tccli 3.0.1239.1__py2.py3-none-any.whl → 3.0.1240.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
tccli/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = '3.0.1239.1'
1
+ __version__ = '3.0.1240.1'
@@ -17,6 +17,58 @@ from tencentcloud.csip.v20221121 import models as models_v20221121
17
17
  from jmespath import search
18
18
  import time
19
19
 
20
+ def doDescribeUebaRule(args, parsed_globals):
21
+ g_param = parse_global_arg(parsed_globals)
22
+
23
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
24
+ cred = credential.CVMRoleCredential()
25
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
26
+ cred = credential.STSAssumeRoleCredential(
27
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
+ )
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
+ else:
33
+ cred = credential.Credential(
34
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
35
+ )
36
+ http_profile = HttpProfile(
37
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
38
+ reqMethod="POST",
39
+ endpoint=g_param[OptionsDefine.Endpoint],
40
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
+ )
42
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
43
+ if g_param[OptionsDefine.Language]:
44
+ profile.language = g_param[OptionsDefine.Language]
45
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
46
+ client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
47
+ client._sdkVersion += ("_CLI_" + __version__)
48
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
49
+ model = models.DescribeUebaRuleRequest()
50
+ model.from_json_string(json.dumps(args))
51
+ start_time = time.time()
52
+ while True:
53
+ rsp = client.DescribeUebaRule(model)
54
+ result = rsp.to_json_string()
55
+ try:
56
+ json_obj = json.loads(result)
57
+ except TypeError as e:
58
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
59
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
60
+ break
61
+ cur_time = time.time()
62
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
63
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
64
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
65
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
66
+ else:
67
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
68
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
69
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
+
71
+
20
72
  def doDeleteDomainAndIp(args, parsed_globals):
21
73
  g_param = parse_global_arg(parsed_globals)
22
74
 
@@ -589,7 +641,7 @@ def doDeleteRiskScanTask(args, parsed_globals):
589
641
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
642
 
591
643
 
592
- def doDescribeRiskCenterAssetViewWeakPasswordRiskList(args, parsed_globals):
644
+ def doDescribeTaskLogList(args, parsed_globals):
593
645
  g_param = parse_global_arg(parsed_globals)
594
646
 
595
647
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -618,11 +670,11 @@ def doDescribeRiskCenterAssetViewWeakPasswordRiskList(args, parsed_globals):
618
670
  client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
619
671
  client._sdkVersion += ("_CLI_" + __version__)
620
672
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.DescribeRiskCenterAssetViewWeakPasswordRiskListRequest()
673
+ model = models.DescribeTaskLogListRequest()
622
674
  model.from_json_string(json.dumps(args))
623
675
  start_time = time.time()
624
676
  while True:
625
- rsp = client.DescribeRiskCenterAssetViewWeakPasswordRiskList(model)
677
+ rsp = client.DescribeTaskLogList(model)
626
678
  result = rsp.to_json_string()
627
679
  try:
628
680
  json_obj = json.loads(result)
@@ -1005,6 +1057,58 @@ def doModifyRiskCenterScanTask(args, parsed_globals):
1005
1057
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1058
 
1007
1059
 
1060
+ def doDescribeOrganizationInfo(args, parsed_globals):
1061
+ g_param = parse_global_arg(parsed_globals)
1062
+
1063
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1064
+ cred = credential.CVMRoleCredential()
1065
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1066
+ cred = credential.STSAssumeRoleCredential(
1067
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
+ )
1070
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
+ else:
1073
+ cred = credential.Credential(
1074
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1075
+ )
1076
+ http_profile = HttpProfile(
1077
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1078
+ reqMethod="POST",
1079
+ endpoint=g_param[OptionsDefine.Endpoint],
1080
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
+ )
1082
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1083
+ if g_param[OptionsDefine.Language]:
1084
+ profile.language = g_param[OptionsDefine.Language]
1085
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
+ client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
1087
+ client._sdkVersion += ("_CLI_" + __version__)
1088
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
+ model = models.DescribeOrganizationInfoRequest()
1090
+ model.from_json_string(json.dumps(args))
1091
+ start_time = time.time()
1092
+ while True:
1093
+ rsp = client.DescribeOrganizationInfo(model)
1094
+ result = rsp.to_json_string()
1095
+ try:
1096
+ json_obj = json.loads(result)
1097
+ except TypeError as e:
1098
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1099
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1100
+ break
1101
+ cur_time = time.time()
1102
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1103
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1104
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1105
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1106
+ else:
1107
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1108
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1109
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1110
+
1111
+
1008
1112
  def doDescribeAssetViewVulRiskList(args, parsed_globals):
1009
1113
  g_param = parse_global_arg(parsed_globals)
1010
1114
 
@@ -1265,6 +1369,58 @@ def doStopRiskCenterTask(args, parsed_globals):
1265
1369
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1370
 
1267
1371
 
1372
+ def doModifyUebaRuleSwitch(args, parsed_globals):
1373
+ g_param = parse_global_arg(parsed_globals)
1374
+
1375
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1376
+ cred = credential.CVMRoleCredential()
1377
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1378
+ cred = credential.STSAssumeRoleCredential(
1379
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
+ )
1382
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
+ else:
1385
+ cred = credential.Credential(
1386
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1387
+ )
1388
+ http_profile = HttpProfile(
1389
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1390
+ reqMethod="POST",
1391
+ endpoint=g_param[OptionsDefine.Endpoint],
1392
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
+ )
1394
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1395
+ if g_param[OptionsDefine.Language]:
1396
+ profile.language = g_param[OptionsDefine.Language]
1397
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1398
+ client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
1399
+ client._sdkVersion += ("_CLI_" + __version__)
1400
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1401
+ model = models.ModifyUebaRuleSwitchRequest()
1402
+ model.from_json_string(json.dumps(args))
1403
+ start_time = time.time()
1404
+ while True:
1405
+ rsp = client.ModifyUebaRuleSwitch(model)
1406
+ result = rsp.to_json_string()
1407
+ try:
1408
+ json_obj = json.loads(result)
1409
+ except TypeError as e:
1410
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1411
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1412
+ break
1413
+ cur_time = time.time()
1414
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1415
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1416
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1417
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1418
+ else:
1419
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1420
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1421
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
+
1423
+
1268
1424
  def doCreateRiskCenterScanTask(args, parsed_globals):
1269
1425
  g_param = parse_global_arg(parsed_globals)
1270
1426
 
@@ -1421,7 +1577,7 @@ def doDescribeSearchBugInfo(args, parsed_globals):
1421
1577
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
1578
 
1423
1579
 
1424
- def doDescribeTaskLogList(args, parsed_globals):
1580
+ def doDescribeRiskCenterAssetViewWeakPasswordRiskList(args, parsed_globals):
1425
1581
  g_param = parse_global_arg(parsed_globals)
1426
1582
 
1427
1583
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1450,11 +1606,11 @@ def doDescribeTaskLogList(args, parsed_globals):
1450
1606
  client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
1451
1607
  client._sdkVersion += ("_CLI_" + __version__)
1452
1608
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.DescribeTaskLogListRequest()
1609
+ model = models.DescribeRiskCenterAssetViewWeakPasswordRiskListRequest()
1454
1610
  model.from_json_string(json.dumps(args))
1455
1611
  start_time = time.time()
1456
1612
  while True:
1457
- rsp = client.DescribeTaskLogList(model)
1613
+ rsp = client.DescribeRiskCenterAssetViewWeakPasswordRiskList(model)
1458
1614
  result = rsp.to_json_string()
1459
1615
  try:
1460
1616
  json_obj = json.loads(result)
@@ -1577,7 +1733,7 @@ def doDescribeScanReportList(args, parsed_globals):
1577
1733
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1578
1734
 
1579
1735
 
1580
- def doCreateDomainAndIp(args, parsed_globals):
1736
+ def doDescribeSubUserInfo(args, parsed_globals):
1581
1737
  g_param = parse_global_arg(parsed_globals)
1582
1738
 
1583
1739
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1606,11 +1762,11 @@ def doCreateDomainAndIp(args, parsed_globals):
1606
1762
  client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
1607
1763
  client._sdkVersion += ("_CLI_" + __version__)
1608
1764
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1609
- model = models.CreateDomainAndIpRequest()
1765
+ model = models.DescribeSubUserInfoRequest()
1610
1766
  model.from_json_string(json.dumps(args))
1611
1767
  start_time = time.time()
1612
1768
  while True:
1613
- rsp = client.CreateDomainAndIp(model)
1769
+ rsp = client.DescribeSubUserInfo(model)
1614
1770
  result = rsp.to_json_string()
1615
1771
  try:
1616
1772
  json_obj = json.loads(result)
@@ -1681,6 +1837,58 @@ def doDescribeAlertList(args, parsed_globals):
1681
1837
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1682
1838
 
1683
1839
 
1840
+ def doModifyRiskCenterRiskStatus(args, parsed_globals):
1841
+ g_param = parse_global_arg(parsed_globals)
1842
+
1843
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1844
+ cred = credential.CVMRoleCredential()
1845
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1846
+ cred = credential.STSAssumeRoleCredential(
1847
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
+ )
1850
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
+ else:
1853
+ cred = credential.Credential(
1854
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1855
+ )
1856
+ http_profile = HttpProfile(
1857
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1858
+ reqMethod="POST",
1859
+ endpoint=g_param[OptionsDefine.Endpoint],
1860
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
+ )
1862
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1863
+ if g_param[OptionsDefine.Language]:
1864
+ profile.language = g_param[OptionsDefine.Language]
1865
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1866
+ client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
1867
+ client._sdkVersion += ("_CLI_" + __version__)
1868
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1869
+ model = models.ModifyRiskCenterRiskStatusRequest()
1870
+ model.from_json_string(json.dumps(args))
1871
+ start_time = time.time()
1872
+ while True:
1873
+ rsp = client.ModifyRiskCenterRiskStatus(model)
1874
+ result = rsp.to_json_string()
1875
+ try:
1876
+ json_obj = json.loads(result)
1877
+ except TypeError as e:
1878
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1879
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1880
+ break
1881
+ cur_time = time.time()
1882
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1883
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1884
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1885
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1886
+ else:
1887
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1888
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1889
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
+
1891
+
1684
1892
  def doUpdateAlertStatusList(args, parsed_globals):
1685
1893
  g_param = parse_global_arg(parsed_globals)
1686
1894
 
@@ -1993,7 +2201,7 @@ def doDescribeVULRiskAdvanceCFGList(args, parsed_globals):
1993
2201
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1994
2202
 
1995
2203
 
1996
- def doModifyRiskCenterRiskStatus(args, parsed_globals):
2204
+ def doCreateDomainAndIp(args, parsed_globals):
1997
2205
  g_param = parse_global_arg(parsed_globals)
1998
2206
 
1999
2207
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -2022,11 +2230,11 @@ def doModifyRiskCenterRiskStatus(args, parsed_globals):
2022
2230
  client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
2023
2231
  client._sdkVersion += ("_CLI_" + __version__)
2024
2232
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
2025
- model = models.ModifyRiskCenterRiskStatusRequest()
2233
+ model = models.CreateDomainAndIpRequest()
2026
2234
  model.from_json_string(json.dumps(args))
2027
2235
  start_time = time.time()
2028
2236
  while True:
2029
- rsp = client.ModifyRiskCenterRiskStatus(model)
2237
+ rsp = client.CreateDomainAndIp(model)
2030
2238
  result = rsp.to_json_string()
2031
2239
  try:
2032
2240
  json_obj = json.loads(result)
@@ -2149,6 +2357,58 @@ def doDescribeTopAttackInfo(args, parsed_globals):
2149
2357
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2150
2358
 
2151
2359
 
2360
+ def doDescribeClusterAssets(args, parsed_globals):
2361
+ g_param = parse_global_arg(parsed_globals)
2362
+
2363
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2364
+ cred = credential.CVMRoleCredential()
2365
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2366
+ cred = credential.STSAssumeRoleCredential(
2367
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
+ )
2370
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
+ else:
2373
+ cred = credential.Credential(
2374
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2375
+ )
2376
+ http_profile = HttpProfile(
2377
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2378
+ reqMethod="POST",
2379
+ endpoint=g_param[OptionsDefine.Endpoint],
2380
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
+ )
2382
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2383
+ if g_param[OptionsDefine.Language]:
2384
+ profile.language = g_param[OptionsDefine.Language]
2385
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2386
+ client = mod.CsipClient(cred, g_param[OptionsDefine.Region], profile)
2387
+ client._sdkVersion += ("_CLI_" + __version__)
2388
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2389
+ model = models.DescribeClusterAssetsRequest()
2390
+ model.from_json_string(json.dumps(args))
2391
+ start_time = time.time()
2392
+ while True:
2393
+ rsp = client.DescribeClusterAssets(model)
2394
+ result = rsp.to_json_string()
2395
+ try:
2396
+ json_obj = json.loads(result)
2397
+ except TypeError as e:
2398
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2399
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2400
+ break
2401
+ cur_time = time.time()
2402
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2403
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2404
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2405
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2406
+ else:
2407
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2408
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2409
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2410
+
2411
+
2152
2412
  def doDescribeTaskLogURL(args, parsed_globals):
2153
2413
  g_param = parse_global_arg(parsed_globals)
2154
2414
 
@@ -2264,6 +2524,7 @@ MODELS_MAP = {
2264
2524
  }
2265
2525
 
2266
2526
  ACTION_MAP = {
2527
+ "DescribeUebaRule": doDescribeUebaRule,
2267
2528
  "DeleteDomainAndIp": doDeleteDomainAndIp,
2268
2529
  "DescribeDbAssetInfo": doDescribeDbAssetInfo,
2269
2530
  "DescribeNICAssets": doDescribeNICAssets,
@@ -2275,7 +2536,7 @@ ACTION_MAP = {
2275
2536
  "DescribeListenerList": doDescribeListenerList,
2276
2537
  "DescribeOrganizationUserInfo": doDescribeOrganizationUserInfo,
2277
2538
  "DeleteRiskScanTask": doDeleteRiskScanTask,
2278
- "DescribeRiskCenterAssetViewWeakPasswordRiskList": doDescribeRiskCenterAssetViewWeakPasswordRiskList,
2539
+ "DescribeTaskLogList": doDescribeTaskLogList,
2279
2540
  "DescribeRiskCenterAssetViewVULRiskList": doDescribeRiskCenterAssetViewVULRiskList,
2280
2541
  "DescribeClusterPodAssets": doDescribeClusterPodAssets,
2281
2542
  "DescribeRiskCenterAssetViewCFGRiskList": doDescribeRiskCenterAssetViewCFGRiskList,
@@ -2283,28 +2544,32 @@ ACTION_MAP = {
2283
2544
  "DescribeRiskCenterServerRiskList": doDescribeRiskCenterServerRiskList,
2284
2545
  "DescribeCVMAssets": doDescribeCVMAssets,
2285
2546
  "ModifyRiskCenterScanTask": doModifyRiskCenterScanTask,
2547
+ "DescribeOrganizationInfo": doDescribeOrganizationInfo,
2286
2548
  "DescribeAssetViewVulRiskList": doDescribeAssetViewVulRiskList,
2287
2549
  "DescribeVULRiskDetail": doDescribeVULRiskDetail,
2288
2550
  "DescribeRiskCenterWebsiteRiskList": doDescribeRiskCenterWebsiteRiskList,
2289
2551
  "DescribeCFWAssetStatistics": doDescribeCFWAssetStatistics,
2290
2552
  "StopRiskCenterTask": doStopRiskCenterTask,
2553
+ "ModifyUebaRuleSwitch": doModifyUebaRuleSwitch,
2291
2554
  "CreateRiskCenterScanTask": doCreateRiskCenterScanTask,
2292
2555
  "DescribeGatewayAssets": doDescribeGatewayAssets,
2293
2556
  "DescribeSearchBugInfo": doDescribeSearchBugInfo,
2294
- "DescribeTaskLogList": doDescribeTaskLogList,
2557
+ "DescribeRiskCenterAssetViewWeakPasswordRiskList": doDescribeRiskCenterAssetViewWeakPasswordRiskList,
2295
2558
  "DescribeVulViewVulRiskList": doDescribeVulViewVulRiskList,
2296
2559
  "DescribeScanReportList": doDescribeScanReportList,
2297
- "CreateDomainAndIp": doCreateDomainAndIp,
2560
+ "DescribeSubUserInfo": doDescribeSubUserInfo,
2298
2561
  "DescribeAlertList": doDescribeAlertList,
2562
+ "ModifyRiskCenterRiskStatus": doModifyRiskCenterRiskStatus,
2299
2563
  "UpdateAlertStatusList": doUpdateAlertStatusList,
2300
2564
  "DescribeScanTaskList": doDescribeScanTaskList,
2301
2565
  "DescribeDbAssets": doDescribeDbAssets,
2302
2566
  "DescribeRiskCenterPortViewPortRiskList": doDescribeRiskCenterPortViewPortRiskList,
2303
2567
  "DescribeRiskCenterAssetViewPortRiskList": doDescribeRiskCenterAssetViewPortRiskList,
2304
2568
  "DescribeVULRiskAdvanceCFGList": doDescribeVULRiskAdvanceCFGList,
2305
- "ModifyRiskCenterRiskStatus": doModifyRiskCenterRiskStatus,
2569
+ "CreateDomainAndIp": doCreateDomainAndIp,
2306
2570
  "ModifyOrganizationAccountStatus": doModifyOrganizationAccountStatus,
2307
2571
  "DescribeTopAttackInfo": doDescribeTopAttackInfo,
2572
+ "DescribeClusterAssets": doDescribeClusterAssets,
2308
2573
  "DescribeTaskLogURL": doDescribeTaskLogURL,
2309
2574
  "DescribeCVMAssetInfo": doDescribeCVMAssetInfo,
2310
2575