tccli 3.0.848.1__py2.py3-none-any.whl → 3.0.849.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +1 -0
- tccli/services/bma/v20221115/api.json +9 -0
- tccli/services/bma/v20221115/examples.json +1 -1
- tccli/services/cwp/cwp_client.py +61 -8
- tccli/services/cwp/v20180228/api.json +319 -0
- tccli/services/cwp/v20180228/examples.json +8 -0
- tccli/services/dlc/v20210125/api.json +1 -1
- tccli/services/ess/v20201111/api.json +1 -1
- tccli/services/mongodb/v20190725/api.json +5 -20
- tccli/services/mongodb/v20190725/examples.json +5 -5
- tccli/services/ocr/v20181119/api.json +20 -1
- tccli/services/ocr/v20181119/examples.json +1 -1
- tccli/services/ssl/v20191205/api.json +0 -4
- tccli/services/ssl/v20191205/examples.json +1 -1
- tccli/services/thpc/thpc_client.py +13 -8
- tccli/services/thpc/v20230321/api.json +2414 -0
- tccli/services/thpc/v20230321/examples.json +125 -0
- tccli/services/trtc/v20190722/api.json +4 -16
- tccli/services/tse/v20201207/api.json +45 -2
- tccli/services/tts/v20190823/api.json +1 -16
- tccli/services/tts/v20190823/examples.json +1 -1
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/METADATA +2 -2
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/RECORD +28 -26
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/LICENSE +0 -0
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/top_level.txt +0 -0
tccli/__init__.py
CHANGED
@@ -1 +1 @@
|
|
1
|
-
__version__ = '3.0.
|
1
|
+
__version__ = '3.0.849.1'
|
tccli/services/__init__.py
CHANGED
@@ -204,6 +204,15 @@
|
|
204
204
|
"required": false,
|
205
205
|
"type": "object",
|
206
206
|
"value_allowed_null": false
|
207
|
+
},
|
208
|
+
{
|
209
|
+
"document": "账号id",
|
210
|
+
"example": "无",
|
211
|
+
"member": "string",
|
212
|
+
"name": "Uin",
|
213
|
+
"required": false,
|
214
|
+
"type": "string",
|
215
|
+
"value_allowed_null": false
|
207
216
|
}
|
208
217
|
],
|
209
218
|
"usage": "out"
|
@@ -60,7 +60,7 @@
|
|
60
60
|
{
|
61
61
|
"document": "查询品牌列表",
|
62
62
|
"input": "POST / HTTP/1.1\nHost: bma.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeBPBrands\n<公共请求参数>\n\n{}",
|
63
|
-
"output": "{\n \"Response\": {\n \"Brands\": [\n {\n \"CompanyId\": 0,\n \"CompanyName\": \"
|
63
|
+
"output": "{\n \"Response\": {\n \"Brands\": [\n {\n \"Uin\": \"abc\",\n \"CompanyId\": 0,\n \"CompanyName\": \"abc\",\n \"BrandName\": \"abc\",\n \"Phone\": \"abc\",\n \"License\": \"abc\",\n \"LicenseStatus\": 0,\n \"LicenseNote\": \"abc\",\n \"Authorization\": \"abc\",\n \"AuthorizationStatus\": 0,\n \"AuthorizationNote\": \"abc\",\n \"Trademarks\": [\n {\n \"Trademark\": \"abc\",\n \"TrademarkStatus\": 0,\n \"TrademarkNote\": \"abc\",\n \"TrademarkId\": 0,\n \"Transfer\": \"abc\",\n \"TransferStatus\": 0,\n \"TransferNote\": \"abc\",\n \"TrademarkName\": \"abc\"\n }\n ],\n \"InsertTime\": \"abc\",\n \"Services\": {\n \"ProtectURLCount\": 0,\n \"ProtectURLExpireTime\": \"abc\",\n \"ProtectAPPCount\": 0,\n \"ProtectAPPExpireTime\": \"abc\",\n \"ProtectOfficialAccountCount\": 0,\n \"ProtectOfficialAccountExpireTime\": \"abc\",\n \"ProtectMiniProgramCount\": 0,\n \"ProtectMiniProgramExpireTime\": \"abc\",\n \"OfflineCount\": 0\n }\n }\n ],\n \"NoticeStatus\": 0,\n \"RequestId\": \"abc\"\n }\n}",
|
64
64
|
"title": "查询品牌列表"
|
65
65
|
}
|
66
66
|
],
|
tccli/services/cwp/cwp_client.py
CHANGED
@@ -69,7 +69,7 @@ def doDeleteTags(args, parsed_globals):
|
|
69
69
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
70
70
|
|
71
71
|
|
72
|
-
def
|
72
|
+
def doDescribeRiskDnsEventList(args, parsed_globals):
|
73
73
|
g_param = parse_global_arg(parsed_globals)
|
74
74
|
|
75
75
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -98,11 +98,11 @@ def doSwitchBashRules(args, parsed_globals):
|
|
98
98
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
99
99
|
client._sdkVersion += ("_CLI_" + __version__)
|
100
100
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
101
|
-
model = models.
|
101
|
+
model = models.DescribeRiskDnsEventListRequest()
|
102
102
|
model.from_json_string(json.dumps(args))
|
103
103
|
start_time = time.time()
|
104
104
|
while True:
|
105
|
-
rsp = client.
|
105
|
+
rsp = client.DescribeRiskDnsEventList(model)
|
106
106
|
result = rsp.to_json_string()
|
107
107
|
try:
|
108
108
|
json_obj = json.loads(result)
|
@@ -7973,6 +7973,58 @@ def doEditTags(args, parsed_globals):
|
|
7973
7973
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7974
7974
|
|
7975
7975
|
|
7976
|
+
def doDescribeClientException(args, parsed_globals):
|
7977
|
+
g_param = parse_global_arg(parsed_globals)
|
7978
|
+
|
7979
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7980
|
+
cred = credential.CVMRoleCredential()
|
7981
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7982
|
+
cred = credential.STSAssumeRoleCredential(
|
7983
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7984
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7985
|
+
)
|
7986
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7987
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7988
|
+
else:
|
7989
|
+
cred = credential.Credential(
|
7990
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7991
|
+
)
|
7992
|
+
http_profile = HttpProfile(
|
7993
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7994
|
+
reqMethod="POST",
|
7995
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7996
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7997
|
+
)
|
7998
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7999
|
+
if g_param[OptionsDefine.Language]:
|
8000
|
+
profile.language = g_param[OptionsDefine.Language]
|
8001
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
8002
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
8003
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
8004
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8005
|
+
model = models.DescribeClientExceptionRequest()
|
8006
|
+
model.from_json_string(json.dumps(args))
|
8007
|
+
start_time = time.time()
|
8008
|
+
while True:
|
8009
|
+
rsp = client.DescribeClientException(model)
|
8010
|
+
result = rsp.to_json_string()
|
8011
|
+
try:
|
8012
|
+
json_obj = json.loads(result)
|
8013
|
+
except TypeError as e:
|
8014
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
8015
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
8016
|
+
break
|
8017
|
+
cur_time = time.time()
|
8018
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
8019
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
8020
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
8021
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
8022
|
+
else:
|
8023
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
8024
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
8025
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8026
|
+
|
8027
|
+
|
7976
8028
|
def doSeparateMalwares(args, parsed_globals):
|
7977
8029
|
g_param = parse_global_arg(parsed_globals)
|
7978
8030
|
|
@@ -12237,7 +12289,7 @@ def doDescribeWebPageServiceInfo(args, parsed_globals):
|
|
12237
12289
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
12238
12290
|
|
12239
12291
|
|
12240
|
-
def
|
12292
|
+
def doSwitchBashRules(args, parsed_globals):
|
12241
12293
|
g_param = parse_global_arg(parsed_globals)
|
12242
12294
|
|
12243
12295
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -12266,11 +12318,11 @@ def doDescribeClientException(args, parsed_globals):
|
|
12266
12318
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
12267
12319
|
client._sdkVersion += ("_CLI_" + __version__)
|
12268
12320
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
12269
|
-
model = models.
|
12321
|
+
model = models.SwitchBashRulesRequest()
|
12270
12322
|
model.from_json_string(json.dumps(args))
|
12271
12323
|
start_time = time.time()
|
12272
12324
|
while True:
|
12273
|
-
rsp = client.
|
12325
|
+
rsp = client.SwitchBashRules(model)
|
12274
12326
|
result = rsp.to_json_string()
|
12275
12327
|
try:
|
12276
12328
|
json_obj = json.loads(result)
|
@@ -13653,7 +13705,7 @@ MODELS_MAP = {
|
|
13653
13705
|
|
13654
13706
|
ACTION_MAP = {
|
13655
13707
|
"DeleteTags": doDeleteTags,
|
13656
|
-
"
|
13708
|
+
"DescribeRiskDnsEventList": doDescribeRiskDnsEventList,
|
13657
13709
|
"TrustMalwares": doTrustMalwares,
|
13658
13710
|
"DeleteBaselineRule": doDeleteBaselineRule,
|
13659
13711
|
"DescribeAssetPortInfoList": doDescribeAssetPortInfoList,
|
@@ -13805,6 +13857,7 @@ ACTION_MAP = {
|
|
13805
13857
|
"ExportAssetWebServiceInfoList": doExportAssetWebServiceInfoList,
|
13806
13858
|
"DescribeAssetWebLocationInfo": doDescribeAssetWebLocationInfo,
|
13807
13859
|
"EditTags": doEditTags,
|
13860
|
+
"DescribeClientException": doDescribeClientException,
|
13808
13861
|
"SeparateMalwares": doSeparateMalwares,
|
13809
13862
|
"ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
|
13810
13863
|
"DescribeBaselineRule": doDescribeBaselineRule,
|
@@ -13887,7 +13940,7 @@ ACTION_MAP = {
|
|
13887
13940
|
"DescribeAssetWebLocationList": doDescribeAssetWebLocationList,
|
13888
13941
|
"DescribeAssetProcessInfoList": doDescribeAssetProcessInfoList,
|
13889
13942
|
"DescribeWebPageServiceInfo": doDescribeWebPageServiceInfo,
|
13890
|
-
"
|
13943
|
+
"SwitchBashRules": doSwitchBashRules,
|
13891
13944
|
"DescribeTags": doDescribeTags,
|
13892
13945
|
"DescribeBaselineBasicInfo": doDescribeBaselineBasicInfo,
|
13893
13946
|
"ExportBaselineWeakPasswordList": doExportBaselineWeakPasswordList,
|
@@ -1092,6 +1092,13 @@
|
|
1092
1092
|
"output": "DescribeReverseShellRulesResponse",
|
1093
1093
|
"status": "online"
|
1094
1094
|
},
|
1095
|
+
"DescribeRiskDnsEventList": {
|
1096
|
+
"document": "获取恶意请求事件列表",
|
1097
|
+
"input": "DescribeRiskDnsEventListRequest",
|
1098
|
+
"name": "获取恶意请求事件列表",
|
1099
|
+
"output": "DescribeRiskDnsEventListResponse",
|
1100
|
+
"status": "online"
|
1101
|
+
},
|
1095
1102
|
"DescribeRiskDnsList": {
|
1096
1103
|
"document": "入侵检测,获取恶意请求列表",
|
1097
1104
|
"input": "DescribeRiskDnsListRequest",
|
@@ -19665,6 +19672,87 @@
|
|
19665
19672
|
],
|
19666
19673
|
"type": "object"
|
19667
19674
|
},
|
19675
|
+
"DescribeRiskDnsEventListRequest": {
|
19676
|
+
"document": "DescribeRiskDnsEventList请求参数结构体",
|
19677
|
+
"members": [
|
19678
|
+
{
|
19679
|
+
"default": "",
|
19680
|
+
"document": "<li>IpOrName - String - 是否必填:否 - 主机Ip或别名筛选</li>\n<li>HostId - String - 是否必填:否 - 主机Id</li>\n<li>AgentId - String - 是否必填:否 - 客户端Id</li>\n<li>PolicyType - String - 是否必填:否 - 策略类型,0:系统策略1:用户自定义策略</li>\n<li>Domain - String - 是否必填:否 - 域名(先对域名做urlencode,再base64)</li>\n<li>HandleStatus - String - 是否必填:否 - 状态筛选0:待处理;2:信任;3:不信任</li>\n<li>BeginTime - String - 是否必填:否 - 最近访问开始时间</li>\n<li>EndTime - String - 是否必填:否 - 最近访问结束时间</li>",
|
19681
|
+
"example": "10",
|
19682
|
+
"member": "Filter",
|
19683
|
+
"name": "Filters",
|
19684
|
+
"required": false,
|
19685
|
+
"type": "list"
|
19686
|
+
},
|
19687
|
+
{
|
19688
|
+
"default": "",
|
19689
|
+
"document": "需要返回的数量,默认为10,最大值为100",
|
19690
|
+
"example": "0",
|
19691
|
+
"member": "int64",
|
19692
|
+
"name": "Limit",
|
19693
|
+
"required": false,
|
19694
|
+
"type": "int"
|
19695
|
+
},
|
19696
|
+
{
|
19697
|
+
"default": "",
|
19698
|
+
"document": "偏移量,默认为0。",
|
19699
|
+
"example": "[]",
|
19700
|
+
"member": "int64",
|
19701
|
+
"name": "Offset",
|
19702
|
+
"required": false,
|
19703
|
+
"type": "int"
|
19704
|
+
},
|
19705
|
+
{
|
19706
|
+
"default": "",
|
19707
|
+
"document": "排序方式:根据请求次数排序:[asc:升序|desc:降序]",
|
19708
|
+
"example": "asc",
|
19709
|
+
"member": "string",
|
19710
|
+
"name": "Order",
|
19711
|
+
"required": false,
|
19712
|
+
"type": "string"
|
19713
|
+
},
|
19714
|
+
{
|
19715
|
+
"default": "",
|
19716
|
+
"document": "排序字段:[AccessCount:请求次数|LastTime:最近请求时间]",
|
19717
|
+
"example": "AccessCount",
|
19718
|
+
"member": "string",
|
19719
|
+
"name": "By",
|
19720
|
+
"required": false,
|
19721
|
+
"type": "string"
|
19722
|
+
}
|
19723
|
+
],
|
19724
|
+
"type": "object"
|
19725
|
+
},
|
19726
|
+
"DescribeRiskDnsEventListResponse": {
|
19727
|
+
"document": "DescribeRiskDnsEventList返回参数结构体",
|
19728
|
+
"members": [
|
19729
|
+
{
|
19730
|
+
"document": "恶意请求事件列表\n注意:此字段可能返回 null,表示取不到有效值。",
|
19731
|
+
"example": "无",
|
19732
|
+
"member": "RiskDnsEvent",
|
19733
|
+
"name": "List",
|
19734
|
+
"required": true,
|
19735
|
+
"type": "list",
|
19736
|
+
"value_allowed_null": true
|
19737
|
+
},
|
19738
|
+
{
|
19739
|
+
"document": "总数",
|
19740
|
+
"example": "无",
|
19741
|
+
"member": "int64",
|
19742
|
+
"name": "TotalCount",
|
19743
|
+
"required": true,
|
19744
|
+
"type": "int",
|
19745
|
+
"value_allowed_null": false
|
19746
|
+
},
|
19747
|
+
{
|
19748
|
+
"document": "唯一请求 ID,每次请求都会返回。定位问题时需要提供该次请求的 RequestId。",
|
19749
|
+
"member": "string",
|
19750
|
+
"name": "RequestId",
|
19751
|
+
"type": "string"
|
19752
|
+
}
|
19753
|
+
],
|
19754
|
+
"type": "object"
|
19755
|
+
},
|
19668
19756
|
"DescribeRiskDnsListRequest": {
|
19669
19757
|
"document": "DescribeRiskDnsList请求参数结构体",
|
19670
19758
|
"members": [
|
@@ -29154,6 +29242,237 @@
|
|
29154
29242
|
],
|
29155
29243
|
"usage": "out"
|
29156
29244
|
},
|
29245
|
+
"RiskDnsEvent": {
|
29246
|
+
"document": "恶意请求事件",
|
29247
|
+
"members": [
|
29248
|
+
{
|
29249
|
+
"document": "事件Id",
|
29250
|
+
"example": "153",
|
29251
|
+
"member": "int64",
|
29252
|
+
"name": "Id",
|
29253
|
+
"required": false,
|
29254
|
+
"type": "int",
|
29255
|
+
"value_allowed_null": false
|
29256
|
+
},
|
29257
|
+
{
|
29258
|
+
"document": "策略ID",
|
29259
|
+
"example": "10000",
|
29260
|
+
"member": "int64",
|
29261
|
+
"name": "PolicyId",
|
29262
|
+
"required": false,
|
29263
|
+
"type": "int",
|
29264
|
+
"value_allowed_null": false
|
29265
|
+
},
|
29266
|
+
{
|
29267
|
+
"document": "命中策略类型[-1:未知|0系统|1:用户]",
|
29268
|
+
"example": "1",
|
29269
|
+
"member": "int64",
|
29270
|
+
"name": "PolicyType",
|
29271
|
+
"required": false,
|
29272
|
+
"type": "int",
|
29273
|
+
"value_allowed_null": false
|
29274
|
+
},
|
29275
|
+
{
|
29276
|
+
"document": "命中策略名称",
|
29277
|
+
"example": "test",
|
29278
|
+
"member": "string",
|
29279
|
+
"name": "PolicyName",
|
29280
|
+
"required": false,
|
29281
|
+
"type": "string",
|
29282
|
+
"value_allowed_null": false
|
29283
|
+
},
|
29284
|
+
{
|
29285
|
+
"document": "保护级别[0:基础版|1:专业版|2:旗舰版]",
|
29286
|
+
"example": "1",
|
29287
|
+
"member": "int64",
|
29288
|
+
"name": "ProtectLevel",
|
29289
|
+
"required": false,
|
29290
|
+
"type": "int",
|
29291
|
+
"value_allowed_null": false
|
29292
|
+
},
|
29293
|
+
{
|
29294
|
+
"document": "主机ID",
|
29295
|
+
"example": "d1f53e38-3f03-4a72-bf16-afa78ed698f2",
|
29296
|
+
"member": "string",
|
29297
|
+
"name": "HostId",
|
29298
|
+
"required": false,
|
29299
|
+
"type": "string",
|
29300
|
+
"value_allowed_null": false
|
29301
|
+
},
|
29302
|
+
{
|
29303
|
+
"document": "主机名称",
|
29304
|
+
"example": "test",
|
29305
|
+
"member": "string",
|
29306
|
+
"name": "HostName",
|
29307
|
+
"required": false,
|
29308
|
+
"type": "string",
|
29309
|
+
"value_allowed_null": false
|
29310
|
+
},
|
29311
|
+
{
|
29312
|
+
"document": "主机IP",
|
29313
|
+
"example": "10.0.0.1",
|
29314
|
+
"member": "string",
|
29315
|
+
"name": "HostIp",
|
29316
|
+
"required": false,
|
29317
|
+
"type": "string",
|
29318
|
+
"value_allowed_null": false
|
29319
|
+
},
|
29320
|
+
{
|
29321
|
+
"document": "外网IP",
|
29322
|
+
"example": "123.22.3.1",
|
29323
|
+
"member": "string",
|
29324
|
+
"name": "WanIp",
|
29325
|
+
"required": false,
|
29326
|
+
"type": "string",
|
29327
|
+
"value_allowed_null": false
|
29328
|
+
},
|
29329
|
+
{
|
29330
|
+
"document": "客户端ID",
|
29331
|
+
"example": "a1f53e38-3f03-4a72-bf16-afa78dd698f3",
|
29332
|
+
"member": "string",
|
29333
|
+
"name": "AgentId",
|
29334
|
+
"required": false,
|
29335
|
+
"type": "string",
|
29336
|
+
"value_allowed_null": false
|
29337
|
+
},
|
29338
|
+
{
|
29339
|
+
"document": "访问域名",
|
29340
|
+
"example": "re.r3r3.org",
|
29341
|
+
"member": "string",
|
29342
|
+
"name": "Domain",
|
29343
|
+
"required": false,
|
29344
|
+
"type": "string",
|
29345
|
+
"value_allowed_null": false
|
29346
|
+
},
|
29347
|
+
{
|
29348
|
+
"document": "标签特性",
|
29349
|
+
"example": "[\"vueir\",\"mle\"]",
|
29350
|
+
"member": "string",
|
29351
|
+
"name": "Tags",
|
29352
|
+
"required": false,
|
29353
|
+
"type": "list",
|
29354
|
+
"value_allowed_null": false
|
29355
|
+
},
|
29356
|
+
{
|
29357
|
+
"document": "访问次数",
|
29358
|
+
"example": "10",
|
29359
|
+
"member": "int64",
|
29360
|
+
"name": "AccessCount",
|
29361
|
+
"required": false,
|
29362
|
+
"type": "int",
|
29363
|
+
"value_allowed_null": false
|
29364
|
+
},
|
29365
|
+
{
|
29366
|
+
"document": "威胁描述",
|
29367
|
+
"example": "威胁描述",
|
29368
|
+
"member": "string",
|
29369
|
+
"name": "ThreatDesc",
|
29370
|
+
"required": false,
|
29371
|
+
"type": "string",
|
29372
|
+
"value_allowed_null": false
|
29373
|
+
},
|
29374
|
+
{
|
29375
|
+
"document": "修复方案",
|
29376
|
+
"example": "无",
|
29377
|
+
"member": "string",
|
29378
|
+
"name": "SuggestSolution",
|
29379
|
+
"required": false,
|
29380
|
+
"type": "string",
|
29381
|
+
"value_allowed_null": false
|
29382
|
+
},
|
29383
|
+
{
|
29384
|
+
"document": "参考链接",
|
29385
|
+
"example": "http://www.vxjump.net/files/virus_analysis/virut%20botnet%20anal",
|
29386
|
+
"member": "string",
|
29387
|
+
"name": "ReferenceLink",
|
29388
|
+
"required": false,
|
29389
|
+
"type": "string",
|
29390
|
+
"value_allowed_null": false
|
29391
|
+
},
|
29392
|
+
{
|
29393
|
+
"document": "处理状态;[0:待处理|2:已加白|3:非信任状态|4:已处理|5:已忽略]",
|
29394
|
+
"example": "1",
|
29395
|
+
"member": "int64",
|
29396
|
+
"name": "HandleStatus",
|
29397
|
+
"required": false,
|
29398
|
+
"type": "int",
|
29399
|
+
"value_allowed_null": false
|
29400
|
+
},
|
29401
|
+
{
|
29402
|
+
"document": "进程ID",
|
29403
|
+
"example": "1",
|
29404
|
+
"member": "int64",
|
29405
|
+
"name": "Pid",
|
29406
|
+
"required": false,
|
29407
|
+
"type": "int",
|
29408
|
+
"value_allowed_null": false
|
29409
|
+
},
|
29410
|
+
{
|
29411
|
+
"document": "进程名",
|
29412
|
+
"example": "pidname",
|
29413
|
+
"member": "string",
|
29414
|
+
"name": "ProcessName",
|
29415
|
+
"required": false,
|
29416
|
+
"type": "string",
|
29417
|
+
"value_allowed_null": false
|
29418
|
+
},
|
29419
|
+
{
|
29420
|
+
"document": "进程MD5",
|
29421
|
+
"example": "3c59dc048e8850243be8079a5c74d079",
|
29422
|
+
"member": "string",
|
29423
|
+
"name": "ProcessMd5",
|
29424
|
+
"required": false,
|
29425
|
+
"type": "string",
|
29426
|
+
"value_allowed_null": false
|
29427
|
+
},
|
29428
|
+
{
|
29429
|
+
"document": "命令行",
|
29430
|
+
"example": "cmd",
|
29431
|
+
"member": "string",
|
29432
|
+
"name": "CmdLine",
|
29433
|
+
"required": false,
|
29434
|
+
"type": "string",
|
29435
|
+
"value_allowed_null": false
|
29436
|
+
},
|
29437
|
+
{
|
29438
|
+
"document": "首次访问时间",
|
29439
|
+
"example": "2021-04-26 15:19:04",
|
29440
|
+
"member": "string",
|
29441
|
+
"name": "FirstTime",
|
29442
|
+
"required": false,
|
29443
|
+
"type": "string",
|
29444
|
+
"value_allowed_null": false
|
29445
|
+
},
|
29446
|
+
{
|
29447
|
+
"document": "最近访问时间",
|
29448
|
+
"example": "2022-07-15 11:27:01",
|
29449
|
+
"member": "string",
|
29450
|
+
"name": "LastTime",
|
29451
|
+
"required": false,
|
29452
|
+
"type": "string",
|
29453
|
+
"value_allowed_null": false
|
29454
|
+
},
|
29455
|
+
{
|
29456
|
+
"document": "主机在线状态[OFFLINE:离线|ONLINE:在线|UNKNOWN:未知]",
|
29457
|
+
"example": "ONLINE",
|
29458
|
+
"member": "string",
|
29459
|
+
"name": "HostStatus",
|
29460
|
+
"required": false,
|
29461
|
+
"type": "string",
|
29462
|
+
"value_allowed_null": false
|
29463
|
+
},
|
29464
|
+
{
|
29465
|
+
"document": "附加信息\n注意:此字段可能返回 null,表示取不到有效值。",
|
29466
|
+
"example": "无",
|
29467
|
+
"member": "MachineExtraInfo",
|
29468
|
+
"name": "MachineExtraInfo",
|
29469
|
+
"required": false,
|
29470
|
+
"type": "object",
|
29471
|
+
"value_allowed_null": true
|
29472
|
+
}
|
29473
|
+
],
|
29474
|
+
"usage": "out"
|
29475
|
+
},
|
29157
29476
|
"RiskDnsList": {
|
29158
29477
|
"document": "恶意请求列表",
|
29159
29478
|
"members": [
|
@@ -1260,6 +1260,14 @@
|
|
1260
1260
|
"title": "获取反弹Shell规则列表"
|
1261
1261
|
}
|
1262
1262
|
],
|
1263
|
+
"DescribeRiskDnsEventList": [
|
1264
|
+
{
|
1265
|
+
"document": "",
|
1266
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsEventList\n<公共请求参数>\n\n{}",
|
1267
|
+
"output": "{\n \"Response\": {\n \"List\": [\n {\n \"Id\": 10368,\n \"PolicyId\": 5000179,\n \"PolicyType\": 1,\n \"PolicyName\": \"v_llzlu拦截\",\n \"ProtectLevel\": 2,\n \"HostId\": \"02db9a21-78fe-4a4c-b96f-a11bf819a962\",\n \"HostName\": \"v_llzlu恶意请求\",\n \"HostIp\": \"192.168.111.28\",\n \"WanIp\": \"43.138.255.181\",\n \"HostStatus\": \"OFFLINE\",\n \"AgentId\": \"02db9a21-78fe-4a4c-b96f-a11bf819a962\",\n \"Domain\": \"183.60.95.201\",\n \"Tags\": [],\n \"AccessCount\": 1,\n \"ThreatDesc\": \"发现主机存在访问恶意IP/域名的行为,您的主机可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"SuggestSolution\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"ReferenceLink\": \"\",\n \"HandleStatus\": 6,\n \"Pid\": 1387042,\n \"ProcessName\": \"/usr/bin/ping\",\n \"ProcessMd5\": \"7f42e35e3065eaa9a58b89e249e8cbc7\",\n \"CmdLine\": \"ping 183.60.95.201 \",\n \"FirstTime\": \"2022-09-19 14:57:23\",\n \"LastTime\": \"2022-09-19 14:57:23\"\n }\n ],\n \"RequestId\": \"130e109f-a922-4d16-827d-b17a366125a2\",\n \"TotalCount\": 9989\n }\n}",
|
1268
|
+
"title": "获取恶意请求事件列表"
|
1269
|
+
}
|
1270
|
+
],
|
1263
1271
|
"DescribeRiskDnsList": [
|
1264
1272
|
{
|
1265
1273
|
"document": "入侵检测-获取恶意请求列表",
|
@@ -325,7 +325,7 @@
|
|
325
325
|
"DescribeForbiddenTablePro": {
|
326
326
|
"document": "本接口(DescribeForbiddenTablePro)用于获取被禁用的表属性列表",
|
327
327
|
"input": "DescribeForbiddenTableProRequest",
|
328
|
-
"name": "
|
328
|
+
"name": "获取被禁用的表属性列表(新)",
|
329
329
|
"output": "DescribeForbiddenTableProResponse",
|
330
330
|
"status": "online"
|
331
331
|
},
|
@@ -2350,7 +2350,7 @@
|
|
2350
2350
|
"type": "object"
|
2351
2351
|
},
|
2352
2352
|
{
|
2353
|
-
"document": "身份证件类型:\nID_CARD 身份证\nPASSPORT 护照\nHONGKONG_AND_MACAO
|
2353
|
+
"document": "身份证件类型:\nID_CARD 身份证\nPASSPORT 护照\nHONGKONG_AND_MACAO 中国香港\nFOREIGN_ID_CARD 境外身份\nHONGKONG_MACAO_AND_TAIWAN 中国台湾",
|
2354
2354
|
"example": "无",
|
2355
2355
|
"member": "string",
|
2356
2356
|
"name": "IdCardType",
|