tccli 3.0.1234.1__py2.py3-none-any.whl → 3.0.1236.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/services/cdb/v20170320/api.json +15 -15
- tccli/services/cls/v20201016/api.json +4 -4
- tccli/services/cwp/cwp_client.py +326 -8
- tccli/services/cwp/v20180228/api.json +488 -1
- tccli/services/cwp/v20180228/examples.json +48 -0
- tccli/services/essbasic/v20210526/api.json +10 -0
- tccli/services/faceid/v20180301/api.json +19 -0
- tccli/services/hunyuan/v20230901/api.json +12 -3
- tccli/services/iotexplorer/iotexplorer_client.py +159 -0
- tccli/services/iotexplorer/v20190423/api.json +298 -4
- tccli/services/iotexplorer/v20190423/examples.json +30 -0
- tccli/services/iotvideo/iotvideo_client.py +106 -0
- tccli/services/iotvideo/v20211125/api.json +169 -0
- tccli/services/iotvideo/v20211125/examples.json +16 -0
- tccli/services/ocr/v20181119/api.json +5 -5
- tccli/services/ocr/v20181119/examples.json +7 -7
- tccli/services/privatedns/v20201028/api.json +8 -8
- tccli/services/smh/v20210712/api.json +7 -7
- tccli/services/smh/v20210712/examples.json +1 -1
- tccli/services/sms/v20210111/api.json +1 -1
- tccli/services/ssl/v20191205/api.json +46 -33
- tccli/services/ssl/v20191205/examples.json +13 -13
- tccli/services/tcbr/v20220217/api.json +71 -71
- tccli/services/tcbr/v20220217/examples.json +13 -31
- tccli/services/teo/v20220901/api.json +1 -1
- tccli/services/trocket/v20230308/api.json +19 -0
- tccli/services/tsf/v20180326/api.json +1577 -1408
- tccli/services/tsf/v20180326/examples.json +55 -61
- tccli/services/vrs/v20200824/api.json +68 -6
- tccli/services/vrs/v20200824/examples.json +8 -0
- tccli/services/vrs/vrs_client.py +53 -0
- tccli/services/wedata/v20210820/api.json +76 -0
- {tccli-3.0.1234.1.dist-info → tccli-3.0.1236.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1234.1.dist-info → tccli-3.0.1236.1.dist-info}/RECORD +38 -38
- {tccli-3.0.1234.1.dist-info → tccli-3.0.1236.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1234.1.dist-info → tccli-3.0.1236.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1234.1.dist-info → tccli-3.0.1236.1.dist-info}/license_files/LICENSE +0 -0
@@ -385,6 +385,13 @@
|
|
385
385
|
"output": "DeleteProtectDirResponse",
|
386
386
|
"status": "online"
|
387
387
|
},
|
388
|
+
"DeleteRaspRules": {
|
389
|
+
"document": "删除漏洞防御白名单",
|
390
|
+
"input": "DeleteRaspRulesRequest",
|
391
|
+
"name": "删除rasp白名单规则",
|
392
|
+
"output": "DeleteRaspRulesResponse",
|
393
|
+
"status": "online"
|
394
|
+
},
|
388
395
|
"DeleteReverseShellEvents": {
|
389
396
|
"document": "根据Ids删除反弹Shell事件",
|
390
397
|
"input": "DeleteReverseShellEventsRequest",
|
@@ -1897,6 +1904,27 @@
|
|
1897
1904
|
"output": "DescribeRansomDefenseTrendResponse",
|
1898
1905
|
"status": "online"
|
1899
1906
|
},
|
1907
|
+
"DescribeRaspMaxCpu": {
|
1908
|
+
"document": "查看漏洞防御最大cpu限制",
|
1909
|
+
"input": "DescribeRaspMaxCpuRequest",
|
1910
|
+
"name": "查询rasp最大cpu限制",
|
1911
|
+
"output": "DescribeRaspMaxCpuResponse",
|
1912
|
+
"status": "online"
|
1913
|
+
},
|
1914
|
+
"DescribeRaspRuleVuls": {
|
1915
|
+
"document": "获取漏洞防御白名单漏洞列表",
|
1916
|
+
"input": "DescribeRaspRuleVulsRequest",
|
1917
|
+
"name": "获取rasp白名单里的漏洞列表",
|
1918
|
+
"output": "DescribeRaspRuleVulsResponse",
|
1919
|
+
"status": "online"
|
1920
|
+
},
|
1921
|
+
"DescribeRaspRules": {
|
1922
|
+
"document": "查询漏洞防御白名单",
|
1923
|
+
"input": "DescribeRaspRulesRequest",
|
1924
|
+
"name": "获取rasp白名单列表",
|
1925
|
+
"output": "DescribeRaspRulesResponse",
|
1926
|
+
"status": "online"
|
1927
|
+
},
|
1900
1928
|
"DescribeRecommendedProtectCpu": {
|
1901
1929
|
"document": "查询推荐购买防护核数",
|
1902
1930
|
"input": "DescribeRecommendedProtectCpuRequest",
|
@@ -3269,6 +3297,20 @@
|
|
3269
3297
|
"output": "ModifyRansomDefenseStrategyStatusResponse",
|
3270
3298
|
"status": "online"
|
3271
3299
|
},
|
3300
|
+
"ModifyRaspMaxCpu": {
|
3301
|
+
"document": "编辑漏洞防御最大cpu配置",
|
3302
|
+
"input": "ModifyRaspMaxCpuRequest",
|
3303
|
+
"name": "编辑rasp最大cpu限制",
|
3304
|
+
"output": "ModifyRaspMaxCpuResponse",
|
3305
|
+
"status": "online"
|
3306
|
+
},
|
3307
|
+
"ModifyRaspRules": {
|
3308
|
+
"document": "添加漏洞防御白名单",
|
3309
|
+
"input": "ModifyRaspRulesRequest",
|
3310
|
+
"name": "编辑或者创建rasp白名单规则",
|
3311
|
+
"output": "ModifyRaspRulesResponse",
|
3312
|
+
"status": "online"
|
3313
|
+
},
|
3272
3314
|
"ModifyReverseShellRulesAggregation": {
|
3273
3315
|
"document": "编辑反弹Shell规则(支持多服务器选择)",
|
3274
3316
|
"input": "ModifyReverseShellRulesAggregationRequest",
|
@@ -11698,7 +11740,7 @@
|
|
11698
11740
|
},
|
11699
11741
|
{
|
11700
11742
|
"disabled": false,
|
11701
|
-
"document": "
|
11743
|
+
"document": "转义后的正则表达式",
|
11702
11744
|
"example": "rm -rf /tmp/t*",
|
11703
11745
|
"member": "string",
|
11704
11746
|
"name": "RegexBashCmd",
|
@@ -11706,6 +11748,16 @@
|
|
11706
11748
|
"type": "string",
|
11707
11749
|
"value_allowed_null": false
|
11708
11750
|
},
|
11751
|
+
{
|
11752
|
+
"disabled": false,
|
11753
|
+
"document": "转义后的正则表达式",
|
11754
|
+
"example": "/usr/sbin/tail",
|
11755
|
+
"member": "string",
|
11756
|
+
"name": "RegexExe",
|
11757
|
+
"output_required": false,
|
11758
|
+
"type": "string",
|
11759
|
+
"value_allowed_null": false
|
11760
|
+
},
|
11709
11761
|
{
|
11710
11762
|
"disabled": false,
|
11711
11763
|
"document": "0:普通 1:专业版 2:旗舰版",
|
@@ -16276,6 +16328,33 @@
|
|
16276
16328
|
],
|
16277
16329
|
"type": "object"
|
16278
16330
|
},
|
16331
|
+
"DeleteRaspRulesRequest": {
|
16332
|
+
"document": "DeleteRaspRules请求参数结构体",
|
16333
|
+
"members": [
|
16334
|
+
{
|
16335
|
+
"disabled": false,
|
16336
|
+
"document": "待删除的规则ID数组 (最大100条)",
|
16337
|
+
"example": "[31]",
|
16338
|
+
"member": "uint64",
|
16339
|
+
"name": "IDs",
|
16340
|
+
"required": true,
|
16341
|
+
"type": "list"
|
16342
|
+
}
|
16343
|
+
],
|
16344
|
+
"type": "object"
|
16345
|
+
},
|
16346
|
+
"DeleteRaspRulesResponse": {
|
16347
|
+
"document": "DeleteRaspRules返回参数结构体",
|
16348
|
+
"members": [
|
16349
|
+
{
|
16350
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
16351
|
+
"member": "string",
|
16352
|
+
"name": "RequestId",
|
16353
|
+
"type": "string"
|
16354
|
+
}
|
16355
|
+
],
|
16356
|
+
"type": "object"
|
16357
|
+
},
|
16279
16358
|
"DeleteReverseShellEventsRequest": {
|
16280
16359
|
"document": "DeleteReverseShellEvents请求参数结构体",
|
16281
16360
|
"members": [
|
@@ -31179,6 +31258,181 @@
|
|
31179
31258
|
],
|
31180
31259
|
"type": "object"
|
31181
31260
|
},
|
31261
|
+
"DescribeRaspMaxCpuRequest": {
|
31262
|
+
"document": "DescribeRaspMaxCpu请求参数结构体",
|
31263
|
+
"members": [],
|
31264
|
+
"type": "object"
|
31265
|
+
},
|
31266
|
+
"DescribeRaspMaxCpuResponse": {
|
31267
|
+
"document": "DescribeRaspMaxCpu返回参数结构体",
|
31268
|
+
"members": [
|
31269
|
+
{
|
31270
|
+
"disabled": false,
|
31271
|
+
"document": "rasp当前最大cpu限制,0<cpu<=100,默认100表示不限制",
|
31272
|
+
"example": "100",
|
31273
|
+
"member": "uint64",
|
31274
|
+
"name": "RaspMaxCpu",
|
31275
|
+
"output_required": true,
|
31276
|
+
"type": "int",
|
31277
|
+
"value_allowed_null": false
|
31278
|
+
},
|
31279
|
+
{
|
31280
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
31281
|
+
"member": "string",
|
31282
|
+
"name": "RequestId",
|
31283
|
+
"type": "string"
|
31284
|
+
}
|
31285
|
+
],
|
31286
|
+
"type": "object"
|
31287
|
+
},
|
31288
|
+
"DescribeRaspRuleVulsRequest": {
|
31289
|
+
"document": "DescribeRaspRuleVuls请求参数结构体",
|
31290
|
+
"members": [
|
31291
|
+
{
|
31292
|
+
"disabled": false,
|
31293
|
+
"document": "过滤条件。Name=WhiteType的必选,0:表示自定义范围的漏洞列表,1:表示全部请求范围的列表",
|
31294
|
+
"example": "[{\"Name\":\"WhiteType\",\"Values\":[\"0\"]}]",
|
31295
|
+
"member": "Filter",
|
31296
|
+
"name": "Filters",
|
31297
|
+
"required": true,
|
31298
|
+
"type": "list"
|
31299
|
+
},
|
31300
|
+
{
|
31301
|
+
"disabled": false,
|
31302
|
+
"document": "返回数量,默认为10,最大值为1000。",
|
31303
|
+
"example": "10",
|
31304
|
+
"member": "uint64",
|
31305
|
+
"name": "Limit",
|
31306
|
+
"required": false,
|
31307
|
+
"type": "int"
|
31308
|
+
},
|
31309
|
+
{
|
31310
|
+
"disabled": false,
|
31311
|
+
"document": "偏移量,默认为0。",
|
31312
|
+
"example": "0",
|
31313
|
+
"member": "uint64",
|
31314
|
+
"name": "Offset",
|
31315
|
+
"required": false,
|
31316
|
+
"type": "int"
|
31317
|
+
}
|
31318
|
+
],
|
31319
|
+
"type": "object"
|
31320
|
+
},
|
31321
|
+
"DescribeRaspRuleVulsResponse": {
|
31322
|
+
"document": "DescribeRaspRuleVuls返回参数结构体",
|
31323
|
+
"members": [
|
31324
|
+
{
|
31325
|
+
"disabled": false,
|
31326
|
+
"document": "列表内容",
|
31327
|
+
"example": "[ \t\t\t{ \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\" \t\t\t} \t\t]",
|
31328
|
+
"member": "RaspRuleVul",
|
31329
|
+
"name": "List",
|
31330
|
+
"output_required": true,
|
31331
|
+
"type": "list",
|
31332
|
+
"value_allowed_null": false
|
31333
|
+
},
|
31334
|
+
{
|
31335
|
+
"disabled": false,
|
31336
|
+
"document": "总条数",
|
31337
|
+
"example": "1",
|
31338
|
+
"member": "uint64",
|
31339
|
+
"name": "TotalCount",
|
31340
|
+
"output_required": true,
|
31341
|
+
"type": "int",
|
31342
|
+
"value_allowed_null": false
|
31343
|
+
},
|
31344
|
+
{
|
31345
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
31346
|
+
"member": "string",
|
31347
|
+
"name": "RequestId",
|
31348
|
+
"type": "string"
|
31349
|
+
}
|
31350
|
+
],
|
31351
|
+
"type": "object"
|
31352
|
+
},
|
31353
|
+
"DescribeRaspRulesRequest": {
|
31354
|
+
"document": "DescribeRaspRules请求参数结构体",
|
31355
|
+
"members": [
|
31356
|
+
{
|
31357
|
+
"disabled": false,
|
31358
|
+
"document": "返回数量,默认为10,最大值为100。",
|
31359
|
+
"example": "10",
|
31360
|
+
"member": "uint64",
|
31361
|
+
"name": "Limit",
|
31362
|
+
"required": false,
|
31363
|
+
"type": "int"
|
31364
|
+
},
|
31365
|
+
{
|
31366
|
+
"disabled": false,
|
31367
|
+
"document": "偏移量,默认为0。",
|
31368
|
+
"example": "0",
|
31369
|
+
"member": "uint64",
|
31370
|
+
"name": "Offset",
|
31371
|
+
"required": false,
|
31372
|
+
"type": "int"
|
31373
|
+
},
|
31374
|
+
{
|
31375
|
+
"disabled": false,
|
31376
|
+
"document": "过滤条件。\n<li>Keywords - String - 是否必填:否 - 关键字(进程名称)</li>",
|
31377
|
+
"example": "[{\"Name\":\"Keywords\",\"Values\":[\"加白内容\"]}]",
|
31378
|
+
"member": "Filter",
|
31379
|
+
"name": "Filters",
|
31380
|
+
"required": false,
|
31381
|
+
"type": "list"
|
31382
|
+
},
|
31383
|
+
{
|
31384
|
+
"disabled": false,
|
31385
|
+
"document": "排序字段,目前有:CreateTime、ModifyTime,默认按照ModifyTime排序",
|
31386
|
+
"example": "ModifyTime",
|
31387
|
+
"member": "string",
|
31388
|
+
"name": "By",
|
31389
|
+
"required": false,
|
31390
|
+
"type": "string"
|
31391
|
+
},
|
31392
|
+
{
|
31393
|
+
"disabled": false,
|
31394
|
+
"document": "排序升序还是倒序,DESC有ASC、",
|
31395
|
+
"example": "ASC",
|
31396
|
+
"member": "string",
|
31397
|
+
"name": "Order",
|
31398
|
+
"required": false,
|
31399
|
+
"type": "string"
|
31400
|
+
}
|
31401
|
+
],
|
31402
|
+
"type": "object"
|
31403
|
+
},
|
31404
|
+
"DescribeRaspRulesResponse": {
|
31405
|
+
"document": "DescribeRaspRules返回参数结构体",
|
31406
|
+
"members": [
|
31407
|
+
{
|
31408
|
+
"disabled": false,
|
31409
|
+
"document": "列表内容",
|
31410
|
+
"example": "[ \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"Id\": 2, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"URLRegexp\": \"\", \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\", \t\t\t\t\"WhiteType\": 1 \t\t\t}, \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"CveID\": \"CVE-2016-5003\", \t\t\t\t\"Id\": 3, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:32:13\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 1, \t\t\t\t\"URLRegexp\": \"\", \t\t\t\t\"VulVulsID\": 18878, \t\t\t\t\"VulVulsName\": \"Apache Archiva Apache XML-RPC库安全漏洞(CVE-2016-5003)\", \t\t\t\t\"WhiteType\": 1 \t\t\t}, \t\t\t{ \t\t\t\t\"CreateTime\": \"2024-10-17 17:28:05\", \t\t\t\t\"CveID\": \"CVE-2012-4453\", \t\t\t\t\"Id\": 1, \t\t\t\t\"ModifyTime\": \"2024-10-17 17:28:05\", \t\t\t\t\"Status\": 0, \t\t\t\t\"SupportDefense\": 2, \t\t\t\t\"URLRegexp\": \"abc\", \t\t\t\t\"VulVulsID\": 1, \t\t\t\t\"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\", \t\t\t\t\"WhiteType\": 0 \t\t\t} \t\t]",
|
31411
|
+
"member": "RaspRule",
|
31412
|
+
"name": "List",
|
31413
|
+
"output_required": true,
|
31414
|
+
"type": "list",
|
31415
|
+
"value_allowed_null": false
|
31416
|
+
},
|
31417
|
+
{
|
31418
|
+
"disabled": false,
|
31419
|
+
"document": "总条数",
|
31420
|
+
"example": "3",
|
31421
|
+
"member": "uint64",
|
31422
|
+
"name": "TotalCount",
|
31423
|
+
"output_required": true,
|
31424
|
+
"type": "int",
|
31425
|
+
"value_allowed_null": false
|
31426
|
+
},
|
31427
|
+
{
|
31428
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
31429
|
+
"member": "string",
|
31430
|
+
"name": "RequestId",
|
31431
|
+
"type": "string"
|
31432
|
+
}
|
31433
|
+
],
|
31434
|
+
"type": "object"
|
31435
|
+
},
|
31182
31436
|
"DescribeRecommendedProtectCpuRequest": {
|
31183
31437
|
"document": "DescribeRecommendedProtectCpu请求参数结构体",
|
31184
31438
|
"members": [],
|
@@ -48892,6 +49146,87 @@
|
|
48892
49146
|
],
|
48893
49147
|
"type": "object"
|
48894
49148
|
},
|
49149
|
+
"ModifyRaspMaxCpuRequest": {
|
49150
|
+
"document": "ModifyRaspMaxCpu请求参数结构体",
|
49151
|
+
"members": [
|
49152
|
+
{
|
49153
|
+
"disabled": false,
|
49154
|
+
"document": "rasp当前最大cpu限制,0<cpu<=100,默认100表示不限制",
|
49155
|
+
"example": "80",
|
49156
|
+
"member": "uint64",
|
49157
|
+
"name": "RaspMaxCpu",
|
49158
|
+
"required": false,
|
49159
|
+
"type": "int"
|
49160
|
+
}
|
49161
|
+
],
|
49162
|
+
"type": "object"
|
49163
|
+
},
|
49164
|
+
"ModifyRaspMaxCpuResponse": {
|
49165
|
+
"document": "ModifyRaspMaxCpu返回参数结构体",
|
49166
|
+
"members": [
|
49167
|
+
{
|
49168
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
49169
|
+
"member": "string",
|
49170
|
+
"name": "RequestId",
|
49171
|
+
"type": "string"
|
49172
|
+
}
|
49173
|
+
],
|
49174
|
+
"type": "object"
|
49175
|
+
},
|
49176
|
+
"ModifyRaspRulesRequest": {
|
49177
|
+
"document": "ModifyRaspRules请求参数结构体",
|
49178
|
+
"members": [
|
49179
|
+
{
|
49180
|
+
"disabled": false,
|
49181
|
+
"document": "规则ID(新增时请留空,编辑时候必传)",
|
49182
|
+
"example": "34",
|
49183
|
+
"member": "uint64",
|
49184
|
+
"name": "Id",
|
49185
|
+
"required": false,
|
49186
|
+
"type": "int"
|
49187
|
+
},
|
49188
|
+
{
|
49189
|
+
"disabled": false,
|
49190
|
+
"document": "漏洞id数组",
|
49191
|
+
"example": "2",
|
49192
|
+
"member": "uint64",
|
49193
|
+
"name": "VulVulsIDs",
|
49194
|
+
"required": false,
|
49195
|
+
"type": "list"
|
49196
|
+
},
|
49197
|
+
{
|
49198
|
+
"disabled": false,
|
49199
|
+
"document": "自定义请求范围加白正则表达式,选择全部请求范围时候为空,否则不能为空,base64编码",
|
49200
|
+
"example": "LiovdXNyL2Jpbi8=",
|
49201
|
+
"member": "string",
|
49202
|
+
"name": "URLRegexp",
|
49203
|
+
"required": false,
|
49204
|
+
"type": "string"
|
49205
|
+
},
|
49206
|
+
{
|
49207
|
+
"disabled": false,
|
49208
|
+
"document": "加白方式,0:自定义请求范围加白。1:全部请求加白",
|
49209
|
+
"example": "0",
|
49210
|
+
"member": "uint64",
|
49211
|
+
"name": "WhiteType",
|
49212
|
+
"required": false,
|
49213
|
+
"type": "int"
|
49214
|
+
}
|
49215
|
+
],
|
49216
|
+
"type": "object"
|
49217
|
+
},
|
49218
|
+
"ModifyRaspRulesResponse": {
|
49219
|
+
"document": "ModifyRaspRules返回参数结构体",
|
49220
|
+
"members": [
|
49221
|
+
{
|
49222
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
49223
|
+
"member": "string",
|
49224
|
+
"name": "RequestId",
|
49225
|
+
"type": "string"
|
49226
|
+
}
|
49227
|
+
],
|
49228
|
+
"type": "object"
|
49229
|
+
},
|
48895
49230
|
"ModifyReverseShellRulesAggregationRequest": {
|
48896
49231
|
"document": "ModifyReverseShellRulesAggregation请求参数结构体",
|
48897
49232
|
"members": [
|
@@ -53150,6 +53485,158 @@
|
|
53150
53485
|
],
|
53151
53486
|
"usage": "both"
|
53152
53487
|
},
|
53488
|
+
"RaspRule": {
|
53489
|
+
"document": "rasp白名单规则",
|
53490
|
+
"members": [
|
53491
|
+
{
|
53492
|
+
"disabled": false,
|
53493
|
+
"document": "规则ID",
|
53494
|
+
"example": "222",
|
53495
|
+
"member": "uint64",
|
53496
|
+
"name": "Id",
|
53497
|
+
"output_required": true,
|
53498
|
+
"type": "int",
|
53499
|
+
"value_allowed_null": false
|
53500
|
+
},
|
53501
|
+
{
|
53502
|
+
"disabled": false,
|
53503
|
+
"document": "自定义请求url范围正则表达式,为空则保存不成功",
|
53504
|
+
"example": "regexp",
|
53505
|
+
"member": "string",
|
53506
|
+
"name": "URLRegexp",
|
53507
|
+
"output_required": true,
|
53508
|
+
"type": "string",
|
53509
|
+
"value_allowed_null": false
|
53510
|
+
},
|
53511
|
+
{
|
53512
|
+
"disabled": false,
|
53513
|
+
"document": "漏洞id",
|
53514
|
+
"example": "100",
|
53515
|
+
"member": "uint64",
|
53516
|
+
"name": "VulVulsID",
|
53517
|
+
"output_required": true,
|
53518
|
+
"type": "int",
|
53519
|
+
"value_allowed_null": false
|
53520
|
+
},
|
53521
|
+
{
|
53522
|
+
"disabled": false,
|
53523
|
+
"document": "漏洞名称",
|
53524
|
+
"example": "vulVulName",
|
53525
|
+
"member": "string",
|
53526
|
+
"name": "VulVulsName",
|
53527
|
+
"output_required": true,
|
53528
|
+
"type": "string",
|
53529
|
+
"value_allowed_null": false
|
53530
|
+
},
|
53531
|
+
{
|
53532
|
+
"disabled": false,
|
53533
|
+
"document": "cve_id",
|
53534
|
+
"example": "CVE-2015-7975",
|
53535
|
+
"member": "string",
|
53536
|
+
"name": "CveID",
|
53537
|
+
"output_required": false,
|
53538
|
+
"type": "string",
|
53539
|
+
"value_allowed_null": false
|
53540
|
+
},
|
53541
|
+
{
|
53542
|
+
"disabled": false,
|
53543
|
+
"document": "漏洞防御类型,从漏洞表富化, 1:支持组件漏洞防御,组件漏洞没有正则加白。2:支持正则防御",
|
53544
|
+
"example": "1",
|
53545
|
+
"member": "uint64",
|
53546
|
+
"name": "SupportDefense",
|
53547
|
+
"output_required": true,
|
53548
|
+
"type": "int",
|
53549
|
+
"value_allowed_null": false
|
53550
|
+
},
|
53551
|
+
{
|
53552
|
+
"disabled": false,
|
53553
|
+
"document": "加白范围,0:全部请求加白,1:自定义请求范围加白",
|
53554
|
+
"example": "1",
|
53555
|
+
"member": "uint64",
|
53556
|
+
"name": "WhiteType",
|
53557
|
+
"output_required": true,
|
53558
|
+
"type": "int",
|
53559
|
+
"value_allowed_null": false
|
53560
|
+
},
|
53561
|
+
{
|
53562
|
+
"disabled": false,
|
53563
|
+
"document": "状态 0: 有效",
|
53564
|
+
"example": "0",
|
53565
|
+
"member": "uint64",
|
53566
|
+
"name": "Status",
|
53567
|
+
"output_required": true,
|
53568
|
+
"type": "int",
|
53569
|
+
"value_allowed_null": false
|
53570
|
+
},
|
53571
|
+
{
|
53572
|
+
"disabled": false,
|
53573
|
+
"document": "创建时间",
|
53574
|
+
"example": "2020-01-08 09:15:00",
|
53575
|
+
"member": "string",
|
53576
|
+
"name": "CreateTime",
|
53577
|
+
"output_required": true,
|
53578
|
+
"type": "string",
|
53579
|
+
"value_allowed_null": false
|
53580
|
+
},
|
53581
|
+
{
|
53582
|
+
"disabled": false,
|
53583
|
+
"document": "修改时间",
|
53584
|
+
"example": "2020-01-08 09:15:00",
|
53585
|
+
"member": "string",
|
53586
|
+
"name": "ModifyTime",
|
53587
|
+
"output_required": true,
|
53588
|
+
"type": "string",
|
53589
|
+
"value_allowed_null": false
|
53590
|
+
}
|
53591
|
+
],
|
53592
|
+
"usage": "out"
|
53593
|
+
},
|
53594
|
+
"RaspRuleVul": {
|
53595
|
+
"document": "rasp白名单漏洞列表",
|
53596
|
+
"members": [
|
53597
|
+
{
|
53598
|
+
"disabled": false,
|
53599
|
+
"document": "漏洞id",
|
53600
|
+
"example": "104845",
|
53601
|
+
"member": "uint64",
|
53602
|
+
"name": "VulVulsID",
|
53603
|
+
"output_required": true,
|
53604
|
+
"type": "int",
|
53605
|
+
"value_allowed_null": false
|
53606
|
+
},
|
53607
|
+
{
|
53608
|
+
"disabled": false,
|
53609
|
+
"document": "漏洞名称",
|
53610
|
+
"example": "JetBrains TeamCity 安全漏洞",
|
53611
|
+
"member": "string",
|
53612
|
+
"name": "VulVulsName",
|
53613
|
+
"output_required": true,
|
53614
|
+
"type": "string",
|
53615
|
+
"value_allowed_null": false
|
53616
|
+
},
|
53617
|
+
{
|
53618
|
+
"disabled": false,
|
53619
|
+
"document": "cve_id",
|
53620
|
+
"example": "CVE-2023-42793",
|
53621
|
+
"member": "string",
|
53622
|
+
"name": "CveID",
|
53623
|
+
"output_required": false,
|
53624
|
+
"type": "string",
|
53625
|
+
"value_allowed_null": false
|
53626
|
+
},
|
53627
|
+
{
|
53628
|
+
"disabled": false,
|
53629
|
+
"document": "漏洞防御类型,从漏洞表富化, 1:支持组件漏洞防御,组件漏洞没有正则加白。2:支持正则防御",
|
53630
|
+
"example": "1",
|
53631
|
+
"member": "uint64",
|
53632
|
+
"name": "SupportDefense",
|
53633
|
+
"output_required": true,
|
53634
|
+
"type": "int",
|
53635
|
+
"value_allowed_null": false
|
53636
|
+
}
|
53637
|
+
],
|
53638
|
+
"usage": "out"
|
53639
|
+
},
|
53153
53640
|
"RecordInfo": {
|
53154
53641
|
"document": "客户端异常信息结构",
|
53155
53642
|
"members": [
|
@@ -440,6 +440,14 @@
|
|
440
440
|
"title": "示例"
|
441
441
|
}
|
442
442
|
],
|
443
|
+
"DeleteRaspRules": [
|
444
|
+
{
|
445
|
+
"document": "删除漏洞防御白名单",
|
446
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DeleteRaspRules\n<公共请求参数>\n\n{\n \"IDs\": [\n 6,\n 7\n ]\n}",
|
447
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"97052fad-2402-49a2-86d8-7fb97c6c64af\"\n }\n}",
|
448
|
+
"title": "删除漏洞防御白名单"
|
449
|
+
}
|
450
|
+
],
|
443
451
|
"DeleteReverseShellEvents": [
|
444
452
|
{
|
445
453
|
"document": "删除反弹Shell事件",
|
@@ -2174,6 +2182,30 @@
|
|
2174
2182
|
"title": "获取全网勒索态势"
|
2175
2183
|
}
|
2176
2184
|
],
|
2185
|
+
"DescribeRaspMaxCpu": [
|
2186
|
+
{
|
2187
|
+
"document": "查询漏洞防御cpu配置",
|
2188
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspMaxCpu\n<公共请求参数>\n\n{}",
|
2189
|
+
"output": "{\n \"Response\": {\n \"RaspMaxCpu\": 100,\n \"RequestId\": \"e3f0687f-2874-4022-8af6-330dc4c3872b\"\n }\n}",
|
2190
|
+
"title": "查询漏洞防御cpu配置"
|
2191
|
+
}
|
2192
|
+
],
|
2193
|
+
"DescribeRaspRuleVuls": [
|
2194
|
+
{
|
2195
|
+
"document": "获取漏洞防御白名单漏洞列表",
|
2196
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRuleVuls\n<公共请求参数>\n\n{\n \"Offset\": 0,\n \"Limit\": 10,\n \"Filters\": [\n {\n \"Name\": \"WhiteType\",\n \"Values\": [\n \"0\"\n ]\n }\n ]\n}",
|
2197
|
+
"output": "{\n \"Response\": {\n \"List\": [\n {\n \"CveID\": \"CVE-2012-4453\",\n \"SupportDefense\": 2,\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\"\n }\n ],\n \"RequestId\": \"30738e90-7f04-4196-8872-84d27ba02c45\",\n \"TotalCount\": 1\n }\n}",
|
2198
|
+
"title": "获取漏洞防御白名单漏洞列表"
|
2199
|
+
}
|
2200
|
+
],
|
2201
|
+
"DescribeRaspRules": [
|
2202
|
+
{
|
2203
|
+
"document": "查询漏洞防御白名单",
|
2204
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRaspRules\n<公共请求参数>\n\n{}",
|
2205
|
+
"output": "{\n \"Response\": {\n \"List\": [\n {\n \"CreateTime\": \"2024-10-17 17:32:13\",\n \"CveID\": \"CVE-2012-4453\",\n \"Id\": 2,\n \"ModifyTime\": \"2024-10-17 17:32:13\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\",\n \"WhiteType\": 1\n },\n {\n \"CreateTime\": \"2024-10-17 17:32:13\",\n \"CveID\": \"CVE-2016-5003\",\n \"Id\": 3,\n \"ModifyTime\": \"2024-10-17 17:32:13\",\n \"Status\": 0,\n \"SupportDefense\": 1,\n \"URLRegexp\": \"\",\n \"VulVulsID\": 18878,\n \"VulVulsName\": \"Apache Archiva Apache XML-RPC库安全漏洞(CVE-2016-5003)\",\n \"WhiteType\": 1\n },\n {\n \"CreateTime\": \"2024-10-17 17:28:05\",\n \"CveID\": \"CVE-2012-4453\",\n \"Id\": 1,\n \"ModifyTime\": \"2024-10-17 17:28:05\",\n \"Status\": 0,\n \"SupportDefense\": 2,\n \"URLRegexp\": \"regexp\",\n \"VulVulsID\": 1,\n \"VulVulsName\": \"dracut 权限许可和访问控制漏洞 (CVE-2012-4453)\",\n \"WhiteType\": 0\n }\n ],\n \"RequestId\": \"2214a590-b84b-4a97-acdd-8de9331ccfc9\",\n \"TotalCount\": 3\n }\n}",
|
2206
|
+
"title": "查询漏洞防御白名单"
|
2207
|
+
}
|
2208
|
+
],
|
2177
2209
|
"DescribeRecommendedProtectCpu": [
|
2178
2210
|
{
|
2179
2211
|
"document": "",
|
@@ -3760,6 +3792,22 @@
|
|
3760
3792
|
"title": "批量修改防勒索策略状态"
|
3761
3793
|
}
|
3762
3794
|
],
|
3795
|
+
"ModifyRaspMaxCpu": [
|
3796
|
+
{
|
3797
|
+
"document": "设置漏洞防御cpu配置",
|
3798
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspMaxCpu\n<公共请求参数>\n\n{\n \"RaspMaxCpu\": 80\n}",
|
3799
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"c65ee0af-cd41-4cba-bee4-8820a196bae0\"\n }\n}",
|
3800
|
+
"title": "设置漏洞防御cpu配置"
|
3801
|
+
}
|
3802
|
+
],
|
3803
|
+
"ModifyRaspRules": [
|
3804
|
+
{
|
3805
|
+
"document": "添加漏洞防御白名单",
|
3806
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyRaspRules\n<公共请求参数>\n\n{\n \"VulVulsIDs\": [\n 1,\n 18878\n ],\n \"WhiteType\": 1\n}",
|
3807
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"01d1e534-0292-4eac-9a95-746f0f6f60ad\"\n }\n}",
|
3808
|
+
"title": "添加漏洞防御白名单"
|
3809
|
+
}
|
3810
|
+
],
|
3763
3811
|
"ModifyReverseShellRulesAggregation": [
|
3764
3812
|
{
|
3765
3813
|
"document": "增加正则规则",
|
@@ -2447,6 +2447,16 @@
|
|
2447
2447
|
"type": "list",
|
2448
2448
|
"value_allowed_null": true
|
2449
2449
|
},
|
2450
|
+
{
|
2451
|
+
"disabled": false,
|
2452
|
+
"document": "预览链接,有效期5分钟\n注:如果是预览模式(即NeedPreview设置为true)时, 才会有此预览链接URL",
|
2453
|
+
"example": "https://embed.qian.tencent.cn/document-url-preview?channel=PROXYCHANNEL&scene=SINGLEPAGE&code=yDAY0UUckp7ouj3qU3GpRQCZvA3aO2l0&codeType=QUICK&businessType=RESOURCE&businessId=yDCY0UUckp7oucf2UxAAGY1RtjPw9Pyt",
|
2454
|
+
"member": "string",
|
2455
|
+
"name": "PreviewUrl",
|
2456
|
+
"output_required": false,
|
2457
|
+
"type": "string",
|
2458
|
+
"value_allowed_null": false
|
2459
|
+
},
|
2450
2460
|
{
|
2451
2461
|
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
2452
2462
|
"member": "string",
|
@@ -3577,6 +3577,15 @@
|
|
3577
3577
|
"name": "Encryption",
|
3578
3578
|
"required": false,
|
3579
3579
|
"type": "object"
|
3580
|
+
},
|
3581
|
+
{
|
3582
|
+
"disabled": false,
|
3583
|
+
"document": "自定义描述字段。\n- 用于描述调用业务信息,出参中将返回此描述字段。 \n- 每个自定义描述字段支持[1,10]个字符。",
|
3584
|
+
"example": "开户业务",
|
3585
|
+
"member": "string",
|
3586
|
+
"name": "Extra",
|
3587
|
+
"required": false,
|
3588
|
+
"type": "string"
|
3580
3589
|
}
|
3581
3590
|
],
|
3582
3591
|
"type": "object"
|
@@ -3614,6 +3623,16 @@
|
|
3614
3623
|
"type": "string",
|
3615
3624
|
"value_allowed_null": false
|
3616
3625
|
},
|
3626
|
+
{
|
3627
|
+
"disabled": false,
|
3628
|
+
"document": "调用接口中自定义的描述字段。",
|
3629
|
+
"example": "开户业务",
|
3630
|
+
"member": "string",
|
3631
|
+
"name": "Extra",
|
3632
|
+
"output_required": false,
|
3633
|
+
"type": "string",
|
3634
|
+
"value_allowed_null": false
|
3635
|
+
},
|
3617
3636
|
{
|
3618
3637
|
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
3619
3638
|
"member": "string",
|