tccli 3.0.1326.1__py2.py3-none-any.whl → 3.0.1328.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/ams/v20201229/api.json +9 -9
- tccli/services/apm/v20210622/api.json +10 -1
- tccli/services/apm/v20210622/examples.json +2 -2
- tccli/services/bh/v20230418/api.json +9 -0
- tccli/services/cbs/v20170312/api.json +2 -2
- tccli/services/cdb/v20170320/api.json +30 -12
- tccli/services/cdc/v20201214/api.json +5 -5
- tccli/services/cfs/v20190719/api.json +4 -4
- tccli/services/chc/chc_client.py +53 -0
- tccli/services/chc/v20230418/api.json +62 -0
- tccli/services/chc/v20230418/examples.json +8 -0
- tccli/services/clb/clb_client.py +53 -0
- tccli/services/clb/v20180317/api.json +100 -0
- tccli/services/clb/v20180317/examples.json +8 -0
- tccli/services/cvm/v20170312/api.json +2 -2
- tccli/services/cwp/v20180228/api.json +92 -1
- tccli/services/dbbrain/v20210527/api.json +4 -4
- tccli/services/dcdb/v20180411/examples.json +1 -1
- tccli/services/dts/v20211206/api.json +3 -3
- tccli/services/emr/v20190103/api.json +193 -9
- tccli/services/ess/ess_client.py +126 -20
- tccli/services/ess/v20201111/api.json +135 -1
- tccli/services/ess/v20201111/examples.json +22 -0
- tccli/services/essbasic/v20210526/api.json +1 -1
- tccli/services/gs/gs_client.py +836 -147
- tccli/services/gs/v20191118/api.json +964 -28
- tccli/services/gs/v20191118/examples.json +106 -2
- tccli/services/iotexplorer/v20190423/api.json +5 -5
- tccli/services/iotexplorer/v20190423/examples.json +1 -1
- tccli/services/lowcode/v20210108/api.json +60 -0
- tccli/services/mariadb/v20170312/api.json +10 -10
- tccli/services/monitor/monitor_client.py +117 -11
- tccli/services/monitor/v20180724/api.json +151 -0
- tccli/services/monitor/v20180724/examples.json +16 -0
- tccli/services/mrs/v20200910/api.json +1 -1
- tccli/services/oceanus/v20190422/api.json +15 -5
- tccli/services/oceanus/v20190422/examples.json +8 -2
- tccli/services/ocr/v20181119/api.json +74 -9
- tccli/services/partners/v20180321/api.json +7 -7
- tccli/services/privatedns/privatedns_client.py +53 -0
- tccli/services/privatedns/v20201028/api.json +179 -0
- tccli/services/privatedns/v20201028/examples.json +8 -0
- tccli/services/tcss/v20201101/api.json +248 -35
- tccli/services/tcss/v20201101/examples.json +8 -8
- tccli/services/tem/tem_client.py +53 -0
- tccli/services/tem/v20210701/api.json +107 -0
- tccli/services/tem/v20210701/examples.json +8 -0
- tccli/services/teo/v20220901/api.json +807 -74
- tccli/services/teo/v20220901/examples.json +2 -2
- tccli/services/tms/v20201229/api.json +2 -2
- tccli/services/tms/v20201229/examples.json +1 -1
- tccli/services/trtc/v20190722/api.json +2 -2
- tccli/services/vclm/v20240523/api.json +173 -0
- tccli/services/vclm/v20240523/examples.json +16 -0
- tccli/services/vclm/vclm_client.py +106 -0
- tccli/services/vm/v20210922/api.json +13 -13
- tccli/services/vm/v20210922/examples.json +2 -2
- tccli/services/vod/v20180717/api.json +13 -11
- tccli/services/vod/v20180717/examples.json +4 -4
- tccli/services/vpc/v20170312/api.json +12 -3
- tccli/services/waf/v20180125/api.json +2 -2
- tccli/services/wedata/v20210820/api.json +952 -0
- tccli/services/wedata/v20210820/examples.json +8 -0
- tccli/services/wedata/wedata_client.py +53 -0
- {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/RECORD +70 -70
- {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1326.1.dist-info → tccli-3.0.1328.1.dist-info}/license_files/LICENSE +0 -0
@@ -704,7 +704,7 @@
|
|
704
704
|
{
|
705
705
|
"document": "运行时访问控制事件列表",
|
706
706
|
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAccessControlEvents\n<公共请求参数>\n\n{}",
|
707
|
-
"output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fdj4****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 10012,\n \"EventType\": \"NORMAL\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13\n }\n}",
|
707
|
+
"output": "{\n \"Response\": {\n \"EventSet\": [\n {\n \"Behavior\": \"BEHAVIOR_ALERT\",\n \"ClusterID\": \"cls-fdj4****\",\n \"ClusterName\": \"demoset\",\n \"ContainerId\": \"a41351f3384159740167f25d83fcb206ffa154ab31d50c6594580ca6bac0b2cf\",\n \"ContainerIsolateOperationSrc\": \"system\",\n \"ContainerName\": \"container1\",\n \"ContainerNetStatus\": \"NORMAL\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"ContainerStatus\": \"STOPPED\",\n \"Description\": \"检测到系统计划任务被修改\",\n \"EventCount\": 10012,\n \"EventType\": \"NORMAL\",\n \"FileName\": \"cron.update\",\n \"FilePath\": \"/etc/crontabs/cron.update\",\n \"FoundTime\": \"2020-10-29 18:11:10\",\n \"HostID\": \"f5a89f72-aaad-bbbc-cccc-eb3b3b74c2f0\",\n \"HostIP\": \"10.86.68.35\",\n \"Id\": \"4904016\",\n \"ImageId\": \"sha256:3926aaa0fe2ece5cbe51aaaf242b074c211beb8e046c9d4db4959c220be0171f\",\n \"ImageName\": \"iamge1\",\n \"LatestFoundTime\": \"2020-10-29 18:11:10\",\n \"MatchAction\": \"RULE_MODE_ALERT\",\n \"MatchFilePath\": \"/etc/crontabs/cron.update\",\n \"MatchProcessPath\": \"/bin/busybox\",\n \"MatchRuleId\": \"200000000000000000000001\",\n \"MatchRuleName\": \"系统策略\",\n \"NodeID\": \"8a5772dee965c8223aebc*****\",\n \"NodeName\": \"host1\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"d41d8cd98f00b204e9800998ecf8427e\",\n \"PodIP\": \"10.0.0.11\",\n \"PodName\": \"demoset\",\n \"ProcessName\": \"/bin/busybox\",\n \"PublicIP\": \"1.1.1.1\",\n \"RuleExist\": true,\n \"RuleId\": \"222222222222222222222222\",\n \"Solution\": \"排查是否为正常业务需要的计划任务修改\",\n \"Status\": \"EVENT_UNDEAL\"\n }\n ],\n \"RequestId\": \"098ea687-eba5-4b30-9c05-d3ee0749d0a7\",\n \"TotalCount\": 13,\n \"SupportCoreVersion\": \"4.15.0-142-|4.18.0-80|4.18.0-193.28.1*|5.4.0-77-*|5.4.119.19.009.56\",\n \"InterceptionFailureTip\": \"非读写操作暂未支持拦截,如新建/重命名等,touch/mv 等操作。\"\n }\n}",
|
708
708
|
"title": "运行时访问控制事件列表"
|
709
709
|
}
|
710
710
|
],
|
@@ -920,7 +920,7 @@
|
|
920
920
|
{
|
921
921
|
"document": "",
|
922
922
|
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"InstanceName\",\n \"InstanceId\",\n \"RegistryType\",\n \"Namespace\",\n \"ImageName\",\n \"ImageTag\",\n \"ImageSize\",\n \"ImageDigest\",\n \"ImageId\",\n \"ImageRepoAddress\",\n \"ScanStatus\",\n \"VulCnt\",\n \"VirusCnt\",\n \"RiskCnt\",\n \"ScanStartTime\",\n \"ScanEndTime\",\n \"OsName\",\n \"IsAuthorized\",\n \"RegistryRegion\"\n ]\n}",
|
923
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
|
923
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"c00f4492-6973-4d8f-872b-c29d22c8eee0\",\n \"DownloadUrl\": \"https://download.url\",\n \"JobId\": \"1012\"\n }\n}",
|
924
924
|
"title": "镜像仓库镜像列表导出"
|
925
925
|
}
|
926
926
|
],
|
@@ -996,7 +996,7 @@
|
|
996
996
|
{
|
997
997
|
"document": "",
|
998
998
|
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVirusListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"Path\",\n \"RiskLevel\",\n \"Category\",\n \"VirusName\",\n \"Tags\"\n ],\n \"Id\": 1001\n}",
|
999
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
|
999
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"62e5c0e8-2cae-410a-8240-9cefbd419e08\",\n \"DownloadUrl\": \"https://download.url\",\n \"JobId\": \"1012\"\n }\n}",
|
1000
1000
|
"title": "镜像仓库木马信息列表导出"
|
1001
1001
|
}
|
1002
1002
|
],
|
@@ -1012,7 +1012,7 @@
|
|
1012
1012
|
{
|
1013
1013
|
"document": "",
|
1014
1014
|
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeAssetImageRegistryVulListExport\n<公共请求参数>\n\n{\n \"ExportField\": [\n \"CVEId\",\n \"POCId\",\n \"Name\",\n \"Components\",\n \"Category\",\n \"CategoryType\",\n \"Level\",\n \"Des\",\n \"OfficialSolution\",\n \"Reference\",\n \"DefenseSolution\",\n \"SubmitTime\",\n \"CVSS_Score\",\n \"CVSS_Desc\"\n ],\n \"Id\": 121\n}",
|
1015
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\"\n }\n}",
|
1015
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"488e3711-8515-450a-9a40-df3e95c806fa\",\n \"DownloadUrl\": \"https://download.url\",\n \"JobId\": \"1012\"\n }\n}",
|
1016
1016
|
"title": "镜像仓库漏洞列表导出"
|
1017
1017
|
}
|
1018
1018
|
],
|
@@ -1132,7 +1132,7 @@
|
|
1132
1132
|
{
|
1133
1133
|
"document": "",
|
1134
1134
|
"input": "https://tcss.tencentcloudapi.com/?Action=DescribeAssetSyncLastTime\n&<公共请求参数>",
|
1135
|
-
"output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"2024-10-30 11:48:49\",\n \"TaskStatus\": \"PROCESSED\",\n \"TaskProcess\": 10,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb918846666\"\n }\n}",
|
1135
|
+
"output": "{\n \"Response\": {\n \"AssetSyncLastTime\": \"2024-10-30 11:48:49\",\n \"TaskStatus\": \"PROCESSED\",\n \"TaskProcess\": 10,\n \"FailedHostCount\": 10,\n \"TaskId\": 100,\n \"RequestId\": \"c826b9fa-68b5-4603-bf25-a5eb918846666\"\n }\n}",
|
1136
1136
|
"title": "查询资产同步最近时间"
|
1137
1137
|
}
|
1138
1138
|
],
|
@@ -2066,7 +2066,7 @@
|
|
2066
2066
|
{
|
2067
2067
|
"document": "运行时查询木马文件信息",
|
2068
2068
|
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVirusDetail\n<公共请求参数>\n\n{\n \"Id\": \"10021\"\n}",
|
2069
|
-
"output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4ed805844e07bd15663e4f778acf9bf388719cbcdf794290b9637a550a21d6 -address /run/containerd/containerd.****\",\n \"AncestorProcessPath\": \"/usr/local/bin/containerd-shim-run****\",\n \"AncestorProcessStartUser\": \"0\",\n \"AncestorProcessUserGroup\": \"0\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"10.*.*.1\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496a*******\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/container_name\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a******\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_*******\",\n \"FilePath\": \"/home/virus/specimen_******\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。\",\n \"HostIP\": \"10.0.0.1\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-abb0cd4f92aa\",\n \"HostName\": \"hostname\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd*******\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"mark reason\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.*.*.1/24\",\n \"NodeSubNetID\": \"subnet-aau2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-**\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"node dist/inde****\",\n \"PProcessPath\": \"/usr/bin/****\",\n \"PProcessStartUser\": \"root\",\n \"PProcessUserGroup\": \"root\",\n \"PodIP\": \"10.0.*.*\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAccountGroup\": \"root\",\n \"ProcessArgv\": \"git clone --depth=1 https://github.com/busi\",\n \"ProcessChan\": \"git(433802)|node(280016)|containerd-shim-runc-v2(176637)|system****\",\n \"ProcessFileAuthority\": \"-rwxr-****\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"472c65af3f43136472d1a383f5******\",\n \"ProcessName\": \"/bin/a***\",\n \"ProcessPath\": \"/usr/bin****\",\n \"ProcessStartAccount\": \"root\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836*****\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"DaemonSet\"\n }\n}",
|
2069
|
+
"output": "{\n \"Response\": {\n \"AncestorProcessParam\": \"/usr/local/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7b4ed805844e07bd15663e4f778acf9bf388719cbcdf794290b9637a550a21d6 -address /run/containerd/containerd.****\",\n \"AncestorProcessPath\": \"/usr/local/bin/containerd-shim-run****\",\n \"AncestorProcessStartUser\": \"0\",\n \"AncestorProcessUserGroup\": \"0\",\n \"CheckPlatform\": [\n \"VDC\",\n \"TAV\"\n ],\n \"ClientIP\": \"10.*.*.1\",\n \"ClusterID\": \"cls-dfw3e***\",\n \"ClusterName\": \"clsfoo***\",\n \"ContainerId\": \"d4c43f9268ecea2aa75b26632299df8aaf496a*******\",\n \"ContainerIsolateOperationSrc\": \"运行时安全/文件查杀\",\n \"ContainerName\": \"/container_name\",\n \"ContainerNetStatus\": \"ISOLATED\",\n \"ContainerNetSubStatus\": \"NONE\",\n \"CreateTime\": \"2024-08-27T03:30:37Z\",\n \"EventType\": \"恶意文件告警\",\n \"FileAccessTime\": \"2018-02-28T07:45:34Z\",\n \"FileMd5\": \"81a7701a194c3a******\",\n \"FileModifyTime\": \"2018-02-28T07:45:34Z\",\n \"FileName\": \"specimen_*******\",\n \"FilePath\": \"/home/virus/specimen_******\",\n \"HarmDescribe\": \"蠕虫病毒Ramnit最早出现在2010年,至今已有8年之久,因传播力强而“闻名于世”。\",\n \"HostIP\": \"10.0.0.1\",\n \"HostId\": \"dc56fda9-58c8-4c4f-9e8c-abb0cd4f92aa\",\n \"HostName\": \"hostname\",\n \"ImageId\": \"sha256:80beff5ff34259ceb7fbe9cd*******\",\n \"ImageName\": \"centos:7\",\n \"Mark\": \"mark reason\",\n \"ModifyTime\": \"2024-10-21T06:42:49Z\",\n \"Namespace\": \"tcss\",\n \"NodeID\": \"mix-GOmf****\",\n \"NodeSubNetCIDR\": \"10.*.*.1/24\",\n \"NodeSubNetID\": \"subnet-aau2***\",\n \"NodeSubNetName\": \"subnet***\",\n \"NodeType\": \"NORMAL\",\n \"NodeUniqueID\": \"wer41324-18a1-4775-9e3f-**\",\n \"OperationTime\": \"2024-08-27T03:30:37Z\",\n \"PProcessParam\": \"node dist/inde****\",\n \"PProcessPath\": \"/usr/bin/****\",\n \"PProcessStartUser\": \"root\",\n \"PProcessUserGroup\": \"root\",\n \"PodIP\": \"10.0.*.*\",\n \"PodName\": \"PodName\",\n \"PodStatus\": \"Running\",\n \"ProcessAccountGroup\": \"root\",\n \"ProcessArgv\": \"git clone --depth=1 https://github.com/busi\",\n \"ProcessChan\": \"git(433802)|node(280016)|containerd-shim-runc-v2(176637)|system****\",\n \"ProcessFileAuthority\": \"-rwxr-****\",\n \"ProcessId\": 0,\n \"ProcessMd5\": \"472c65af3f43136472d1a383f5******\",\n \"ProcessName\": \"/bin/a***\",\n \"ProcessPath\": \"/usr/bin****\",\n \"ProcessStartAccount\": \"root\",\n \"RequestId\": \"dc56fda9-58c8-4c4f-9e8c-b7296836*****\",\n \"RiskLevel\": \"RISK_CRITICAL\",\n \"Size\": 332155,\n \"SourceType\": 0,\n \"Status\": \"DEAL_NONE\",\n \"SubStatus\": \"FILE_NOT_FOUND\",\n \"SuggestScheme\": \"1.在病毒尚未完全清理干净之前,暂时关闭系统文件共享功能 ,防止感染范围进一步扩大;\\n2.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n3.隔离或者删除相关的木马文件;\\n4.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"Tags\": [\n \"ramnit\",\n \"Worm\",\n \"窃取用户信息,感染用户本地所有的html、exe、dll等格式的文件。\"\n ],\n \"VirusName\": \"Win32.Virus.Ramnit.Qwhl\",\n \"WorkloadType\": \"DaemonSet\",\n \"ContainerStatus\": \"RUNNING\"\n }\n}",
|
2070
2070
|
"title": "运行时查询木马文件信息"
|
2071
2071
|
}
|
2072
2072
|
],
|
@@ -2385,8 +2385,8 @@
|
|
2385
2385
|
"ModifyAsset": [
|
2386
2386
|
{
|
2387
2387
|
"document": "",
|
2388
|
-
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAsset\n<公共请求参数>\n\n{\n \"All\": true,\n \"Hosts\": []\n}",
|
2389
|
-
"output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\",\n \"Status\": \"SUCCESS\"\n }\n}",
|
2388
|
+
"input": "POST / HTTP/1.1\nHost: tcss.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyAsset\n<公共请求参数>\n\n{\n \"All\": true,\n \"Hosts\": [],\n \"AllSuperHost\": true,\n \"NodeUniqueIds\": [],\n \"TimeoutSec\": 3600\n}",
|
2389
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"33ec689a-e026-4700-8dc4-b559b97f0667\",\n \"Status\": \"SUCCESS\",\n \"TaskId\": 10086\n }\n}",
|
2390
2390
|
"title": "主机资产刷新"
|
2391
2391
|
}
|
2392
2392
|
],
|
tccli/services/tem/tem_client.py
CHANGED
@@ -1059,6 +1059,58 @@ def doResumeDeployApplication(args, parsed_globals):
|
|
1059
1059
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1060
1060
|
|
1061
1061
|
|
1062
|
+
def doModifyGatewayIngress(args, parsed_globals):
|
1063
|
+
g_param = parse_global_arg(parsed_globals)
|
1064
|
+
|
1065
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
1066
|
+
cred = credential.CVMRoleCredential()
|
1067
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
1068
|
+
cred = credential.STSAssumeRoleCredential(
|
1069
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
1070
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
1071
|
+
)
|
1072
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
1073
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
1074
|
+
else:
|
1075
|
+
cred = credential.Credential(
|
1076
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
1077
|
+
)
|
1078
|
+
http_profile = HttpProfile(
|
1079
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
1080
|
+
reqMethod="POST",
|
1081
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
1082
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
1083
|
+
)
|
1084
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
1085
|
+
if g_param[OptionsDefine.Language]:
|
1086
|
+
profile.language = g_param[OptionsDefine.Language]
|
1087
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
1088
|
+
client = mod.TemClient(cred, g_param[OptionsDefine.Region], profile)
|
1089
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
1090
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
1091
|
+
model = models.ModifyGatewayIngressRequest()
|
1092
|
+
model.from_json_string(json.dumps(args))
|
1093
|
+
start_time = time.time()
|
1094
|
+
while True:
|
1095
|
+
rsp = client.ModifyGatewayIngress(model)
|
1096
|
+
result = rsp.to_json_string()
|
1097
|
+
try:
|
1098
|
+
json_obj = json.loads(result)
|
1099
|
+
except TypeError as e:
|
1100
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
1101
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
1102
|
+
break
|
1103
|
+
cur_time = time.time()
|
1104
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
1105
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
1106
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
1107
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
1108
|
+
else:
|
1109
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
1110
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
1111
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
1112
|
+
|
1113
|
+
|
1062
1114
|
def doModifyEnvironment(args, parsed_globals):
|
1063
1115
|
g_param = parse_global_arg(parsed_globals)
|
1064
1116
|
|
@@ -3172,6 +3224,7 @@ ACTION_MAP = {
|
|
3172
3224
|
"ModifyApplicationAutoscaler": doModifyApplicationAutoscaler,
|
3173
3225
|
"DescribePagedLogConfigList": doDescribePagedLogConfigList,
|
3174
3226
|
"ResumeDeployApplication": doResumeDeployApplication,
|
3227
|
+
"ModifyGatewayIngress": doModifyGatewayIngress,
|
3175
3228
|
"ModifyEnvironment": doModifyEnvironment,
|
3176
3229
|
"DescribeEnvironment": doDescribeEnvironment,
|
3177
3230
|
"DescribeLogConfig": doDescribeLogConfig,
|
@@ -294,6 +294,13 @@
|
|
294
294
|
"output": "ModifyEnvironmentResponse",
|
295
295
|
"status": "online"
|
296
296
|
},
|
297
|
+
"ModifyGatewayIngress": {
|
298
|
+
"document": "修改网关的转发配置",
|
299
|
+
"input": "ModifyGatewayIngressRequest",
|
300
|
+
"name": "修改网关的转发配置",
|
301
|
+
"output": "ModifyGatewayIngressResponse",
|
302
|
+
"status": "online"
|
303
|
+
},
|
297
304
|
"ModifyIngress": {
|
298
305
|
"document": "此接口没有被使用了\n\n创建或者更新 Ingress 规则",
|
299
306
|
"input": "ModifyIngressRequest",
|
@@ -5489,6 +5496,106 @@
|
|
5489
5496
|
],
|
5490
5497
|
"type": "object"
|
5491
5498
|
},
|
5499
|
+
"ModifyGatewayIngressRequest": {
|
5500
|
+
"document": "ModifyGatewayIngress请求参数结构体",
|
5501
|
+
"members": [
|
5502
|
+
{
|
5503
|
+
"disabled": false,
|
5504
|
+
"document": "环境 ID",
|
5505
|
+
"example": "en-xxx",
|
5506
|
+
"member": "string",
|
5507
|
+
"name": "EnvironmentId",
|
5508
|
+
"required": false,
|
5509
|
+
"type": "string"
|
5510
|
+
},
|
5511
|
+
{
|
5512
|
+
"disabled": false,
|
5513
|
+
"document": "网关名称",
|
5514
|
+
"example": "gateway",
|
5515
|
+
"member": "string",
|
5516
|
+
"name": "GatewayName",
|
5517
|
+
"required": false,
|
5518
|
+
"type": "string"
|
5519
|
+
},
|
5520
|
+
{
|
5521
|
+
"disabled": false,
|
5522
|
+
"document": "网关类型,如 clb",
|
5523
|
+
"example": "clb",
|
5524
|
+
"member": "string",
|
5525
|
+
"name": "GatewayType",
|
5526
|
+
"required": false,
|
5527
|
+
"type": "string"
|
5528
|
+
},
|
5529
|
+
{
|
5530
|
+
"disabled": false,
|
5531
|
+
"document": "转发配置名称",
|
5532
|
+
"example": "xxx",
|
5533
|
+
"member": "string",
|
5534
|
+
"name": "Name",
|
5535
|
+
"required": false,
|
5536
|
+
"type": "string"
|
5537
|
+
},
|
5538
|
+
{
|
5539
|
+
"disabled": false,
|
5540
|
+
"document": "rules 配置",
|
5541
|
+
"example": "{}",
|
5542
|
+
"member": "IngressRule",
|
5543
|
+
"name": "Rules",
|
5544
|
+
"required": false,
|
5545
|
+
"type": "list"
|
5546
|
+
},
|
5547
|
+
{
|
5548
|
+
"disabled": false,
|
5549
|
+
"document": "是否混合 https,默认 false,可选值 true 代表有 https 协议监听",
|
5550
|
+
"example": "false",
|
5551
|
+
"member": "bool",
|
5552
|
+
"name": "Mixed",
|
5553
|
+
"required": false,
|
5554
|
+
"type": "bool"
|
5555
|
+
},
|
5556
|
+
{
|
5557
|
+
"disabled": false,
|
5558
|
+
"document": "tls 配置",
|
5559
|
+
"example": "{}",
|
5560
|
+
"member": "IngressTls",
|
5561
|
+
"name": "Tls",
|
5562
|
+
"required": false,
|
5563
|
+
"type": "list"
|
5564
|
+
},
|
5565
|
+
{
|
5566
|
+
"disabled": false,
|
5567
|
+
"document": "重定向模式,可选值:\n- AUTO(自动重定向http到https)\n- NONE(不使用重定向)",
|
5568
|
+
"example": "NONE",
|
5569
|
+
"member": "string",
|
5570
|
+
"name": "RewriteType",
|
5571
|
+
"required": false,
|
5572
|
+
"type": "string"
|
5573
|
+
}
|
5574
|
+
],
|
5575
|
+
"type": "object"
|
5576
|
+
},
|
5577
|
+
"ModifyGatewayIngressResponse": {
|
5578
|
+
"document": "ModifyGatewayIngress返回参数结构体",
|
5579
|
+
"members": [
|
5580
|
+
{
|
5581
|
+
"disabled": false,
|
5582
|
+
"document": "是否成功\n注意:此字段可能返回 null,表示取不到有效值。",
|
5583
|
+
"example": "true",
|
5584
|
+
"member": "bool",
|
5585
|
+
"name": "Result",
|
5586
|
+
"required": true,
|
5587
|
+
"type": "bool",
|
5588
|
+
"value_allowed_null": true
|
5589
|
+
},
|
5590
|
+
{
|
5591
|
+
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
5592
|
+
"member": "string",
|
5593
|
+
"name": "RequestId",
|
5594
|
+
"type": "string"
|
5595
|
+
}
|
5596
|
+
],
|
5597
|
+
"type": "object"
|
5598
|
+
},
|
5492
5599
|
"ModifyIngressRequest": {
|
5493
5600
|
"document": "ModifyIngress请求参数结构体",
|
5494
5601
|
"members": [
|
@@ -336,6 +336,14 @@
|
|
336
336
|
"title": "编辑环境"
|
337
337
|
}
|
338
338
|
],
|
339
|
+
"ModifyGatewayIngress": [
|
340
|
+
{
|
341
|
+
"document": "修改网关的转发配置",
|
342
|
+
"input": "POST / HTTP/1.1\nHost: tem.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: ModifyGatewayIngress\n<公共请求参数>\n\n{\n \"EnvironmentId\": \"xx\",\n \"GatewayType\": \"clb\",\n \"GatewayName\": \"xx\",\n \"Name\": \"xx\",\n \"Rules\": [\n {\n \"Protocol\": \"xx\",\n \"Host\": \"xx\",\n \"Http\": {\n \"Paths\": [\n {\n \"Path\": \"xx\",\n \"Backend\": {\n \"ServiceName\": \"xx\",\n \"ServicePort\": 443\n }\n }\n ]\n }\n }\n ],\n \"Tls\": [\n {\n \"CertificateId\": \"xx\",\n \"Hosts\": [\n \"xxx.com\"\n ],\n \"SecretName\": \"xx\"\n }\n ],\n \"Mixed\": true,\n \"RewriteType\": \"NONE\"\n}",
|
343
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"81f74023-563c-437d-abf7-8139449ef178\",\n \"Result\": true\n }\n}",
|
344
|
+
"title": "修改网关的转发配置"
|
345
|
+
}
|
346
|
+
],
|
339
347
|
"ModifyIngress": [
|
340
348
|
{
|
341
349
|
"document": "创建或者更新 Ingress 规则",
|