漏洞防御,组件漏洞没有正则加白。2:支持正则防御",
53630
+ "example": "1",
53631
+ "member": "uint64",
53632
+ "name": "SupportDefense",
53633
+ "output_required": true,
53634
+ "type": "int",
53635
+ "value_allowed_null": false
53636
+ }
53637
+ ],
53638
+ "usage": "out"
53639
+ },
53153
53640
  "RecordInfo": {
53154
53641
  "document": "客户端异常信息结构",
53155
53642
  "members": [
@@ -440,6 +440,14 @@
440
440
  "title": "示例"
441
441
  }
442
442
  ],
443
+ "DeleteRaspRules": [
444
+ {
445
+ "document": "删除漏洞防御白名单",
446
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRaspRules\n<公共请求参数>\n\n{\n \"IDs\": [\n 6,\n 7\n ]\n}",
447
+ "output": "{\n \"Response\": {\n \"RequestId\": \"97052fad-2402-49a2-86d8-7fb97c6c64af\"\n }\n}",
448
+ "title": "删除漏洞防御白名单"
449
+ }
450
+ ],
443
451
  "DeleteReverseShellEvents": [
444
452
  {
445
453
  "document": "删除反弹Shell事件",
@@ -2174,6 +2182,30 @@
2174
2182
  "title": "获取全网勒索态势"
2175
2183
  }
2176
2184
  ],
2185
+ "DescribeRaspMaxCpu": [
2186
+ {
2187
+ "document": "查询漏洞防御cpu配置",
2188
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspMaxCpu\n<公共请求参数>\n\n{}",
2189
+ "output": "{\n \"Response\": {\n \"RaspMaxCpu\": 100,\n \"RequestId\": \"e3f0687f-2874-4022-8af6-330dc4c3872b\"\n }\n}",
2190
+ "title": "查询漏洞防御cpu配置"
2191
+ }
2192
+ ],
2193
+ "DescribeRaspRuleVuls": [
2194
+ {
2195
+ "document": "获取漏洞防御白名单漏洞列表",
2196
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRuleVuls\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"WhiteType\",\n \"Values\": [\n \"0\"\n ]\n }\n ]\n}",
2197
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CveID\": \"CVE-2012-4453\",\n \"SupportDefense\": 2,\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\"\n }\n ],\n \"RequestId\": \"30738e90-7f04-4196-8872-84d27ba02c45\",\n \"TotalCount\": 1\n }\n}",
2198
+ "title": "获取漏洞防御白名单漏洞列表"
2199
+ }
2200
+ ],
2201
+ "DescribeRaspRules": [
2202
+ {
2203
+ "document": "查询漏洞防御白名单",
2204
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRules\n<公共请求参数>\n\n{}",
2205
+ "output": "{\n \"Response\": {\n \"List\": [\n {\n \"CreateTime\": \"2024-10-17 17:32:13\",\n \"CveID\": \"CVE-2012-4453\",\n \"Id\": 2,\n \"ModifyTime\": \"2024-10-17 17:32:13\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\",\n \"WhiteType\": 1\n },\n {\n \"CreateTime\": \"2024-10-17 17:32:13\",\n \"CveID\": \"CVE-2016-5003\",\n \"Id\": 3,\n \"ModifyTime\": \"2024-10-17 17:32:13\",\n \"Status\": 0,\n \"SupportDefense\": 1,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 18878,\n \"VulVulsName\": \"Apache Archiva Apache XML-RPC库安全漏洞(CVE-2016-5003)\",\n \"WhiteType\": 1\n },\n {\n \"CreateTime\": \"2024-10-17 17:28:05\",\n \"CveID\": \"CVE-2012-4453\",\n \"Id\": 1,\n \"ModifyTime\": \"2024-10-17 17:28:05\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"regexp\",\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\",\n \"WhiteType\": 0\n }\n ],\n \"RequestId\": \"2214a590-b84b-4a97-acdd-8de9331ccfc9\",\n \"TotalCount\": 3\n }\n}",
2206
+ "title": "查询漏洞防御白名单"
2207
+ }
2208
+ ],
2177
2209
  "DescribeRecommendedProtectCpu": [
2178
2210
  {
2179
2211
  "document": "",
@@ -3760,6 +3792,22 @@
3760
3792
  "title": "批量修改防勒索策略状态"
3761
3793
  }
3762
3794
  ],
3795
+ "ModifyRaspMaxCpu": [
3796
+ {
3797
+ "document": "设置漏洞防御cpu配置",
3798
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspMaxCpu\n<公共请求参数>\n\n{\n \"RaspMaxCpu\": 80\n}",
3799
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c65ee0af-cd41-4cba-bee4-8820a196bae0\"\n }\n}",
3800
+ "title": "设置漏洞防御cpu配置"
3801
+ }
3802
+ ],
3803
+ "ModifyRaspRules": [
3804
+ {
3805
+ "document": "添加漏洞防御白名单",
3806
+ "input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspRules\n<公共请求参数>\n\n{\n \"VulVulsIDs\": [\n 1,\n 18878\n ],\n \"WhiteType\": 1\n}",
3807
+ "output": "{\n \"Response\": {\n \"RequestId\": \"01d1e534-0292-4eac-9a95-746f0f6f60ad\"\n }\n}",
3808
+ "title": "添加漏洞防御白名单"
3809
+ }
3810
+ ],
3763
3811
  "ModifyReverseShellRulesAggregation": [
3764
3812
  {
3765
3813
  "document": "增加正则规则",
@@ -14677,7 +14677,7 @@
14677
14677
  },
14678
14678
  {
14679
14679
  "disabled": false,
14680
- "document": "模板的H5预览链接,有效期5分钟。\n可以通过浏览器打开此链接预览模板,或者嵌入到iframe中预览模板。\n注意:此字段可能返回 null,表示取不到有效值。",
14680
+ "document": "模板的 H5 预览链接,有效期为 5 分钟。\n您可以通过浏览器直接打开此链接预览模板,或将其嵌入到 iframe 中进行预览。\n\n注意:只有在请求接口时将 <b>WithPreviewUrl </b>参数设置为 true,才会生成预览链接。\n注意:此字段可能返回 null,表示取不到有效值。",
14681
14681
  "example": "https://embed.beta.qian.tencent.cn/document-url-preview?channel=PROXYCHANNEL&scene=SINGLEPAGE&code=yDSxNUUckptbbq64UEly7FaCkhsBlSLj&codeType=QUICK&businessType=TEMPLATE&businessId=yDSLVUUckpo3pub6UE5dPdv8pkDsrbEn&channel=PROXYCHANNEL",
14682
14682
  "member": "string",
14683
14683
  "name": "PreviewUrl",