tccli 3.0.1337.1__py2.py3-none-any.whl → 3.0.1339.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/services/apm/v20210622/api.json +10 -0
  3. tccli/services/asr/v20190614/api.json +1 -1
  4. tccli/services/ccc/v20200210/api.json +100 -1
  5. tccli/services/cdb/v20170320/api.json +37 -37
  6. tccli/services/cdb/v20170320/examples.json +7 -7
  7. tccli/services/cdn/v20180606/api.json +2 -2
  8. tccli/services/cdwdoris/v20211228/api.json +2 -2
  9. tccli/services/cfs/v20190719/api.json +15 -3
  10. tccli/services/cfw/v20190904/examples.json +12 -0
  11. tccli/services/ckafka/v20190819/api.json +19 -0
  12. tccli/services/cls/v20201016/api.json +2 -2
  13. tccli/services/csip/csip_client.py +791 -102
  14. tccli/services/csip/v20221121/api.json +6108 -3458
  15. tccli/services/csip/v20221121/examples.json +104 -0
  16. tccli/services/dts/v20211206/api.json +11 -0
  17. tccli/services/es/v20180416/api.json +55 -0
  18. tccli/services/es/v20250101/api.json +21 -0
  19. tccli/services/ess/ess_client.py +159 -0
  20. tccli/services/ess/v20201111/api.json +284 -4
  21. tccli/services/ess/v20201111/examples.json +28 -4
  22. tccli/services/essbasic/essbasic_client.py +171 -12
  23. tccli/services/essbasic/v20210526/api.json +256 -5
  24. tccli/services/essbasic/v20210526/examples.json +25 -1
  25. tccli/services/gwlb/v20240906/api.json +1 -1
  26. tccli/services/gwlb/v20240906/examples.json +1 -1
  27. tccli/services/hunyuan/v20230901/api.json +3 -3
  28. tccli/services/ioa/v20220601/api.json +55 -0
  29. tccli/services/ioa/v20220601/examples.json +1 -1
  30. tccli/services/iotexplorer/iotexplorer_client.py +57 -4
  31. tccli/services/iotexplorer/v20190423/api.json +145 -19
  32. tccli/services/iotexplorer/v20190423/examples.json +8 -0
  33. tccli/services/live/live_client.py +208 -49
  34. tccli/services/live/v20180801/api.json +498 -73
  35. tccli/services/live/v20180801/examples.json +35 -11
  36. tccli/services/lkeap/lkeap_client.py +0 -53
  37. tccli/services/lkeap/v20240522/api.json +0 -90
  38. tccli/services/lkeap/v20240522/examples.json +0 -8
  39. tccli/services/ocr/v20181119/api.json +21 -1
  40. tccli/services/ocr/v20181119/examples.json +1 -1
  41. tccli/services/ssl/ssl_client.py +212 -0
  42. tccli/services/ssl/v20191205/api.json +625 -10
  43. tccli/services/ssl/v20191205/examples.json +38 -0
  44. tccli/services/tcbr/v20220217/api.json +11 -0
  45. tccli/services/tdmq/v20200217/api.json +56 -47
  46. tccli/services/tdmq/v20200217/examples.json +8 -8
  47. tccli/services/trocket/trocket_client.py +104 -51
  48. tccli/services/trocket/v20230308/api.json +238 -61
  49. tccli/services/trocket/v20230308/examples.json +20 -12
  50. tccli/services/trtc/v20190722/api.json +3 -3
  51. tccli/services/tse/v20201207/api.json +19 -0
  52. tccli/services/tsf/v20180326/api.json +1 -1
  53. tccli/services/wedata/v20210820/api.json +607 -3
  54. tccli/services/wedata/v20210820/examples.json +18 -8
  55. tccli/services/wedata/wedata_client.py +106 -0
  56. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/METADATA +2 -2
  57. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/RECORD +60 -60
  58. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/WHEEL +0 -0
  59. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/entry_points.txt +0 -0
  60. {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/license_files/LICENSE +0 -0
@@ -48,6 +48,14 @@
48
48
  "title": "告警中心全量告警示例"
49
49
  }
50
50
  ],
51
+ "DescribeAssetRiskList": [
52
+ {
53
+ "document": "",
54
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeXspmAssetsRisks\n<公共请求参数>\n\n{}",
55
+ "output": "{\n \"Response\": {\n \"AssetRiskList\": [\n {\n \"AppId\": 1300448058,\n \"CheckType\": \"network_security\",\n \"CloudAccountId\": \"12335421\",\n \"CloudAccountName\": \"测试\",\n \"CreateTime\": \"2025-04-29T08:51:39Z\",\n \"InstanceId\": \"test\",\n \"InstanceName\": \"test\",\n \"Provider\": \"tencent\",\n \"ProviderName\": \"腾讯云\",\n \"RiskRuleId\": \"tc_191\",\n \"RiskStatus\": 2,\n \"RiskTitle\": \"安全组存在放通非业务端口全部网段的规则\",\n \"Severity\": \"medium\",\n \"UpdateTime\": \"2025-05-07T01:51:28Z\"\n }\n ],\n \"RequestId\": \"ab3a4f8f-30e4-462c-8be0-4b24bff70111\",\n \"TotalCount\": 518\n }\n}",
56
+ "title": "资产视角下风险列表示例"
57
+ }
58
+ ],
51
59
  "DescribeAssetViewVulRiskList": [
52
60
  {
53
61
  "document": "获取资产视角的漏洞风险列表",
@@ -64,6 +72,14 @@
64
72
  "title": "资产中心统计"
65
73
  }
66
74
  ],
75
+ "DescribeCSIPRiskStatistics": [
76
+ {
77
+ "document": "",
78
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCSIPRiskStatistics\n<公共请求参数>\n\n{}",
79
+ "output": "{\n \"Response\": {\n \"Data\": {\n \"CFGHighLevel\": 46,\n \"CFGTotal\": 333,\n \"LastScanTime\": \"2025-04-11 00:00:09\",\n \"PortHighLevel\": 1,\n \"PortTotal\": 66,\n \"ServerHighLevel\": 0,\n \"ServerTotal\": 6,\n \"VULHighLevel\": 31,\n \"VULTotal\": 596,\n \"WeakPasswordHighLevel\": 0,\n \"WeakPasswordTotal\": 0,\n \"WebsiteHighLevel\": 0,\n \"HostBaseLineRiskTotal\": 0,\n \"HostBaseLineRiskHighLevel\": 0,\n \"PodBaseLineRiskTotal\": 0,\n \"PodBaseLineRiskHighLevel\": 0,\n \"WebsiteTotal\": 15\n },\n \"RequestId\": \"14a5d202-861d-4669-8ca7-592c0acd2dc9\"\n }\n}",
80
+ "title": "获取风险中心风险概况"
81
+ }
82
+ ],
67
83
  "DescribeCVMAssetInfo": [
68
84
  {
69
85
  "document": "接口测试",
@@ -80,6 +96,14 @@
80
96
  "title": "获取cvm列表"
81
97
  }
82
98
  ],
99
+ "DescribeCheckViewRisks": [
100
+ {
101
+ "document": "",
102
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCheckViewRisks\n<公共请求参数>\n\n{}",
103
+ "output": "{\n \"Response\": {\n \"CheckViewRiskList\": [\n {\n \"AssetCount\": 37,\n \"AssetType\": \"云服务器\",\n \"CheckType\": \"network_security\",\n \"CreateTime\": \"2025-04-29T08:51:33Z\",\n \"EventType\": \"云服务器安全组IP来源设置过大\",\n \"Provider\": \"腾讯云\",\n \"RiskCount\": 67,\n \"RiskDesc\": \"发现*个云服务器安全组IP来源设置过大\",\n \"RiskRuleId\": \"tc_003\",\n \"RiskStatus\": 0,\n \"RiskTitle\": \"云服务器安全组IP来源设置过大\",\n \"Severity\": \"medium\",\n \"UpdateTime\": \"2025-05-07T01:51:30Z\"\n }\n ],\n \"RequestId\": \"3ac59d59-0a8e-4c6a-8249-936f0f02cf99\",\n \"TotalCount\": 32\n }\n}",
104
+ "title": "检查视角下云资源配置风险列表"
105
+ }
106
+ ],
83
107
  "DescribeClusterAssets": [
84
108
  {
85
109
  "document": "空示例",
@@ -120,6 +144,22 @@
120
144
  "title": "接口示例"
121
145
  }
122
146
  ],
147
+ "DescribeExposeAssetCategory": [
148
+ {
149
+ "document": "",
150
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExposeAssetCategory\n<公共请求参数>\n\n{}",
151
+ "output": "{\n \"Response\": {\n \"ExposeAssetTypeList\": [\n {\n \"Provider\": \"tencent\",\n \"ProviderName\": \"腾讯云\",\n \"AssetType\": \"cvm_instance\",\n \"AssetTypeName\": \"云服务器\"\n }\n ],\n \"RequestId\": \"46fb51ad-b6d8-4c91-af47-8f4bc947a69c\"\n }\n}",
152
+ "title": "暴露面资产分类"
153
+ }
154
+ ],
155
+ "DescribeExposePath": [
156
+ {
157
+ "document": "",
158
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExposePath\n<公共请求参数>\n\n{\n \"AssetId\": \"ins-xxxx\"\n}",
159
+ "output": "{\n \"Response\": {\n \"RequestId\": \"c93adc50-6598-4af6-afa4-51e09895451f\",\n \"Content\": \"\"\n }\n}",
160
+ "title": "查询互联网暴露节点"
161
+ }
162
+ ],
123
163
  "DescribeExposures": [
124
164
  {
125
165
  "document": "",
@@ -168,6 +208,14 @@
168
208
  "title": "查询集团账号用户列表"
169
209
  }
170
210
  ],
211
+ "DescribeOtherCloudAssets": [
212
+ {
213
+ "document": "其他云资源列表",
214
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeOtherCloudAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 0,\n \"Offset\": 0,\n \"Order\": \"abc\",\n \"By\": \"abc\",\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"OperatorType\": 0\n }\n ],\n \"StartTime\": \"abc\",\n \"EndTime\": \"abc\"\n },\n \"AssetTypes\": [\n \"abc\"\n ]\n}",
215
+ "output": "{\n \"Response\": {\n \"Total\": 1,\n \"Data\": [\n {\n \"AssetId\": \"abc\",\n \"AssetName\": \"abc\",\n \"AssetType\": \"abc\",\n \"VpcId\": \"abc\",\n \"VpcName\": \"abc\",\n \"Region\": \"abc\",\n \"Domain\": \"abc\",\n \"AssetCreateTime\": \"abc\",\n \"LastScanTime\": \"abc\",\n \"ConfigurationRisk\": 1,\n \"Attack\": 1,\n \"Access\": 1,\n \"ScanTask\": 1,\n \"AppId\": 1,\n \"Uin\": \"abc\",\n \"NickName\": \"abc\",\n \"Port\": 1,\n \"Tag\": [\n {\n \"Name\": \"abc\",\n \"Value\": \"abc\"\n }\n ],\n \"PrivateIp\": \"abc\",\n \"PublicIp\": \"abc\",\n \"Status\": 1,\n \"IsCore\": 1,\n \"IsNewAsset\": 1\n }\n ],\n \"RegionList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"VpcList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
216
+ "title": "其他云资源列表"
217
+ }
218
+ ],
171
219
  "DescribePublicIpAssets": [
172
220
  {
173
221
  "document": "",
@@ -176,6 +224,14 @@
176
224
  "title": "资产查询"
177
225
  }
178
226
  ],
227
+ "DescribeRepositoryImageAssets": [
228
+ {
229
+ "document": "仓库镜像列表",
230
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRepositoryImageAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 0,\n \"Offset\": 0,\n \"Order\": \"abc\",\n \"By\": \"abc\",\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"OperatorType\": 0\n }\n ],\n \"StartTime\": \"abc\",\n \"EndTime\": \"abc\"\n }\n}",
231
+ "output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AppId\": 0,\n \"Uin\": \"abc\",\n \"NickName\": \"abc\",\n \"InstanceId\": \"abc\",\n \"InstanceName\": \"abc\",\n \"InstanceCreateTime\": \"abc\",\n \"InstanceSize\": \"abc\",\n \"BuildCount\": 0,\n \"InstanceType\": \"abc\",\n \"AuthStatus\": 0,\n \"InstanceVersion\": \"abc\",\n \"Region\": \"abc\",\n \"RepositoryUrl\": \"abc\",\n \"RepositoryName\": \"abc\"\n }\n ],\n \"Total\": 0,\n \"RegionList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
232
+ "title": "仓库镜像列表"
233
+ }
234
+ ],
179
235
  "DescribeRiskCenterAssetViewCFGRiskList": [
180
236
  {
181
237
  "document": "获取资产视角的配置风险列表",
@@ -208,6 +264,14 @@
208
264
  "title": "获取资产视角的弱口令风险列表"
209
265
  }
210
266
  ],
267
+ "DescribeRiskCenterCFGViewCFGRiskList": [
268
+ {
269
+ "document": "空示例",
270
+ "input": "{\n \"MemberId\": [\n \"xx\"\n ],\n \"Filter\": {\n \"Limit\": 0,\n \"Offset\": 0,\n \"Order\": \"xx\",\n \"By\": \"xx\",\n \"Filters\": [\n {\n \"Name\": \"xx\",\n \"Values\": [\n \"xx\"\n ],\n \"OperatorType\": 0\n }\n ],\n \"StartTime\": \"xx\",\n \"EndTime\": \"xx\"\n }\n}",
271
+ "output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"Data\": [\n {\n \"NoHandleCount\": 0,\n \"Level\": \"xx\",\n \"RecentTime\": \"xx\",\n \"FirstTime\": \"xx\",\n \"AffectAssetCount\": 1,\n \"Id\": \"xx\",\n \"From\": \"xx\",\n \"Index\": \"xx\",\n \"AppId\": \"xx\",\n \"Nick\": \"xx\",\n \"Uin\": \"xx\",\n \"CFGName\": \"xx\",\n \"CheckType\": \"xx\",\n \"CFGSTD\": \"xx\",\n \"CFGDescribe\": \"xx\",\n \"CFGFix\": \"xx\",\n \"CFGHelpURL\": \"xx\"\n }\n ],\n \"StatusLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"LevelLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"FromLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"CheckTypeLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"CFGNameLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
272
+ "title": "空示例"
273
+ }
274
+ ],
211
275
  "DescribeRiskCenterPortViewPortRiskList": [
212
276
  {
213
277
  "document": "获取端口视角的端口风险列表",
@@ -240,6 +304,30 @@
240
304
  "title": "获取内容风险列表"
241
305
  }
242
306
  ],
307
+ "DescribeRiskDetailList": [
308
+ {
309
+ "document": "",
310
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDetailList\n<公共请求参数>\n\n{\n \"RiskRuleId\": \"tc_001\"\n}",
311
+ "output": "{\n \"Response\": {\n \"AssetRiskDetailList\": [\n {\n \"CheckStatus\": \"\",\n \"CloudAccountId\": \"12352343\",\n \"CloudAccountName\": \"测试\",\n \"CreateTime\": \"2025-04-29T07:36:22Z\",\n \"InstanceId\": \"12352343\",\n \"InstanceName\": \"test\",\n \"Provider\": \"tencent\",\n \"ProviderName\": \"腾讯云\",\n \"RiskContent\": \"{\\\"header\\\": [{\\\"name\\\": \\\"user_name\\\", \\\"value\\\": \\\"用户名称\\\"}, {\\\"name\\\": \\\"console_login\\\", \\\"value\\\": \\\"是否可以登录控制台\\\"}, {\\\"name\\\": \\\"user_uin\\\", \\\"value\\\": \\\"用户账号\\\"}, {\\\"name\\\": \\\"risk_type\\\", \\\"value\\\": \\\"风险类型\\\"}], \\\"result\\\": {\\\"user_name\\\": \\\"test\\\", \\\"console_login\\\": \\\"是\\\", \\\"risk_type\\\": \\\"操作保护未开启\\\", \\\"user_uin\\\": \\\"123423131\\\"}}\",\n \"RiskId\": 1,\n \"RiskRuleId\": \"tc_001\",\n \"RiskStatus\": 0,\n \"UpdateTime\": \"2025-05-07T01:51:26Z\"\n }\n ],\n \"RequestId\": \"f3d556f8-9168-4a7c-b839-b0d8d07a706d\",\n \"TotalCount\": 1\n }\n}",
312
+ "title": "风险详情列表"
313
+ }
314
+ ],
315
+ "DescribeRiskRuleDetail": [
316
+ {
317
+ "document": "",
318
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskRuleDetail\n<公共请求参数>\n\n{\n \"RiskRuleId\": \"tc_001\"\n}",
319
+ "output": "{\n \"Response\": {\n \"Provider\": \"tencent\",\n \"RequestId\": \"94fe20c6-ea21-4d00-a765-6c0cf133031f\",\n \"RiskFixAdvice\": \"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\",\n \"RiskInfluence\": \"主机存在安全漏洞,可能导致主机被入侵,建议您按应急漏洞、应用漏洞、Web-CMS、Windows软件漏洞、Linux软件漏洞的优先级顺序进行修复。该顺序并不决定,也可能存在非常严重的Windows软件漏洞需要立即处理的情况。您还可以打开腾讯云主机“仅展示高优修复漏洞”按钮,来处理高优修复漏洞。\",\n \"RiskName\": \"腾讯云 主机安全漏洞检测\",\n \"RiskRuleId\": \"tc_083\"\n }\n}",
320
+ "title": "查询风险规则详情"
321
+ }
322
+ ],
323
+ "DescribeRiskRules": [
324
+ {
325
+ "document": "",
326
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskRules\n<公共请求参数>\n\n{}",
327
+ "output": "{\n \"Response\": {\n \"InstanceTypeList\": [\n {\n \"Text\": \"Elasticsearch Service\",\n \"Value\": \"es_cluster\"\n },\n {\n \"Text\": \"轻量应用服务器\",\n \"Value\": \"lighthouse_instance\"\n },\n {\n \"Text\": \"云数据库 MariaDB\",\n \"Value\": \"mariadb_instance\"\n },\n {\n \"Text\": \"云数据库 MariaDB账号\",\n \"Value\": \"mariadb_account\"\n },\n {\n \"Text\": \"腾讯云可观测平台Grafana服务\",\n \"Value\": \"monitor_grafana\"\n },\n {\n \"Text\": \"NAT网关\",\n \"Value\": \"nat_gateway\"\n },\n {\n \"Text\": \"云数据库 PostgreSQL\",\n \"Value\": \"postgres_instance\"\n },\n {\n \"Text\": \"云数据库 PostgreSQL Serverless版\",\n \"Value\": \"postgres_serverless\"\n },\n {\n \"Text\": \"云数据库Redis\",\n \"Value\": \"redis_instance\"\n },\n {\n \"Text\": \"安全组\",\n \"Value\": \"security_group\"\n },\n {\n \"Text\": \"云数据库 SQL Server\",\n \"Value\": \"sqlserver_instance\"\n },\n {\n \"Text\": \"访问管理用户密钥\",\n \"Value\": \"cam_user_ak\"\n },\n {\n \"Text\": \"访问管理用户\",\n \"Value\": \"cam_user\"\n },\n {\n \"Text\": \"容器服务标准集群\",\n \"Value\": \"tke_cluster\"\n },\n {\n \"Text\": \"容器服务边缘集群\",\n \"Value\": \"edge_cluster\"\n },\n {\n \"Text\": \"容器服务Serverless集群\",\n \"Value\": \"eks_cluster\"\n },\n {\n \"Text\": \"微服务引擎Apollo服务\",\n \"Value\": \"tse_apollo\"\n },\n {\n \"Text\": \"微服务引擎Eureka服务\",\n \"Value\": \"tse_eureka\"\n },\n {\n \"Text\": \"微服务引擎Nacos服务\",\n \"Value\": \"tse_nacos\"\n },\n {\n \"Text\": \"微服务引擎Polaris服务\",\n \"Value\": \"tse_polaris\"\n },\n {\n \"Text\": \"微服务引擎Zookeeper服务\",\n \"Value\": \"tse_zookeeper\"\n },\n {\n \"Text\": \"微服务引擎云原生API网关\",\n \"Value\": \"kong_instance\"\n },\n {\n \"Text\": \"云服务器\",\n \"Value\": \"cvm_instance\"\n },\n {\n \"Text\": \"消息队列 TDMQ RocketMQ版\",\n \"Value\": \"tdmq_rocketmq\"\n },\n {\n \"Text\": \"消息队列 TDMQ RabbitMQ版\",\n \"Value\": \"tdmq_rabbitmq\"\n },\n {\n \"Text\": \"消息队列 TDMQ Pulsar版\",\n \"Value\": \"tdmq_pulsar\"\n },\n {\n \"Text\": \"Web 应用防火墙\",\n \"Value\": \"waf_instance\"\n },\n {\n \"Text\": \"VPN网关\",\n \"Value\": \"vpn_gateway\"\n },\n {\n \"Text\": \"文件存储\",\n \"Value\": \"cfs_instance\"\n },\n {\n \"Text\": \"云数据库 MySQL\",\n \"Value\": \"cdb_instance\"\n },\n {\n \"Text\": \"云数据库 MySQL账号\",\n \"Value\": \"cdb_account\"\n },\n {\n \"Text\": \"域名记录\",\n \"Value\": \"domain_record\"\n },\n {\n \"Text\": \"消息队列 CKafka 版\",\n \"Value\": \"ckafka_instance\"\n },\n {\n \"Text\": \"负载均衡\",\n \"Value\": \"clb_instance\"\n },\n {\n \"Text\": \"对象存储\",\n \"Value\": \"cos_bucket\"\n },\n {\n \"Text\": \"TDSQL-C MySQL 版\",\n \"Value\": \"cynosdb_cluster\"\n },\n {\n \"Text\": \"TDSQL-C MySQL 版账号\",\n \"Value\": \"cynosdb_account\"\n },\n {\n \"Text\": \"TDSQL MySQL 版\",\n \"Value\": \"dcdb_instance\"\n },\n {\n \"Text\": \"弹性 MapReduce\",\n \"Value\": \"emr_cluster\"\n },\n {\n \"Text\": \"云函数函数服务\",\n \"Value\": \"scf_instance\"\n },\n {\n \"Text\": \"云数据库 SQL Server账号\",\n \"Value\": \"sqlserver_account\"\n },\n {\n \"Text\": \"云数据库 MongoDB\",\n \"Value\": \"mongodb_instance\"\n },\n {\n \"Text\": \"云数据库 KeeWiDB\",\n \"Value\": \"keewidb_instance\"\n },\n {\n \"Text\": \"容器服务标准集群策略\",\n \"Value\": \"tke_policy\"\n },\n {\n \"Text\": \"向量数据库\",\n \"Value\": \"vdb_instance\"\n },\n {\n \"Text\": \"Elasticsearch Service采集器\",\n \"Value\": \"es_beats\"\n },\n {\n \"Text\": \"主机漏洞\",\n \"Value\": \"cwp_asset_vuln\"\n },\n {\n \"Text\": \"主机基线风险\",\n \"Value\": \"cwp_asset_baseline_risk\"\n },\n {\n \"Text\": \"主机列表\",\n \"Value\": \"cwp_asset_machine\"\n },\n {\n \"Text\": \"主机安全事件\",\n \"Value\": \"cwp_asset_event\"\n }\n ],\n \"RequestId\": \"651a037f-9bab-42ba-980c-6e26c7935191\",\n \"RiskRuleList\": [\n {\n \"CheckType\": \"network_security\",\n \"InstanceName\": \"Elasticsearch Service\",\n \"InstanceType\": \"es_cluster\",\n \"Provider\": \"腾讯云\",\n \"RiskInfluence\": \"云上多种产品都有管理后台功能且具有对公网开放能力,管理后台对外开放后后容易存在口令被爆破/被入侵风险,可导致重要数据泄露,服务器遭受入侵等严重后果。\",\n \"ItemId\": \"11.1-10.1\",\n \"RiskTitle\": \"Elasticsearch Service对外网开放管理后台\",\n \"Severity\": \"high\"\n }\n ],\n \"TotalCount\": 179\n }\n}",
328
+ "title": "高级配置风险规则列表"
329
+ }
330
+ ],
243
331
  "DescribeScanReportList": [
244
332
  {
245
333
  "document": "获取扫描报告列表",
@@ -248,6 +336,14 @@
248
336
  "title": "获取扫描报告列表"
249
337
  }
250
338
  ],
339
+ "DescribeScanStatistic": [
340
+ {
341
+ "document": "查询暴露面扫描结果统计信息",
342
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeScanStatistic\n<公共请求参数>\n\n{}",
343
+ "output": "{\n \"Response\": {\n \"HighRiskPortServiceCount\": 3,\n \"PortServiceCount\": 3,\n \"PortServiceIncrement\": 0,\n \"RequestId\": \"45ca21d4-f373-4274-9295-5380abc74bed\",\n \"RiskWebAppCount\": 0,\n \"VulCount\": 0,\n \"WeakPasswordCount\": 1,\n \"WebAppCount\": 0,\n \"WebAppIncrement\": 0\n }\n}",
344
+ "title": "查询暴露面扫描结果统计信息"
345
+ }
346
+ ],
251
347
  "DescribeScanTaskList": [
252
348
  {
253
349
  "document": "查询任务列表",
@@ -312,6 +408,14 @@
312
408
  "title": "test"
313
409
  }
314
410
  ],
411
+ "DescribeVULList": [
412
+ {
413
+ "document": "示例1",
414
+ "input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVULList\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 3,\n \"Offset\": 0,\n \"Filters\": [\n {\n \"Name\": \"EMGCVulType\",\n \"Values\": [\n \"1\"\n ]\n }\n ]\n }\n}",
415
+ "output": "{\n \"Response\": {\n \"AttackHeat\": [\n {\n \"Text\": \"无热度\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"高\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"低\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"中\",\n \"Value\": \"2\"\n }\n ],\n \"CheckStatus\": [\n {\n \"Text\": \"扫描完成\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"未扫描\",\n \"Value\": \"0\"\n }\n ],\n \"Data\": [\n {\n \"AffectAssetCount\": 0,\n \"AppName\": \"(vim) vim\",\n \"AttackHeat\": 0,\n \"CVE\": \"CVE-2008-4101\",\n \"CVSS\": 0,\n \"EMGCVulType\": 1,\n \"LastScanTime\": \"\",\n \"Level\": \"high\",\n \"PublishTime\": \"2008-09-19 01:59:00\",\n \"ScanStatus\": 0,\n \"SupportProduct\": \"cwp_detect,cwp_fix\",\n \"TaskId\": \"\",\n \"VULName\": \"Vim 输入验证漏洞\",\n \"VULType\": \"输入验证\",\n \"VulTag\": [\n \"NETWORK\",\n \"POC\",\n \"SYS\",\n \"APP\"\n ]\n },\n {\n \"AffectAssetCount\": 0,\n \"AppName\": \"(radius_extension_project) radius\",\n \"AttackHeat\": 0,\n \"CVE\": \"CVE-2013-2220\",\n \"CVSS\": 0,\n \"EMGCVulType\": 1,\n \"LastScanTime\": \"\",\n \"Level\": \"high\",\n \"PublishTime\": \"2013-07-31 21:20:00\",\n \"ScanStatus\": 0,\n \"SupportProduct\": \"cwp_detect,cwp_fix\",\n \"TaskId\": \"\",\n \"VULName\": \"PECL radius 'radius_get_vendor_attr()'远程拒绝服务漏洞\",\n \"VULType\": \"缓冲区错误\",\n \"VulTag\": [\n \"NETWORK\",\n \"SYS\"\n ]\n },\n {\n \"AffectAssetCount\": 0,\n \"AppName\": \"(apache) activemq\",\n \"AttackHeat\": 0,\n \"CVE\": \"CVE-2016-3088\",\n \"CVSS\": 9.8,\n \"EMGCVulType\": 1,\n \"LastScanTime\": \"\",\n \"Level\": \"high\",\n \"PublishTime\": \"2016-06-01 16:59:04\",\n \"ScanStatus\": 0,\n \"SupportProduct\": \"cwp_detect,cwp_defense\",\n \"TaskId\": \"\",\n \"VULName\": \"Apache ActiveMQ Fileserver 远程代码执行漏洞(CVE-2016-3088)\",\n \"VULType\": \"输入验证\",\n \"VulTag\": [\n \"NETWORK\",\n \"EXP\",\n \"POC\",\n \"KNOWN_EXPLOITED\",\n \"SYS\",\n \"APP\"\n ]\n }\n ],\n \"ProductSupport\": [\n {\n \"Text\": \"云安全中心自动修复\",\n \"Value\": \"cwp_fix\"\n },\n {\n \"Text\": \"云防火墙、Web应用防火墙开启虚拟补丁\",\n \"Value\": \"cfw_waf_virtual\"\n },\n {\n \"Text\": \"云安全中心漏洞检测\",\n \"Value\": \"cwp_detect\"\n },\n {\n \"Text\": \"云安全中心漏洞防御\",\n \"Value\": \"cwp_defense\"\n }\n ],\n \"RequestId\": \"d2e5b2ba-6ee2-4801-a378-af163d79a052\",\n \"RiskLevels\": [\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"\",\n \"Value\": \"未知\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n },\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n }\n ],\n \"TotalCount\": 208,\n \"VULTypeLists\": [\n {\n \"Text\": \"输入验证\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"缓冲区错误\",\n \"Value\": \"12\"\n },\n {\n \"Text\": \"竞争条件\",\n \"Value\": \"9\"\n },\n {\n \"Text\": \"权限许可和访问控制\",\n \"Value\": \"24\"\n },\n {\n \"Text\": \"批量分配漏洞\",\n \"Value\": \"52\"\n },\n {\n \"Text\": \"代码注入\",\n \"Value\": \"18\"\n },\n {\n \"Text\": \"文件上传\",\n \"Value\": \"35\"\n },\n {\n \"Text\": \"反序列化\",\n \"Value\": \"16\"\n },\n {\n \"Text\": \"路径遍历\",\n \"Value\": \"21\"\n },\n {\n \"Text\": \"信任管理\",\n \"Value\": \"32\"\n },\n {\n \"Text\": \"授权问题\",\n \"Value\": \"4\"\n },\n {\n \"Text\": \"代码执行 \",\n \"Value\": \"45\"\n },\n {\n \"Text\": \"输入验证错误\",\n \"Value\": \"42\"\n },\n {\n \"Text\": \"SQL注入\",\n \"Value\": \"37\"\n },\n {\n \"Text\": \"未授权访问\",\n \"Value\": \"53\"\n },\n {\n \"Text\": \"无限循环漏洞\",\n \"Value\": \"22\"\n },\n {\n \"Text\": \"资源管理错误\",\n \"Value\": \"6\"\n },\n {\n \"Text\": \"命令执行\",\n \"Value\": \"41\"\n },\n {\n \"Text\": \"其他\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"操作系统命令注入\",\n \"Value\": \"36\"\n },\n {\n \"Text\": \"注入\",\n \"Value\": \"11\"\n },\n {\n \"Text\": \"权限管理不当\",\n \"Value\": \"20\"\n },\n {\n \"Text\": \"空指针引用\",\n \"Value\": \"10\"\n },\n {\n \"Text\": \"整数溢出\",\n \"Value\": \"25\"\n },\n {\n \"Text\": \"代码问题\",\n \"Value\": \"23\"\n },\n {\n \"Text\": \"越界写入\",\n \"Value\": \"5\"\n },\n {\n \"Text\": \"访问控制错误\",\n \"Value\": \"30\"\n },\n {\n \"Text\": \"组件漏洞\",\n \"Value\": \"56\"\n },\n {\n \"Text\": \"服务器端请求伪造\",\n \"Value\": \"57\"\n },\n {\n \"Text\": \"跨站请求伪造\",\n \"Value\": \"15\"\n },\n {\n \"Text\": \"数字错误\",\n \"Value\": \"28\"\n },\n {\n \"Text\": \"拒绝服务 \",\n \"Value\": \"40\"\n },\n {\n \"Text\": \"缓冲区溢出\",\n \"Value\": \"14\"\n },\n {\n \"Text\": \"越界读取\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"配置错误\",\n \"Value\": \"8\"\n },\n {\n \"Text\": \"安全模式绕过\",\n \"Value\": \"61\"\n },\n {\n \"Text\": \"权限提升 \",\n \"Value\": \"54\"\n },\n {\n \"Text\": \"任意文件读取\",\n \"Value\": \"71\"\n },\n {\n \"Text\": \"信息泄露\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"登录绕过\",\n \"Value\": \"60\"\n },\n {\n \"Text\": \"信息泄漏\",\n \"Value\": \"43\"\n },\n {\n \"Text\": \"解析错误 \",\n \"Value\": \"63\"\n },\n {\n \"Text\": \"Xml注入 \",\n \"Value\": \"78\"\n },\n {\n \"Text\": \"权限许可和访问控制问题\",\n \"Value\": \"13\"\n },\n {\n \"Text\": \"XML外部实体(XXE)注入\",\n \"Value\": \"29\"\n },\n {\n \"Text\": \"跨站脚本\",\n \"Value\": \"44\"\n },\n {\n \"Text\": \"命令注入\",\n \"Value\": \"34\"\n },\n {\n \"Text\": \"http请求拆分\",\n \"Value\": \"59\"\n },\n {\n \"Text\": \"安全特征问题\",\n \"Value\": \"48\"\n },\n {\n \"Text\": \"资料不足\",\n \"Value\": \"33\"\n },\n {\n \"Text\": \"Double Free漏洞\",\n \"Value\": \"17\"\n },\n {\n \"Text\": \"加密问题\",\n \"Value\": \"7\"\n },\n {\n \"Text\": \"url重定向\",\n \"Value\": \"49\"\n },\n {\n \"Text\": \"弱密码\",\n \"Value\": \"62\"\n },\n {\n \"Text\": \"信任管理问题\",\n \"Value\": \"46\"\n },\n {\n \"Text\": \"后置链接\",\n \"Value\": \"19\"\n },\n {\n \"Text\": \"设计错误\",\n \"Value\": \"38\"\n },\n {\n \"Text\": \"CRLF 注入\",\n \"Value\": \"31\"\n },\n {\n \"Text\": \"未充分验证数据可靠性\",\n \"Value\": \"51\"\n },\n {\n \"Text\": \"本地文件包含\",\n \"Value\": \"50\"\n },\n {\n \"Text\": \"竞争条件问题\",\n \"Value\": \"58\"\n },\n {\n \"Text\": \"访问控制\",\n \"Value\": \"26\"\n },\n {\n \"Text\": \"目录遍历\",\n \"Value\": \"27\"\n },\n {\n \"Text\": \"无效指针引用\",\n \"Value\": \"55\"\n },\n {\n \"Text\": \"LDAP 注入漏洞\",\n \"Value\": \"47\"\n },\n {\n \"Text\": \"格式化字符串\",\n \"Value\": \"67\"\n },\n {\n \"Text\": \"会话固定\",\n \"Value\": \"69\"\n },\n {\n \"Text\": \"ldap注入\",\n \"Value\": \"70\"\n },\n {\n \"Text\": \"中间人攻击\",\n \"Value\": \"72\"\n },\n {\n \"Text\": \"http请求伪造\",\n \"Value\": \"73\"\n },\n {\n \"Text\": \"http响应伪造\",\n \"Value\": \"64\"\n },\n {\n \"Text\": \"边界条件错误\",\n \"Value\": \"68\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"66\"\n },\n {\n \"Text\": \"访问验证错误\",\n \"Value\": \"65\"\n },\n {\n \"Text\": \"远程溢出\",\n \"Value\": \"75\"\n },\n {\n \"Text\": \"后门 \",\n \"Value\": \"76\"\n },\n {\n \"Text\": \"本地溢出\",\n \"Value\": \"77\"\n },\n {\n \"Text\": \"任意文件下载\",\n \"Value\": \"80\"\n },\n {\n \"Text\": \"混淆代理\",\n \"Value\": \"79\"\n },\n {\n \"Text\": \"目录穿越 \",\n \"Value\": \"81\"\n },\n {\n \"Text\": \"权限验证不足\",\n \"Value\": \"82\"\n },\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"83\"\n },\n {\n \"Text\": \"Xpath注入\",\n \"Value\": \"84\"\n },\n {\n \"Text\": \"路径泄漏\",\n \"Value\": \"86\"\n }\n ]\n }\n}",
416
+ "title": "示例1"
417
+ }
418
+ ],
315
419
  "DescribeVULRiskAdvanceCFGList": [
316
420
  {
317
421
  "document": "查询漏洞风险高级配置",
@@ -2406,6 +2406,17 @@
2406
2406
  "required": false,
2407
2407
  "type": "string",
2408
2408
  "value_allowed_null": false
2409
+ },
2410
+ {
2411
+ "disabled": false,
2412
+ "document": "云联网网关所属账号,如果云联网网关为其他账号资源需要填写",
2413
+ "example": "212221111",
2414
+ "member": "string",
2415
+ "name": "CcnOwnerUin",
2416
+ "output_required": false,
2417
+ "required": false,
2418
+ "type": "string",
2419
+ "value_allowed_null": false
2409
2420
  }
2410
2421
  ],
2411
2422
  "usage": "both"
@@ -880,6 +880,50 @@
880
880
  "required": true,
881
881
  "type": "string",
882
882
  "value_allowed_null": false
883
+ },
884
+ {
885
+ "disabled": false,
886
+ "document": "0 腾讯云仓库; 1 客户仓库",
887
+ "example": "0",
888
+ "member": "uint64",
889
+ "name": "EsRepositoryType",
890
+ "output_required": false,
891
+ "required": false,
892
+ "type": "int",
893
+ "value_allowed_null": false
894
+ },
895
+ {
896
+ "disabled": false,
897
+ "document": "客户快照仓库名称",
898
+ "example": "testRepository",
899
+ "member": "string",
900
+ "name": "UserEsRepository",
901
+ "output_required": false,
902
+ "required": false,
903
+ "type": "string",
904
+ "value_allowed_null": false
905
+ },
906
+ {
907
+ "disabled": false,
908
+ "document": "快照存储周期 单位天",
909
+ "example": "15",
910
+ "member": "uint64",
911
+ "name": "StorageDuration",
912
+ "output_required": false,
913
+ "required": false,
914
+ "type": "int",
915
+ "value_allowed_null": false
916
+ },
917
+ {
918
+ "disabled": false,
919
+ "document": "自动备份频率单位小时",
920
+ "example": "4",
921
+ "member": "uint64",
922
+ "name": "AutoBackupInterval",
923
+ "output_required": false,
924
+ "required": false,
925
+ "type": "int",
926
+ "value_allowed_null": false
883
927
  }
884
928
  ],
885
929
  "usage": "both"
@@ -9936,6 +9980,17 @@
9936
9980
  "type": "string",
9937
9981
  "value_allowed_null": true
9938
9982
  },
9983
+ {
9984
+ "disabled": false,
9985
+ "document": "仓库名称\n注意:此字段可能返回 null,表示取不到有效值。",
9986
+ "example": "testRepository",
9987
+ "member": "string",
9988
+ "name": "Repository",
9989
+ "output_required": false,
9990
+ "required": false,
9991
+ "type": "string",
9992
+ "value_allowed_null": true
9993
+ },
9939
9994
  {
9940
9995
  "disabled": false,
9941
9996
  "document": "该快照所属集群的版本号\n注意:此字段可能返回 null,表示取不到有效值。",
@@ -261,6 +261,17 @@
261
261
  "required": false,
262
262
  "type": "list",
263
263
  "value_allowed_null": false
264
+ },
265
+ {
266
+ "disabled": false,
267
+ "document": "相邻切片重合字符数,需要小于分片长度",
268
+ "example": "4000",
269
+ "member": "uint64",
270
+ "name": "ChunkOverlap",
271
+ "output_required": false,
272
+ "required": false,
273
+ "type": "int",
274
+ "value_allowed_null": false
264
275
  }
265
276
  ],
266
277
  "usage": "both"
@@ -411,6 +422,16 @@
411
422
  "type": "list",
412
423
  "value_allowed_null": false
413
424
  },
425
+ {
426
+ "disabled": false,
427
+ "document": "token消耗量",
428
+ "example": "无",
429
+ "member": "Usage",
430
+ "name": "Usage",
431
+ "output_required": false,
432
+ "type": "object",
433
+ "value_allowed_null": false
434
+ },
414
435
  {
415
436
  "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
416
437
  "member": "string",
@@ -381,6 +381,58 @@ def doDescribeBatchOrganizationRegistrationUrls(args, parsed_globals):
381
381
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
382
 
383
383
 
384
+ def doDescribeBatchOrganizationRegistrationTasks(args, parsed_globals):
385
+ g_param = parse_global_arg(parsed_globals)
386
+
387
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
388
+ cred = credential.CVMRoleCredential()
389
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
390
+ cred = credential.STSAssumeRoleCredential(
391
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
+ )
394
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
+ else:
397
+ cred = credential.Credential(
398
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
399
+ )
400
+ http_profile = HttpProfile(
401
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
402
+ reqMethod="POST",
403
+ endpoint=g_param[OptionsDefine.Endpoint],
404
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
+ )
406
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
407
+ if g_param[OptionsDefine.Language]:
408
+ profile.language = g_param[OptionsDefine.Language]
409
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
+ client = mod.EssClient(cred, g_param[OptionsDefine.Region], profile)
411
+ client._sdkVersion += ("_CLI_" + __version__)
412
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
+ model = models.DescribeBatchOrganizationRegistrationTasksRequest()
414
+ model.from_json_string(json.dumps(args))
415
+ start_time = time.time()
416
+ while True:
417
+ rsp = client.DescribeBatchOrganizationRegistrationTasks(model)
418
+ result = rsp.to_json_string()
419
+ try:
420
+ json_obj = json.loads(result)
421
+ except TypeError as e:
422
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
423
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
424
+ break
425
+ cur_time = time.time()
426
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
427
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
428
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
429
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
430
+ else:
431
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
432
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
433
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
+
435
+
384
436
  def doCreatePreparedPersonalEsign(args, parsed_globals):
385
437
  g_param = parse_global_arg(parsed_globals)
386
438
 
@@ -3761,6 +3813,58 @@ def doCreateConvertTaskApi(args, parsed_globals):
3761
3813
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3762
3814
 
3763
3815
 
3816
+ def doModifyPartnerAutoSignAuthUrl(args, parsed_globals):
3817
+ g_param = parse_global_arg(parsed_globals)
3818
+
3819
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3820
+ cred = credential.CVMRoleCredential()
3821
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3822
+ cred = credential.STSAssumeRoleCredential(
3823
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
+ )
3826
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
+ else:
3829
+ cred = credential.Credential(
3830
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3831
+ )
3832
+ http_profile = HttpProfile(
3833
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3834
+ reqMethod="POST",
3835
+ endpoint=g_param[OptionsDefine.Endpoint],
3836
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
+ )
3838
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3839
+ if g_param[OptionsDefine.Language]:
3840
+ profile.language = g_param[OptionsDefine.Language]
3841
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3842
+ client = mod.EssClient(cred, g_param[OptionsDefine.Region], profile)
3843
+ client._sdkVersion += ("_CLI_" + __version__)
3844
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
3845
+ model = models.ModifyPartnerAutoSignAuthUrlRequest()
3846
+ model.from_json_string(json.dumps(args))
3847
+ start_time = time.time()
3848
+ while True:
3849
+ rsp = client.ModifyPartnerAutoSignAuthUrl(model)
3850
+ result = rsp.to_json_string()
3851
+ try:
3852
+ json_obj = json.loads(result)
3853
+ except TypeError as e:
3854
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
3855
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
3856
+ break
3857
+ cur_time = time.time()
3858
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
3859
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
3860
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
3861
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
3862
+ else:
3863
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
3864
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
3865
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3866
+
3867
+
3764
3868
  def doCreateOrganizationAuthUrl(args, parsed_globals):
3765
3869
  g_param = parse_global_arg(parsed_globals)
3766
3870
 
@@ -4125,6 +4229,58 @@ def doDescribeUserFlowType(args, parsed_globals):
4125
4229
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4126
4230
 
4127
4231
 
4232
+ def doCreateModifyAdminAuthorizationUrl(args, parsed_globals):
4233
+ g_param = parse_global_arg(parsed_globals)
4234
+
4235
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
4236
+ cred = credential.CVMRoleCredential()
4237
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
4238
+ cred = credential.STSAssumeRoleCredential(
4239
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4240
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4241
+ )
4242
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4243
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4244
+ else:
4245
+ cred = credential.Credential(
4246
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
4247
+ )
4248
+ http_profile = HttpProfile(
4249
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
4250
+ reqMethod="POST",
4251
+ endpoint=g_param[OptionsDefine.Endpoint],
4252
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4253
+ )
4254
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4255
+ if g_param[OptionsDefine.Language]:
4256
+ profile.language = g_param[OptionsDefine.Language]
4257
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4258
+ client = mod.EssClient(cred, g_param[OptionsDefine.Region], profile)
4259
+ client._sdkVersion += ("_CLI_" + __version__)
4260
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
4261
+ model = models.CreateModifyAdminAuthorizationUrlRequest()
4262
+ model.from_json_string(json.dumps(args))
4263
+ start_time = time.time()
4264
+ while True:
4265
+ rsp = client.CreateModifyAdminAuthorizationUrl(model)
4266
+ result = rsp.to_json_string()
4267
+ try:
4268
+ json_obj = json.loads(result)
4269
+ except TypeError as e:
4270
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
4271
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4272
+ break
4273
+ cur_time = time.time()
4274
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4275
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4276
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4277
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4278
+ else:
4279
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4280
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4281
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4282
+
4283
+
4128
4284
  def doCreateIntegrationEmployees(args, parsed_globals):
4129
4285
  g_param = parse_global_arg(parsed_globals)
4130
4286
 
@@ -5651,6 +5807,7 @@ ACTION_MAP = {
5651
5807
  "CreateUserVerifyUrl": doCreateUserVerifyUrl,
5652
5808
  "CreateEmbedWebUrl": doCreateEmbedWebUrl,
5653
5809
  "DescribeBatchOrganizationRegistrationUrls": doDescribeBatchOrganizationRegistrationUrls,
5810
+ "DescribeBatchOrganizationRegistrationTasks": doDescribeBatchOrganizationRegistrationTasks,
5654
5811
  "CreatePreparedPersonalEsign": doCreatePreparedPersonalEsign,
5655
5812
  "CreateFlowSignReview": doCreateFlowSignReview,
5656
5813
  "ModifyIntegrationDepartment": doModifyIntegrationDepartment,
@@ -5716,6 +5873,7 @@ ACTION_MAP = {
5716
5873
  "CreateExtendedServiceAuthInfos": doCreateExtendedServiceAuthInfos,
5717
5874
  "CreateOrganizationInfoChangeUrl": doCreateOrganizationInfoChangeUrl,
5718
5875
  "CreateConvertTaskApi": doCreateConvertTaskApi,
5876
+ "ModifyPartnerAutoSignAuthUrl": doModifyPartnerAutoSignAuthUrl,
5719
5877
  "CreateOrganizationAuthUrl": doCreateOrganizationAuthUrl,
5720
5878
  "UploadFiles": doUploadFiles,
5721
5879
  "CreateFlowForwards": doCreateFlowForwards,
@@ -5723,6 +5881,7 @@ ACTION_MAP = {
5723
5881
  "CreateWebThemeConfig": doCreateWebThemeConfig,
5724
5882
  "CreateDynamicFlowApprover": doCreateDynamicFlowApprover,
5725
5883
  "DescribeUserFlowType": doDescribeUserFlowType,
5884
+ "CreateModifyAdminAuthorizationUrl": doCreateModifyAdminAuthorizationUrl,
5726
5885
  "CreateIntegrationEmployees": doCreateIntegrationEmployees,
5727
5886
  "DeleteOrganizationAuthorizations": doDeleteOrganizationAuthorizations,
5728
5887
  "OperateSeals": doOperateSeals,