tccli 3.0.1290.1__py2.py3-none-any.whl → 3.0.1291.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/antiddos/v20200309/api.json +132 -103
  3. tccli/services/antiddos/v20200309/examples.json +5 -5
  4. tccli/services/bi/v20220105/api.json +1 -1
  5. tccli/services/bi/v20220105/examples.json +1 -1
  6. tccli/services/cam/v20190116/api.json +39 -33
  7. tccli/services/cam/v20190116/examples.json +1 -1
  8. tccli/services/cbs/v20170312/api.json +24 -20
  9. tccli/services/cdwch/v20200915/api.json +204 -199
  10. tccli/services/cdwch/v20200915/examples.json +11 -11
  11. tccli/services/ckafka/v20190819/api.json +273 -268
  12. tccli/services/clb/v20180317/api.json +12 -8
  13. tccli/services/cls/cls_client.py +18 -230
  14. tccli/services/cls/v20201016/api.json +52 -486
  15. tccli/services/cls/v20201016/examples.json +0 -32
  16. tccli/services/cvm/v20170312/api.json +10 -0
  17. tccli/services/cynosdb/v20190107/api.json +95 -95
  18. tccli/services/dbbrain/v20191016/api.json +30 -30
  19. tccli/services/dbbrain/v20210527/api.json +103 -103
  20. tccli/services/dcdb/v20180411/api.json +48 -48
  21. tccli/services/dnspod/dnspod_client.py +466 -307
  22. tccli/services/dnspod/v20210323/api.json +391 -0
  23. tccli/services/dnspod/v20210323/examples.json +24 -0
  24. tccli/services/dsgc/dsgc_client.py +0 -53
  25. tccli/services/dsgc/v20190723/api.json +0 -24
  26. tccli/services/dsgc/v20190723/examples.json +0 -8
  27. tccli/services/iotvideoindustry/v20201201/api.json +542 -523
  28. tccli/services/iotvideoindustry/v20201201/examples.json +15 -15
  29. tccli/services/mariadb/v20170312/api.json +42 -42
  30. tccli/services/mariadb/v20170312/examples.json +12 -0
  31. tccli/services/mmps/v20200710/api.json +95 -95
  32. tccli/services/mps/v20190612/api.json +7 -7
  33. tccli/services/postgres/v20170312/api.json +308 -283
  34. tccli/services/svp/v20240125/api.json +66 -66
  35. tccli/services/svp/v20240125/examples.json +1 -1
  36. tccli/services/tcb/tcb_client.py +0 -53
  37. tccli/services/tcb/v20180608/api.json +0 -110
  38. tccli/services/tcb/v20180608/examples.json +0 -8
  39. tccli/services/tcss/tcss_client.py +224 -277
  40. tccli/services/tcss/v20201101/api.json +4618 -4329
  41. tccli/services/tcss/v20201101/examples.json +207 -221
  42. tccli/services/tdmq/tdmq_client.py +0 -53
  43. tccli/services/tdmq/v20200217/api.json +0 -89
  44. tccli/services/tdmq/v20200217/examples.json +0 -8
  45. tccli/services/teo/teo_client.py +53 -0
  46. tccli/services/teo/v20220901/api.json +82 -11
  47. tccli/services/teo/v20220901/examples.json +8 -0
  48. tccli/services/thpc/v20211109/api.json +8 -8
  49. tccli/services/thpc/v20220401/api.json +8 -8
  50. tccli/services/thpc/v20230321/api.json +11 -10
  51. tccli/services/tke/v20180525/api.json +60 -60
  52. tccli/services/tke/v20220501/api.json +34 -34
  53. tccli/services/vpc/v20170312/api.json +44 -44
  54. tccli/services/waf/v20180125/api.json +9 -0
  55. tccli/services/wedata/v20210820/api.json +19 -0
  56. {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.1.dist-info}/METADATA +2 -2
  57. {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.1.dist-info}/RECORD +60 -60
  58. {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.1.dist-info}/WHEEL +0 -0
  59. {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.1.dist-info}/entry_points.txt +0 -0
  60. {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.1.dist-info}/license_files/LICENSE +0 -0
@@ -173,59 +173,7 @@ def doDescribeAssetWebServiceList(args, parsed_globals):
173
173
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
174
 
175
175
 
176
- def doModifySecLogDeliveryClsSetting(args, parsed_globals):
177
- g_param = parse_global_arg(parsed_globals)
178
-
179
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
180
- cred = credential.CVMRoleCredential()
181
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
182
- cred = credential.STSAssumeRoleCredential(
183
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
- )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
- else:
189
- cred = credential.Credential(
190
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
191
- )
192
- http_profile = HttpProfile(
193
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
194
- reqMethod="POST",
195
- endpoint=g_param[OptionsDefine.Endpoint],
196
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
- )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
199
- if g_param[OptionsDefine.Language]:
200
- profile.language = g_param[OptionsDefine.Language]
201
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
202
- client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
203
- client._sdkVersion += ("_CLI_" + __version__)
204
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
- model = models.ModifySecLogDeliveryClsSettingRequest()
206
- model.from_json_string(json.dumps(args))
207
- start_time = time.time()
208
- while True:
209
- rsp = client.ModifySecLogDeliveryClsSetting(model)
210
- result = rsp.to_json_string()
211
- try:
212
- json_obj = json.loads(result)
213
- except TypeError as e:
214
- json_obj = json.loads(result.decode('utf-8')) # python3.3
215
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
216
- break
217
- cur_time = time.time()
218
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
219
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
220
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
221
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
222
- else:
223
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
224
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
225
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
-
227
-
228
- def doDescribeAbnormalProcessEventsExport(args, parsed_globals):
176
+ def doUpdateAndPublishNetworkFirewallPolicyYamlDetail(args, parsed_globals):
229
177
  g_param = parse_global_arg(parsed_globals)
230
178
 
231
179
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -254,11 +202,11 @@ def doDescribeAbnormalProcessEventsExport(args, parsed_globals):
254
202
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
255
203
  client._sdkVersion += ("_CLI_" + __version__)
256
204
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.DescribeAbnormalProcessEventsExportRequest()
205
+ model = models.UpdateAndPublishNetworkFirewallPolicyYamlDetailRequest()
258
206
  model.from_json_string(json.dumps(args))
259
207
  start_time = time.time()
260
208
  while True:
261
- rsp = client.DescribeAbnormalProcessEventsExport(model)
209
+ rsp = client.UpdateAndPublishNetworkFirewallPolicyYamlDetail(model)
262
210
  result = rsp.to_json_string()
263
211
  try:
264
212
  json_obj = json.loads(result)
@@ -745,7 +693,7 @@ def doModifyAccessControlRuleStatus(args, parsed_globals):
745
693
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
694
 
747
695
 
748
- def doDescribeAbnormalProcessRulesExport(args, parsed_globals):
696
+ def doDescribeRiskSyscallEventsExport(args, parsed_globals):
749
697
  g_param = parse_global_arg(parsed_globals)
750
698
 
751
699
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -774,11 +722,11 @@ def doDescribeAbnormalProcessRulesExport(args, parsed_globals):
774
722
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
775
723
  client._sdkVersion += ("_CLI_" + __version__)
776
724
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.DescribeAbnormalProcessRulesExportRequest()
725
+ model = models.DescribeRiskSyscallEventsExportRequest()
778
726
  model.from_json_string(json.dumps(args))
779
727
  start_time = time.time()
780
728
  while True:
781
- rsp = client.DescribeAbnormalProcessRulesExport(model)
729
+ rsp = client.DescribeRiskSyscallEventsExport(model)
782
730
  result = rsp.to_json_string()
783
731
  try:
784
732
  json_obj = json.loads(result)
@@ -3085,58 +3033,6 @@ def doDescribeNetworkFirewallPolicyYamlDetail(args, parsed_globals):
3085
3033
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3086
3034
 
3087
3035
 
3088
- def doDescribeEscapeEventsExport(args, parsed_globals):
3089
- g_param = parse_global_arg(parsed_globals)
3090
-
3091
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3092
- cred = credential.CVMRoleCredential()
3093
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3094
- cred = credential.STSAssumeRoleCredential(
3095
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
- )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
- else:
3101
- cred = credential.Credential(
3102
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3103
- )
3104
- http_profile = HttpProfile(
3105
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3106
- reqMethod="POST",
3107
- endpoint=g_param[OptionsDefine.Endpoint],
3108
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
- )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3111
- if g_param[OptionsDefine.Language]:
3112
- profile.language = g_param[OptionsDefine.Language]
3113
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3114
- client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
3115
- client._sdkVersion += ("_CLI_" + __version__)
3116
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
3117
- model = models.DescribeEscapeEventsExportRequest()
3118
- model.from_json_string(json.dumps(args))
3119
- start_time = time.time()
3120
- while True:
3121
- rsp = client.DescribeEscapeEventsExport(model)
3122
- result = rsp.to_json_string()
3123
- try:
3124
- json_obj = json.loads(result)
3125
- except TypeError as e:
3126
- json_obj = json.loads(result.decode('utf-8')) # python3.3
3127
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3128
- break
3129
- cur_time = time.time()
3130
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3131
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3132
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3133
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3134
- else:
3135
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3136
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3137
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3138
-
3139
-
3140
3036
  def doCheckNetworkFirewallPolicyYaml(args, parsed_globals):
3141
3037
  g_param = parse_global_arg(parsed_globals)
3142
3038
 
@@ -3241,58 +3137,6 @@ def doDescribeComplianceAssetPolicyItemList(args, parsed_globals):
3241
3137
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3242
3138
 
3243
3139
 
3244
- def doDescribeAssetImageListExport(args, parsed_globals):
3245
- g_param = parse_global_arg(parsed_globals)
3246
-
3247
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3248
- cred = credential.CVMRoleCredential()
3249
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3250
- cred = credential.STSAssumeRoleCredential(
3251
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
- )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
- else:
3257
- cred = credential.Credential(
3258
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3259
- )
3260
- http_profile = HttpProfile(
3261
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3262
- reqMethod="POST",
3263
- endpoint=g_param[OptionsDefine.Endpoint],
3264
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
- )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3267
- if g_param[OptionsDefine.Language]:
3268
- profile.language = g_param[OptionsDefine.Language]
3269
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3270
- client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
3271
- client._sdkVersion += ("_CLI_" + __version__)
3272
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
3273
- model = models.DescribeAssetImageListExportRequest()
3274
- model.from_json_string(json.dumps(args))
3275
- start_time = time.time()
3276
- while True:
3277
- rsp = client.DescribeAssetImageListExport(model)
3278
- result = rsp.to_json_string()
3279
- try:
3280
- json_obj = json.loads(result)
3281
- except TypeError as e:
3282
- json_obj = json.loads(result.decode('utf-8')) # python3.3
3283
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3284
- break
3285
- cur_time = time.time()
3286
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3287
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3288
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3289
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3290
- else:
3291
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3292
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3293
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3294
-
3295
-
3296
3140
  def doDescribeAssetImageScanSetting(args, parsed_globals):
3297
3141
  g_param = parse_global_arg(parsed_globals)
3298
3142
 
@@ -4125,7 +3969,7 @@ def doDescribeVirusManualScanEstimateTimeout(args, parsed_globals):
4125
3969
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4126
3970
 
4127
3971
 
4128
- def doDescribeRiskSyscallEventsExport(args, parsed_globals):
3972
+ def doModifySecLogDeliveryClsSetting(args, parsed_globals):
4129
3973
  g_param = parse_global_arg(parsed_globals)
4130
3974
 
4131
3975
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4154,11 +3998,11 @@ def doDescribeRiskSyscallEventsExport(args, parsed_globals):
4154
3998
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
4155
3999
  client._sdkVersion += ("_CLI_" + __version__)
4156
4000
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4157
- model = models.DescribeRiskSyscallEventsExportRequest()
4001
+ model = models.ModifySecLogDeliveryClsSettingRequest()
4158
4002
  model.from_json_string(json.dumps(args))
4159
4003
  start_time = time.time()
4160
4004
  while True:
4161
- rsp = client.DescribeRiskSyscallEventsExport(model)
4005
+ rsp = client.ModifySecLogDeliveryClsSetting(model)
4162
4006
  result = rsp.to_json_string()
4163
4007
  try:
4164
4008
  json_obj = json.loads(result)
@@ -5425,6 +5269,58 @@ def doDescribeContainerAssetSummary(args, parsed_globals):
5425
5269
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5426
5270
 
5427
5271
 
5272
+ def doDescribeRaspRuleVuls(args, parsed_globals):
5273
+ g_param = parse_global_arg(parsed_globals)
5274
+
5275
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
5276
+ cred = credential.CVMRoleCredential()
5277
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
5278
+ cred = credential.STSAssumeRoleCredential(
5279
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
5280
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
5281
+ )
5282
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
5283
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
5284
+ else:
5285
+ cred = credential.Credential(
5286
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
5287
+ )
5288
+ http_profile = HttpProfile(
5289
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
5290
+ reqMethod="POST",
5291
+ endpoint=g_param[OptionsDefine.Endpoint],
5292
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
5293
+ )
5294
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
5295
+ if g_param[OptionsDefine.Language]:
5296
+ profile.language = g_param[OptionsDefine.Language]
5297
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
5298
+ client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
5299
+ client._sdkVersion += ("_CLI_" + __version__)
5300
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
5301
+ model = models.DescribeRaspRuleVulsRequest()
5302
+ model.from_json_string(json.dumps(args))
5303
+ start_time = time.time()
5304
+ while True:
5305
+ rsp = client.DescribeRaspRuleVuls(model)
5306
+ result = rsp.to_json_string()
5307
+ try:
5308
+ json_obj = json.loads(result)
5309
+ except TypeError as e:
5310
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
5311
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
5312
+ break
5313
+ cur_time = time.time()
5314
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
5315
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
5316
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
5317
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
5318
+ else:
5319
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
5320
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
5321
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
5322
+
5323
+
5428
5324
  def doDescribeAssetSuperNodeList(args, parsed_globals):
5429
5325
  g_param = parse_global_arg(parsed_globals)
5430
5326
 
@@ -7297,6 +7193,58 @@ def doCreateImageExportJob(args, parsed_globals):
7297
7193
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7298
7194
 
7299
7195
 
7196
+ def doDeleteRaspRules(args, parsed_globals):
7197
+ g_param = parse_global_arg(parsed_globals)
7198
+
7199
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
7200
+ cred = credential.CVMRoleCredential()
7201
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
7202
+ cred = credential.STSAssumeRoleCredential(
7203
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
7204
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
7205
+ )
7206
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
7207
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
7208
+ else:
7209
+ cred = credential.Credential(
7210
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
7211
+ )
7212
+ http_profile = HttpProfile(
7213
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
7214
+ reqMethod="POST",
7215
+ endpoint=g_param[OptionsDefine.Endpoint],
7216
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
7217
+ )
7218
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
7219
+ if g_param[OptionsDefine.Language]:
7220
+ profile.language = g_param[OptionsDefine.Language]
7221
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
7222
+ client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
7223
+ client._sdkVersion += ("_CLI_" + __version__)
7224
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
7225
+ model = models.DeleteRaspRulesRequest()
7226
+ model.from_json_string(json.dumps(args))
7227
+ start_time = time.time()
7228
+ while True:
7229
+ rsp = client.DeleteRaspRules(model)
7230
+ result = rsp.to_json_string()
7231
+ try:
7232
+ json_obj = json.loads(result)
7233
+ except TypeError as e:
7234
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
7235
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
7236
+ break
7237
+ cur_time = time.time()
7238
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
7239
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
7240
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
7241
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
7242
+ else:
7243
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
7244
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
7245
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
7246
+
7247
+
7300
7248
  def doAddEditWarningRules(args, parsed_globals):
7301
7249
  g_param = parse_global_arg(parsed_globals)
7302
7250
 
@@ -9065,7 +9013,7 @@ def doDescribeEscapeWhiteList(args, parsed_globals):
9065
9013
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9066
9014
 
9067
9015
 
9068
- def doModifyRiskSyscallStatus(args, parsed_globals):
9016
+ def doDeleteK8sApiAbnormalRule(args, parsed_globals):
9069
9017
  g_param = parse_global_arg(parsed_globals)
9070
9018
 
9071
9019
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9094,11 +9042,11 @@ def doModifyRiskSyscallStatus(args, parsed_globals):
9094
9042
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
9095
9043
  client._sdkVersion += ("_CLI_" + __version__)
9096
9044
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9097
- model = models.ModifyRiskSyscallStatusRequest()
9045
+ model = models.DeleteK8sApiAbnormalRuleRequest()
9098
9046
  model.from_json_string(json.dumps(args))
9099
9047
  start_time = time.time()
9100
9048
  while True:
9101
- rsp = client.ModifyRiskSyscallStatus(model)
9049
+ rsp = client.DeleteK8sApiAbnormalRule(model)
9102
9050
  result = rsp.to_json_string()
9103
9051
  try:
9104
9052
  json_obj = json.loads(result)
@@ -9117,7 +9065,7 @@ def doModifyRiskSyscallStatus(args, parsed_globals):
9117
9065
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9118
9066
 
9119
9067
 
9120
- def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
9068
+ def doModifyRiskSyscallStatus(args, parsed_globals):
9121
9069
  g_param = parse_global_arg(parsed_globals)
9122
9070
 
9123
9071
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9146,11 +9094,11 @@ def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
9146
9094
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
9147
9095
  client._sdkVersion += ("_CLI_" + __version__)
9148
9096
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9149
- model = models.DescribeComplianceAssetDetailInfoRequest()
9097
+ model = models.ModifyRiskSyscallStatusRequest()
9150
9098
  model.from_json_string(json.dumps(args))
9151
9099
  start_time = time.time()
9152
9100
  while True:
9153
- rsp = client.DescribeComplianceAssetDetailInfo(model)
9101
+ rsp = client.ModifyRiskSyscallStatus(model)
9154
9102
  result = rsp.to_json_string()
9155
9103
  try:
9156
9104
  json_obj = json.loads(result)
@@ -9169,7 +9117,7 @@ def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
9169
9117
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9170
9118
 
9171
9119
 
9172
- def doCreateVulContainerExportJob(args, parsed_globals):
9120
+ def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
9173
9121
  g_param = parse_global_arg(parsed_globals)
9174
9122
 
9175
9123
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9198,11 +9146,11 @@ def doCreateVulContainerExportJob(args, parsed_globals):
9198
9146
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
9199
9147
  client._sdkVersion += ("_CLI_" + __version__)
9200
9148
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9201
- model = models.CreateVulContainerExportJobRequest()
9149
+ model = models.DescribeComplianceAssetDetailInfoRequest()
9202
9150
  model.from_json_string(json.dumps(args))
9203
9151
  start_time = time.time()
9204
9152
  while True:
9205
- rsp = client.CreateVulContainerExportJob(model)
9153
+ rsp = client.DescribeComplianceAssetDetailInfo(model)
9206
9154
  result = rsp.to_json_string()
9207
9155
  try:
9208
9156
  json_obj = json.loads(result)
@@ -9221,7 +9169,7 @@ def doCreateVulContainerExportJob(args, parsed_globals):
9221
9169
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
9222
9170
 
9223
9171
 
9224
- def doUpdateAndPublishNetworkFirewallPolicyYamlDetail(args, parsed_globals):
9172
+ def doCreateVulContainerExportJob(args, parsed_globals):
9225
9173
  g_param = parse_global_arg(parsed_globals)
9226
9174
 
9227
9175
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -9250,11 +9198,11 @@ def doUpdateAndPublishNetworkFirewallPolicyYamlDetail(args, parsed_globals):
9250
9198
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
9251
9199
  client._sdkVersion += ("_CLI_" + __version__)
9252
9200
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
9253
- model = models.UpdateAndPublishNetworkFirewallPolicyYamlDetailRequest()
9201
+ model = models.CreateVulContainerExportJobRequest()
9254
9202
  model.from_json_string(json.dumps(args))
9255
9203
  start_time = time.time()
9256
9204
  while True:
9257
- rsp = client.UpdateAndPublishNetworkFirewallPolicyYamlDetail(model)
9205
+ rsp = client.CreateVulContainerExportJob(model)
9258
9206
  result = rsp.to_json_string()
9259
9207
  try:
9260
9208
  json_obj = json.loads(result)
@@ -10781,7 +10729,7 @@ def doDescribeVirusAutoIsolateSetting(args, parsed_globals):
10781
10729
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
10782
10730
 
10783
10731
 
10784
- def doDescribeEscapeEventTendency(args, parsed_globals):
10732
+ def doDescribeRaspRules(args, parsed_globals):
10785
10733
  g_param = parse_global_arg(parsed_globals)
10786
10734
 
10787
10735
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -10810,11 +10758,11 @@ def doDescribeEscapeEventTendency(args, parsed_globals):
10810
10758
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
10811
10759
  client._sdkVersion += ("_CLI_" + __version__)
10812
10760
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
10813
- model = models.DescribeEscapeEventTendencyRequest()
10761
+ model = models.DescribeRaspRulesRequest()
10814
10762
  model.from_json_string(json.dumps(args))
10815
10763
  start_time = time.time()
10816
10764
  while True:
10817
- rsp = client.DescribeEscapeEventTendency(model)
10765
+ rsp = client.DescribeRaspRules(model)
10818
10766
  result = rsp.to_json_string()
10819
10767
  try:
10820
10768
  json_obj = json.loads(result)
@@ -11509,7 +11457,7 @@ def doDescribeAssetImageList(args, parsed_globals):
11509
11457
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
11510
11458
 
11511
11459
 
11512
- def doDeleteK8sApiAbnormalRule(args, parsed_globals):
11460
+ def doDescribeEscapeEventTendency(args, parsed_globals):
11513
11461
  g_param = parse_global_arg(parsed_globals)
11514
11462
 
11515
11463
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -11538,11 +11486,11 @@ def doDeleteK8sApiAbnormalRule(args, parsed_globals):
11538
11486
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
11539
11487
  client._sdkVersion += ("_CLI_" + __version__)
11540
11488
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
11541
- model = models.DeleteK8sApiAbnormalRuleRequest()
11489
+ model = models.DescribeEscapeEventTendencyRequest()
11542
11490
  model.from_json_string(json.dumps(args))
11543
11491
  start_time = time.time()
11544
11492
  while True:
11545
- rsp = client.DeleteK8sApiAbnormalRule(model)
11493
+ rsp = client.DescribeEscapeEventTendency(model)
11546
11494
  result = rsp.to_json_string()
11547
11495
  try:
11548
11496
  json_obj = json.loads(result)
@@ -13225,58 +13173,6 @@ def doModifyAsset(args, parsed_globals):
13225
13173
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
13226
13174
 
13227
13175
 
13228
- def doDescribeAccessControlRulesExport(args, parsed_globals):
13229
- g_param = parse_global_arg(parsed_globals)
13230
-
13231
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
13232
- cred = credential.CVMRoleCredential()
13233
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
13234
- cred = credential.STSAssumeRoleCredential(
13235
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
13236
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
13237
- )
13238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
13239
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
13240
- else:
13241
- cred = credential.Credential(
13242
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
13243
- )
13244
- http_profile = HttpProfile(
13245
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
13246
- reqMethod="POST",
13247
- endpoint=g_param[OptionsDefine.Endpoint],
13248
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
13249
- )
13250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
13251
- if g_param[OptionsDefine.Language]:
13252
- profile.language = g_param[OptionsDefine.Language]
13253
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
13254
- client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
13255
- client._sdkVersion += ("_CLI_" + __version__)
13256
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
13257
- model = models.DescribeAccessControlRulesExportRequest()
13258
- model.from_json_string(json.dumps(args))
13259
- start_time = time.time()
13260
- while True:
13261
- rsp = client.DescribeAccessControlRulesExport(model)
13262
- result = rsp.to_json_string()
13263
- try:
13264
- json_obj = json.loads(result)
13265
- except TypeError as e:
13266
- json_obj = json.loads(result.decode('utf-8')) # python3.3
13267
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
13268
- break
13269
- cur_time = time.time()
13270
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
13271
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
13272
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
13273
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
13274
- else:
13275
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
13276
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
13277
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
13278
-
13279
-
13280
13176
  def doDeleteCompliancePolicyItemFromWhitelist(args, parsed_globals):
13281
13177
  g_param = parse_global_arg(parsed_globals)
13282
13178
 
@@ -14421,7 +14317,7 @@ def doCreateVirusScanAgain(args, parsed_globals):
14421
14317
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
14422
14318
 
14423
14319
 
14424
- def doDescribeAutoAuthorizedRuleHost(args, parsed_globals):
14320
+ def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
14425
14321
  g_param = parse_global_arg(parsed_globals)
14426
14322
 
14427
14323
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -14450,11 +14346,11 @@ def doDescribeAutoAuthorizedRuleHost(args, parsed_globals):
14450
14346
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
14451
14347
  client._sdkVersion += ("_CLI_" + __version__)
14452
14348
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
14453
- model = models.DescribeAutoAuthorizedRuleHostRequest()
14349
+ model = models.DescribeAssetImageRegistryVulListExportRequest()
14454
14350
  model.from_json_string(json.dumps(args))
14455
14351
  start_time = time.time()
14456
14352
  while True:
14457
- rsp = client.DescribeAutoAuthorizedRuleHost(model)
14353
+ rsp = client.DescribeAssetImageRegistryVulListExport(model)
14458
14354
  result = rsp.to_json_string()
14459
14355
  try:
14460
14356
  json_obj = json.loads(result)
@@ -15357,6 +15253,58 @@ def doDescribeRiskSyscallNames(args, parsed_globals):
15357
15253
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
15358
15254
 
15359
15255
 
15256
+ def doDescribeAutoAuthorizedRuleHost(args, parsed_globals):
15257
+ g_param = parse_global_arg(parsed_globals)
15258
+
15259
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
15260
+ cred = credential.CVMRoleCredential()
15261
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
15262
+ cred = credential.STSAssumeRoleCredential(
15263
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
15264
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
15265
+ )
15266
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
15267
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
15268
+ else:
15269
+ cred = credential.Credential(
15270
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
15271
+ )
15272
+ http_profile = HttpProfile(
15273
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
15274
+ reqMethod="POST",
15275
+ endpoint=g_param[OptionsDefine.Endpoint],
15276
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
15277
+ )
15278
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
15279
+ if g_param[OptionsDefine.Language]:
15280
+ profile.language = g_param[OptionsDefine.Language]
15281
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
15282
+ client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
15283
+ client._sdkVersion += ("_CLI_" + __version__)
15284
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
15285
+ model = models.DescribeAutoAuthorizedRuleHostRequest()
15286
+ model.from_json_string(json.dumps(args))
15287
+ start_time = time.time()
15288
+ while True:
15289
+ rsp = client.DescribeAutoAuthorizedRuleHost(model)
15290
+ result = rsp.to_json_string()
15291
+ try:
15292
+ json_obj = json.loads(result)
15293
+ except TypeError as e:
15294
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
15295
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
15296
+ break
15297
+ cur_time = time.time()
15298
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
15299
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
15300
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
15301
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
15302
+ else:
15303
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
15304
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
15305
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
15306
+
15307
+
15360
15308
  def doScanComplianceAssetsByPolicyItem(args, parsed_globals):
15361
15309
  g_param = parse_global_arg(parsed_globals)
15362
15310
 
@@ -16761,7 +16709,7 @@ def doDescribeNetworkFirewallPolicyDetail(args, parsed_globals):
16761
16709
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
16762
16710
 
16763
16711
 
16764
- def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
16712
+ def doRenewImageAuthorizeState(args, parsed_globals):
16765
16713
  g_param = parse_global_arg(parsed_globals)
16766
16714
 
16767
16715
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -16790,11 +16738,11 @@ def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
16790
16738
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
16791
16739
  client._sdkVersion += ("_CLI_" + __version__)
16792
16740
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
16793
- model = models.DescribeAssetImageRegistryVulListExportRequest()
16741
+ model = models.RenewImageAuthorizeStateRequest()
16794
16742
  model.from_json_string(json.dumps(args))
16795
16743
  start_time = time.time()
16796
16744
  while True:
16797
- rsp = client.DescribeAssetImageRegistryVulListExport(model)
16745
+ rsp = client.RenewImageAuthorizeState(model)
16798
16746
  result = rsp.to_json_string()
16799
16747
  try:
16800
16748
  json_obj = json.loads(result)
@@ -16813,7 +16761,7 @@ def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
16813
16761
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
16814
16762
 
16815
16763
 
16816
- def doRenewImageAuthorizeState(args, parsed_globals):
16764
+ def doDescribeEventEscapeImageList(args, parsed_globals):
16817
16765
  g_param = parse_global_arg(parsed_globals)
16818
16766
 
16819
16767
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -16842,11 +16790,11 @@ def doRenewImageAuthorizeState(args, parsed_globals):
16842
16790
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
16843
16791
  client._sdkVersion += ("_CLI_" + __version__)
16844
16792
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
16845
- model = models.RenewImageAuthorizeStateRequest()
16793
+ model = models.DescribeEventEscapeImageListRequest()
16846
16794
  model.from_json_string(json.dumps(args))
16847
16795
  start_time = time.time()
16848
16796
  while True:
16849
- rsp = client.RenewImageAuthorizeState(model)
16797
+ rsp = client.DescribeEventEscapeImageList(model)
16850
16798
  result = rsp.to_json_string()
16851
16799
  try:
16852
16800
  json_obj = json.loads(result)
@@ -16865,7 +16813,7 @@ def doRenewImageAuthorizeState(args, parsed_globals):
16865
16813
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
16866
16814
 
16867
16815
 
16868
- def doDescribeEventEscapeImageList(args, parsed_globals):
16816
+ def doDescribeAssetImageRegistryVulList(args, parsed_globals):
16869
16817
  g_param = parse_global_arg(parsed_globals)
16870
16818
 
16871
16819
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -16894,11 +16842,11 @@ def doDescribeEventEscapeImageList(args, parsed_globals):
16894
16842
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
16895
16843
  client._sdkVersion += ("_CLI_" + __version__)
16896
16844
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
16897
- model = models.DescribeEventEscapeImageListRequest()
16845
+ model = models.DescribeAssetImageRegistryVulListRequest()
16898
16846
  model.from_json_string(json.dumps(args))
16899
16847
  start_time = time.time()
16900
16848
  while True:
16901
- rsp = client.DescribeEventEscapeImageList(model)
16849
+ rsp = client.DescribeAssetImageRegistryVulList(model)
16902
16850
  result = rsp.to_json_string()
16903
16851
  try:
16904
16852
  json_obj = json.loads(result)
@@ -16917,7 +16865,7 @@ def doDescribeEventEscapeImageList(args, parsed_globals):
16917
16865
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
16918
16866
 
16919
16867
 
16920
- def doDescribeAssetImageRegistryVulList(args, parsed_globals):
16868
+ def doDescribeEscapeEventTypeSummary(args, parsed_globals):
16921
16869
  g_param = parse_global_arg(parsed_globals)
16922
16870
 
16923
16871
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -16946,11 +16894,11 @@ def doDescribeAssetImageRegistryVulList(args, parsed_globals):
16946
16894
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
16947
16895
  client._sdkVersion += ("_CLI_" + __version__)
16948
16896
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
16949
- model = models.DescribeAssetImageRegistryVulListRequest()
16897
+ model = models.DescribeEscapeEventTypeSummaryRequest()
16950
16898
  model.from_json_string(json.dumps(args))
16951
16899
  start_time = time.time()
16952
16900
  while True:
16953
- rsp = client.DescribeAssetImageRegistryVulList(model)
16901
+ rsp = client.DescribeEscapeEventTypeSummary(model)
16954
16902
  result = rsp.to_json_string()
16955
16903
  try:
16956
16904
  json_obj = json.loads(result)
@@ -16969,7 +16917,7 @@ def doDescribeAssetImageRegistryVulList(args, parsed_globals):
16969
16917
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
16970
16918
 
16971
16919
 
16972
- def doDescribeEscapeEventTypeSummary(args, parsed_globals):
16920
+ def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
16973
16921
  g_param = parse_global_arg(parsed_globals)
16974
16922
 
16975
16923
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -16998,11 +16946,11 @@ def doDescribeEscapeEventTypeSummary(args, parsed_globals):
16998
16946
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
16999
16947
  client._sdkVersion += ("_CLI_" + __version__)
17000
16948
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17001
- model = models.DescribeEscapeEventTypeSummaryRequest()
16949
+ model = models.DescribeVirusAutoIsolateSampleListRequest()
17002
16950
  model.from_json_string(json.dumps(args))
17003
16951
  start_time = time.time()
17004
16952
  while True:
17005
- rsp = client.DescribeEscapeEventTypeSummary(model)
16953
+ rsp = client.DescribeVirusAutoIsolateSampleList(model)
17006
16954
  result = rsp.to_json_string()
17007
16955
  try:
17008
16956
  json_obj = json.loads(result)
@@ -17021,7 +16969,7 @@ def doDescribeEscapeEventTypeSummary(args, parsed_globals):
17021
16969
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17022
16970
 
17023
16971
 
17024
- def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
16972
+ def doDescribeSecLogAlertMsg(args, parsed_globals):
17025
16973
  g_param = parse_global_arg(parsed_globals)
17026
16974
 
17027
16975
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17050,11 +16998,11 @@ def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
17050
16998
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
17051
16999
  client._sdkVersion += ("_CLI_" + __version__)
17052
17000
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17053
- model = models.DescribeVirusAutoIsolateSampleListRequest()
17001
+ model = models.DescribeSecLogAlertMsgRequest()
17054
17002
  model.from_json_string(json.dumps(args))
17055
17003
  start_time = time.time()
17056
17004
  while True:
17057
- rsp = client.DescribeVirusAutoIsolateSampleList(model)
17005
+ rsp = client.DescribeSecLogAlertMsg(model)
17058
17006
  result = rsp.to_json_string()
17059
17007
  try:
17060
17008
  json_obj = json.loads(result)
@@ -17073,7 +17021,7 @@ def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
17073
17021
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17074
17022
 
17075
17023
 
17076
- def doDescribeSecLogAlertMsg(args, parsed_globals):
17024
+ def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
17077
17025
  g_param = parse_global_arg(parsed_globals)
17078
17026
 
17079
17027
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17102,11 +17050,11 @@ def doDescribeSecLogAlertMsg(args, parsed_globals):
17102
17050
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
17103
17051
  client._sdkVersion += ("_CLI_" + __version__)
17104
17052
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17105
- model = models.DescribeSecLogAlertMsgRequest()
17053
+ model = models.ModifyK8sApiAbnormalRuleStatusRequest()
17106
17054
  model.from_json_string(json.dumps(args))
17107
17055
  start_time = time.time()
17108
17056
  while True:
17109
- rsp = client.DescribeSecLogAlertMsg(model)
17057
+ rsp = client.ModifyK8sApiAbnormalRuleStatus(model)
17110
17058
  result = rsp.to_json_string()
17111
17059
  try:
17112
17060
  json_obj = json.loads(result)
@@ -17125,7 +17073,7 @@ def doDescribeSecLogAlertMsg(args, parsed_globals):
17125
17073
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17126
17074
 
17127
17075
 
17128
- def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
17076
+ def doDescribeVulSummary(args, parsed_globals):
17129
17077
  g_param = parse_global_arg(parsed_globals)
17130
17078
 
17131
17079
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17154,11 +17102,11 @@ def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
17154
17102
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
17155
17103
  client._sdkVersion += ("_CLI_" + __version__)
17156
17104
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17157
- model = models.ModifyK8sApiAbnormalRuleStatusRequest()
17105
+ model = models.DescribeVulSummaryRequest()
17158
17106
  model.from_json_string(json.dumps(args))
17159
17107
  start_time = time.time()
17160
17108
  while True:
17161
- rsp = client.ModifyK8sApiAbnormalRuleStatus(model)
17109
+ rsp = client.DescribeVulSummary(model)
17162
17110
  result = rsp.to_json_string()
17163
17111
  try:
17164
17112
  json_obj = json.loads(result)
@@ -17177,7 +17125,7 @@ def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
17177
17125
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
17178
17126
 
17179
17127
 
17180
- def doDescribeVulSummary(args, parsed_globals):
17128
+ def doModifyRaspRules(args, parsed_globals):
17181
17129
  g_param = parse_global_arg(parsed_globals)
17182
17130
 
17183
17131
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -17206,11 +17154,11 @@ def doDescribeVulSummary(args, parsed_globals):
17206
17154
  client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
17207
17155
  client._sdkVersion += ("_CLI_" + __version__)
17208
17156
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
17209
- model = models.DescribeVulSummaryRequest()
17157
+ model = models.ModifyRaspRulesRequest()
17210
17158
  model.from_json_string(json.dumps(args))
17211
17159
  start_time = time.time()
17212
17160
  while True:
17213
- rsp = client.DescribeVulSummary(model)
17161
+ rsp = client.ModifyRaspRules(model)
17214
17162
  result = rsp.to_json_string()
17215
17163
  try:
17216
17164
  json_obj = json.loads(result)
@@ -17607,8 +17555,7 @@ ACTION_MAP = {
17607
17555
  "DeleteEscapeWhiteList": doDeleteEscapeWhiteList,
17608
17556
  "CreateK8sApiAbnormalEventExportJob": doCreateK8sApiAbnormalEventExportJob,
17609
17557
  "DescribeAssetWebServiceList": doDescribeAssetWebServiceList,
17610
- "ModifySecLogDeliveryClsSetting": doModifySecLogDeliveryClsSetting,
17611
- "DescribeAbnormalProcessEventsExport": doDescribeAbnormalProcessEventsExport,
17558
+ "UpdateAndPublishNetworkFirewallPolicyYamlDetail": doUpdateAndPublishNetworkFirewallPolicyYamlDetail,
17612
17559
  "DescribeVirusScanTimeoutSetting": doDescribeVirusScanTimeoutSetting,
17613
17560
  "DescribeVirusSummary": doDescribeVirusSummary,
17614
17561
  "CreateAbnormalProcessRulesExportJob": doCreateAbnormalProcessRulesExportJob,
@@ -17618,7 +17565,7 @@ ACTION_MAP = {
17618
17565
  "DescribePublicKey": doDescribePublicKey,
17619
17566
  "DescribeSearchExportList": doDescribeSearchExportList,
17620
17567
  "ModifyAccessControlRuleStatus": doModifyAccessControlRuleStatus,
17621
- "DescribeAbnormalProcessRulesExport": doDescribeAbnormalProcessRulesExport,
17568
+ "DescribeRiskSyscallEventsExport": doDescribeRiskSyscallEventsExport,
17622
17569
  "DescribeNetworkFirewallPolicyStatus": doDescribeNetworkFirewallPolicyStatus,
17623
17570
  "DescribeEscapeEventDetail": doDescribeEscapeEventDetail,
17624
17571
  "CreateVulDefenceEventExportJob": doCreateVulDefenceEventExportJob,
@@ -17663,10 +17610,8 @@ ACTION_MAP = {
17663
17610
  "CreateAssetImageRegistryScanTaskOneKey": doCreateAssetImageRegistryScanTaskOneKey,
17664
17611
  "ModifyAssetImageScanStop": doModifyAssetImageScanStop,
17665
17612
  "DescribeNetworkFirewallPolicyYamlDetail": doDescribeNetworkFirewallPolicyYamlDetail,
17666
- "DescribeEscapeEventsExport": doDescribeEscapeEventsExport,
17667
17613
  "CheckNetworkFirewallPolicyYaml": doCheckNetworkFirewallPolicyYaml,
17668
17614
  "DescribeComplianceAssetPolicyItemList": doDescribeComplianceAssetPolicyItemList,
17669
- "DescribeAssetImageListExport": doDescribeAssetImageListExport,
17670
17615
  "DescribeAssetImageScanSetting": doDescribeAssetImageScanSetting,
17671
17616
  "CreateCheckComponent": doCreateCheckComponent,
17672
17617
  "ModifySecLogDeliveryKafkaSetting": doModifySecLogDeliveryKafkaSetting,
@@ -17683,7 +17628,7 @@ ACTION_MAP = {
17683
17628
  "DescribeAssetImageRegistryDetail": doDescribeAssetImageRegistryDetail,
17684
17629
  "ModifyEscapeWhiteList": doModifyEscapeWhiteList,
17685
17630
  "DescribeVirusManualScanEstimateTimeout": doDescribeVirusManualScanEstimateTimeout,
17686
- "DescribeRiskSyscallEventsExport": doDescribeRiskSyscallEventsExport,
17631
+ "ModifySecLogDeliveryClsSetting": doModifySecLogDeliveryClsSetting,
17687
17632
  "DescribeImageAutoAuthorizedRule": doDescribeImageAutoAuthorizedRule,
17688
17633
  "DescribeAbnormalProcessRuleDetail": doDescribeAbnormalProcessRuleDetail,
17689
17634
  "CreateVulDefenceHostExportJob": doCreateVulDefenceHostExportJob,
@@ -17708,6 +17653,7 @@ ACTION_MAP = {
17708
17653
  "AddComplianceAssetPolicySetToWhitelist": doAddComplianceAssetPolicySetToWhitelist,
17709
17654
  "ModifySecLogJoinObjects": doModifySecLogJoinObjects,
17710
17655
  "DescribeContainerAssetSummary": doDescribeContainerAssetSummary,
17656
+ "DescribeRaspRuleVuls": doDescribeRaspRuleVuls,
17711
17657
  "DescribeAssetSuperNodeList": doDescribeAssetSuperNodeList,
17712
17658
  "DescribeImageRegistryTimingScanTask": doDescribeImageRegistryTimingScanTask,
17713
17659
  "DescribeReverseShellEventsExport": doDescribeReverseShellEventsExport,
@@ -17744,6 +17690,7 @@ ACTION_MAP = {
17744
17690
  "DescribeVirusAutoIsolateSampleDetail": doDescribeVirusAutoIsolateSampleDetail,
17745
17691
  "AddEscapeWhiteList": doAddEscapeWhiteList,
17746
17692
  "CreateImageExportJob": doCreateImageExportJob,
17693
+ "DeleteRaspRules": doDeleteRaspRules,
17747
17694
  "AddEditWarningRules": doAddEditWarningRules,
17748
17695
  "ScanComplianceAssets": doScanComplianceAssets,
17749
17696
  "StopVirusScanTask": doStopVirusScanTask,
@@ -17778,10 +17725,10 @@ ACTION_MAP = {
17778
17725
  "CreateSystemVulExportJob": doCreateSystemVulExportJob,
17779
17726
  "DescribeVulDefenceEventTendency": doDescribeVulDefenceEventTendency,
17780
17727
  "DescribeEscapeWhiteList": doDescribeEscapeWhiteList,
17728
+ "DeleteK8sApiAbnormalRule": doDeleteK8sApiAbnormalRule,
17781
17729
  "ModifyRiskSyscallStatus": doModifyRiskSyscallStatus,
17782
17730
  "DescribeComplianceAssetDetailInfo": doDescribeComplianceAssetDetailInfo,
17783
17731
  "CreateVulContainerExportJob": doCreateVulContainerExportJob,
17784
- "UpdateAndPublishNetworkFirewallPolicyYamlDetail": doUpdateAndPublishNetworkFirewallPolicyYamlDetail,
17785
17732
  "ModifyImageAuthorized": doModifyImageAuthorized,
17786
17733
  "ModifyAbnormalProcessStatus": doModifyAbnormalProcessStatus,
17787
17734
  "CreateExportComplianceStatusListJob": doCreateExportComplianceStatusListJob,
@@ -17811,7 +17758,7 @@ ACTION_MAP = {
17811
17758
  "DescribeTcssSummary": doDescribeTcssSummary,
17812
17759
  "DescribeVirusMonitorSetting": doDescribeVirusMonitorSetting,
17813
17760
  "DescribeVirusAutoIsolateSetting": doDescribeVirusAutoIsolateSetting,
17814
- "DescribeEscapeEventTendency": doDescribeEscapeEventTendency,
17761
+ "DescribeRaspRules": doDescribeRaspRules,
17815
17762
  "ModifyVirusScanTimeoutSetting": doModifyVirusScanTimeoutSetting,
17816
17763
  "DescribeSecLogCleanSettingInfo": doDescribeSecLogCleanSettingInfo,
17817
17764
  "DescribeSystemVulList": doDescribeSystemVulList,
@@ -17825,7 +17772,7 @@ ACTION_MAP = {
17825
17772
  "DescribeImageAutoAuthorizedTaskList": doDescribeImageAutoAuthorizedTaskList,
17826
17773
  "DescribeComplianceTaskPolicyItemSummaryList": doDescribeComplianceTaskPolicyItemSummaryList,
17827
17774
  "DescribeAssetImageList": doDescribeAssetImageList,
17828
- "DeleteK8sApiAbnormalRule": doDeleteK8sApiAbnormalRule,
17775
+ "DescribeEscapeEventTendency": doDescribeEscapeEventTendency,
17829
17776
  "ExportVirusList": doExportVirusList,
17830
17777
  "CreateProcessEventsExportJob": doCreateProcessEventsExportJob,
17831
17778
  "DescribeAccessControlEvents": doDescribeAccessControlEvents,
@@ -17858,7 +17805,6 @@ ACTION_MAP = {
17858
17805
  "DescribeCompliancePolicyItemAffectedAssetList": doDescribeCompliancePolicyItemAffectedAssetList,
17859
17806
  "DescribeLogStorageStatistic": doDescribeLogStorageStatistic,
17860
17807
  "ModifyAsset": doModifyAsset,
17861
- "DescribeAccessControlRulesExport": doDescribeAccessControlRulesExport,
17862
17808
  "DeleteCompliancePolicyItemFromWhitelist": doDeleteCompliancePolicyItemFromWhitelist,
17863
17809
  "ModifyVirusAutoIsolateSetting": doModifyVirusAutoIsolateSetting,
17864
17810
  "DescribeSecLogKafkaUIN": doDescribeSecLogKafkaUIN,
@@ -17881,7 +17827,7 @@ ACTION_MAP = {
17881
17827
  "DescribeVulLevelImageSummary": doDescribeVulLevelImageSummary,
17882
17828
  "ModifySecLogCleanSettingInfo": doModifySecLogCleanSettingInfo,
17883
17829
  "CreateVirusScanAgain": doCreateVirusScanAgain,
17884
- "DescribeAutoAuthorizedRuleHost": doDescribeAutoAuthorizedRuleHost,
17830
+ "DescribeAssetImageRegistryVulListExport": doDescribeAssetImageRegistryVulListExport,
17885
17831
  "DescribeRiskList": doDescribeRiskList,
17886
17832
  "DescribeVirusSampleDownloadUrl": doDescribeVirusSampleDownloadUrl,
17887
17833
  "DescribeESHits": doDescribeESHits,
@@ -17899,6 +17845,7 @@ ACTION_MAP = {
17899
17845
  "DescribeAssetImageRegistrySummary": doDescribeAssetImageRegistrySummary,
17900
17846
  "OpenTcssTrial": doOpenTcssTrial,
17901
17847
  "DescribeRiskSyscallNames": doDescribeRiskSyscallNames,
17848
+ "DescribeAutoAuthorizedRuleHost": doDescribeAutoAuthorizedRuleHost,
17902
17849
  "ScanComplianceAssetsByPolicyItem": doScanComplianceAssetsByPolicyItem,
17903
17850
  "DescribeImageAuthorizedInfo": doDescribeImageAuthorizedInfo,
17904
17851
  "DescribeRiskSyscallEvents": doDescribeRiskSyscallEvents,
@@ -17926,7 +17873,6 @@ ACTION_MAP = {
17926
17873
  "DescribeVulDefenceSetting": doDescribeVulDefenceSetting,
17927
17874
  "DescribeUserPodList": doDescribeUserPodList,
17928
17875
  "DescribeNetworkFirewallPolicyDetail": doDescribeNetworkFirewallPolicyDetail,
17929
- "DescribeAssetImageRegistryVulListExport": doDescribeAssetImageRegistryVulListExport,
17930
17876
  "RenewImageAuthorizeState": doRenewImageAuthorizeState,
17931
17877
  "DescribeEventEscapeImageList": doDescribeEventEscapeImageList,
17932
17878
  "DescribeAssetImageRegistryVulList": doDescribeAssetImageRegistryVulList,
@@ -17935,6 +17881,7 @@ ACTION_MAP = {
17935
17881
  "DescribeSecLogAlertMsg": doDescribeSecLogAlertMsg,
17936
17882
  "ModifyK8sApiAbnormalRuleStatus": doModifyK8sApiAbnormalRuleStatus,
17937
17883
  "DescribeVulSummary": doDescribeVulSummary,
17884
+ "ModifyRaspRules": doModifyRaspRules,
17938
17885
  "DescribeAssetImageDetail": doDescribeAssetImageDetail,
17939
17886
  "DeleteReverseShellWhiteLists": doDeleteReverseShellWhiteLists,
17940
17887
  "DescribeK8sApiAbnormalEventInfo": doDescribeK8sApiAbnormalEventInfo,