tccli 3.0.1391.1__py2.py3-none-any.whl → 3.0.1414.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of tccli might be problematic. Click here for more details.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +2 -1
- tccli/services/ai3d/v20250513/api.json +22 -4
- tccli/services/aiart/aiart_client.py +173 -67
- tccli/services/aiart/v20221229/api.json +193 -0
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/apm/apm_client.py +53 -0
- tccli/services/apm/v20210622/api.json +354 -0
- tccli/services/apm/v20210622/examples.json +8 -0
- tccli/services/asr/v20190614/api.json +3 -3
- tccli/services/autoscaling/v20180419/api.json +24 -2
- tccli/services/batch/v20170312/api.json +1 -1
- tccli/services/bda/bda_client.py +15 -704
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/billing/billing_client.py +326 -8
- tccli/services/billing/v20180709/api.json +2200 -255
- tccli/services/billing/v20180709/examples.json +48 -0
- tccli/services/cam/v20190116/api.json +4 -4
- tccli/services/captcha/v20190722/api.json +3 -3
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/ccc/ccc_client.py +235 -76
- tccli/services/ccc/v20200210/api.json +502 -18
- tccli/services/ccc/v20200210/examples.json +24 -0
- tccli/services/cdb/cdb_client.py +106 -0
- tccli/services/cdb/v20170320/api.json +257 -44
- tccli/services/cdb/v20170320/examples.json +22 -6
- tccli/services/cdn/cdn_client.py +4 -163
- tccli/services/cdn/v20180606/api.json +61 -310
- tccli/services/cdn/v20180606/examples.json +1 -25
- tccli/services/cdwdoris/v20211228/api.json +51 -12
- tccli/services/cdwpg/v20201230/api.json +11 -1
- tccli/services/cdwpg/v20201230/examples.json +1 -1
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +41 -94
- tccli/services/cfs/v20190719/api.json +171 -55
- tccli/services/cfs/v20190719/examples.json +1 -9
- tccli/services/cfw/v20190904/api.json +122 -10
- tccli/services/ckafka/ckafka_client.py +188 -29
- tccli/services/ckafka/v20190819/api.json +277 -4
- tccli/services/ckafka/v20190819/examples.json +25 -1
- tccli/services/clb/clb_client.py +0 -265
- tccli/services/clb/v20180317/api.json +130 -296
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/v20220530/api.json +55 -0
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/v20191112/api.json +10 -10
- tccli/services/cls/v20201016/api.json +63 -45
- tccli/services/cls/v20201016/examples.json +10 -4
- tccli/services/csip/v20221121/api.json +53 -3
- tccli/services/ctem/v20231128/api.json +320 -0
- tccli/services/ctem/v20231128/examples.json +3 -3
- tccli/services/cvm/cvm_client.py +0 -212
- tccli/services/cvm/v20170312/api.json +91 -843
- tccli/services/cvm/v20170312/examples.json +32 -58
- tccli/services/cynosdb/cynosdb_client.py +167 -8
- tccli/services/cynosdb/v20190107/api.json +1126 -148
- tccli/services/cynosdb/v20190107/examples.json +31 -7
- tccli/services/dbbrain/dbbrain_client.py +246 -87
- tccli/services/dbbrain/v20191016/api.json +74 -62
- tccli/services/dbbrain/v20191016/examples.json +1 -1
- tccli/services/dbbrain/v20210527/api.json +601 -177
- tccli/services/dbbrain/v20210527/examples.json +28 -4
- tccli/services/dc/v20180410/api.json +101 -3
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +53 -0
- tccli/services/dlc/v20210125/api.json +237 -24
- tccli/services/dlc/v20210125/examples.json +12 -4
- tccli/services/dnspod/dnspod_client.py +106 -0
- tccli/services/dnspod/v20210323/api.json +126 -20
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/dsgc/v20190723/api.json +73 -15
- tccli/services/dts/v20180330/api.json +4 -4
- tccli/services/dts/v20211206/api.json +408 -127
- tccli/services/dts/v20211206/examples.json +15 -9
- tccli/services/eb/v20210416/api.json +41 -1
- tccli/services/eb/v20210416/examples.json +1 -1
- tccli/services/emr/v20190103/api.json +56 -9
- tccli/services/emr/v20190103/examples.json +5 -5
- tccli/services/es/es_client.py +273 -8
- tccli/services/es/v20180416/api.json +845 -33
- tccli/services/es/v20180416/examples.json +33 -1
- tccli/services/es/v20250101/api.json +135 -2
- tccli/services/es/v20250101/examples.json +8 -0
- tccli/services/ess/ess_client.py +509 -32
- tccli/services/ess/v20201111/api.json +1366 -113
- tccli/services/ess/v20201111/examples.json +94 -10
- tccli/services/essbasic/v20210526/api.json +265 -27
- tccli/services/essbasic/v20210526/examples.json +12 -12
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +53 -0
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/gs/gs_client.py +216 -4
- tccli/services/gs/v20191118/api.json +202 -1
- tccli/services/gs/v20191118/examples.json +32 -0
- tccli/services/gwlb/gwlb_client.py +53 -0
- tccli/services/gwlb/v20240906/api.json +150 -0
- tccli/services/gwlb/v20240906/examples.json +8 -0
- tccli/services/hai/v20230812/api.json +5 -5
- tccli/services/hunyuan/v20230901/api.json +3 -3
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/v20180301/api.json +227 -207
- tccli/services/iai/v20180301/examples.json +26 -26
- tccli/services/iai/v20200303/api.json +4 -4
- tccli/services/iai/v20200303/examples.json +1 -1
- tccli/services/ioa/ioa_client.py +265 -0
- tccli/services/ioa/v20220601/api.json +781 -85
- tccli/services/ioa/v20220601/examples.json +46 -0
- tccli/services/iotexplorer/iotexplorer_client.py +387 -16
- tccli/services/iotexplorer/v20190423/api.json +1183 -63
- tccli/services/iotexplorer/v20190423/examples.json +92 -0
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/lcic/v20220817/api.json +61 -15
- tccli/services/lighthouse/v20200324/api.json +193 -24
- tccli/services/lighthouse/v20200324/examples.json +9 -3
- tccli/services/live/v20180801/api.json +6 -6
- tccli/services/live/v20180801/examples.json +7 -1
- tccli/services/lke/lke_client.py +40 -93
- tccli/services/lke/v20231130/api.json +943 -390
- tccli/services/lke/v20231130/examples.json +38 -46
- tccli/services/lkeap/v20240522/api.json +39 -12
- tccli/services/lkeap/v20240522/examples.json +12 -0
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/mna/v20210119/api.json +11 -2
- tccli/services/mna/v20210119/examples.json +1 -1
- tccli/services/mongodb/mongodb_client.py +334 -16
- tccli/services/mongodb/v20190725/api.json +1092 -383
- tccli/services/mongodb/v20190725/examples.json +69 -21
- tccli/services/monitor/monitor_client.py +106 -0
- tccli/services/monitor/v20180724/api.json +383 -12
- tccli/services/monitor/v20180724/examples.json +24 -2
- tccli/services/mps/mps_client.py +220 -8
- tccli/services/mps/v20190612/api.json +1999 -179
- tccli/services/mps/v20190612/examples.json +56 -6
- tccli/services/mqtt/v20240516/api.json +10 -0
- tccli/services/mqtt/v20240516/examples.json +3 -9
- tccli/services/nlp/v20190408/api.json +6 -6
- tccli/services/oceanus/oceanus_client.py +318 -0
- tccli/services/oceanus/v20190422/api.json +461 -26
- tccli/services/oceanus/v20190422/examples.json +50 -2
- tccli/services/ocr/ocr_client.py +41 -253
- tccli/services/ocr/v20181119/api.json +153 -659
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/v20210331/api.json +46 -7
- tccli/services/postgres/v20170312/api.json +333 -77
- tccli/services/postgres/v20170312/examples.json +37 -31
- tccli/services/privatedns/privatedns_client.py +641 -58
- tccli/services/privatedns/v20201028/api.json +930 -19
- tccli/services/privatedns/v20201028/examples.json +91 -3
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/redis/v20180412/api.json +303 -109
- tccli/services/redis/v20180412/examples.json +12 -12
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/v20210622/api.json +22 -4
- tccli/services/rum/v20210622/examples.json +2 -2
- tccli/services/sms/v20190711/api.json +12 -12
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +13 -13
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/sqlserver/v20180328/api.json +46 -7
- tccli/services/sqlserver/v20180328/examples.json +2 -2
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/svp/v20240125/api.json +14 -4
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/v20201028/api.json +22 -3
- tccli/services/tcb/v20180608/api.json +1 -1
- tccli/services/tcss/tcss_client.py +228 -69
- tccli/services/tcss/v20201101/api.json +273 -25
- tccli/services/tcss/v20201101/examples.json +26 -2
- tccli/services/teo/teo_client.py +317 -52
- tccli/services/teo/v20220901/api.json +1824 -242
- tccli/services/teo/v20220901/examples.json +109 -21
- tccli/services/thpc/thpc_client.py +57 -4
- tccli/services/thpc/v20230321/api.json +163 -21
- tccli/services/thpc/v20230321/examples.json +13 -5
- tccli/services/tione/tione_client.py +163 -4
- tccli/services/tione/v20211111/api.json +285 -21
- tccli/services/tione/v20211111/examples.json +27 -3
- tccli/services/tke/tke_client.py +8 -8
- tccli/services/tke/v20180525/api.json +168 -130
- tccli/services/tke/v20180525/examples.json +20 -20
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tms/tms_client.py +106 -0
- tccli/services/tms/v20201229/api.json +249 -3
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/v20230308/api.json +4 -4
- tccli/services/trro/trro_client.py +106 -0
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/v20190722/api.json +197 -49
- tccli/services/trtc/v20190722/examples.json +4 -4
- tccli/services/tse/v20201207/api.json +69 -2
- tccli/services/tse/v20201207/examples.json +3 -3
- tccli/services/tsf/v20180326/api.json +70 -7
- tccli/services/tsf/v20180326/examples.json +2 -2
- tccli/services/vclm/v20240523/api.json +145 -0
- tccli/services/vclm/v20240523/examples.json +16 -0
- tccli/services/vclm/vclm_client.py +106 -0
- tccli/services/vcube/v20220410/api.json +1 -1
- tccli/services/vod/v20180717/api.json +7 -7
- tccli/services/vpc/v20170312/api.json +1216 -70
- tccli/services/vpc/v20170312/examples.json +139 -3
- tccli/services/vpc/vpc_client.py +1023 -122
- tccli/services/vrs/v20200824/api.json +11 -11
- tccli/services/vrs/v20200824/examples.json +1 -1
- tccli/services/vtc/v20240223/api.json +14 -14
- tccli/services/waf/v20180125/api.json +812 -143
- tccli/services/waf/v20180125/examples.json +2 -2
- tccli/services/wedata/v20210820/api.json +1281 -601
- tccli/services/wedata/v20210820/examples.json +127 -157
- tccli/services/wedata/v20250806/api.json +19335 -0
- tccli/services/wedata/v20250806/examples.json +999 -0
- tccli/services/wedata/wedata_client.py +7072 -1131
- {tccli-3.0.1391.1.dist-info → tccli-3.0.1414.1.dist-info}/METADATA +9 -7
- {tccli-3.0.1391.1.dist-info → tccli-3.0.1414.1.dist-info}/RECORD +226 -224
- {tccli-3.0.1391.1.dist-info → tccli-3.0.1414.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1391.1.dist-info → tccli-3.0.1414.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1391.1.dist-info/license_files → tccli-3.0.1414.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -329,6 +329,58 @@ def doDescribeVirusSummary(args, parsed_globals):
|
|
|
329
329
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
330
330
|
|
|
331
331
|
|
|
332
|
+
def doModifyRaspRules(args, parsed_globals):
|
|
333
|
+
g_param = parse_global_arg(parsed_globals)
|
|
334
|
+
|
|
335
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
336
|
+
cred = credential.CVMRoleCredential()
|
|
337
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
338
|
+
cred = credential.STSAssumeRoleCredential(
|
|
339
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
|
+
)
|
|
342
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
|
+
else:
|
|
345
|
+
cred = credential.Credential(
|
|
346
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
347
|
+
)
|
|
348
|
+
http_profile = HttpProfile(
|
|
349
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
350
|
+
reqMethod="POST",
|
|
351
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
|
+
)
|
|
354
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
355
|
+
if g_param[OptionsDefine.Language]:
|
|
356
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
357
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
358
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
359
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
360
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
361
|
+
model = models.ModifyRaspRulesRequest()
|
|
362
|
+
model.from_json_string(json.dumps(args))
|
|
363
|
+
start_time = time.time()
|
|
364
|
+
while True:
|
|
365
|
+
rsp = client.ModifyRaspRules(model)
|
|
366
|
+
result = rsp.to_json_string()
|
|
367
|
+
try:
|
|
368
|
+
json_obj = json.loads(result)
|
|
369
|
+
except TypeError as e:
|
|
370
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
371
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
372
|
+
break
|
|
373
|
+
cur_time = time.time()
|
|
374
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
375
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
376
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
377
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
378
|
+
else:
|
|
379
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
380
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
381
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
382
|
+
|
|
383
|
+
|
|
332
384
|
def doCreateAbnormalProcessRulesExportJob(args, parsed_globals):
|
|
333
385
|
g_param = parse_global_arg(parsed_globals)
|
|
334
386
|
|
|
@@ -4489,6 +4541,58 @@ def doDescribeAssetImageBindRuleInfo(args, parsed_globals):
|
|
|
4489
4541
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4490
4542
|
|
|
4491
4543
|
|
|
4544
|
+
def doDescribeSecEventsTendency(args, parsed_globals):
|
|
4545
|
+
g_param = parse_global_arg(parsed_globals)
|
|
4546
|
+
|
|
4547
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
4548
|
+
cred = credential.CVMRoleCredential()
|
|
4549
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
4550
|
+
cred = credential.STSAssumeRoleCredential(
|
|
4551
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
|
+
)
|
|
4554
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
|
+
else:
|
|
4557
|
+
cred = credential.Credential(
|
|
4558
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
4559
|
+
)
|
|
4560
|
+
http_profile = HttpProfile(
|
|
4561
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
4562
|
+
reqMethod="POST",
|
|
4563
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
|
+
)
|
|
4566
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
4567
|
+
if g_param[OptionsDefine.Language]:
|
|
4568
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
4569
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4570
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4571
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
4572
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4573
|
+
model = models.DescribeSecEventsTendencyRequest()
|
|
4574
|
+
model.from_json_string(json.dumps(args))
|
|
4575
|
+
start_time = time.time()
|
|
4576
|
+
while True:
|
|
4577
|
+
rsp = client.DescribeSecEventsTendency(model)
|
|
4578
|
+
result = rsp.to_json_string()
|
|
4579
|
+
try:
|
|
4580
|
+
json_obj = json.loads(result)
|
|
4581
|
+
except TypeError as e:
|
|
4582
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4583
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4584
|
+
break
|
|
4585
|
+
cur_time = time.time()
|
|
4586
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4587
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4588
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4589
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4590
|
+
else:
|
|
4591
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4592
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4593
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4594
|
+
|
|
4595
|
+
|
|
4492
4596
|
def doUpdateNetworkFirewallPolicyDetail(args, parsed_globals):
|
|
4493
4597
|
g_param = parse_global_arg(parsed_globals)
|
|
4494
4598
|
|
|
@@ -9273,6 +9377,58 @@ def doCreateVulContainerExportJob(args, parsed_globals):
|
|
|
9273
9377
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
9274
9378
|
|
|
9275
9379
|
|
|
9380
|
+
def doUninstallClusterContainerSecurity(args, parsed_globals):
|
|
9381
|
+
g_param = parse_global_arg(parsed_globals)
|
|
9382
|
+
|
|
9383
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
9384
|
+
cred = credential.CVMRoleCredential()
|
|
9385
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
9386
|
+
cred = credential.STSAssumeRoleCredential(
|
|
9387
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
9388
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
9389
|
+
)
|
|
9390
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
9391
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
9392
|
+
else:
|
|
9393
|
+
cred = credential.Credential(
|
|
9394
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
9395
|
+
)
|
|
9396
|
+
http_profile = HttpProfile(
|
|
9397
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
9398
|
+
reqMethod="POST",
|
|
9399
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
9400
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
9401
|
+
)
|
|
9402
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
9403
|
+
if g_param[OptionsDefine.Language]:
|
|
9404
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
9405
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
9406
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
9407
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
9408
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
9409
|
+
model = models.UninstallClusterContainerSecurityRequest()
|
|
9410
|
+
model.from_json_string(json.dumps(args))
|
|
9411
|
+
start_time = time.time()
|
|
9412
|
+
while True:
|
|
9413
|
+
rsp = client.UninstallClusterContainerSecurity(model)
|
|
9414
|
+
result = rsp.to_json_string()
|
|
9415
|
+
try:
|
|
9416
|
+
json_obj = json.loads(result)
|
|
9417
|
+
except TypeError as e:
|
|
9418
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
9419
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
9420
|
+
break
|
|
9421
|
+
cur_time = time.time()
|
|
9422
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
9423
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
9424
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
9425
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
9426
|
+
else:
|
|
9427
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
9428
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
9429
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
9430
|
+
|
|
9431
|
+
|
|
9276
9432
|
def doModifyImageAuthorized(args, parsed_globals):
|
|
9277
9433
|
g_param = parse_global_arg(parsed_globals)
|
|
9278
9434
|
|
|
@@ -14057,7 +14213,7 @@ def doModifyRiskDnsEventStatus(args, parsed_globals):
|
|
|
14057
14213
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
14058
14214
|
|
|
14059
14215
|
|
|
14060
|
-
def
|
|
14216
|
+
def doModifyDefendStatus(args, parsed_globals):
|
|
14061
14217
|
g_param = parse_global_arg(parsed_globals)
|
|
14062
14218
|
|
|
14063
14219
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -14086,11 +14242,11 @@ def doDescribeSecLogJoinTypeList(args, parsed_globals):
|
|
|
14086
14242
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
14087
14243
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
14088
14244
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
14089
|
-
model = models.
|
|
14245
|
+
model = models.ModifyDefendStatusRequest()
|
|
14090
14246
|
model.from_json_string(json.dumps(args))
|
|
14091
14247
|
start_time = time.time()
|
|
14092
14248
|
while True:
|
|
14093
|
-
rsp = client.
|
|
14249
|
+
rsp = client.ModifyDefendStatus(model)
|
|
14094
14250
|
result = rsp.to_json_string()
|
|
14095
14251
|
try:
|
|
14096
14252
|
json_obj = json.loads(result)
|
|
@@ -14213,6 +14369,58 @@ def doDescribeVulRegistryImageList(args, parsed_globals):
|
|
|
14213
14369
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
14214
14370
|
|
|
14215
14371
|
|
|
14372
|
+
def doCreateClusterAccess(args, parsed_globals):
|
|
14373
|
+
g_param = parse_global_arg(parsed_globals)
|
|
14374
|
+
|
|
14375
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
14376
|
+
cred = credential.CVMRoleCredential()
|
|
14377
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
14378
|
+
cred = credential.STSAssumeRoleCredential(
|
|
14379
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
14380
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
14381
|
+
)
|
|
14382
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
14383
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
14384
|
+
else:
|
|
14385
|
+
cred = credential.Credential(
|
|
14386
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
14387
|
+
)
|
|
14388
|
+
http_profile = HttpProfile(
|
|
14389
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
14390
|
+
reqMethod="POST",
|
|
14391
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
|
14392
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
14393
|
+
)
|
|
14394
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
14395
|
+
if g_param[OptionsDefine.Language]:
|
|
14396
|
+
profile.language = g_param[OptionsDefine.Language]
|
|
14397
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
14398
|
+
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
14399
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
|
14400
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
14401
|
+
model = models.CreateClusterAccessRequest()
|
|
14402
|
+
model.from_json_string(json.dumps(args))
|
|
14403
|
+
start_time = time.time()
|
|
14404
|
+
while True:
|
|
14405
|
+
rsp = client.CreateClusterAccess(model)
|
|
14406
|
+
result = rsp.to_json_string()
|
|
14407
|
+
try:
|
|
14408
|
+
json_obj = json.loads(result)
|
|
14409
|
+
except TypeError as e:
|
|
14410
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
14411
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
14412
|
+
break
|
|
14413
|
+
cur_time = time.time()
|
|
14414
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
14415
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
14416
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
14417
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
14418
|
+
else:
|
|
14419
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
14420
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
14421
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
14422
|
+
|
|
14423
|
+
|
|
14216
14424
|
def doDescribeVulLevelImageSummary(args, parsed_globals):
|
|
14217
14425
|
g_param = parse_global_arg(parsed_globals)
|
|
14218
14426
|
|
|
@@ -15253,7 +15461,7 @@ def doOpenTcssTrial(args, parsed_globals):
|
|
|
15253
15461
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
15254
15462
|
|
|
15255
15463
|
|
|
15256
|
-
def
|
|
15464
|
+
def doDescribeSearchTemplates(args, parsed_globals):
|
|
15257
15465
|
g_param = parse_global_arg(parsed_globals)
|
|
15258
15466
|
|
|
15259
15467
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -15282,11 +15490,11 @@ def doDescribeRiskSyscallNames(args, parsed_globals):
|
|
|
15282
15490
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
15283
15491
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
15284
15492
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
15285
|
-
model = models.
|
|
15493
|
+
model = models.DescribeSearchTemplatesRequest()
|
|
15286
15494
|
model.from_json_string(json.dumps(args))
|
|
15287
15495
|
start_time = time.time()
|
|
15288
15496
|
while True:
|
|
15289
|
-
rsp = client.
|
|
15497
|
+
rsp = client.DescribeSearchTemplates(model)
|
|
15290
15498
|
result = rsp.to_json_string()
|
|
15291
15499
|
try:
|
|
15292
15500
|
json_obj = json.loads(result)
|
|
@@ -15877,7 +16085,7 @@ def doDescribeAssetImageVirusList(args, parsed_globals):
|
|
|
15877
16085
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
15878
16086
|
|
|
15879
16087
|
|
|
15880
|
-
def
|
|
16088
|
+
def doDescribeRiskSyscallNames(args, parsed_globals):
|
|
15881
16089
|
g_param = parse_global_arg(parsed_globals)
|
|
15882
16090
|
|
|
15883
16091
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -15906,11 +16114,11 @@ def doDescribeSecEventsTendency(args, parsed_globals):
|
|
|
15906
16114
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
15907
16115
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
15908
16116
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
15909
|
-
model = models.
|
|
16117
|
+
model = models.DescribeRiskSyscallNamesRequest()
|
|
15910
16118
|
model.from_json_string(json.dumps(args))
|
|
15911
16119
|
start_time = time.time()
|
|
15912
16120
|
while True:
|
|
15913
|
-
rsp = client.
|
|
16121
|
+
rsp = client.DescribeRiskSyscallNames(model)
|
|
15914
16122
|
result = rsp.to_json_string()
|
|
15915
16123
|
try:
|
|
15916
16124
|
json_obj = json.loads(result)
|
|
@@ -16241,58 +16449,6 @@ def doCreateHostExportJob(args, parsed_globals):
|
|
|
16241
16449
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
16242
16450
|
|
|
16243
16451
|
|
|
16244
|
-
def doDescribeSearchTemplates(args, parsed_globals):
|
|
16245
|
-
g_param = parse_global_arg(parsed_globals)
|
|
16246
|
-
|
|
16247
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
16248
|
-
cred = credential.CVMRoleCredential()
|
|
16249
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
16250
|
-
cred = credential.STSAssumeRoleCredential(
|
|
16251
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
16252
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
16253
|
-
)
|
|
16254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
16255
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
16256
|
-
else:
|
|
16257
|
-
cred = credential.Credential(
|
|
16258
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
16259
|
-
)
|
|
16260
|
-
http_profile = HttpProfile(
|
|
16261
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
16262
|
-
reqMethod="POST",
|
|
16263
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
16264
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
16265
|
-
)
|
|
16266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
16267
|
-
if g_param[OptionsDefine.Language]:
|
|
16268
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
16269
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
16270
|
-
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
16271
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
16272
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
16273
|
-
model = models.DescribeSearchTemplatesRequest()
|
|
16274
|
-
model.from_json_string(json.dumps(args))
|
|
16275
|
-
start_time = time.time()
|
|
16276
|
-
while True:
|
|
16277
|
-
rsp = client.DescribeSearchTemplates(model)
|
|
16278
|
-
result = rsp.to_json_string()
|
|
16279
|
-
try:
|
|
16280
|
-
json_obj = json.loads(result)
|
|
16281
|
-
except TypeError as e:
|
|
16282
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
16283
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
16284
|
-
break
|
|
16285
|
-
cur_time = time.time()
|
|
16286
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
16287
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
16288
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
16289
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
16290
|
-
else:
|
|
16291
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
16292
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
16293
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
16294
|
-
|
|
16295
|
-
|
|
16296
16452
|
def doDescribeImageComponentList(args, parsed_globals):
|
|
16297
16453
|
g_param = parse_global_arg(parsed_globals)
|
|
16298
16454
|
|
|
@@ -17177,7 +17333,7 @@ def doDescribeVulSummary(args, parsed_globals):
|
|
|
17177
17333
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
17178
17334
|
|
|
17179
17335
|
|
|
17180
|
-
def
|
|
17336
|
+
def doDescribeSecLogJoinTypeList(args, parsed_globals):
|
|
17181
17337
|
g_param = parse_global_arg(parsed_globals)
|
|
17182
17338
|
|
|
17183
17339
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -17206,11 +17362,11 @@ def doModifyRaspRules(args, parsed_globals):
|
|
|
17206
17362
|
client = mod.TcssClient(cred, g_param[OptionsDefine.Region], profile)
|
|
17207
17363
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
17208
17364
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
17209
|
-
model = models.
|
|
17365
|
+
model = models.DescribeSecLogJoinTypeListRequest()
|
|
17210
17366
|
model.from_json_string(json.dumps(args))
|
|
17211
17367
|
start_time = time.time()
|
|
17212
17368
|
while True:
|
|
17213
|
-
rsp = client.
|
|
17369
|
+
rsp = client.DescribeSecLogJoinTypeList(model)
|
|
17214
17370
|
result = rsp.to_json_string()
|
|
17215
17371
|
try:
|
|
17216
17372
|
json_obj = json.loads(result)
|
|
@@ -17610,6 +17766,7 @@ ACTION_MAP = {
|
|
|
17610
17766
|
"UpdateAndPublishNetworkFirewallPolicyYamlDetail": doUpdateAndPublishNetworkFirewallPolicyYamlDetail,
|
|
17611
17767
|
"DescribeVirusScanTimeoutSetting": doDescribeVirusScanTimeoutSetting,
|
|
17612
17768
|
"DescribeVirusSummary": doDescribeVirusSummary,
|
|
17769
|
+
"ModifyRaspRules": doModifyRaspRules,
|
|
17613
17770
|
"CreateAbnormalProcessRulesExportJob": doCreateAbnormalProcessRulesExportJob,
|
|
17614
17771
|
"DescribeAssetHostList": doDescribeAssetHostList,
|
|
17615
17772
|
"DescribeAssetImageRegistryScanStatusOneKey": doDescribeAssetImageRegistryScanStatusOneKey,
|
|
@@ -17690,6 +17847,7 @@ ACTION_MAP = {
|
|
|
17690
17847
|
"DescribeReverseShellDetail": doDescribeReverseShellDetail,
|
|
17691
17848
|
"DescribeESAggregations": doDescribeESAggregations,
|
|
17692
17849
|
"DescribeAssetImageBindRuleInfo": doDescribeAssetImageBindRuleInfo,
|
|
17850
|
+
"DescribeSecEventsTendency": doDescribeSecEventsTendency,
|
|
17693
17851
|
"UpdateNetworkFirewallPolicyDetail": doUpdateNetworkFirewallPolicyDetail,
|
|
17694
17852
|
"CreateAssetImageVirusExportJob": doCreateAssetImageVirusExportJob,
|
|
17695
17853
|
"DescribeNetworkFirewallPolicyDiscover": doDescribeNetworkFirewallPolicyDiscover,
|
|
@@ -17782,6 +17940,7 @@ ACTION_MAP = {
|
|
|
17782
17940
|
"ModifyRiskSyscallStatus": doModifyRiskSyscallStatus,
|
|
17783
17941
|
"DescribeComplianceAssetDetailInfo": doDescribeComplianceAssetDetailInfo,
|
|
17784
17942
|
"CreateVulContainerExportJob": doCreateVulContainerExportJob,
|
|
17943
|
+
"UninstallClusterContainerSecurity": doUninstallClusterContainerSecurity,
|
|
17785
17944
|
"ModifyImageAuthorized": doModifyImageAuthorized,
|
|
17786
17945
|
"ModifyAbnormalProcessStatus": doModifyAbnormalProcessStatus,
|
|
17787
17946
|
"CreateExportComplianceStatusListJob": doCreateExportComplianceStatusListJob,
|
|
@@ -17874,9 +18033,10 @@ ACTION_MAP = {
|
|
|
17874
18033
|
"DescribeAssetImageRiskListExport": doDescribeAssetImageRiskListExport,
|
|
17875
18034
|
"ModifyReverseShellStatus": doModifyReverseShellStatus,
|
|
17876
18035
|
"ModifyRiskDnsEventStatus": doModifyRiskDnsEventStatus,
|
|
17877
|
-
"
|
|
18036
|
+
"ModifyDefendStatus": doModifyDefendStatus,
|
|
17878
18037
|
"DescribeVulIgnoreLocalImageList": doDescribeVulIgnoreLocalImageList,
|
|
17879
18038
|
"DescribeVulRegistryImageList": doDescribeVulRegistryImageList,
|
|
18039
|
+
"CreateClusterAccess": doCreateClusterAccess,
|
|
17880
18040
|
"DescribeVulLevelImageSummary": doDescribeVulLevelImageSummary,
|
|
17881
18041
|
"ModifySecLogCleanSettingInfo": doModifySecLogCleanSettingInfo,
|
|
17882
18042
|
"CreateVirusScanAgain": doCreateVirusScanAgain,
|
|
@@ -17897,7 +18057,7 @@ ACTION_MAP = {
|
|
|
17897
18057
|
"ModifyCompliancePeriodTask": doModifyCompliancePeriodTask,
|
|
17898
18058
|
"DescribeAssetImageRegistrySummary": doDescribeAssetImageRegistrySummary,
|
|
17899
18059
|
"OpenTcssTrial": doOpenTcssTrial,
|
|
17900
|
-
"
|
|
18060
|
+
"DescribeSearchTemplates": doDescribeSearchTemplates,
|
|
17901
18061
|
"DescribeAutoAuthorizedRuleHost": doDescribeAutoAuthorizedRuleHost,
|
|
17902
18062
|
"ScanComplianceAssetsByPolicyItem": doScanComplianceAssetsByPolicyItem,
|
|
17903
18063
|
"DescribeImageAuthorizedInfo": doDescribeImageAuthorizedInfo,
|
|
@@ -17909,14 +18069,13 @@ ACTION_MAP = {
|
|
|
17909
18069
|
"DescribeReverseShellWhiteListDetail": doDescribeReverseShellWhiteListDetail,
|
|
17910
18070
|
"CreateAssetImageScanSetting": doCreateAssetImageScanSetting,
|
|
17911
18071
|
"DescribeAssetImageVirusList": doDescribeAssetImageVirusList,
|
|
17912
|
-
"
|
|
18072
|
+
"DescribeRiskSyscallNames": doDescribeRiskSyscallNames,
|
|
17913
18073
|
"CreateK8sApiAbnormalRuleInfo": doCreateK8sApiAbnormalRuleInfo,
|
|
17914
18074
|
"DescribeVulDefenceEvent": doDescribeVulDefenceEvent,
|
|
17915
18075
|
"DescribeSecLogDeliveryKafkaSetting": doDescribeSecLogDeliveryKafkaSetting,
|
|
17916
18076
|
"DescribeInspectionReport": doDescribeInspectionReport,
|
|
17917
18077
|
"DescribeReverseShellEvents": doDescribeReverseShellEvents,
|
|
17918
18078
|
"CreateHostExportJob": doCreateHostExportJob,
|
|
17919
|
-
"DescribeSearchTemplates": doDescribeSearchTemplates,
|
|
17920
18079
|
"DescribeImageComponentList": doDescribeImageComponentList,
|
|
17921
18080
|
"CheckRepeatAssetImageRegistry": doCheckRepeatAssetImageRegistry,
|
|
17922
18081
|
"AddNetworkFirewallPolicyDetail": doAddNetworkFirewallPolicyDetail,
|
|
@@ -17934,7 +18093,7 @@ ACTION_MAP = {
|
|
|
17934
18093
|
"DescribeSecLogAlertMsg": doDescribeSecLogAlertMsg,
|
|
17935
18094
|
"ModifyK8sApiAbnormalRuleStatus": doModifyK8sApiAbnormalRuleStatus,
|
|
17936
18095
|
"DescribeVulSummary": doDescribeVulSummary,
|
|
17937
|
-
"
|
|
18096
|
+
"DescribeSecLogJoinTypeList": doDescribeSecLogJoinTypeList,
|
|
17938
18097
|
"DescribeAssetImageDetail": doDescribeAssetImageDetail,
|
|
17939
18098
|
"DeleteReverseShellWhiteLists": doDeleteReverseShellWhiteLists,
|
|
17940
18099
|
"DescribeK8sApiAbnormalEventInfo": doDescribeK8sApiAbnormalEventInfo,
|