tccli 3.0.1326.1__py2.py3-none-any.whl → 3.0.1328.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (70) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/ams/v20201229/api.json +9 -9
  3. tccli/services/apm/v20210622/api.json +10 -1
  4. tccli/services/apm/v20210622/examples.json +2 -2
  5. tccli/services/bh/v20230418/api.json +9 -0
  6. tccli/services/cbs/v20170312/api.json +2 -2
  7. tccli/services/cdb/v20170320/api.json +30 -12
  8. tccli/services/cdc/v20201214/api.json +5 -5
  9. tccli/services/cfs/v20190719/api.json +4 -4
  10. tccli/services/chc/chc_client.py +53 -0
  11. tccli/services/chc/v20230418/api.json +62 -0
  12. tccli/services/chc/v20230418/examples.json +8 -0
  13. tccli/services/clb/clb_client.py +53 -0
  14. tccli/services/clb/v20180317/api.json +100 -0
  15. tccli/services/clb/v20180317/examples.json +8 -0
  16. tccli/services/cvm/v20170312/api.json +2 -2
  17. tccli/services/cwp/v20180228/api.json +92 -1
  18. tccli/services/dbbrain/v20210527/api.json +4 -4
  19. tccli/services/dcdb/v20180411/examples.json +1 -1
  20. tccli/services/dts/v20211206/api.json +3 -3
  21. tccli/services/emr/v20190103/api.json +193 -9
  22. tccli/services/ess/ess_client.py +126 -20
  23. tccli/services/ess/v20201111/api.json +135 -1
  24. tccli/services/ess/v20201111/examples.json +22 -0
  25. tccli/services/essbasic/v20210526/api.json +1 -1
  26. tccli/services/gs/gs_client.py +836 -147
  27. tccli/services/gs/v20191118/api.json +964 -28
  28. tccli/services/gs/v20191118/examples.json +106 -2
  29. tccli/services/iotexplorer/v20190423/api.json +5 -5
  30. tccli/services/iotexplorer/v20190423/examples.json +1 -1
  31. tccli/services/lowcode/v20210108/api.json +60 -0
  32. tccli/services/mariadb/v20170312/api.json +10 -10
  33. tccli/services/monitor/monitor_client.py +117 -11
  34. tccli/services/monitor/v20180724/api.json +151 -0
  35. tccli/services/monitor/v20180724/examples.json +16 -0
  36. tccli/services/mrs/v20200910/api.json +1 -1
  37. tccli/services/oceanus/v20190422/api.json +15 -5
  38. tccli/services/oceanus/v20190422/examples.json +8 -2
  39. tccli/services/ocr/v20181119/api.json +74 -9
  40. tccli/services/partners/v20180321/api.json +7 -7
  41. tccli/services/privatedns/privatedns_client.py +53 -0
  42. tccli/services/privatedns/v20201028/api.json +179 -0
  43. tccli/services/privatedns/v20201028/examples.json +8 -0
  44. tccli/services/tcss/v20201101/api.json +248 -35
  45. tccli/services/tcss/v20201101/examples.json +8 -8
  46. tccli/services/tem/tem_client.py +53 -0
  47. tccli/services/tem/v20210701/api.json +107 -0
  48. tccli/services/tem/v20210701/examples.json +8 -0
  49. tccli/services/teo/v20220901/api.json +807 -74
  50. tccli/services/teo/v20220901/examples.json +2 -2
  51. tccli/services/tms/v20201229/api.json +2 -2
  52. tccli/services/tms/v20201229/examples.json +1 -1
  53. tccli/services/trtc/v20190722/api.json +2 -2
  54. tccli/services/vclm/v20240523/api.json +173 -0
  55. tccli/services/vclm/v20240523/examples.json +16 -0
  56. tccli/services/vclm/vclm_client.py +106 -0
  57. tccli/services/vm/v20210922/api.json +13 -13
  58. tccli/services/vm/v20210922/examples.json +2 -2
  59. tccli/services/vod/v20180717/api.json +13 -11
  60. tccli/services/vod/v20180717/examples.json +4 -4
  61. tccli/services/vpc/v20170312/api.json +12 -3
  62. tccli/services/waf/v20180125/api.json +2 -2
  63. tccli/services/wedata/v20210820/api.json +952 -0
  64. tccli/services/wedata/v20210820/examples.json +8 -0
  65. tccli/services/wedata/wedata_client.py +53 -0
  66. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/METADATA +2 -2
  67. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/RECORD +70 -70
  68. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/WHEEL +0 -0
  69. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/entry_points.txt +0 -0
  70. {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/license_files/LICENSE +0 -0
@@ -704,7 +704,7 @@
704
704
  {
705
705
  "document": "运行时访问控制事件列表",
706
706
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlEvents\n<公共请求参数>\n\n{}",
707
- "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fdj4****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 10012,\n \"EventType\": \"NORMAL\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13\n }\n}",
707
+ "output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fdj4****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 10012,\n \"EventType\": \"NORMAL\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13,\n \"SupportCoreVersion\": \"4.15.0-142-|4.18.0-80|4.18.0-193.28.1*|5.4.0-77-*|5.4.119.19.009.56\",\n \"InterceptionFailureTip\": \"非读写操作暂未支持拦截,如新建/重命名等,touch/mv 等操作。\"\n }\n}",
708
708
  "title": "运行时访问控制事件列表"
709
709
  }
710
710
  ],
@@ -920,7 +920,7 @@
920
920
  {
921
921
  "document": "",
922
922
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"InstanceName\",\n \"InstanceId\",\n \"RegistryType\",\n \"Namespace\",\n \"ImageName\",\n \"ImageTag\",\n \"ImageSize\",\n \"ImageDigest\",\n \"ImageId\",\n \"ImageRepoAddress\",\n \"ScanStatus\",\n \"VulCnt\",\n \"VirusCnt\",\n \"RiskCnt\",\n \"ScanStartTime\",\n \"ScanEndTime\",\n \"OsName\",\n \"IsAuthorized\",\n \"RegistryRegion\"\n ]\n}",
923
- "output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
923
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://download.url\",\n \"JobId\": \"1012\"\n }\n}",
924
924
  "title": "镜像仓库镜像列表导出"
925
925
  }
926
926
  ],
@@ -996,7 +996,7 @@
996
996
  {
997
997
  "document": "",
998
998
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 1001\n}",
999
- "output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
999
+ "output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://download.url\",\n \"JobId\": \"1012\"\n }\n}",
1000
1000
  "title": "镜像仓库木马信息列表导出"
1001
1001
  }
1002
1002
  ],
@@ -1012,7 +1012,7 @@
1012
1012
  {
1013
1013
  "document": "",
1014
1014
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"CVEId\",\n \"POCId\",\n \"Name\",\n \"Components\",\n \"Category\",\n \"CategoryType\",\n \"Level\",\n \"Des\",\n \"OfficialSolution\",\n \"Reference\",\n \"DefenseSolution\",\n \"SubmitTime\",\n \"CVSS_Score\",\n \"CVSS_Desc\"\n ],\n \"Id\": 121\n}",
1015
- "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
1015
+ "output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\",\n \"JobId\": \"1012\"\n }\n}",
1016
1016
  "title": "镜像仓库漏洞列表导出"
1017
1017
  }
1018
1018
  ],
@@ -1132,7 +1132,7 @@
1132
1132
  {
1133
1133
  "document": "",
1134
1134
  "input": "https://tcss.tencentcloudapi.com/?Action=DescribeAssetSyncLastTime\n&<公共请求参数>",
1135
- "output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"2024-10-30 11:48:49\",\n \"TaskStatus\": \"PROCESSED\",\n \"TaskProcess\": 10,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb918846666\"\n }\n}",
1135
+ "output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"2024-10-30 11:48:49\",\n \"TaskStatus\": \"PROCESSED\",\n \"TaskProcess\": 10,\n \"FailedHostCount\": 10,\n \"TaskId\": 100,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb918846666\"\n }\n}",
1136
1136
  "title": "查询资产同步最近时间"
1137
1137
  }
1138
1138
  ],
@@ -2066,7 +2066,7 @@
2066
2066
  {
2067
2067
  "document": "运行时查询木马文件信息",
2068
2068
  "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusDetail\n<公共请求参数>\n\n{\n \"Id\": \"10021\"\n}",
2069
- "output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4ed805844e07bd15663e4f778acf9bf388719cbcdf794290b9637a550a21d6 -address /run/containerd/containerd.****\",\n \"AncestorProcessPath\": \"/usr/local/bin/containerd-shim-run****\",\n \"AncestorProcessStartUser\": \"0\",\n \"AncestorProcessUserGroup\": \"0\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"10.*.*.1\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496a*******\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/container_name\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a******\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_*******\",\n \"FilePath\": \"/home/virus/specimen_******\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。\",\n \"HostIP\": \"10.0.0.1\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-abb0cd4f92aa\",\n \"HostName\": \"hostname\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd*******\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"mark reason\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.*.*.1/24\",\n \"NodeSubNetID\": \"subnet-aau2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-**\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"node dist/inde****\",\n \"PProcessPath\": \"/usr/bin/****\",\n \"PProcessStartUser\": \"root\",\n \"PProcessUserGroup\": \"root\",\n \"PodIP\": \"10.0.*.*\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAccountGroup\": \"root\",\n \"ProcessArgv\": \"git clone --depth=1 https://github.com/busi\",\n \"ProcessChan\": \"git(433802)|node(280016)|containerd-shim-runc-v2(176637)|system****\",\n \"ProcessFileAuthority\": \"-rwxr-****\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"472c65af3f43136472d1a383f5******\",\n \"ProcessName\": \"/bin/a***\",\n \"ProcessPath\": \"/usr/bin****\",\n \"ProcessStartAccount\": \"root\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836*****\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"DaemonSet\"\n }\n}",
2069
+ "output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4ed805844e07bd15663e4f778acf9bf388719cbcdf794290b9637a550a21d6 -address /run/containerd/containerd.****\",\n \"AncestorProcessPath\": \"/usr/local/bin/containerd-shim-run****\",\n \"AncestorProcessStartUser\": \"0\",\n \"AncestorProcessUserGroup\": \"0\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"10.*.*.1\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496a*******\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/container_name\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a******\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_*******\",\n \"FilePath\": \"/home/virus/specimen_******\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。\",\n \"HostIP\": \"10.0.0.1\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-abb0cd4f92aa\",\n \"HostName\": \"hostname\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd*******\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"mark reason\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.*.*.1/24\",\n \"NodeSubNetID\": \"subnet-aau2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-**\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"node dist/inde****\",\n \"PProcessPath\": \"/usr/bin/****\",\n \"PProcessStartUser\": \"root\",\n \"PProcessUserGroup\": \"root\",\n \"PodIP\": \"10.0.*.*\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAccountGroup\": \"root\",\n \"ProcessArgv\": \"git clone --depth=1 https://github.com/busi\",\n \"ProcessChan\": \"git(433802)|node(280016)|containerd-shim-runc-v2(176637)|system****\",\n \"ProcessFileAuthority\": \"-rwxr-****\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"472c65af3f43136472d1a383f5******\",\n \"ProcessName\": \"/bin/a***\",\n \"ProcessPath\": \"/usr/bin****\",\n \"ProcessStartAccount\": \"root\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836*****\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"DaemonSet\",\n \"ContainerStatus\": \"RUNNING\"\n }\n}",
2070
2070
  "title": "运行时查询木马文件信息"
2071
2071
  }
2072
2072
  ],
@@ -2385,8 +2385,8 @@
2385
2385
  "ModifyAsset": [
2386
2386
  {
2387
2387
  "document": "",
2388
- "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAsset\n<公共请求参数>\n\n{\n \"All\": true,\n \"Hosts\": []\n}",
2389
- "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\",\n \"Status\": \"SUCCESS\"\n }\n}",
2388
+ "input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAsset\n<公共请求参数>\n\n{\n \"All\": true,\n \"Hosts\": [],\n \"AllSuperHost\": true,\n \"NodeUniqueIds\": [],\n \"TimeoutSec\": 3600\n}",
2389
+ "output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\",\n \"Status\": \"SUCCESS\",\n \"TaskId\": 10086\n }\n}",
2390
2390
  "title": "主机资产刷新"
2391
2391
  }
2392
2392
  ],
@@ -1059,6 +1059,58 @@ def doResumeDeployApplication(args, parsed_globals):
1059
1059
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1060
1060
 
1061
1061
 
1062
+ def doModifyGatewayIngress(args, parsed_globals):
1063
+ g_param = parse_global_arg(parsed_globals)
1064
+
1065
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1066
+ cred = credential.CVMRoleCredential()
1067
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1068
+ cred = credential.STSAssumeRoleCredential(
1069
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1070
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1071
+ )
1072
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1073
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1074
+ else:
1075
+ cred = credential.Credential(
1076
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1077
+ )
1078
+ http_profile = HttpProfile(
1079
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1080
+ reqMethod="POST",
1081
+ endpoint=g_param[OptionsDefine.Endpoint],
1082
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1083
+ )
1084
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1085
+ if g_param[OptionsDefine.Language]:
1086
+ profile.language = g_param[OptionsDefine.Language]
1087
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1088
+ client = mod.TemClient(cred, g_param[OptionsDefine.Region], profile)
1089
+ client._sdkVersion += ("_CLI_" + __version__)
1090
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1091
+ model = models.ModifyGatewayIngressRequest()
1092
+ model.from_json_string(json.dumps(args))
1093
+ start_time = time.time()
1094
+ while True:
1095
+ rsp = client.ModifyGatewayIngress(model)
1096
+ result = rsp.to_json_string()
1097
+ try:
1098
+ json_obj = json.loads(result)
1099
+ except TypeError as e:
1100
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1101
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1102
+ break
1103
+ cur_time = time.time()
1104
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1105
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1106
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1107
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1108
+ else:
1109
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1110
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1111
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1112
+
1113
+
1062
1114
  def doModifyEnvironment(args, parsed_globals):
1063
1115
  g_param = parse_global_arg(parsed_globals)
1064
1116
 
@@ -3172,6 +3224,7 @@ ACTION_MAP = {
3172
3224
  "ModifyApplicationAutoscaler": doModifyApplicationAutoscaler,
3173
3225
  "DescribePagedLogConfigList": doDescribePagedLogConfigList,
3174
3226
  "ResumeDeployApplication": doResumeDeployApplication,
3227
+ "ModifyGatewayIngress": doModifyGatewayIngress,
3175
3228
  "ModifyEnvironment": doModifyEnvironment,
3176
3229
  "DescribeEnvironment": doDescribeEnvironment,
3177
3230
  "DescribeLogConfig": doDescribeLogConfig,
@@ -294,6 +294,13 @@
294
294
  "output": "ModifyEnvironmentResponse",
295
295
  "status": "online"
296
296
  },
297
+ "ModifyGatewayIngress": {
298
+ "document": "修改网关的转发配置",
299
+ "input": "ModifyGatewayIngressRequest",
300
+ "name": "修改网关的转发配置",
301
+ "output": "ModifyGatewayIngressResponse",
302
+ "status": "online"
303
+ },
297
304
  "ModifyIngress": {
298
305
  "document": "此接口没有被使用了\n\n创建或者更新 Ingress 规则",
299
306
  "input": "ModifyIngressRequest",
@@ -5489,6 +5496,106 @@
5489
5496
  ],
5490
5497
  "type": "object"
5491
5498
  },
5499
+ "ModifyGatewayIngressRequest": {
5500
+ "document": "ModifyGatewayIngress请求参数结构体",
5501
+ "members": [
5502
+ {
5503
+ "disabled": false,
5504
+ "document": "环境 ID",
5505
+ "example": "en-xxx",
5506
+ "member": "string",
5507
+ "name": "EnvironmentId",
5508
+ "required": false,
5509
+ "type": "string"
5510
+ },
5511
+ {
5512
+ "disabled": false,
5513
+ "document": "网关名称",
5514
+ "example": "gateway",
5515
+ "member": "string",
5516
+ "name": "GatewayName",
5517
+ "required": false,
5518
+ "type": "string"
5519
+ },
5520
+ {
5521
+ "disabled": false,
5522
+ "document": "网关类型,如 clb",
5523
+ "example": "clb",
5524
+ "member": "string",
5525
+ "name": "GatewayType",
5526
+ "required": false,
5527
+ "type": "string"
5528
+ },
5529
+ {
5530
+ "disabled": false,
5531
+ "document": "转发配置名称",
5532
+ "example": "xxx",
5533
+ "member": "string",
5534
+ "name": "Name",
5535
+ "required": false,
5536
+ "type": "string"
5537
+ },
5538
+ {
5539
+ "disabled": false,
5540
+ "document": "rules 配置",
5541
+ "example": "{}",
5542
+ "member": "IngressRule",
5543
+ "name": "Rules",
5544
+ "required": false,
5545
+ "type": "list"
5546
+ },
5547
+ {
5548
+ "disabled": false,
5549
+ "document": "是否混合 https,默认 false,可选值 true 代表有 https 协议监听",
5550
+ "example": "false",
5551
+ "member": "bool",
5552
+ "name": "Mixed",
5553
+ "required": false,
5554
+ "type": "bool"
5555
+ },
5556
+ {
5557
+ "disabled": false,
5558
+ "document": "tls 配置",
5559
+ "example": "{}",
5560
+ "member": "IngressTls",
5561
+ "name": "Tls",
5562
+ "required": false,
5563
+ "type": "list"
5564
+ },
5565
+ {
5566
+ "disabled": false,
5567
+ "document": "重定向模式,可选值:\n- AUTO(自动重定向http到https)\n- NONE(不使用重定向)",
5568
+ "example": "NONE",
5569
+ "member": "string",
5570
+ "name": "RewriteType",
5571
+ "required": false,
5572
+ "type": "string"
5573
+ }
5574
+ ],
5575
+ "type": "object"
5576
+ },
5577
+ "ModifyGatewayIngressResponse": {
5578
+ "document": "ModifyGatewayIngress返回参数结构体",
5579
+ "members": [
5580
+ {
5581
+ "disabled": false,
5582
+ "document": "是否成功\n注意:此字段可能返回 null,表示取不到有效值。",
5583
+ "example": "true",
5584
+ "member": "bool",
5585
+ "name": "Result",
5586
+ "required": true,
5587
+ "type": "bool",
5588
+ "value_allowed_null": true
5589
+ },
5590
+ {
5591
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
5592
+ "member": "string",
5593
+ "name": "RequestId",
5594
+ "type": "string"
5595
+ }
5596
+ ],
5597
+ "type": "object"
5598
+ },
5492
5599
  "ModifyIngressRequest": {
5493
5600
  "document": "ModifyIngress请求参数结构体",
5494
5601
  "members": [
@@ -336,6 +336,14 @@
336
336
  "title": "编辑环境"
337
337
  }
338
338
  ],
339
+ "ModifyGatewayIngress": [
340
+ {
341
+ "document": "修改网关的转发配置",
342
+ "input": "POST / HTTP/1.1\nHost: tem.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyGatewayIngress\n<公共请求参数>\n\n{\n \"EnvironmentId\": \"xx\",\n \"GatewayType\": \"clb\",\n \"GatewayName\": \"xx\",\n \"Name\": \"xx\",\n \"Rules\": [\n {\n \"Protocol\": \"xx\",\n \"Host\": \"xx\",\n \"Http\": {\n \"Paths\": [\n {\n \"Path\": \"xx\",\n \"Backend\": {\n \"ServiceName\": \"xx\",\n \"ServicePort\": 443\n }\n }\n ]\n }\n }\n ],\n \"Tls\": [\n {\n \"CertificateId\": \"xx\",\n \"Hosts\": [\n \"xxx.com\"\n ],\n \"SecretName\": \"xx\"\n }\n ],\n \"Mixed\": true,\n \"RewriteType\": \"NONE\"\n}",
343
+ "output": "{\n \"Response\": {\n \"RequestId\": \"81f74023-563c-437d-abf7-8139449ef178\",\n \"Result\": true\n }\n}",
344
+ "title": "修改网关的转发配置"
345
+ }
346
+ ],
339
347
  "ModifyIngress": [
340
348
  {
341
349
  "document": "创建或者更新 Ingress 规则",