tccli 3.0.1290.1__py2.py3-none-any.whl → 3.0.1291.2__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/antiddos/v20200309/api.json +132 -103
- tccli/services/antiddos/v20200309/examples.json +5 -5
- tccli/services/bi/v20220105/api.json +1 -1
- tccli/services/bi/v20220105/examples.json +1 -1
- tccli/services/cam/v20190116/api.json +39 -33
- tccli/services/cam/v20190116/examples.json +1 -1
- tccli/services/cbs/v20170312/api.json +24 -20
- tccli/services/cdwch/v20200915/api.json +204 -199
- tccli/services/cdwch/v20200915/examples.json +11 -11
- tccli/services/ckafka/v20190819/api.json +273 -268
- tccli/services/clb/v20180317/api.json +12 -8
- tccli/services/cls/cls_client.py +18 -230
- tccli/services/cls/v20201016/api.json +52 -486
- tccli/services/cls/v20201016/examples.json +0 -32
- tccli/services/cvm/v20170312/api.json +10 -0
- tccli/services/cynosdb/v20190107/api.json +95 -95
- tccli/services/dbbrain/v20191016/api.json +30 -30
- tccli/services/dbbrain/v20210527/api.json +103 -103
- tccli/services/dcdb/v20180411/api.json +48 -48
- tccli/services/dnspod/dnspod_client.py +466 -307
- tccli/services/dnspod/v20210323/api.json +391 -0
- tccli/services/dnspod/v20210323/examples.json +24 -0
- tccli/services/dsgc/dsgc_client.py +0 -53
- tccli/services/dsgc/v20190723/api.json +0 -24
- tccli/services/dsgc/v20190723/examples.json +0 -8
- tccli/services/iotvideoindustry/v20201201/api.json +542 -523
- tccli/services/iotvideoindustry/v20201201/examples.json +15 -15
- tccli/services/mariadb/v20170312/api.json +42 -42
- tccli/services/mariadb/v20170312/examples.json +12 -0
- tccli/services/mmps/v20200710/api.json +95 -95
- tccli/services/mps/v20190612/api.json +7 -7
- tccli/services/postgres/v20170312/api.json +308 -283
- tccli/services/svp/v20240125/api.json +66 -66
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/tcb/tcb_client.py +0 -53
- tccli/services/tcb/v20180608/api.json +0 -110
- tccli/services/tcb/v20180608/examples.json +0 -8
- tccli/services/tcss/tcss_client.py +224 -277
- tccli/services/tcss/v20201101/api.json +4618 -4329
- tccli/services/tcss/v20201101/examples.json +207 -221
- tccli/services/tdmq/tdmq_client.py +0 -53
- tccli/services/tdmq/v20200217/api.json +0 -89
- tccli/services/tdmq/v20200217/examples.json +0 -8
- tccli/services/teo/teo_client.py +53 -0
- tccli/services/teo/v20220901/api.json +82 -11
- tccli/services/teo/v20220901/examples.json +8 -0
- tccli/services/thpc/v20211109/api.json +8 -8
- tccli/services/thpc/v20220401/api.json +8 -8
- tccli/services/thpc/v20230321/api.json +11 -10
- tccli/services/tke/v20180525/api.json +60 -60
- tccli/services/tke/v20220501/api.json +34 -34
- tccli/services/vpc/v20170312/api.json +44 -44
- tccli/services/waf/v20180125/api.json +9 -0
- tccli/services/wedata/v20210820/api.json +19 -0
- {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.2.dist-info}/METADATA +2 -2
- {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.2.dist-info}/RECORD +60 -60
- {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.2.dist-info}/WHEEL +0 -0
- {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.2.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1290.1.dist-info → tccli-3.0.1291.2.dist-info}/license_files/LICENSE +0 -0
@@ -173,59 +173,7 @@ def doDescribeAssetWebServiceList(args, parsed_globals):
|
|
173
173
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
174
174
|
|
175
175
|
|
176
|
-
def
|
177
|
-
g_param = parse_global_arg(parsed_globals)
|
178
|
-
|
179
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
180
|
-
cred = credential.CVMRoleCredential()
|
181
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
182
|
-
cred = credential.STSAssumeRoleCredential(
|
183
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
184
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
185
|
-
)
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
187
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
188
|
-
else:
|
189
|
-
cred = credential.Credential(
|
190
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
191
|
-
)
|
192
|
-
http_profile = HttpProfile(
|
193
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
194
|
-
reqMethod="POST",
|
195
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
196
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
197
|
-
)
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
199
|
-
if g_param[OptionsDefine.Language]:
|
200
|
-
profile.language = g_param[OptionsDefine.Language]
|
201
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
202
|
-
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
203
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
204
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
205
|
-
model = models.ModifySecLogDeliveryClsSettingRequest()
|
206
|
-
model.from_json_string(json.dumps(args))
|
207
|
-
start_time = time.time()
|
208
|
-
while True:
|
209
|
-
rsp = client.ModifySecLogDeliveryClsSetting(model)
|
210
|
-
result = rsp.to_json_string()
|
211
|
-
try:
|
212
|
-
json_obj = json.loads(result)
|
213
|
-
except TypeError as e:
|
214
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
215
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
216
|
-
break
|
217
|
-
cur_time = time.time()
|
218
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
219
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
220
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
221
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
222
|
-
else:
|
223
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
224
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
225
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
226
|
-
|
227
|
-
|
228
|
-
def doDescribeAbnormalProcessEventsExport(args, parsed_globals):
|
176
|
+
def doUpdateAndPublishNetworkFirewallPolicyYamlDetail(args, parsed_globals):
|
229
177
|
g_param = parse_global_arg(parsed_globals)
|
230
178
|
|
231
179
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -254,11 +202,11 @@ def doDescribeAbnormalProcessEventsExport(args, parsed_globals):
|
|
254
202
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
255
203
|
client._sdkVersion += ("_CLI_" + __version__)
|
256
204
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
257
|
-
model = models.
|
205
|
+
model = models.UpdateAndPublishNetworkFirewallPolicyYamlDetailRequest()
|
258
206
|
model.from_json_string(json.dumps(args))
|
259
207
|
start_time = time.time()
|
260
208
|
while True:
|
261
|
-
rsp = client.
|
209
|
+
rsp = client.UpdateAndPublishNetworkFirewallPolicyYamlDetail(model)
|
262
210
|
result = rsp.to_json_string()
|
263
211
|
try:
|
264
212
|
json_obj = json.loads(result)
|
@@ -745,7 +693,7 @@ def doModifyAccessControlRuleStatus(args, parsed_globals):
|
|
745
693
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
746
694
|
|
747
695
|
|
748
|
-
def
|
696
|
+
def doDescribeRiskSyscallEventsExport(args, parsed_globals):
|
749
697
|
g_param = parse_global_arg(parsed_globals)
|
750
698
|
|
751
699
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -774,11 +722,11 @@ def doDescribeAbnormalProcessRulesExport(args, parsed_globals):
|
|
774
722
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
775
723
|
client._sdkVersion += ("_CLI_" + __version__)
|
776
724
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
777
|
-
model = models.
|
725
|
+
model = models.DescribeRiskSyscallEventsExportRequest()
|
778
726
|
model.from_json_string(json.dumps(args))
|
779
727
|
start_time = time.time()
|
780
728
|
while True:
|
781
|
-
rsp = client.
|
729
|
+
rsp = client.DescribeRiskSyscallEventsExport(model)
|
782
730
|
result = rsp.to_json_string()
|
783
731
|
try:
|
784
732
|
json_obj = json.loads(result)
|
@@ -3085,58 +3033,6 @@ def doDescribeNetworkFirewallPolicyYamlDetail(args, parsed_globals):
|
|
3085
3033
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3086
3034
|
|
3087
3035
|
|
3088
|
-
def doDescribeEscapeEventsExport(args, parsed_globals):
|
3089
|
-
g_param = parse_global_arg(parsed_globals)
|
3090
|
-
|
3091
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3092
|
-
cred = credential.CVMRoleCredential()
|
3093
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3094
|
-
cred = credential.STSAssumeRoleCredential(
|
3095
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3096
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3097
|
-
)
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3099
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3100
|
-
else:
|
3101
|
-
cred = credential.Credential(
|
3102
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3103
|
-
)
|
3104
|
-
http_profile = HttpProfile(
|
3105
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3106
|
-
reqMethod="POST",
|
3107
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
3108
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3109
|
-
)
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3111
|
-
if g_param[OptionsDefine.Language]:
|
3112
|
-
profile.language = g_param[OptionsDefine.Language]
|
3113
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3114
|
-
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
3115
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
3116
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3117
|
-
model = models.DescribeEscapeEventsExportRequest()
|
3118
|
-
model.from_json_string(json.dumps(args))
|
3119
|
-
start_time = time.time()
|
3120
|
-
while True:
|
3121
|
-
rsp = client.DescribeEscapeEventsExport(model)
|
3122
|
-
result = rsp.to_json_string()
|
3123
|
-
try:
|
3124
|
-
json_obj = json.loads(result)
|
3125
|
-
except TypeError as e:
|
3126
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3127
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3128
|
-
break
|
3129
|
-
cur_time = time.time()
|
3130
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3131
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3132
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3133
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3134
|
-
else:
|
3135
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3136
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3137
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3138
|
-
|
3139
|
-
|
3140
3036
|
def doCheckNetworkFirewallPolicyYaml(args, parsed_globals):
|
3141
3037
|
g_param = parse_global_arg(parsed_globals)
|
3142
3038
|
|
@@ -3241,58 +3137,6 @@ def doDescribeComplianceAssetPolicyItemList(args, parsed_globals):
|
|
3241
3137
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3242
3138
|
|
3243
3139
|
|
3244
|
-
def doDescribeAssetImageListExport(args, parsed_globals):
|
3245
|
-
g_param = parse_global_arg(parsed_globals)
|
3246
|
-
|
3247
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3248
|
-
cred = credential.CVMRoleCredential()
|
3249
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3250
|
-
cred = credential.STSAssumeRoleCredential(
|
3251
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3252
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3253
|
-
)
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3255
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3256
|
-
else:
|
3257
|
-
cred = credential.Credential(
|
3258
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3259
|
-
)
|
3260
|
-
http_profile = HttpProfile(
|
3261
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3262
|
-
reqMethod="POST",
|
3263
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
3264
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3265
|
-
)
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3267
|
-
if g_param[OptionsDefine.Language]:
|
3268
|
-
profile.language = g_param[OptionsDefine.Language]
|
3269
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3270
|
-
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
3271
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
3272
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3273
|
-
model = models.DescribeAssetImageListExportRequest()
|
3274
|
-
model.from_json_string(json.dumps(args))
|
3275
|
-
start_time = time.time()
|
3276
|
-
while True:
|
3277
|
-
rsp = client.DescribeAssetImageListExport(model)
|
3278
|
-
result = rsp.to_json_string()
|
3279
|
-
try:
|
3280
|
-
json_obj = json.loads(result)
|
3281
|
-
except TypeError as e:
|
3282
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3283
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3284
|
-
break
|
3285
|
-
cur_time = time.time()
|
3286
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3287
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3288
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3289
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3290
|
-
else:
|
3291
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3292
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3293
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3294
|
-
|
3295
|
-
|
3296
3140
|
def doDescribeAssetImageScanSetting(args, parsed_globals):
|
3297
3141
|
g_param = parse_global_arg(parsed_globals)
|
3298
3142
|
|
@@ -4125,7 +3969,7 @@ def doDescribeVirusManualScanEstimateTimeout(args, parsed_globals):
|
|
4125
3969
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4126
3970
|
|
4127
3971
|
|
4128
|
-
def
|
3972
|
+
def doModifySecLogDeliveryClsSetting(args, parsed_globals):
|
4129
3973
|
g_param = parse_global_arg(parsed_globals)
|
4130
3974
|
|
4131
3975
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -4154,11 +3998,11 @@ def doDescribeRiskSyscallEventsExport(args, parsed_globals):
|
|
4154
3998
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
4155
3999
|
client._sdkVersion += ("_CLI_" + __version__)
|
4156
4000
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4157
|
-
model = models.
|
4001
|
+
model = models.ModifySecLogDeliveryClsSettingRequest()
|
4158
4002
|
model.from_json_string(json.dumps(args))
|
4159
4003
|
start_time = time.time()
|
4160
4004
|
while True:
|
4161
|
-
rsp = client.
|
4005
|
+
rsp = client.ModifySecLogDeliveryClsSetting(model)
|
4162
4006
|
result = rsp.to_json_string()
|
4163
4007
|
try:
|
4164
4008
|
json_obj = json.loads(result)
|
@@ -5425,6 +5269,58 @@ def doDescribeContainerAssetSummary(args, parsed_globals):
|
|
5425
5269
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5426
5270
|
|
5427
5271
|
|
5272
|
+
def doDescribeRaspRuleVuls(args, parsed_globals):
|
5273
|
+
g_param = parse_global_arg(parsed_globals)
|
5274
|
+
|
5275
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
5276
|
+
cred = credential.CVMRoleCredential()
|
5277
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
5278
|
+
cred = credential.STSAssumeRoleCredential(
|
5279
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
5280
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
5281
|
+
)
|
5282
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
5283
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
5284
|
+
else:
|
5285
|
+
cred = credential.Credential(
|
5286
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
5287
|
+
)
|
5288
|
+
http_profile = HttpProfile(
|
5289
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
5290
|
+
reqMethod="POST",
|
5291
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
5292
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
5293
|
+
)
|
5294
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
5295
|
+
if g_param[OptionsDefine.Language]:
|
5296
|
+
profile.language = g_param[OptionsDefine.Language]
|
5297
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
5298
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
5299
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
5300
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
5301
|
+
model = models.DescribeRaspRuleVulsRequest()
|
5302
|
+
model.from_json_string(json.dumps(args))
|
5303
|
+
start_time = time.time()
|
5304
|
+
while True:
|
5305
|
+
rsp = client.DescribeRaspRuleVuls(model)
|
5306
|
+
result = rsp.to_json_string()
|
5307
|
+
try:
|
5308
|
+
json_obj = json.loads(result)
|
5309
|
+
except TypeError as e:
|
5310
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
5311
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
5312
|
+
break
|
5313
|
+
cur_time = time.time()
|
5314
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
5315
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
5316
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
5317
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
5318
|
+
else:
|
5319
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
5320
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
5321
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
5322
|
+
|
5323
|
+
|
5428
5324
|
def doDescribeAssetSuperNodeList(args, parsed_globals):
|
5429
5325
|
g_param = parse_global_arg(parsed_globals)
|
5430
5326
|
|
@@ -7297,6 +7193,58 @@ def doCreateImageExportJob(args, parsed_globals):
|
|
7297
7193
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7298
7194
|
|
7299
7195
|
|
7196
|
+
def doDeleteRaspRules(args, parsed_globals):
|
7197
|
+
g_param = parse_global_arg(parsed_globals)
|
7198
|
+
|
7199
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7200
|
+
cred = credential.CVMRoleCredential()
|
7201
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7202
|
+
cred = credential.STSAssumeRoleCredential(
|
7203
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7204
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
7205
|
+
)
|
7206
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7207
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7208
|
+
else:
|
7209
|
+
cred = credential.Credential(
|
7210
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7211
|
+
)
|
7212
|
+
http_profile = HttpProfile(
|
7213
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7214
|
+
reqMethod="POST",
|
7215
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7216
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7217
|
+
)
|
7218
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7219
|
+
if g_param[OptionsDefine.Language]:
|
7220
|
+
profile.language = g_param[OptionsDefine.Language]
|
7221
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
7222
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
7223
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
7224
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
7225
|
+
model = models.DeleteRaspRulesRequest()
|
7226
|
+
model.from_json_string(json.dumps(args))
|
7227
|
+
start_time = time.time()
|
7228
|
+
while True:
|
7229
|
+
rsp = client.DeleteRaspRules(model)
|
7230
|
+
result = rsp.to_json_string()
|
7231
|
+
try:
|
7232
|
+
json_obj = json.loads(result)
|
7233
|
+
except TypeError as e:
|
7234
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
7235
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
7236
|
+
break
|
7237
|
+
cur_time = time.time()
|
7238
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
7239
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
7240
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
7241
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
7242
|
+
else:
|
7243
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
7244
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
7245
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7246
|
+
|
7247
|
+
|
7300
7248
|
def doAddEditWarningRules(args, parsed_globals):
|
7301
7249
|
g_param = parse_global_arg(parsed_globals)
|
7302
7250
|
|
@@ -9065,7 +9013,7 @@ def doDescribeEscapeWhiteList(args, parsed_globals):
|
|
9065
9013
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
9066
9014
|
|
9067
9015
|
|
9068
|
-
def
|
9016
|
+
def doDeleteK8sApiAbnormalRule(args, parsed_globals):
|
9069
9017
|
g_param = parse_global_arg(parsed_globals)
|
9070
9018
|
|
9071
9019
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -9094,11 +9042,11 @@ def doModifyRiskSyscallStatus(args, parsed_globals):
|
|
9094
9042
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
9095
9043
|
client._sdkVersion += ("_CLI_" + __version__)
|
9096
9044
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
9097
|
-
model = models.
|
9045
|
+
model = models.DeleteK8sApiAbnormalRuleRequest()
|
9098
9046
|
model.from_json_string(json.dumps(args))
|
9099
9047
|
start_time = time.time()
|
9100
9048
|
while True:
|
9101
|
-
rsp = client.
|
9049
|
+
rsp = client.DeleteK8sApiAbnormalRule(model)
|
9102
9050
|
result = rsp.to_json_string()
|
9103
9051
|
try:
|
9104
9052
|
json_obj = json.loads(result)
|
@@ -9117,7 +9065,7 @@ def doModifyRiskSyscallStatus(args, parsed_globals):
|
|
9117
9065
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
9118
9066
|
|
9119
9067
|
|
9120
|
-
def
|
9068
|
+
def doModifyRiskSyscallStatus(args, parsed_globals):
|
9121
9069
|
g_param = parse_global_arg(parsed_globals)
|
9122
9070
|
|
9123
9071
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -9146,11 +9094,11 @@ def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
|
|
9146
9094
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
9147
9095
|
client._sdkVersion += ("_CLI_" + __version__)
|
9148
9096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
9149
|
-
model = models.
|
9097
|
+
model = models.ModifyRiskSyscallStatusRequest()
|
9150
9098
|
model.from_json_string(json.dumps(args))
|
9151
9099
|
start_time = time.time()
|
9152
9100
|
while True:
|
9153
|
-
rsp = client.
|
9101
|
+
rsp = client.ModifyRiskSyscallStatus(model)
|
9154
9102
|
result = rsp.to_json_string()
|
9155
9103
|
try:
|
9156
9104
|
json_obj = json.loads(result)
|
@@ -9169,7 +9117,7 @@ def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
|
|
9169
9117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
9170
9118
|
|
9171
9119
|
|
9172
|
-
def
|
9120
|
+
def doDescribeComplianceAssetDetailInfo(args, parsed_globals):
|
9173
9121
|
g_param = parse_global_arg(parsed_globals)
|
9174
9122
|
|
9175
9123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -9198,11 +9146,11 @@ def doCreateVulContainerExportJob(args, parsed_globals):
|
|
9198
9146
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
9199
9147
|
client._sdkVersion += ("_CLI_" + __version__)
|
9200
9148
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
9201
|
-
model = models.
|
9149
|
+
model = models.DescribeComplianceAssetDetailInfoRequest()
|
9202
9150
|
model.from_json_string(json.dumps(args))
|
9203
9151
|
start_time = time.time()
|
9204
9152
|
while True:
|
9205
|
-
rsp = client.
|
9153
|
+
rsp = client.DescribeComplianceAssetDetailInfo(model)
|
9206
9154
|
result = rsp.to_json_string()
|
9207
9155
|
try:
|
9208
9156
|
json_obj = json.loads(result)
|
@@ -9221,7 +9169,7 @@ def doCreateVulContainerExportJob(args, parsed_globals):
|
|
9221
9169
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
9222
9170
|
|
9223
9171
|
|
9224
|
-
def
|
9172
|
+
def doCreateVulContainerExportJob(args, parsed_globals):
|
9225
9173
|
g_param = parse_global_arg(parsed_globals)
|
9226
9174
|
|
9227
9175
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -9250,11 +9198,11 @@ def doUpdateAndPublishNetworkFirewallPolicyYamlDetail(args, parsed_globals):
|
|
9250
9198
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
9251
9199
|
client._sdkVersion += ("_CLI_" + __version__)
|
9252
9200
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
9253
|
-
model = models.
|
9201
|
+
model = models.CreateVulContainerExportJobRequest()
|
9254
9202
|
model.from_json_string(json.dumps(args))
|
9255
9203
|
start_time = time.time()
|
9256
9204
|
while True:
|
9257
|
-
rsp = client.
|
9205
|
+
rsp = client.CreateVulContainerExportJob(model)
|
9258
9206
|
result = rsp.to_json_string()
|
9259
9207
|
try:
|
9260
9208
|
json_obj = json.loads(result)
|
@@ -10781,7 +10729,7 @@ def doDescribeVirusAutoIsolateSetting(args, parsed_globals):
|
|
10781
10729
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
10782
10730
|
|
10783
10731
|
|
10784
|
-
def
|
10732
|
+
def doDescribeRaspRules(args, parsed_globals):
|
10785
10733
|
g_param = parse_global_arg(parsed_globals)
|
10786
10734
|
|
10787
10735
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -10810,11 +10758,11 @@ def doDescribeEscapeEventTendency(args, parsed_globals):
|
|
10810
10758
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
10811
10759
|
client._sdkVersion += ("_CLI_" + __version__)
|
10812
10760
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
10813
|
-
model = models.
|
10761
|
+
model = models.DescribeRaspRulesRequest()
|
10814
10762
|
model.from_json_string(json.dumps(args))
|
10815
10763
|
start_time = time.time()
|
10816
10764
|
while True:
|
10817
|
-
rsp = client.
|
10765
|
+
rsp = client.DescribeRaspRules(model)
|
10818
10766
|
result = rsp.to_json_string()
|
10819
10767
|
try:
|
10820
10768
|
json_obj = json.loads(result)
|
@@ -11509,7 +11457,7 @@ def doDescribeAssetImageList(args, parsed_globals):
|
|
11509
11457
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
11510
11458
|
|
11511
11459
|
|
11512
|
-
def
|
11460
|
+
def doDescribeEscapeEventTendency(args, parsed_globals):
|
11513
11461
|
g_param = parse_global_arg(parsed_globals)
|
11514
11462
|
|
11515
11463
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -11538,11 +11486,11 @@ def doDeleteK8sApiAbnormalRule(args, parsed_globals):
|
|
11538
11486
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
11539
11487
|
client._sdkVersion += ("_CLI_" + __version__)
|
11540
11488
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
11541
|
-
model = models.
|
11489
|
+
model = models.DescribeEscapeEventTendencyRequest()
|
11542
11490
|
model.from_json_string(json.dumps(args))
|
11543
11491
|
start_time = time.time()
|
11544
11492
|
while True:
|
11545
|
-
rsp = client.
|
11493
|
+
rsp = client.DescribeEscapeEventTendency(model)
|
11546
11494
|
result = rsp.to_json_string()
|
11547
11495
|
try:
|
11548
11496
|
json_obj = json.loads(result)
|
@@ -13225,58 +13173,6 @@ def doModifyAsset(args, parsed_globals):
|
|
13225
13173
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
13226
13174
|
|
13227
13175
|
|
13228
|
-
def doDescribeAccessControlRulesExport(args, parsed_globals):
|
13229
|
-
g_param = parse_global_arg(parsed_globals)
|
13230
|
-
|
13231
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
13232
|
-
cred = credential.CVMRoleCredential()
|
13233
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
13234
|
-
cred = credential.STSAssumeRoleCredential(
|
13235
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
13236
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
13237
|
-
)
|
13238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
13239
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
13240
|
-
else:
|
13241
|
-
cred = credential.Credential(
|
13242
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
13243
|
-
)
|
13244
|
-
http_profile = HttpProfile(
|
13245
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
13246
|
-
reqMethod="POST",
|
13247
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
13248
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
13249
|
-
)
|
13250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
13251
|
-
if g_param[OptionsDefine.Language]:
|
13252
|
-
profile.language = g_param[OptionsDefine.Language]
|
13253
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
13254
|
-
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
13255
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
13256
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
13257
|
-
model = models.DescribeAccessControlRulesExportRequest()
|
13258
|
-
model.from_json_string(json.dumps(args))
|
13259
|
-
start_time = time.time()
|
13260
|
-
while True:
|
13261
|
-
rsp = client.DescribeAccessControlRulesExport(model)
|
13262
|
-
result = rsp.to_json_string()
|
13263
|
-
try:
|
13264
|
-
json_obj = json.loads(result)
|
13265
|
-
except TypeError as e:
|
13266
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
13267
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
13268
|
-
break
|
13269
|
-
cur_time = time.time()
|
13270
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
13271
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
13272
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
13273
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
13274
|
-
else:
|
13275
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
13276
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
13277
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
13278
|
-
|
13279
|
-
|
13280
13176
|
def doDeleteCompliancePolicyItemFromWhitelist(args, parsed_globals):
|
13281
13177
|
g_param = parse_global_arg(parsed_globals)
|
13282
13178
|
|
@@ -14421,7 +14317,7 @@ def doCreateVirusScanAgain(args, parsed_globals):
|
|
14421
14317
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
14422
14318
|
|
14423
14319
|
|
14424
|
-
def
|
14320
|
+
def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
|
14425
14321
|
g_param = parse_global_arg(parsed_globals)
|
14426
14322
|
|
14427
14323
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -14450,11 +14346,11 @@ def doDescribeAutoAuthorizedRuleHost(args, parsed_globals):
|
|
14450
14346
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
14451
14347
|
client._sdkVersion += ("_CLI_" + __version__)
|
14452
14348
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
14453
|
-
model = models.
|
14349
|
+
model = models.DescribeAssetImageRegistryVulListExportRequest()
|
14454
14350
|
model.from_json_string(json.dumps(args))
|
14455
14351
|
start_time = time.time()
|
14456
14352
|
while True:
|
14457
|
-
rsp = client.
|
14353
|
+
rsp = client.DescribeAssetImageRegistryVulListExport(model)
|
14458
14354
|
result = rsp.to_json_string()
|
14459
14355
|
try:
|
14460
14356
|
json_obj = json.loads(result)
|
@@ -15357,6 +15253,58 @@ def doDescribeRiskSyscallNames(args, parsed_globals):
|
|
15357
15253
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
15358
15254
|
|
15359
15255
|
|
15256
|
+
def doDescribeAutoAuthorizedRuleHost(args, parsed_globals):
|
15257
|
+
g_param = parse_global_arg(parsed_globals)
|
15258
|
+
|
15259
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
15260
|
+
cred = credential.CVMRoleCredential()
|
15261
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
15262
|
+
cred = credential.STSAssumeRoleCredential(
|
15263
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
15264
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
15265
|
+
)
|
15266
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
15267
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
15268
|
+
else:
|
15269
|
+
cred = credential.Credential(
|
15270
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
15271
|
+
)
|
15272
|
+
http_profile = HttpProfile(
|
15273
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
15274
|
+
reqMethod="POST",
|
15275
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
15276
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
15277
|
+
)
|
15278
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
15279
|
+
if g_param[OptionsDefine.Language]:
|
15280
|
+
profile.language = g_param[OptionsDefine.Language]
|
15281
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
15282
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
15283
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
15284
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
15285
|
+
model = models.DescribeAutoAuthorizedRuleHostRequest()
|
15286
|
+
model.from_json_string(json.dumps(args))
|
15287
|
+
start_time = time.time()
|
15288
|
+
while True:
|
15289
|
+
rsp = client.DescribeAutoAuthorizedRuleHost(model)
|
15290
|
+
result = rsp.to_json_string()
|
15291
|
+
try:
|
15292
|
+
json_obj = json.loads(result)
|
15293
|
+
except TypeError as e:
|
15294
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
15295
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
15296
|
+
break
|
15297
|
+
cur_time = time.time()
|
15298
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
15299
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
15300
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
15301
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
15302
|
+
else:
|
15303
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
15304
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
15305
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
15306
|
+
|
15307
|
+
|
15360
15308
|
def doScanComplianceAssetsByPolicyItem(args, parsed_globals):
|
15361
15309
|
g_param = parse_global_arg(parsed_globals)
|
15362
15310
|
|
@@ -16761,7 +16709,7 @@ def doDescribeNetworkFirewallPolicyDetail(args, parsed_globals):
|
|
16761
16709
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16762
16710
|
|
16763
16711
|
|
16764
|
-
def
|
16712
|
+
def doRenewImageAuthorizeState(args, parsed_globals):
|
16765
16713
|
g_param = parse_global_arg(parsed_globals)
|
16766
16714
|
|
16767
16715
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -16790,11 +16738,11 @@ def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
|
|
16790
16738
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
16791
16739
|
client._sdkVersion += ("_CLI_" + __version__)
|
16792
16740
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
16793
|
-
model = models.
|
16741
|
+
model = models.RenewImageAuthorizeStateRequest()
|
16794
16742
|
model.from_json_string(json.dumps(args))
|
16795
16743
|
start_time = time.time()
|
16796
16744
|
while True:
|
16797
|
-
rsp = client.
|
16745
|
+
rsp = client.RenewImageAuthorizeState(model)
|
16798
16746
|
result = rsp.to_json_string()
|
16799
16747
|
try:
|
16800
16748
|
json_obj = json.loads(result)
|
@@ -16813,7 +16761,7 @@ def doDescribeAssetImageRegistryVulListExport(args, parsed_globals):
|
|
16813
16761
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16814
16762
|
|
16815
16763
|
|
16816
|
-
def
|
16764
|
+
def doDescribeEventEscapeImageList(args, parsed_globals):
|
16817
16765
|
g_param = parse_global_arg(parsed_globals)
|
16818
16766
|
|
16819
16767
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -16842,11 +16790,11 @@ def doRenewImageAuthorizeState(args, parsed_globals):
|
|
16842
16790
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
16843
16791
|
client._sdkVersion += ("_CLI_" + __version__)
|
16844
16792
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
16845
|
-
model = models.
|
16793
|
+
model = models.DescribeEventEscapeImageListRequest()
|
16846
16794
|
model.from_json_string(json.dumps(args))
|
16847
16795
|
start_time = time.time()
|
16848
16796
|
while True:
|
16849
|
-
rsp = client.
|
16797
|
+
rsp = client.DescribeEventEscapeImageList(model)
|
16850
16798
|
result = rsp.to_json_string()
|
16851
16799
|
try:
|
16852
16800
|
json_obj = json.loads(result)
|
@@ -16865,7 +16813,7 @@ def doRenewImageAuthorizeState(args, parsed_globals):
|
|
16865
16813
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16866
16814
|
|
16867
16815
|
|
16868
|
-
def
|
16816
|
+
def doDescribeAssetImageRegistryVulList(args, parsed_globals):
|
16869
16817
|
g_param = parse_global_arg(parsed_globals)
|
16870
16818
|
|
16871
16819
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -16894,11 +16842,11 @@ def doDescribeEventEscapeImageList(args, parsed_globals):
|
|
16894
16842
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
16895
16843
|
client._sdkVersion += ("_CLI_" + __version__)
|
16896
16844
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
16897
|
-
model = models.
|
16845
|
+
model = models.DescribeAssetImageRegistryVulListRequest()
|
16898
16846
|
model.from_json_string(json.dumps(args))
|
16899
16847
|
start_time = time.time()
|
16900
16848
|
while True:
|
16901
|
-
rsp = client.
|
16849
|
+
rsp = client.DescribeAssetImageRegistryVulList(model)
|
16902
16850
|
result = rsp.to_json_string()
|
16903
16851
|
try:
|
16904
16852
|
json_obj = json.loads(result)
|
@@ -16917,7 +16865,7 @@ def doDescribeEventEscapeImageList(args, parsed_globals):
|
|
16917
16865
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16918
16866
|
|
16919
16867
|
|
16920
|
-
def
|
16868
|
+
def doDescribeEscapeEventTypeSummary(args, parsed_globals):
|
16921
16869
|
g_param = parse_global_arg(parsed_globals)
|
16922
16870
|
|
16923
16871
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -16946,11 +16894,11 @@ def doDescribeAssetImageRegistryVulList(args, parsed_globals):
|
|
16946
16894
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
16947
16895
|
client._sdkVersion += ("_CLI_" + __version__)
|
16948
16896
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
16949
|
-
model = models.
|
16897
|
+
model = models.DescribeEscapeEventTypeSummaryRequest()
|
16950
16898
|
model.from_json_string(json.dumps(args))
|
16951
16899
|
start_time = time.time()
|
16952
16900
|
while True:
|
16953
|
-
rsp = client.
|
16901
|
+
rsp = client.DescribeEscapeEventTypeSummary(model)
|
16954
16902
|
result = rsp.to_json_string()
|
16955
16903
|
try:
|
16956
16904
|
json_obj = json.loads(result)
|
@@ -16969,7 +16917,7 @@ def doDescribeAssetImageRegistryVulList(args, parsed_globals):
|
|
16969
16917
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
16970
16918
|
|
16971
16919
|
|
16972
|
-
def
|
16920
|
+
def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
|
16973
16921
|
g_param = parse_global_arg(parsed_globals)
|
16974
16922
|
|
16975
16923
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -16998,11 +16946,11 @@ def doDescribeEscapeEventTypeSummary(args, parsed_globals):
|
|
16998
16946
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
16999
16947
|
client._sdkVersion += ("_CLI_" + __version__)
|
17000
16948
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17001
|
-
model = models.
|
16949
|
+
model = models.DescribeVirusAutoIsolateSampleListRequest()
|
17002
16950
|
model.from_json_string(json.dumps(args))
|
17003
16951
|
start_time = time.time()
|
17004
16952
|
while True:
|
17005
|
-
rsp = client.
|
16953
|
+
rsp = client.DescribeVirusAutoIsolateSampleList(model)
|
17006
16954
|
result = rsp.to_json_string()
|
17007
16955
|
try:
|
17008
16956
|
json_obj = json.loads(result)
|
@@ -17021,7 +16969,7 @@ def doDescribeEscapeEventTypeSummary(args, parsed_globals):
|
|
17021
16969
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17022
16970
|
|
17023
16971
|
|
17024
|
-
def
|
16972
|
+
def doDescribeSecLogAlertMsg(args, parsed_globals):
|
17025
16973
|
g_param = parse_global_arg(parsed_globals)
|
17026
16974
|
|
17027
16975
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17050,11 +16998,11 @@ def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
|
|
17050
16998
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
17051
16999
|
client._sdkVersion += ("_CLI_" + __version__)
|
17052
17000
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17053
|
-
model = models.
|
17001
|
+
model = models.DescribeSecLogAlertMsgRequest()
|
17054
17002
|
model.from_json_string(json.dumps(args))
|
17055
17003
|
start_time = time.time()
|
17056
17004
|
while True:
|
17057
|
-
rsp = client.
|
17005
|
+
rsp = client.DescribeSecLogAlertMsg(model)
|
17058
17006
|
result = rsp.to_json_string()
|
17059
17007
|
try:
|
17060
17008
|
json_obj = json.loads(result)
|
@@ -17073,7 +17021,7 @@ def doDescribeVirusAutoIsolateSampleList(args, parsed_globals):
|
|
17073
17021
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17074
17022
|
|
17075
17023
|
|
17076
|
-
def
|
17024
|
+
def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
|
17077
17025
|
g_param = parse_global_arg(parsed_globals)
|
17078
17026
|
|
17079
17027
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17102,11 +17050,11 @@ def doDescribeSecLogAlertMsg(args, parsed_globals):
|
|
17102
17050
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
17103
17051
|
client._sdkVersion += ("_CLI_" + __version__)
|
17104
17052
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17105
|
-
model = models.
|
17053
|
+
model = models.ModifyK8sApiAbnormalRuleStatusRequest()
|
17106
17054
|
model.from_json_string(json.dumps(args))
|
17107
17055
|
start_time = time.time()
|
17108
17056
|
while True:
|
17109
|
-
rsp = client.
|
17057
|
+
rsp = client.ModifyK8sApiAbnormalRuleStatus(model)
|
17110
17058
|
result = rsp.to_json_string()
|
17111
17059
|
try:
|
17112
17060
|
json_obj = json.loads(result)
|
@@ -17125,7 +17073,7 @@ def doDescribeSecLogAlertMsg(args, parsed_globals):
|
|
17125
17073
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17126
17074
|
|
17127
17075
|
|
17128
|
-
def
|
17076
|
+
def doDescribeVulSummary(args, parsed_globals):
|
17129
17077
|
g_param = parse_global_arg(parsed_globals)
|
17130
17078
|
|
17131
17079
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17154,11 +17102,11 @@ def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
|
|
17154
17102
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
17155
17103
|
client._sdkVersion += ("_CLI_" + __version__)
|
17156
17104
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17157
|
-
model = models.
|
17105
|
+
model = models.DescribeVulSummaryRequest()
|
17158
17106
|
model.from_json_string(json.dumps(args))
|
17159
17107
|
start_time = time.time()
|
17160
17108
|
while True:
|
17161
|
-
rsp = client.
|
17109
|
+
rsp = client.DescribeVulSummary(model)
|
17162
17110
|
result = rsp.to_json_string()
|
17163
17111
|
try:
|
17164
17112
|
json_obj = json.loads(result)
|
@@ -17177,7 +17125,7 @@ def doModifyK8sApiAbnormalRuleStatus(args, parsed_globals):
|
|
17177
17125
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
17178
17126
|
|
17179
17127
|
|
17180
|
-
def
|
17128
|
+
def doModifyRaspRules(args, parsed_globals):
|
17181
17129
|
g_param = parse_global_arg(parsed_globals)
|
17182
17130
|
|
17183
17131
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -17206,11 +17154,11 @@ def doDescribeVulSummary(args, parsed_globals):
|
|
17206
17154
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
17207
17155
|
client._sdkVersion += ("_CLI_" + __version__)
|
17208
17156
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
17209
|
-
model = models.
|
17157
|
+
model = models.ModifyRaspRulesRequest()
|
17210
17158
|
model.from_json_string(json.dumps(args))
|
17211
17159
|
start_time = time.time()
|
17212
17160
|
while True:
|
17213
|
-
rsp = client.
|
17161
|
+
rsp = client.ModifyRaspRules(model)
|
17214
17162
|
result = rsp.to_json_string()
|
17215
17163
|
try:
|
17216
17164
|
json_obj = json.loads(result)
|
@@ -17607,8 +17555,7 @@ ACTION_MAP = {
|
|
17607
17555
|
"DeleteEscapeWhiteList": doDeleteEscapeWhiteList,
|
17608
17556
|
"CreateK8sApiAbnormalEventExportJob": doCreateK8sApiAbnormalEventExportJob,
|
17609
17557
|
"DescribeAssetWebServiceList": doDescribeAssetWebServiceList,
|
17610
|
-
"
|
17611
|
-
"DescribeAbnormalProcessEventsExport": doDescribeAbnormalProcessEventsExport,
|
17558
|
+
"UpdateAndPublishNetworkFirewallPolicyYamlDetail": doUpdateAndPublishNetworkFirewallPolicyYamlDetail,
|
17612
17559
|
"DescribeVirusScanTimeoutSetting": doDescribeVirusScanTimeoutSetting,
|
17613
17560
|
"DescribeVirusSummary": doDescribeVirusSummary,
|
17614
17561
|
"CreateAbnormalProcessRulesExportJob": doCreateAbnormalProcessRulesExportJob,
|
@@ -17618,7 +17565,7 @@ ACTION_MAP = {
|
|
17618
17565
|
"DescribePublicKey": doDescribePublicKey,
|
17619
17566
|
"DescribeSearchExportList": doDescribeSearchExportList,
|
17620
17567
|
"ModifyAccessControlRuleStatus": doModifyAccessControlRuleStatus,
|
17621
|
-
"
|
17568
|
+
"DescribeRiskSyscallEventsExport": doDescribeRiskSyscallEventsExport,
|
17622
17569
|
"DescribeNetworkFirewallPolicyStatus": doDescribeNetworkFirewallPolicyStatus,
|
17623
17570
|
"DescribeEscapeEventDetail": doDescribeEscapeEventDetail,
|
17624
17571
|
"CreateVulDefenceEventExportJob": doCreateVulDefenceEventExportJob,
|
@@ -17663,10 +17610,8 @@ ACTION_MAP = {
|
|
17663
17610
|
"CreateAssetImageRegistryScanTaskOneKey": doCreateAssetImageRegistryScanTaskOneKey,
|
17664
17611
|
"ModifyAssetImageScanStop": doModifyAssetImageScanStop,
|
17665
17612
|
"DescribeNetworkFirewallPolicyYamlDetail": doDescribeNetworkFirewallPolicyYamlDetail,
|
17666
|
-
"DescribeEscapeEventsExport": doDescribeEscapeEventsExport,
|
17667
17613
|
"CheckNetworkFirewallPolicyYaml": doCheckNetworkFirewallPolicyYaml,
|
17668
17614
|
"DescribeComplianceAssetPolicyItemList": doDescribeComplianceAssetPolicyItemList,
|
17669
|
-
"DescribeAssetImageListExport": doDescribeAssetImageListExport,
|
17670
17615
|
"DescribeAssetImageScanSetting": doDescribeAssetImageScanSetting,
|
17671
17616
|
"CreateCheckComponent": doCreateCheckComponent,
|
17672
17617
|
"ModifySecLogDeliveryKafkaSetting": doModifySecLogDeliveryKafkaSetting,
|
@@ -17683,7 +17628,7 @@ ACTION_MAP = {
|
|
17683
17628
|
"DescribeAssetImageRegistryDetail": doDescribeAssetImageRegistryDetail,
|
17684
17629
|
"ModifyEscapeWhiteList": doModifyEscapeWhiteList,
|
17685
17630
|
"DescribeVirusManualScanEstimateTimeout": doDescribeVirusManualScanEstimateTimeout,
|
17686
|
-
"
|
17631
|
+
"ModifySecLogDeliveryClsSetting": doModifySecLogDeliveryClsSetting,
|
17687
17632
|
"DescribeImageAutoAuthorizedRule": doDescribeImageAutoAuthorizedRule,
|
17688
17633
|
"DescribeAbnormalProcessRuleDetail": doDescribeAbnormalProcessRuleDetail,
|
17689
17634
|
"CreateVulDefenceHostExportJob": doCreateVulDefenceHostExportJob,
|
@@ -17708,6 +17653,7 @@ ACTION_MAP = {
|
|
17708
17653
|
"AddComplianceAssetPolicySetToWhitelist": doAddComplianceAssetPolicySetToWhitelist,
|
17709
17654
|
"ModifySecLogJoinObjects": doModifySecLogJoinObjects,
|
17710
17655
|
"DescribeContainerAssetSummary": doDescribeContainerAssetSummary,
|
17656
|
+
"DescribeRaspRuleVuls": doDescribeRaspRuleVuls,
|
17711
17657
|
"DescribeAssetSuperNodeList": doDescribeAssetSuperNodeList,
|
17712
17658
|
"DescribeImageRegistryTimingScanTask": doDescribeImageRegistryTimingScanTask,
|
17713
17659
|
"DescribeReverseShellEventsExport": doDescribeReverseShellEventsExport,
|
@@ -17744,6 +17690,7 @@ ACTION_MAP = {
|
|
17744
17690
|
"DescribeVirusAutoIsolateSampleDetail": doDescribeVirusAutoIsolateSampleDetail,
|
17745
17691
|
"AddEscapeWhiteList": doAddEscapeWhiteList,
|
17746
17692
|
"CreateImageExportJob": doCreateImageExportJob,
|
17693
|
+
"DeleteRaspRules": doDeleteRaspRules,
|
17747
17694
|
"AddEditWarningRules": doAddEditWarningRules,
|
17748
17695
|
"ScanComplianceAssets": doScanComplianceAssets,
|
17749
17696
|
"StopVirusScanTask": doStopVirusScanTask,
|
@@ -17778,10 +17725,10 @@ ACTION_MAP = {
|
|
17778
17725
|
"CreateSystemVulExportJob": doCreateSystemVulExportJob,
|
17779
17726
|
"DescribeVulDefenceEventTendency": doDescribeVulDefenceEventTendency,
|
17780
17727
|
"DescribeEscapeWhiteList": doDescribeEscapeWhiteList,
|
17728
|
+
"DeleteK8sApiAbnormalRule": doDeleteK8sApiAbnormalRule,
|
17781
17729
|
"ModifyRiskSyscallStatus": doModifyRiskSyscallStatus,
|
17782
17730
|
"DescribeComplianceAssetDetailInfo": doDescribeComplianceAssetDetailInfo,
|
17783
17731
|
"CreateVulContainerExportJob": doCreateVulContainerExportJob,
|
17784
|
-
"UpdateAndPublishNetworkFirewallPolicyYamlDetail": doUpdateAndPublishNetworkFirewallPolicyYamlDetail,
|
17785
17732
|
"ModifyImageAuthorized": doModifyImageAuthorized,
|
17786
17733
|
"ModifyAbnormalProcessStatus": doModifyAbnormalProcessStatus,
|
17787
17734
|
"CreateExportComplianceStatusListJob": doCreateExportComplianceStatusListJob,
|
@@ -17811,7 +17758,7 @@ ACTION_MAP = {
|
|
17811
17758
|
"DescribeTcssSummary": doDescribeTcssSummary,
|
17812
17759
|
"DescribeVirusMonitorSetting": doDescribeVirusMonitorSetting,
|
17813
17760
|
"DescribeVirusAutoIsolateSetting": doDescribeVirusAutoIsolateSetting,
|
17814
|
-
"
|
17761
|
+
"DescribeRaspRules": doDescribeRaspRules,
|
17815
17762
|
"ModifyVirusScanTimeoutSetting": doModifyVirusScanTimeoutSetting,
|
17816
17763
|
"DescribeSecLogCleanSettingInfo": doDescribeSecLogCleanSettingInfo,
|
17817
17764
|
"DescribeSystemVulList": doDescribeSystemVulList,
|
@@ -17825,7 +17772,7 @@ ACTION_MAP = {
|
|
17825
17772
|
"DescribeImageAutoAuthorizedTaskList": doDescribeImageAutoAuthorizedTaskList,
|
17826
17773
|
"DescribeComplianceTaskPolicyItemSummaryList": doDescribeComplianceTaskPolicyItemSummaryList,
|
17827
17774
|
"DescribeAssetImageList": doDescribeAssetImageList,
|
17828
|
-
"
|
17775
|
+
"DescribeEscapeEventTendency": doDescribeEscapeEventTendency,
|
17829
17776
|
"ExportVirusList": doExportVirusList,
|
17830
17777
|
"CreateProcessEventsExportJob": doCreateProcessEventsExportJob,
|
17831
17778
|
"DescribeAccessControlEvents": doDescribeAccessControlEvents,
|
@@ -17858,7 +17805,6 @@ ACTION_MAP = {
|
|
17858
17805
|
"DescribeCompliancePolicyItemAffectedAssetList": doDescribeCompliancePolicyItemAffectedAssetList,
|
17859
17806
|
"DescribeLogStorageStatistic": doDescribeLogStorageStatistic,
|
17860
17807
|
"ModifyAsset": doModifyAsset,
|
17861
|
-
"DescribeAccessControlRulesExport": doDescribeAccessControlRulesExport,
|
17862
17808
|
"DeleteCompliancePolicyItemFromWhitelist": doDeleteCompliancePolicyItemFromWhitelist,
|
17863
17809
|
"ModifyVirusAutoIsolateSetting": doModifyVirusAutoIsolateSetting,
|
17864
17810
|
"DescribeSecLogKafkaUIN": doDescribeSecLogKafkaUIN,
|
@@ -17881,7 +17827,7 @@ ACTION_MAP = {
|
|
17881
17827
|
"DescribeVulLevelImageSummary": doDescribeVulLevelImageSummary,
|
17882
17828
|
"ModifySecLogCleanSettingInfo": doModifySecLogCleanSettingInfo,
|
17883
17829
|
"CreateVirusScanAgain": doCreateVirusScanAgain,
|
17884
|
-
"
|
17830
|
+
"DescribeAssetImageRegistryVulListExport": doDescribeAssetImageRegistryVulListExport,
|
17885
17831
|
"DescribeRiskList": doDescribeRiskList,
|
17886
17832
|
"DescribeVirusSampleDownloadUrl": doDescribeVirusSampleDownloadUrl,
|
17887
17833
|
"DescribeESHits": doDescribeESHits,
|
@@ -17899,6 +17845,7 @@ ACTION_MAP = {
|
|
17899
17845
|
"DescribeAssetImageRegistrySummary": doDescribeAssetImageRegistrySummary,
|
17900
17846
|
"OpenTcssTrial": doOpenTcssTrial,
|
17901
17847
|
"DescribeRiskSyscallNames": doDescribeRiskSyscallNames,
|
17848
|
+
"DescribeAutoAuthorizedRuleHost": doDescribeAutoAuthorizedRuleHost,
|
17902
17849
|
"ScanComplianceAssetsByPolicyItem": doScanComplianceAssetsByPolicyItem,
|
17903
17850
|
"DescribeImageAuthorizedInfo": doDescribeImageAuthorizedInfo,
|
17904
17851
|
"DescribeRiskSyscallEvents": doDescribeRiskSyscallEvents,
|
@@ -17926,7 +17873,6 @@ ACTION_MAP = {
|
|
17926
17873
|
"DescribeVulDefenceSetting": doDescribeVulDefenceSetting,
|
17927
17874
|
"DescribeUserPodList": doDescribeUserPodList,
|
17928
17875
|
"DescribeNetworkFirewallPolicyDetail": doDescribeNetworkFirewallPolicyDetail,
|
17929
|
-
"DescribeAssetImageRegistryVulListExport": doDescribeAssetImageRegistryVulListExport,
|
17930
17876
|
"RenewImageAuthorizeState": doRenewImageAuthorizeState,
|
17931
17877
|
"DescribeEventEscapeImageList": doDescribeEventEscapeImageList,
|
17932
17878
|
"DescribeAssetImageRegistryVulList": doDescribeAssetImageRegistryVulList,
|
@@ -17935,6 +17881,7 @@ ACTION_MAP = {
|
|
17935
17881
|
"DescribeSecLogAlertMsg": doDescribeSecLogAlertMsg,
|
17936
17882
|
"ModifyK8sApiAbnormalRuleStatus": doModifyK8sApiAbnormalRuleStatus,
|
17937
17883
|
"DescribeVulSummary": doDescribeVulSummary,
|
17884
|
+
"ModifyRaspRules": doModifyRaspRules,
|
17938
17885
|
"DescribeAssetImageDetail": doDescribeAssetImageDetail,
|
17939
17886
|
"DeleteReverseShellWhiteLists": doDeleteReverseShellWhiteLists,
|
17940
17887
|
"DescribeK8sApiAbnormalEventInfo": doDescribeK8sApiAbnormalEventInfo,
|