tccli 3.0.1337.1__py2.py3-none-any.whl → 3.0.1339.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/apm/v20210622/api.json +10 -0
- tccli/services/asr/v20190614/api.json +1 -1
- tccli/services/ccc/v20200210/api.json +100 -1
- tccli/services/cdb/v20170320/api.json +37 -37
- tccli/services/cdb/v20170320/examples.json +7 -7
- tccli/services/cdn/v20180606/api.json +2 -2
- tccli/services/cdwdoris/v20211228/api.json +2 -2
- tccli/services/cfs/v20190719/api.json +15 -3
- tccli/services/cfw/v20190904/examples.json +12 -0
- tccli/services/ckafka/v20190819/api.json +19 -0
- tccli/services/cls/v20201016/api.json +2 -2
- tccli/services/csip/csip_client.py +791 -102
- tccli/services/csip/v20221121/api.json +6108 -3458
- tccli/services/csip/v20221121/examples.json +104 -0
- tccli/services/dts/v20211206/api.json +11 -0
- tccli/services/es/v20180416/api.json +55 -0
- tccli/services/es/v20250101/api.json +21 -0
- tccli/services/ess/ess_client.py +159 -0
- tccli/services/ess/v20201111/api.json +284 -4
- tccli/services/ess/v20201111/examples.json +28 -4
- tccli/services/essbasic/essbasic_client.py +171 -12
- tccli/services/essbasic/v20210526/api.json +256 -5
- tccli/services/essbasic/v20210526/examples.json +25 -1
- tccli/services/gwlb/v20240906/api.json +1 -1
- tccli/services/gwlb/v20240906/examples.json +1 -1
- tccli/services/hunyuan/v20230901/api.json +3 -3
- tccli/services/ioa/v20220601/api.json +55 -0
- tccli/services/ioa/v20220601/examples.json +1 -1
- tccli/services/iotexplorer/iotexplorer_client.py +57 -4
- tccli/services/iotexplorer/v20190423/api.json +145 -19
- tccli/services/iotexplorer/v20190423/examples.json +8 -0
- tccli/services/live/live_client.py +208 -49
- tccli/services/live/v20180801/api.json +498 -73
- tccli/services/live/v20180801/examples.json +35 -11
- tccli/services/lkeap/lkeap_client.py +0 -53
- tccli/services/lkeap/v20240522/api.json +0 -90
- tccli/services/lkeap/v20240522/examples.json +0 -8
- tccli/services/ocr/v20181119/api.json +21 -1
- tccli/services/ocr/v20181119/examples.json +1 -1
- tccli/services/ssl/ssl_client.py +212 -0
- tccli/services/ssl/v20191205/api.json +625 -10
- tccli/services/ssl/v20191205/examples.json +38 -0
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tdmq/v20200217/api.json +56 -47
- tccli/services/tdmq/v20200217/examples.json +8 -8
- tccli/services/trocket/trocket_client.py +104 -51
- tccli/services/trocket/v20230308/api.json +238 -61
- tccli/services/trocket/v20230308/examples.json +20 -12
- tccli/services/trtc/v20190722/api.json +3 -3
- tccli/services/tse/v20201207/api.json +19 -0
- tccli/services/tsf/v20180326/api.json +1 -1
- tccli/services/wedata/v20210820/api.json +607 -3
- tccli/services/wedata/v20210820/examples.json +18 -8
- tccli/services/wedata/wedata_client.py +106 -0
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/METADATA +2 -2
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/RECORD +60 -60
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1337.1.dist-info → tccli-3.0.1339.1.dist-info}/license_files/LICENSE +0 -0
@@ -48,6 +48,14 @@
|
|
48
48
|
"title": "告警中心全量告警示例"
|
49
49
|
}
|
50
50
|
],
|
51
|
+
"DescribeAssetRiskList": [
|
52
|
+
{
|
53
|
+
"document": "",
|
54
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeXspmAssetsRisks\n<公共请求参数>\n\n{}",
|
55
|
+
"output": "{\n \"Response\": {\n \"AssetRiskList\": [\n {\n \"AppId\": 1300448058,\n \"CheckType\": \"network_security\",\n \"CloudAccountId\": \"12335421\",\n \"CloudAccountName\": \"测试\",\n \"CreateTime\": \"2025-04-29T08:51:39Z\",\n \"InstanceId\": \"test\",\n \"InstanceName\": \"test\",\n \"Provider\": \"tencent\",\n \"ProviderName\": \"腾讯云\",\n \"RiskRuleId\": \"tc_191\",\n \"RiskStatus\": 2,\n \"RiskTitle\": \"安全组存在放通非业务端口全部网段的规则\",\n \"Severity\": \"medium\",\n \"UpdateTime\": \"2025-05-07T01:51:28Z\"\n }\n ],\n \"RequestId\": \"ab3a4f8f-30e4-462c-8be0-4b24bff70111\",\n \"TotalCount\": 518\n }\n}",
|
56
|
+
"title": "资产视角下风险列表示例"
|
57
|
+
}
|
58
|
+
],
|
51
59
|
"DescribeAssetViewVulRiskList": [
|
52
60
|
{
|
53
61
|
"document": "获取资产视角的漏洞风险列表",
|
@@ -64,6 +72,14 @@
|
|
64
72
|
"title": "资产中心统计"
|
65
73
|
}
|
66
74
|
],
|
75
|
+
"DescribeCSIPRiskStatistics": [
|
76
|
+
{
|
77
|
+
"document": "",
|
78
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCSIPRiskStatistics\n<公共请求参数>\n\n{}",
|
79
|
+
"output": "{\n \"Response\": {\n \"Data\": {\n \"CFGHighLevel\": 46,\n \"CFGTotal\": 333,\n \"LastScanTime\": \"2025-04-11 00:00:09\",\n \"PortHighLevel\": 1,\n \"PortTotal\": 66,\n \"ServerHighLevel\": 0,\n \"ServerTotal\": 6,\n \"VULHighLevel\": 31,\n \"VULTotal\": 596,\n \"WeakPasswordHighLevel\": 0,\n \"WeakPasswordTotal\": 0,\n \"WebsiteHighLevel\": 0,\n \"HostBaseLineRiskTotal\": 0,\n \"HostBaseLineRiskHighLevel\": 0,\n \"PodBaseLineRiskTotal\": 0,\n \"PodBaseLineRiskHighLevel\": 0,\n \"WebsiteTotal\": 15\n },\n \"RequestId\": \"14a5d202-861d-4669-8ca7-592c0acd2dc9\"\n }\n}",
|
80
|
+
"title": "获取风险中心风险概况"
|
81
|
+
}
|
82
|
+
],
|
67
83
|
"DescribeCVMAssetInfo": [
|
68
84
|
{
|
69
85
|
"document": "接口测试",
|
@@ -80,6 +96,14 @@
|
|
80
96
|
"title": "获取cvm列表"
|
81
97
|
}
|
82
98
|
],
|
99
|
+
"DescribeCheckViewRisks": [
|
100
|
+
{
|
101
|
+
"document": "",
|
102
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeCheckViewRisks\n<公共请求参数>\n\n{}",
|
103
|
+
"output": "{\n \"Response\": {\n \"CheckViewRiskList\": [\n {\n \"AssetCount\": 37,\n \"AssetType\": \"云服务器\",\n \"CheckType\": \"network_security\",\n \"CreateTime\": \"2025-04-29T08:51:33Z\",\n \"EventType\": \"云服务器安全组IP来源设置过大\",\n \"Provider\": \"腾讯云\",\n \"RiskCount\": 67,\n \"RiskDesc\": \"发现*个云服务器安全组IP来源设置过大\",\n \"RiskRuleId\": \"tc_003\",\n \"RiskStatus\": 0,\n \"RiskTitle\": \"云服务器安全组IP来源设置过大\",\n \"Severity\": \"medium\",\n \"UpdateTime\": \"2025-05-07T01:51:30Z\"\n }\n ],\n \"RequestId\": \"3ac59d59-0a8e-4c6a-8249-936f0f02cf99\",\n \"TotalCount\": 32\n }\n}",
|
104
|
+
"title": "检查视角下云资源配置风险列表"
|
105
|
+
}
|
106
|
+
],
|
83
107
|
"DescribeClusterAssets": [
|
84
108
|
{
|
85
109
|
"document": "空示例",
|
@@ -120,6 +144,22 @@
|
|
120
144
|
"title": "接口示例"
|
121
145
|
}
|
122
146
|
],
|
147
|
+
"DescribeExposeAssetCategory": [
|
148
|
+
{
|
149
|
+
"document": "",
|
150
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExposeAssetCategory\n<公共请求参数>\n\n{}",
|
151
|
+
"output": "{\n \"Response\": {\n \"ExposeAssetTypeList\": [\n {\n \"Provider\": \"tencent\",\n \"ProviderName\": \"腾讯云\",\n \"AssetType\": \"cvm_instance\",\n \"AssetTypeName\": \"云服务器\"\n }\n ],\n \"RequestId\": \"46fb51ad-b6d8-4c91-af47-8f4bc947a69c\"\n }\n}",
|
152
|
+
"title": "暴露面资产分类"
|
153
|
+
}
|
154
|
+
],
|
155
|
+
"DescribeExposePath": [
|
156
|
+
{
|
157
|
+
"document": "",
|
158
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeExposePath\n<公共请求参数>\n\n{\n \"AssetId\": \"ins-xxxx\"\n}",
|
159
|
+
"output": "{\n \"Response\": {\n \"RequestId\": \"c93adc50-6598-4af6-afa4-51e09895451f\",\n \"Content\": \"\"\n }\n}",
|
160
|
+
"title": "查询互联网暴露节点"
|
161
|
+
}
|
162
|
+
],
|
123
163
|
"DescribeExposures": [
|
124
164
|
{
|
125
165
|
"document": "",
|
@@ -168,6 +208,14 @@
|
|
168
208
|
"title": "查询集团账号用户列表"
|
169
209
|
}
|
170
210
|
],
|
211
|
+
"DescribeOtherCloudAssets": [
|
212
|
+
{
|
213
|
+
"document": "其他云资源列表",
|
214
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeOtherCloudAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 0,\n \"Offset\": 0,\n \"Order\": \"abc\",\n \"By\": \"abc\",\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"OperatorType\": 0\n }\n ],\n \"StartTime\": \"abc\",\n \"EndTime\": \"abc\"\n },\n \"AssetTypes\": [\n \"abc\"\n ]\n}",
|
215
|
+
"output": "{\n \"Response\": {\n \"Total\": 1,\n \"Data\": [\n {\n \"AssetId\": \"abc\",\n \"AssetName\": \"abc\",\n \"AssetType\": \"abc\",\n \"VpcId\": \"abc\",\n \"VpcName\": \"abc\",\n \"Region\": \"abc\",\n \"Domain\": \"abc\",\n \"AssetCreateTime\": \"abc\",\n \"LastScanTime\": \"abc\",\n \"ConfigurationRisk\": 1,\n \"Attack\": 1,\n \"Access\": 1,\n \"ScanTask\": 1,\n \"AppId\": 1,\n \"Uin\": \"abc\",\n \"NickName\": \"abc\",\n \"Port\": 1,\n \"Tag\": [\n {\n \"Name\": \"abc\",\n \"Value\": \"abc\"\n }\n ],\n \"PrivateIp\": \"abc\",\n \"PublicIp\": \"abc\",\n \"Status\": 1,\n \"IsCore\": 1,\n \"IsNewAsset\": 1\n }\n ],\n \"RegionList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"AssetTypeList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"VpcList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
|
216
|
+
"title": "其他云资源列表"
|
217
|
+
}
|
218
|
+
],
|
171
219
|
"DescribePublicIpAssets": [
|
172
220
|
{
|
173
221
|
"document": "",
|
@@ -176,6 +224,14 @@
|
|
176
224
|
"title": "资产查询"
|
177
225
|
}
|
178
226
|
],
|
227
|
+
"DescribeRepositoryImageAssets": [
|
228
|
+
{
|
229
|
+
"document": "仓库镜像列表",
|
230
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRepositoryImageAssets\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 0,\n \"Offset\": 0,\n \"Order\": \"abc\",\n \"By\": \"abc\",\n \"Filters\": [\n {\n \"Name\": \"abc\",\n \"Values\": [\n \"abc\"\n ],\n \"OperatorType\": 0\n }\n ],\n \"StartTime\": \"abc\",\n \"EndTime\": \"abc\"\n }\n}",
|
231
|
+
"output": "{\n \"Response\": {\n \"Data\": [\n {\n \"AppId\": 0,\n \"Uin\": \"abc\",\n \"NickName\": \"abc\",\n \"InstanceId\": \"abc\",\n \"InstanceName\": \"abc\",\n \"InstanceCreateTime\": \"abc\",\n \"InstanceSize\": \"abc\",\n \"BuildCount\": 0,\n \"InstanceType\": \"abc\",\n \"AuthStatus\": 0,\n \"InstanceVersion\": \"abc\",\n \"Region\": \"abc\",\n \"RepositoryUrl\": \"abc\",\n \"RepositoryName\": \"abc\"\n }\n ],\n \"Total\": 0,\n \"RegionList\": [\n {\n \"Value\": \"abc\",\n \"Text\": \"abc\"\n }\n ],\n \"RequestId\": \"abc\"\n }\n}",
|
232
|
+
"title": "仓库镜像列表"
|
233
|
+
}
|
234
|
+
],
|
179
235
|
"DescribeRiskCenterAssetViewCFGRiskList": [
|
180
236
|
{
|
181
237
|
"document": "获取资产视角的配置风险列表",
|
@@ -208,6 +264,14 @@
|
|
208
264
|
"title": "获取资产视角的弱口令风险列表"
|
209
265
|
}
|
210
266
|
],
|
267
|
+
"DescribeRiskCenterCFGViewCFGRiskList": [
|
268
|
+
{
|
269
|
+
"document": "空示例",
|
270
|
+
"input": "{\n \"MemberId\": [\n \"xx\"\n ],\n \"Filter\": {\n \"Limit\": 0,\n \"Offset\": 0,\n \"Order\": \"xx\",\n \"By\": \"xx\",\n \"Filters\": [\n {\n \"Name\": \"xx\",\n \"Values\": [\n \"xx\"\n ],\n \"OperatorType\": 0\n }\n ],\n \"StartTime\": \"xx\",\n \"EndTime\": \"xx\"\n }\n}",
|
271
|
+
"output": "{\n \"Response\": {\n \"TotalCount\": 0,\n \"Data\": [\n {\n \"NoHandleCount\": 0,\n \"Level\": \"xx\",\n \"RecentTime\": \"xx\",\n \"FirstTime\": \"xx\",\n \"AffectAssetCount\": 1,\n \"Id\": \"xx\",\n \"From\": \"xx\",\n \"Index\": \"xx\",\n \"AppId\": \"xx\",\n \"Nick\": \"xx\",\n \"Uin\": \"xx\",\n \"CFGName\": \"xx\",\n \"CheckType\": \"xx\",\n \"CFGSTD\": \"xx\",\n \"CFGDescribe\": \"xx\",\n \"CFGFix\": \"xx\",\n \"CFGHelpURL\": \"xx\"\n }\n ],\n \"StatusLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"LevelLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"FromLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"InstanceTypeLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"CheckTypeLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"CFGNameLists\": [\n {\n \"Value\": \"xx\",\n \"Text\": \"xx\"\n }\n ],\n \"RequestId\": \"xx\"\n }\n}",
|
272
|
+
"title": "空示例"
|
273
|
+
}
|
274
|
+
],
|
211
275
|
"DescribeRiskCenterPortViewPortRiskList": [
|
212
276
|
{
|
213
277
|
"document": "获取端口视角的端口风险列表",
|
@@ -240,6 +304,30 @@
|
|
240
304
|
"title": "获取内容风险列表"
|
241
305
|
}
|
242
306
|
],
|
307
|
+
"DescribeRiskDetailList": [
|
308
|
+
{
|
309
|
+
"document": "",
|
310
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDetailList\n<公共请求参数>\n\n{\n \"RiskRuleId\": \"tc_001\"\n}",
|
311
|
+
"output": "{\n \"Response\": {\n \"AssetRiskDetailList\": [\n {\n \"CheckStatus\": \"\",\n \"CloudAccountId\": \"12352343\",\n \"CloudAccountName\": \"测试\",\n \"CreateTime\": \"2025-04-29T07:36:22Z\",\n \"InstanceId\": \"12352343\",\n \"InstanceName\": \"test\",\n \"Provider\": \"tencent\",\n \"ProviderName\": \"腾讯云\",\n \"RiskContent\": \"{\\\"header\\\": [{\\\"name\\\": \\\"user_name\\\", \\\"value\\\": \\\"用户名称\\\"}, {\\\"name\\\": \\\"console_login\\\", \\\"value\\\": \\\"是否可以登录控制台\\\"}, {\\\"name\\\": \\\"user_uin\\\", \\\"value\\\": \\\"用户账号\\\"}, {\\\"name\\\": \\\"risk_type\\\", \\\"value\\\": \\\"风险类型\\\"}], \\\"result\\\": {\\\"user_name\\\": \\\"test\\\", \\\"console_login\\\": \\\"是\\\", \\\"risk_type\\\": \\\"操作保护未开启\\\", \\\"user_uin\\\": \\\"123423131\\\"}}\",\n \"RiskId\": 1,\n \"RiskRuleId\": \"tc_001\",\n \"RiskStatus\": 0,\n \"UpdateTime\": \"2025-05-07T01:51:26Z\"\n }\n ],\n \"RequestId\": \"f3d556f8-9168-4a7c-b839-b0d8d07a706d\",\n \"TotalCount\": 1\n }\n}",
|
312
|
+
"title": "风险详情列表"
|
313
|
+
}
|
314
|
+
],
|
315
|
+
"DescribeRiskRuleDetail": [
|
316
|
+
{
|
317
|
+
"document": "",
|
318
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskRuleDetail\n<公共请求参数>\n\n{\n \"RiskRuleId\": \"tc_001\"\n}",
|
319
|
+
"output": "{\n \"Response\": {\n \"Provider\": \"tencent\",\n \"RequestId\": \"94fe20c6-ea21-4d00-a765-6c0cf133031f\",\n \"RiskFixAdvice\": \"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\",\n \"RiskInfluence\": \"主机存在安全漏洞,可能导致主机被入侵,建议您按应急漏洞、应用漏洞、Web-CMS、Windows软件漏洞、Linux软件漏洞的优先级顺序进行修复。该顺序并不决定,也可能存在非常严重的Windows软件漏洞需要立即处理的情况。您还可以打开腾讯云主机“仅展示高优修复漏洞”按钮,来处理高优修复漏洞。\",\n \"RiskName\": \"腾讯云 主机安全漏洞检测\",\n \"RiskRuleId\": \"tc_083\"\n }\n}",
|
320
|
+
"title": "查询风险规则详情"
|
321
|
+
}
|
322
|
+
],
|
323
|
+
"DescribeRiskRules": [
|
324
|
+
{
|
325
|
+
"document": "",
|
326
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskRules\n<公共请求参数>\n\n{}",
|
327
|
+
"output": "{\n \"Response\": {\n \"InstanceTypeList\": [\n {\n \"Text\": \"Elasticsearch Service\",\n \"Value\": \"es_cluster\"\n },\n {\n \"Text\": \"轻量应用服务器\",\n \"Value\": \"lighthouse_instance\"\n },\n {\n \"Text\": \"云数据库 MariaDB\",\n \"Value\": \"mariadb_instance\"\n },\n {\n \"Text\": \"云数据库 MariaDB账号\",\n \"Value\": \"mariadb_account\"\n },\n {\n \"Text\": \"腾讯云可观测平台Grafana服务\",\n \"Value\": \"monitor_grafana\"\n },\n {\n \"Text\": \"NAT网关\",\n \"Value\": \"nat_gateway\"\n },\n {\n \"Text\": \"云数据库 PostgreSQL\",\n \"Value\": \"postgres_instance\"\n },\n {\n \"Text\": \"云数据库 PostgreSQL Serverless版\",\n \"Value\": \"postgres_serverless\"\n },\n {\n \"Text\": \"云数据库Redis\",\n \"Value\": \"redis_instance\"\n },\n {\n \"Text\": \"安全组\",\n \"Value\": \"security_group\"\n },\n {\n \"Text\": \"云数据库 SQL Server\",\n \"Value\": \"sqlserver_instance\"\n },\n {\n \"Text\": \"访问管理用户密钥\",\n \"Value\": \"cam_user_ak\"\n },\n {\n \"Text\": \"访问管理用户\",\n \"Value\": \"cam_user\"\n },\n {\n \"Text\": \"容器服务标准集群\",\n \"Value\": \"tke_cluster\"\n },\n {\n \"Text\": \"容器服务边缘集群\",\n \"Value\": \"edge_cluster\"\n },\n {\n \"Text\": \"容器服务Serverless集群\",\n \"Value\": \"eks_cluster\"\n },\n {\n \"Text\": \"微服务引擎Apollo服务\",\n \"Value\": \"tse_apollo\"\n },\n {\n \"Text\": \"微服务引擎Eureka服务\",\n \"Value\": \"tse_eureka\"\n },\n {\n \"Text\": \"微服务引擎Nacos服务\",\n \"Value\": \"tse_nacos\"\n },\n {\n \"Text\": \"微服务引擎Polaris服务\",\n \"Value\": \"tse_polaris\"\n },\n {\n \"Text\": \"微服务引擎Zookeeper服务\",\n \"Value\": \"tse_zookeeper\"\n },\n {\n \"Text\": \"微服务引擎云原生API网关\",\n \"Value\": \"kong_instance\"\n },\n {\n \"Text\": \"云服务器\",\n \"Value\": \"cvm_instance\"\n },\n {\n \"Text\": \"消息队列 TDMQ RocketMQ版\",\n \"Value\": \"tdmq_rocketmq\"\n },\n {\n \"Text\": \"消息队列 TDMQ RabbitMQ版\",\n \"Value\": \"tdmq_rabbitmq\"\n },\n {\n \"Text\": \"消息队列 TDMQ Pulsar版\",\n \"Value\": \"tdmq_pulsar\"\n },\n {\n \"Text\": \"Web 应用防火墙\",\n \"Value\": \"waf_instance\"\n },\n {\n \"Text\": \"VPN网关\",\n \"Value\": \"vpn_gateway\"\n },\n {\n \"Text\": \"文件存储\",\n \"Value\": \"cfs_instance\"\n },\n {\n \"Text\": \"云数据库 MySQL\",\n \"Value\": \"cdb_instance\"\n },\n {\n \"Text\": \"云数据库 MySQL账号\",\n \"Value\": \"cdb_account\"\n },\n {\n \"Text\": \"域名记录\",\n \"Value\": \"domain_record\"\n },\n {\n \"Text\": \"消息队列 CKafka 版\",\n \"Value\": \"ckafka_instance\"\n },\n {\n \"Text\": \"负载均衡\",\n \"Value\": \"clb_instance\"\n },\n {\n \"Text\": \"对象存储\",\n \"Value\": \"cos_bucket\"\n },\n {\n \"Text\": \"TDSQL-C MySQL 版\",\n \"Value\": \"cynosdb_cluster\"\n },\n {\n \"Text\": \"TDSQL-C MySQL 版账号\",\n \"Value\": \"cynosdb_account\"\n },\n {\n \"Text\": \"TDSQL MySQL 版\",\n \"Value\": \"dcdb_instance\"\n },\n {\n \"Text\": \"弹性 MapReduce\",\n \"Value\": \"emr_cluster\"\n },\n {\n \"Text\": \"云函数函数服务\",\n \"Value\": \"scf_instance\"\n },\n {\n \"Text\": \"云数据库 SQL Server账号\",\n \"Value\": \"sqlserver_account\"\n },\n {\n \"Text\": \"云数据库 MongoDB\",\n \"Value\": \"mongodb_instance\"\n },\n {\n \"Text\": \"云数据库 KeeWiDB\",\n \"Value\": \"keewidb_instance\"\n },\n {\n \"Text\": \"容器服务标准集群策略\",\n \"Value\": \"tke_policy\"\n },\n {\n \"Text\": \"向量数据库\",\n \"Value\": \"vdb_instance\"\n },\n {\n \"Text\": \"Elasticsearch Service采集器\",\n \"Value\": \"es_beats\"\n },\n {\n \"Text\": \"主机漏洞\",\n \"Value\": \"cwp_asset_vuln\"\n },\n {\n \"Text\": \"主机基线风险\",\n \"Value\": \"cwp_asset_baseline_risk\"\n },\n {\n \"Text\": \"主机列表\",\n \"Value\": \"cwp_asset_machine\"\n },\n {\n \"Text\": \"主机安全事件\",\n \"Value\": \"cwp_asset_event\"\n }\n ],\n \"RequestId\": \"651a037f-9bab-42ba-980c-6e26c7935191\",\n \"RiskRuleList\": [\n {\n \"CheckType\": \"network_security\",\n \"InstanceName\": \"Elasticsearch Service\",\n \"InstanceType\": \"es_cluster\",\n \"Provider\": \"腾讯云\",\n \"RiskInfluence\": \"云上多种产品都有管理后台功能且具有对公网开放能力,管理后台对外开放后后容易存在口令被爆破/被入侵风险,可导致重要数据泄露,服务器遭受入侵等严重后果。\",\n \"ItemId\": \"11.1-10.1\",\n \"RiskTitle\": \"Elasticsearch Service对外网开放管理后台\",\n \"Severity\": \"high\"\n }\n ],\n \"TotalCount\": 179\n }\n}",
|
328
|
+
"title": "高级配置风险规则列表"
|
329
|
+
}
|
330
|
+
],
|
243
331
|
"DescribeScanReportList": [
|
244
332
|
{
|
245
333
|
"document": "获取扫描报告列表",
|
@@ -248,6 +336,14 @@
|
|
248
336
|
"title": "获取扫描报告列表"
|
249
337
|
}
|
250
338
|
],
|
339
|
+
"DescribeScanStatistic": [
|
340
|
+
{
|
341
|
+
"document": "查询暴露面扫描结果统计信息",
|
342
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeScanStatistic\n<公共请求参数>\n\n{}",
|
343
|
+
"output": "{\n \"Response\": {\n \"HighRiskPortServiceCount\": 3,\n \"PortServiceCount\": 3,\n \"PortServiceIncrement\": 0,\n \"RequestId\": \"45ca21d4-f373-4274-9295-5380abc74bed\",\n \"RiskWebAppCount\": 0,\n \"VulCount\": 0,\n \"WeakPasswordCount\": 1,\n \"WebAppCount\": 0,\n \"WebAppIncrement\": 0\n }\n}",
|
344
|
+
"title": "查询暴露面扫描结果统计信息"
|
345
|
+
}
|
346
|
+
],
|
251
347
|
"DescribeScanTaskList": [
|
252
348
|
{
|
253
349
|
"document": "查询任务列表",
|
@@ -312,6 +408,14 @@
|
|
312
408
|
"title": "test"
|
313
409
|
}
|
314
410
|
],
|
411
|
+
"DescribeVULList": [
|
412
|
+
{
|
413
|
+
"document": "示例1",
|
414
|
+
"input": "POST / HTTP/1.1\nHost: csip.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeVULList\n<公共请求参数>\n\n{\n \"Filter\": {\n \"Limit\": 3,\n \"Offset\": 0,\n \"Filters\": [\n {\n \"Name\": \"EMGCVulType\",\n \"Values\": [\n \"1\"\n ]\n }\n ]\n }\n}",
|
415
|
+
"output": "{\n \"Response\": {\n \"AttackHeat\": [\n {\n \"Text\": \"无热度\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"高\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"低\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"中\",\n \"Value\": \"2\"\n }\n ],\n \"CheckStatus\": [\n {\n \"Text\": \"扫描完成\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"未扫描\",\n \"Value\": \"0\"\n }\n ],\n \"Data\": [\n {\n \"AffectAssetCount\": 0,\n \"AppName\": \"(vim) vim\",\n \"AttackHeat\": 0,\n \"CVE\": \"CVE-2008-4101\",\n \"CVSS\": 0,\n \"EMGCVulType\": 1,\n \"LastScanTime\": \"\",\n \"Level\": \"high\",\n \"PublishTime\": \"2008-09-19 01:59:00\",\n \"ScanStatus\": 0,\n \"SupportProduct\": \"cwp_detect,cwp_fix\",\n \"TaskId\": \"\",\n \"VULName\": \"Vim 输入验证漏洞\",\n \"VULType\": \"输入验证\",\n \"VulTag\": [\n \"NETWORK\",\n \"POC\",\n \"SYS\",\n \"APP\"\n ]\n },\n {\n \"AffectAssetCount\": 0,\n \"AppName\": \"(radius_extension_project) radius\",\n \"AttackHeat\": 0,\n \"CVE\": \"CVE-2013-2220\",\n \"CVSS\": 0,\n \"EMGCVulType\": 1,\n \"LastScanTime\": \"\",\n \"Level\": \"high\",\n \"PublishTime\": \"2013-07-31 21:20:00\",\n \"ScanStatus\": 0,\n \"SupportProduct\": \"cwp_detect,cwp_fix\",\n \"TaskId\": \"\",\n \"VULName\": \"PECL radius 'radius_get_vendor_attr()'远程拒绝服务漏洞\",\n \"VULType\": \"缓冲区错误\",\n \"VulTag\": [\n \"NETWORK\",\n \"SYS\"\n ]\n },\n {\n \"AffectAssetCount\": 0,\n \"AppName\": \"(apache) activemq\",\n \"AttackHeat\": 0,\n \"CVE\": \"CVE-2016-3088\",\n \"CVSS\": 9.8,\n \"EMGCVulType\": 1,\n \"LastScanTime\": \"\",\n \"Level\": \"high\",\n \"PublishTime\": \"2016-06-01 16:59:04\",\n \"ScanStatus\": 0,\n \"SupportProduct\": \"cwp_detect,cwp_defense\",\n \"TaskId\": \"\",\n \"VULName\": \"Apache ActiveMQ Fileserver 远程代码执行漏洞(CVE-2016-3088)\",\n \"VULType\": \"输入验证\",\n \"VulTag\": [\n \"NETWORK\",\n \"EXP\",\n \"POC\",\n \"KNOWN_EXPLOITED\",\n \"SYS\",\n \"APP\"\n ]\n }\n ],\n \"ProductSupport\": [\n {\n \"Text\": \"云安全中心自动修复\",\n \"Value\": \"cwp_fix\"\n },\n {\n \"Text\": \"云防火墙、Web应用防火墙开启虚拟补丁\",\n \"Value\": \"cfw_waf_virtual\"\n },\n {\n \"Text\": \"云安全中心漏洞检测\",\n \"Value\": \"cwp_detect\"\n },\n {\n \"Text\": \"云安全中心漏洞防御\",\n \"Value\": \"cwp_defense\"\n }\n ],\n \"RequestId\": \"d2e5b2ba-6ee2-4801-a378-af163d79a052\",\n \"RiskLevels\": [\n {\n \"Text\": \"高危\",\n \"Value\": \"high\"\n },\n {\n \"Text\": \"中危\",\n \"Value\": \"middle\"\n },\n {\n \"Text\": \"\",\n \"Value\": \"未知\"\n },\n {\n \"Text\": \"低危\",\n \"Value\": \"low\"\n }\n ],\n \"Tags\": [\n {\n \"Text\": \"应急\",\n \"Value\": \"IS_EMERGENCY\"\n },\n {\n \"Text\": \"必修\",\n \"Value\": \"IS_SUGGEST\"\n },\n {\n \"Text\": \"该漏洞可以远程利用\",\n \"Value\": \"NETWORK\"\n },\n {\n \"Text\": \"该漏洞可作为应用组件漏洞检出\",\n \"Value\": \"APP\"\n },\n {\n \"Text\": \"该漏洞有exp\",\n \"Value\": \"EXP\"\n },\n {\n \"Text\": \"该漏洞存在在野利用或在野攻击\",\n \"Value\": \"KNOWN_EXPLOITED\"\n },\n {\n \"Text\": \"该漏洞有poc\",\n \"Value\": \"POC\"\n },\n {\n \"Text\": \"该漏洞仅能本地利用\",\n \"Value\": \"LOCAL\"\n },\n {\n \"Text\": \"该漏洞可作为系统组件漏洞检出\",\n \"Value\": \"SYS\"\n }\n ],\n \"TotalCount\": 208,\n \"VULTypeLists\": [\n {\n \"Text\": \"输入验证\",\n \"Value\": \"3\"\n },\n {\n \"Text\": \"缓冲区错误\",\n \"Value\": \"12\"\n },\n {\n \"Text\": \"竞争条件\",\n \"Value\": \"9\"\n },\n {\n \"Text\": \"权限许可和访问控制\",\n \"Value\": \"24\"\n },\n {\n \"Text\": \"批量分配漏洞\",\n \"Value\": \"52\"\n },\n {\n \"Text\": \"代码注入\",\n \"Value\": \"18\"\n },\n {\n \"Text\": \"文件上传\",\n \"Value\": \"35\"\n },\n {\n \"Text\": \"反序列化\",\n \"Value\": \"16\"\n },\n {\n \"Text\": \"路径遍历\",\n \"Value\": \"21\"\n },\n {\n \"Text\": \"信任管理\",\n \"Value\": \"32\"\n },\n {\n \"Text\": \"授权问题\",\n \"Value\": \"4\"\n },\n {\n \"Text\": \"代码执行 \",\n \"Value\": \"45\"\n },\n {\n \"Text\": \"输入验证错误\",\n \"Value\": \"42\"\n },\n {\n \"Text\": \"SQL注入\",\n \"Value\": \"37\"\n },\n {\n \"Text\": \"未授权访问\",\n \"Value\": \"53\"\n },\n {\n \"Text\": \"无限循环漏洞\",\n \"Value\": \"22\"\n },\n {\n \"Text\": \"资源管理错误\",\n \"Value\": \"6\"\n },\n {\n \"Text\": \"命令执行\",\n \"Value\": \"41\"\n },\n {\n \"Text\": \"其他\",\n \"Value\": \"0\"\n },\n {\n \"Text\": \"操作系统命令注入\",\n \"Value\": \"36\"\n },\n {\n \"Text\": \"注入\",\n \"Value\": \"11\"\n },\n {\n \"Text\": \"权限管理不当\",\n \"Value\": \"20\"\n },\n {\n \"Text\": \"空指针引用\",\n \"Value\": \"10\"\n },\n {\n \"Text\": \"整数溢出\",\n \"Value\": \"25\"\n },\n {\n \"Text\": \"代码问题\",\n \"Value\": \"23\"\n },\n {\n \"Text\": \"越界写入\",\n \"Value\": \"5\"\n },\n {\n \"Text\": \"访问控制错误\",\n \"Value\": \"30\"\n },\n {\n \"Text\": \"组件漏洞\",\n \"Value\": \"56\"\n },\n {\n \"Text\": \"服务器端请求伪造\",\n \"Value\": \"57\"\n },\n {\n \"Text\": \"跨站请求伪造\",\n \"Value\": \"15\"\n },\n {\n \"Text\": \"数字错误\",\n \"Value\": \"28\"\n },\n {\n \"Text\": \"拒绝服务 \",\n \"Value\": \"40\"\n },\n {\n \"Text\": \"缓冲区溢出\",\n \"Value\": \"14\"\n },\n {\n \"Text\": \"越界读取\",\n \"Value\": \"1\"\n },\n {\n \"Text\": \"配置错误\",\n \"Value\": \"8\"\n },\n {\n \"Text\": \"安全模式绕过\",\n \"Value\": \"61\"\n },\n {\n \"Text\": \"权限提升 \",\n \"Value\": \"54\"\n },\n {\n \"Text\": \"任意文件读取\",\n \"Value\": \"71\"\n },\n {\n \"Text\": \"信息泄露\",\n \"Value\": \"2\"\n },\n {\n \"Text\": \"登录绕过\",\n \"Value\": \"60\"\n },\n {\n \"Text\": \"信息泄漏\",\n \"Value\": \"43\"\n },\n {\n \"Text\": \"解析错误 \",\n \"Value\": \"63\"\n },\n {\n \"Text\": \"Xml注入 \",\n \"Value\": \"78\"\n },\n {\n \"Text\": \"权限许可和访问控制问题\",\n \"Value\": \"13\"\n },\n {\n \"Text\": \"XML外部实体(XXE)注入\",\n \"Value\": \"29\"\n },\n {\n \"Text\": \"跨站脚本\",\n \"Value\": \"44\"\n },\n {\n \"Text\": \"命令注入\",\n \"Value\": \"34\"\n },\n {\n \"Text\": \"http请求拆分\",\n \"Value\": \"59\"\n },\n {\n \"Text\": \"安全特征问题\",\n \"Value\": \"48\"\n },\n {\n \"Text\": \"资料不足\",\n \"Value\": \"33\"\n },\n {\n \"Text\": \"Double Free漏洞\",\n \"Value\": \"17\"\n },\n {\n \"Text\": \"加密问题\",\n \"Value\": \"7\"\n },\n {\n \"Text\": \"url重定向\",\n \"Value\": \"49\"\n },\n {\n \"Text\": \"弱密码\",\n \"Value\": \"62\"\n },\n {\n \"Text\": \"信任管理问题\",\n \"Value\": \"46\"\n },\n {\n \"Text\": \"后置链接\",\n \"Value\": \"19\"\n },\n {\n \"Text\": \"设计错误\",\n \"Value\": \"38\"\n },\n {\n \"Text\": \"CRLF 注入\",\n \"Value\": \"31\"\n },\n {\n \"Text\": \"未充分验证数据可靠性\",\n \"Value\": \"51\"\n },\n {\n \"Text\": \"本地文件包含\",\n \"Value\": \"50\"\n },\n {\n \"Text\": \"竞争条件问题\",\n \"Value\": \"58\"\n },\n {\n \"Text\": \"访问控制\",\n \"Value\": \"26\"\n },\n {\n \"Text\": \"目录遍历\",\n \"Value\": \"27\"\n },\n {\n \"Text\": \"无效指针引用\",\n \"Value\": \"55\"\n },\n {\n \"Text\": \"LDAP 注入漏洞\",\n \"Value\": \"47\"\n },\n {\n \"Text\": \"格式化字符串\",\n \"Value\": \"67\"\n },\n {\n \"Text\": \"会话固定\",\n \"Value\": \"69\"\n },\n {\n \"Text\": \"ldap注入\",\n \"Value\": \"70\"\n },\n {\n \"Text\": \"中间人攻击\",\n \"Value\": \"72\"\n },\n {\n \"Text\": \"http请求伪造\",\n \"Value\": \"73\"\n },\n {\n \"Text\": \"http响应伪造\",\n \"Value\": \"64\"\n },\n {\n \"Text\": \"边界条件错误\",\n \"Value\": \"68\"\n },\n {\n \"Text\": \"未知\",\n \"Value\": \"66\"\n },\n {\n \"Text\": \"访问验证错误\",\n \"Value\": \"65\"\n },\n {\n \"Text\": \"远程溢出\",\n \"Value\": \"75\"\n },\n {\n \"Text\": \"后门 \",\n \"Value\": \"76\"\n },\n {\n \"Text\": \"本地溢出\",\n \"Value\": \"77\"\n },\n {\n \"Text\": \"任意文件下载\",\n \"Value\": \"80\"\n },\n {\n \"Text\": \"混淆代理\",\n \"Value\": \"79\"\n },\n {\n \"Text\": \"目录穿越 \",\n \"Value\": \"81\"\n },\n {\n \"Text\": \"权限验证不足\",\n \"Value\": \"82\"\n },\n {\n \"Text\": \"处理逻辑错误\",\n \"Value\": \"83\"\n },\n {\n \"Text\": \"Xpath注入\",\n \"Value\": \"84\"\n },\n {\n \"Text\": \"路径泄漏\",\n \"Value\": \"86\"\n }\n ]\n }\n}",
|
416
|
+
"title": "示例1"
|
417
|
+
}
|
418
|
+
],
|
315
419
|
"DescribeVULRiskAdvanceCFGList": [
|
316
420
|
{
|
317
421
|
"document": "查询漏洞风险高级配置",
|
@@ -2406,6 +2406,17 @@
|
|
2406
2406
|
"required": false,
|
2407
2407
|
"type": "string",
|
2408
2408
|
"value_allowed_null": false
|
2409
|
+
},
|
2410
|
+
{
|
2411
|
+
"disabled": false,
|
2412
|
+
"document": "云联网网关所属账号,如果云联网网关为其他账号资源需要填写",
|
2413
|
+
"example": "212221111",
|
2414
|
+
"member": "string",
|
2415
|
+
"name": "CcnOwnerUin",
|
2416
|
+
"output_required": false,
|
2417
|
+
"required": false,
|
2418
|
+
"type": "string",
|
2419
|
+
"value_allowed_null": false
|
2409
2420
|
}
|
2410
2421
|
],
|
2411
2422
|
"usage": "both"
|
@@ -880,6 +880,50 @@
|
|
880
880
|
"required": true,
|
881
881
|
"type": "string",
|
882
882
|
"value_allowed_null": false
|
883
|
+
},
|
884
|
+
{
|
885
|
+
"disabled": false,
|
886
|
+
"document": "0 腾讯云仓库; 1 客户仓库",
|
887
|
+
"example": "0",
|
888
|
+
"member": "uint64",
|
889
|
+
"name": "EsRepositoryType",
|
890
|
+
"output_required": false,
|
891
|
+
"required": false,
|
892
|
+
"type": "int",
|
893
|
+
"value_allowed_null": false
|
894
|
+
},
|
895
|
+
{
|
896
|
+
"disabled": false,
|
897
|
+
"document": "客户快照仓库名称",
|
898
|
+
"example": "testRepository",
|
899
|
+
"member": "string",
|
900
|
+
"name": "UserEsRepository",
|
901
|
+
"output_required": false,
|
902
|
+
"required": false,
|
903
|
+
"type": "string",
|
904
|
+
"value_allowed_null": false
|
905
|
+
},
|
906
|
+
{
|
907
|
+
"disabled": false,
|
908
|
+
"document": "快照存储周期 单位天",
|
909
|
+
"example": "15",
|
910
|
+
"member": "uint64",
|
911
|
+
"name": "StorageDuration",
|
912
|
+
"output_required": false,
|
913
|
+
"required": false,
|
914
|
+
"type": "int",
|
915
|
+
"value_allowed_null": false
|
916
|
+
},
|
917
|
+
{
|
918
|
+
"disabled": false,
|
919
|
+
"document": "自动备份频率单位小时",
|
920
|
+
"example": "4",
|
921
|
+
"member": "uint64",
|
922
|
+
"name": "AutoBackupInterval",
|
923
|
+
"output_required": false,
|
924
|
+
"required": false,
|
925
|
+
"type": "int",
|
926
|
+
"value_allowed_null": false
|
883
927
|
}
|
884
928
|
],
|
885
929
|
"usage": "both"
|
@@ -9936,6 +9980,17 @@
|
|
9936
9980
|
"type": "string",
|
9937
9981
|
"value_allowed_null": true
|
9938
9982
|
},
|
9983
|
+
{
|
9984
|
+
"disabled": false,
|
9985
|
+
"document": "仓库名称\n注意:此字段可能返回 null,表示取不到有效值。",
|
9986
|
+
"example": "testRepository",
|
9987
|
+
"member": "string",
|
9988
|
+
"name": "Repository",
|
9989
|
+
"output_required": false,
|
9990
|
+
"required": false,
|
9991
|
+
"type": "string",
|
9992
|
+
"value_allowed_null": true
|
9993
|
+
},
|
9939
9994
|
{
|
9940
9995
|
"disabled": false,
|
9941
9996
|
"document": "该快照所属集群的版本号\n注意:此字段可能返回 null,表示取不到有效值。",
|
@@ -261,6 +261,17 @@
|
|
261
261
|
"required": false,
|
262
262
|
"type": "list",
|
263
263
|
"value_allowed_null": false
|
264
|
+
},
|
265
|
+
{
|
266
|
+
"disabled": false,
|
267
|
+
"document": "相邻切片重合字符数,需要小于分片长度",
|
268
|
+
"example": "4000",
|
269
|
+
"member": "uint64",
|
270
|
+
"name": "ChunkOverlap",
|
271
|
+
"output_required": false,
|
272
|
+
"required": false,
|
273
|
+
"type": "int",
|
274
|
+
"value_allowed_null": false
|
264
275
|
}
|
265
276
|
],
|
266
277
|
"usage": "both"
|
@@ -411,6 +422,16 @@
|
|
411
422
|
"type": "list",
|
412
423
|
"value_allowed_null": false
|
413
424
|
},
|
425
|
+
{
|
426
|
+
"disabled": false,
|
427
|
+
"document": "token消耗量",
|
428
|
+
"example": "无",
|
429
|
+
"member": "Usage",
|
430
|
+
"name": "Usage",
|
431
|
+
"output_required": false,
|
432
|
+
"type": "object",
|
433
|
+
"value_allowed_null": false
|
434
|
+
},
|
414
435
|
{
|
415
436
|
"document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
|
416
437
|
"member": "string",
|
tccli/services/ess/ess_client.py
CHANGED
@@ -381,6 +381,58 @@ def doDescribeBatchOrganizationRegistrationUrls(args, parsed_globals):
|
|
381
381
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
382
382
|
|
383
383
|
|
384
|
+
def doDescribeBatchOrganizationRegistrationTasks(args, parsed_globals):
|
385
|
+
g_param = parse_global_arg(parsed_globals)
|
386
|
+
|
387
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
388
|
+
cred = credential.CVMRoleCredential()
|
389
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
390
|
+
cred = credential.STSAssumeRoleCredential(
|
391
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
392
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
393
|
+
)
|
394
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
395
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
396
|
+
else:
|
397
|
+
cred = credential.Credential(
|
398
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
399
|
+
)
|
400
|
+
http_profile = HttpProfile(
|
401
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
402
|
+
reqMethod="POST",
|
403
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
404
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
405
|
+
)
|
406
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
407
|
+
if g_param[OptionsDefine.Language]:
|
408
|
+
profile.language = g_param[OptionsDefine.Language]
|
409
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
410
|
+
client = mod.EssClient(cred, g_param[OptionsDefine.Region], profile)
|
411
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
412
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
413
|
+
model = models.DescribeBatchOrganizationRegistrationTasksRequest()
|
414
|
+
model.from_json_string(json.dumps(args))
|
415
|
+
start_time = time.time()
|
416
|
+
while True:
|
417
|
+
rsp = client.DescribeBatchOrganizationRegistrationTasks(model)
|
418
|
+
result = rsp.to_json_string()
|
419
|
+
try:
|
420
|
+
json_obj = json.loads(result)
|
421
|
+
except TypeError as e:
|
422
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
423
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
424
|
+
break
|
425
|
+
cur_time = time.time()
|
426
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
427
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
428
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
429
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
430
|
+
else:
|
431
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
432
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
433
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
434
|
+
|
435
|
+
|
384
436
|
def doCreatePreparedPersonalEsign(args, parsed_globals):
|
385
437
|
g_param = parse_global_arg(parsed_globals)
|
386
438
|
|
@@ -3761,6 +3813,58 @@ def doCreateConvertTaskApi(args, parsed_globals):
|
|
3761
3813
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3762
3814
|
|
3763
3815
|
|
3816
|
+
def doModifyPartnerAutoSignAuthUrl(args, parsed_globals):
|
3817
|
+
g_param = parse_global_arg(parsed_globals)
|
3818
|
+
|
3819
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
3820
|
+
cred = credential.CVMRoleCredential()
|
3821
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
3822
|
+
cred = credential.STSAssumeRoleCredential(
|
3823
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
3824
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
3825
|
+
)
|
3826
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
3827
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
3828
|
+
else:
|
3829
|
+
cred = credential.Credential(
|
3830
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
3831
|
+
)
|
3832
|
+
http_profile = HttpProfile(
|
3833
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
3834
|
+
reqMethod="POST",
|
3835
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
3836
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
3837
|
+
)
|
3838
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
3839
|
+
if g_param[OptionsDefine.Language]:
|
3840
|
+
profile.language = g_param[OptionsDefine.Language]
|
3841
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
3842
|
+
client = mod.EssClient(cred, g_param[OptionsDefine.Region], profile)
|
3843
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
3844
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
3845
|
+
model = models.ModifyPartnerAutoSignAuthUrlRequest()
|
3846
|
+
model.from_json_string(json.dumps(args))
|
3847
|
+
start_time = time.time()
|
3848
|
+
while True:
|
3849
|
+
rsp = client.ModifyPartnerAutoSignAuthUrl(model)
|
3850
|
+
result = rsp.to_json_string()
|
3851
|
+
try:
|
3852
|
+
json_obj = json.loads(result)
|
3853
|
+
except TypeError as e:
|
3854
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
3855
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
3856
|
+
break
|
3857
|
+
cur_time = time.time()
|
3858
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
3859
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
3860
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
3861
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
3862
|
+
else:
|
3863
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
3864
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
3865
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
3866
|
+
|
3867
|
+
|
3764
3868
|
def doCreateOrganizationAuthUrl(args, parsed_globals):
|
3765
3869
|
g_param = parse_global_arg(parsed_globals)
|
3766
3870
|
|
@@ -4125,6 +4229,58 @@ def doDescribeUserFlowType(args, parsed_globals):
|
|
4125
4229
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4126
4230
|
|
4127
4231
|
|
4232
|
+
def doCreateModifyAdminAuthorizationUrl(args, parsed_globals):
|
4233
|
+
g_param = parse_global_arg(parsed_globals)
|
4234
|
+
|
4235
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
4236
|
+
cred = credential.CVMRoleCredential()
|
4237
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
4238
|
+
cred = credential.STSAssumeRoleCredential(
|
4239
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
4240
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
4241
|
+
)
|
4242
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
4243
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
4244
|
+
else:
|
4245
|
+
cred = credential.Credential(
|
4246
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
4247
|
+
)
|
4248
|
+
http_profile = HttpProfile(
|
4249
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
4250
|
+
reqMethod="POST",
|
4251
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
4252
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
4253
|
+
)
|
4254
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
4255
|
+
if g_param[OptionsDefine.Language]:
|
4256
|
+
profile.language = g_param[OptionsDefine.Language]
|
4257
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
4258
|
+
client = mod.EssClient(cred, g_param[OptionsDefine.Region], profile)
|
4259
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
4260
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
4261
|
+
model = models.CreateModifyAdminAuthorizationUrlRequest()
|
4262
|
+
model.from_json_string(json.dumps(args))
|
4263
|
+
start_time = time.time()
|
4264
|
+
while True:
|
4265
|
+
rsp = client.CreateModifyAdminAuthorizationUrl(model)
|
4266
|
+
result = rsp.to_json_string()
|
4267
|
+
try:
|
4268
|
+
json_obj = json.loads(result)
|
4269
|
+
except TypeError as e:
|
4270
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
4271
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
4272
|
+
break
|
4273
|
+
cur_time = time.time()
|
4274
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
4275
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
4276
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
4277
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
4278
|
+
else:
|
4279
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
4280
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
4281
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
4282
|
+
|
4283
|
+
|
4128
4284
|
def doCreateIntegrationEmployees(args, parsed_globals):
|
4129
4285
|
g_param = parse_global_arg(parsed_globals)
|
4130
4286
|
|
@@ -5651,6 +5807,7 @@ ACTION_MAP = {
|
|
5651
5807
|
"CreateUserVerifyUrl": doCreateUserVerifyUrl,
|
5652
5808
|
"CreateEmbedWebUrl": doCreateEmbedWebUrl,
|
5653
5809
|
"DescribeBatchOrganizationRegistrationUrls": doDescribeBatchOrganizationRegistrationUrls,
|
5810
|
+
"DescribeBatchOrganizationRegistrationTasks": doDescribeBatchOrganizationRegistrationTasks,
|
5654
5811
|
"CreatePreparedPersonalEsign": doCreatePreparedPersonalEsign,
|
5655
5812
|
"CreateFlowSignReview": doCreateFlowSignReview,
|
5656
5813
|
"ModifyIntegrationDepartment": doModifyIntegrationDepartment,
|
@@ -5716,6 +5873,7 @@ ACTION_MAP = {
|
|
5716
5873
|
"CreateExtendedServiceAuthInfos": doCreateExtendedServiceAuthInfos,
|
5717
5874
|
"CreateOrganizationInfoChangeUrl": doCreateOrganizationInfoChangeUrl,
|
5718
5875
|
"CreateConvertTaskApi": doCreateConvertTaskApi,
|
5876
|
+
"ModifyPartnerAutoSignAuthUrl": doModifyPartnerAutoSignAuthUrl,
|
5719
5877
|
"CreateOrganizationAuthUrl": doCreateOrganizationAuthUrl,
|
5720
5878
|
"UploadFiles": doUploadFiles,
|
5721
5879
|
"CreateFlowForwards": doCreateFlowForwards,
|
@@ -5723,6 +5881,7 @@ ACTION_MAP = {
|
|
5723
5881
|
"CreateWebThemeConfig": doCreateWebThemeConfig,
|
5724
5882
|
"CreateDynamicFlowApprover": doCreateDynamicFlowApprover,
|
5725
5883
|
"DescribeUserFlowType": doDescribeUserFlowType,
|
5884
|
+
"CreateModifyAdminAuthorizationUrl": doCreateModifyAdminAuthorizationUrl,
|
5726
5885
|
"CreateIntegrationEmployees": doCreateIntegrationEmployees,
|
5727
5886
|
"DeleteOrganizationAuthorizations": doDeleteOrganizationAuthorizations,
|
5728
5887
|
"OperateSeals": doOperateSeals,
|