tccli 3.0.848.1__py2.py3-none-any.whl → 3.0.849.1__py2.py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- tccli/__init__.py +1 -1
- tccli/services/__init__.py +1 -0
- tccli/services/bma/v20221115/api.json +9 -0
- tccli/services/bma/v20221115/examples.json +1 -1
- tccli/services/cwp/cwp_client.py +61 -8
- tccli/services/cwp/v20180228/api.json +319 -0
- tccli/services/cwp/v20180228/examples.json +8 -0
- tccli/services/dlc/v20210125/api.json +1 -1
- tccli/services/ess/v20201111/api.json +1 -1
- tccli/services/mongodb/v20190725/api.json +5 -20
- tccli/services/mongodb/v20190725/examples.json +5 -5
- tccli/services/ocr/v20181119/api.json +20 -1
- tccli/services/ocr/v20181119/examples.json +1 -1
- tccli/services/ssl/v20191205/api.json +0 -4
- tccli/services/ssl/v20191205/examples.json +1 -1
- tccli/services/thpc/thpc_client.py +13 -8
- tccli/services/thpc/v20230321/api.json +2414 -0
- tccli/services/thpc/v20230321/examples.json +125 -0
- tccli/services/trtc/v20190722/api.json +4 -16
- tccli/services/tse/v20201207/api.json +45 -2
- tccli/services/tts/v20190823/api.json +1 -16
- tccli/services/tts/v20190823/examples.json +1 -1
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/METADATA +2 -2
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/RECORD +28 -26
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/LICENSE +0 -0
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/WHEEL +0 -0
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.848.1.dist-info → tccli-3.0.849.1.dist-info}/top_level.txt +0 -0
tccli/__init__.py
CHANGED
@@ -1 +1 @@
|
|
1
|
-
__version__ = '3.0.
|
1
|
+
__version__ = '3.0.849.1'
|
tccli/services/__init__.py
CHANGED
@@ -204,6 +204,15 @@
|
|
204
204
|
"required": false,
|
205
205
|
"type": "object",
|
206
206
|
"value_allowed_null": false
|
207
|
+
},
|
208
|
+
{
|
209
|
+
"document": "账号id",
|
210
|
+
"example": "无",
|
211
|
+
"member": "string",
|
212
|
+
"name": "Uin",
|
213
|
+
"required": false,
|
214
|
+
"type": "string",
|
215
|
+
"value_allowed_null": false
|
207
216
|
}
|
208
217
|
],
|
209
218
|
"usage": "out"
|
@@ -60,7 +60,7 @@
|
|
60
60
|
{
|
61
61
|
"document": "查询品牌列表",
|
62
62
|
"input": "POST / HTTP/1.1\nHost: bma.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeBPBrands\n<公共请求参数>\n\n{}",
|
63
|
-
"output": "{\n \"Response\": {\n \"Brands\": [\n {\n \"CompanyId\": 0,\n \"CompanyName\": \"
|
63
|
+
"output": "{\n \"Response\": {\n \"Brands\": [\n {\n \"Uin\": \"abc\",\n \"CompanyId\": 0,\n \"CompanyName\": \"abc\",\n \"BrandName\": \"abc\",\n \"Phone\": \"abc\",\n \"License\": \"abc\",\n \"LicenseStatus\": 0,\n \"LicenseNote\": \"abc\",\n \"Authorization\": \"abc\",\n \"AuthorizationStatus\": 0,\n \"AuthorizationNote\": \"abc\",\n \"Trademarks\": [\n {\n \"Trademark\": \"abc\",\n \"TrademarkStatus\": 0,\n \"TrademarkNote\": \"abc\",\n \"TrademarkId\": 0,\n \"Transfer\": \"abc\",\n \"TransferStatus\": 0,\n \"TransferNote\": \"abc\",\n \"TrademarkName\": \"abc\"\n }\n ],\n \"InsertTime\": \"abc\",\n \"Services\": {\n \"ProtectURLCount\": 0,\n \"ProtectURLExpireTime\": \"abc\",\n \"ProtectAPPCount\": 0,\n \"ProtectAPPExpireTime\": \"abc\",\n \"ProtectOfficialAccountCount\": 0,\n \"ProtectOfficialAccountExpireTime\": \"abc\",\n \"ProtectMiniProgramCount\": 0,\n \"ProtectMiniProgramExpireTime\": \"abc\",\n \"OfflineCount\": 0\n }\n }\n ],\n \"NoticeStatus\": 0,\n \"RequestId\": \"abc\"\n }\n}",
|
64
64
|
"title": "查询品牌列表"
|
65
65
|
}
|
66
66
|
],
|
tccli/services/cwp/cwp_client.py
CHANGED
@@ -69,7 +69,7 @@ def doDeleteTags(args, parsed_globals):
|
|
69
69
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
70
70
|
|
71
71
|
|
72
|
-
def
|
72
|
+
def doDescribeRiskDnsEventList(args, parsed_globals):
|
73
73
|
g_param = parse_global_arg(parsed_globals)
|
74
74
|
|
75
75
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -98,11 +98,11 @@ def doSwitchBashRules(args, parsed_globals):
|
|
98
98
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
99
99
|
client._sdkVersion += ("_CLI_" + __version__)
|
100
100
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
101
|
-
model = models.
|
101
|
+
model = models.DescribeRiskDnsEventListRequest()
|
102
102
|
model.from_json_string(json.dumps(args))
|
103
103
|
start_time = time.time()
|
104
104
|
while True:
|
105
|
-
rsp = client.
|
105
|
+
rsp = client.DescribeRiskDnsEventList(model)
|
106
106
|
result = rsp.to_json_string()
|
107
107
|
try:
|
108
108
|
json_obj = json.loads(result)
|
@@ -7973,6 +7973,58 @@ def doEditTags(args, parsed_globals):
|
|
7973
7973
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
7974
7974
|
|
7975
7975
|
|
7976
|
+
def doDescribeClientException(args, parsed_globals):
|
7977
|
+
g_param = parse_global_arg(parsed_globals)
|
7978
|
+
|
7979
|
+
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
7980
|
+
cred = credential.CVMRoleCredential()
|
7981
|
+
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
7982
|
+
cred = credential.STSAssumeRoleCredential(
|
7983
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
7984
|
+
g_param[OptionsDefine.RoleSessionName.replace('-', '_')]
|
7985
|
+
)
|
7986
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
7987
|
+
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
7988
|
+
else:
|
7989
|
+
cred = credential.Credential(
|
7990
|
+
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
7991
|
+
)
|
7992
|
+
http_profile = HttpProfile(
|
7993
|
+
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
7994
|
+
reqMethod="POST",
|
7995
|
+
endpoint=g_param[OptionsDefine.Endpoint],
|
7996
|
+
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
7997
|
+
)
|
7998
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
7999
|
+
if g_param[OptionsDefine.Language]:
|
8000
|
+
profile.language = g_param[OptionsDefine.Language]
|
8001
|
+
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
8002
|
+
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
8003
|
+
client._sdkVersion += ("_CLI_" + __version__)
|
8004
|
+
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
8005
|
+
model = models.DescribeClientExceptionRequest()
|
8006
|
+
model.from_json_string(json.dumps(args))
|
8007
|
+
start_time = time.time()
|
8008
|
+
while True:
|
8009
|
+
rsp = client.DescribeClientException(model)
|
8010
|
+
result = rsp.to_json_string()
|
8011
|
+
try:
|
8012
|
+
json_obj = json.loads(result)
|
8013
|
+
except TypeError as e:
|
8014
|
+
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
8015
|
+
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
8016
|
+
break
|
8017
|
+
cur_time = time.time()
|
8018
|
+
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
8019
|
+
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
8020
|
+
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
8021
|
+
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
8022
|
+
else:
|
8023
|
+
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
8024
|
+
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
8025
|
+
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
8026
|
+
|
8027
|
+
|
7976
8028
|
def doSeparateMalwares(args, parsed_globals):
|
7977
8029
|
g_param = parse_global_arg(parsed_globals)
|
7978
8030
|
|
@@ -12237,7 +12289,7 @@ def doDescribeWebPageServiceInfo(args, parsed_globals):
|
|
12237
12289
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
12238
12290
|
|
12239
12291
|
|
12240
|
-
def
|
12292
|
+
def doSwitchBashRules(args, parsed_globals):
|
12241
12293
|
g_param = parse_global_arg(parsed_globals)
|
12242
12294
|
|
12243
12295
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
@@ -12266,11 +12318,11 @@ def doDescribeClientException(args, parsed_globals):
|
|
12266
12318
|
client = mod.CwpClient(cred, g_param[OptionsDefine.Region], profile)
|
12267
12319
|
client._sdkVersion += ("_CLI_" + __version__)
|
12268
12320
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
12269
|
-
model = models.
|
12321
|
+
model = models.SwitchBashRulesRequest()
|
12270
12322
|
model.from_json_string(json.dumps(args))
|
12271
12323
|
start_time = time.time()
|
12272
12324
|
while True:
|
12273
|
-
rsp = client.
|
12325
|
+
rsp = client.SwitchBashRules(model)
|
12274
12326
|
result = rsp.to_json_string()
|
12275
12327
|
try:
|
12276
12328
|
json_obj = json.loads(result)
|
@@ -13653,7 +13705,7 @@ MODELS_MAP = {
|
|
13653
13705
|
|
13654
13706
|
ACTION_MAP = {
|
13655
13707
|
"DeleteTags": doDeleteTags,
|
13656
|
-
"
|
13708
|
+
"DescribeRiskDnsEventList": doDescribeRiskDnsEventList,
|
13657
13709
|
"TrustMalwares": doTrustMalwares,
|
13658
13710
|
"DeleteBaselineRule": doDeleteBaselineRule,
|
13659
13711
|
"DescribeAssetPortInfoList": doDescribeAssetPortInfoList,
|
@@ -13805,6 +13857,7 @@ ACTION_MAP = {
|
|
13805
13857
|
"ExportAssetWebServiceInfoList": doExportAssetWebServiceInfoList,
|
13806
13858
|
"DescribeAssetWebLocationInfo": doDescribeAssetWebLocationInfo,
|
13807
13859
|
"EditTags": doEditTags,
|
13860
|
+
"DescribeClientException": doDescribeClientException,
|
13808
13861
|
"SeparateMalwares": doSeparateMalwares,
|
13809
13862
|
"ModifyBaselineRuleIgnore": doModifyBaselineRuleIgnore,
|
13810
13863
|
"DescribeBaselineRule": doDescribeBaselineRule,
|
@@ -13887,7 +13940,7 @@ ACTION_MAP = {
|
|
13887
13940
|
"DescribeAssetWebLocationList": doDescribeAssetWebLocationList,
|
13888
13941
|
"DescribeAssetProcessInfoList": doDescribeAssetProcessInfoList,
|
13889
13942
|
"DescribeWebPageServiceInfo": doDescribeWebPageServiceInfo,
|
13890
|
-
"
|
13943
|
+
"SwitchBashRules": doSwitchBashRules,
|
13891
13944
|
"DescribeTags": doDescribeTags,
|
13892
13945
|
"DescribeBaselineBasicInfo": doDescribeBaselineBasicInfo,
|
13893
13946
|
"ExportBaselineWeakPasswordList": doExportBaselineWeakPasswordList,
|
@@ -1092,6 +1092,13 @@
|
|
1092
1092
|
"output": "DescribeReverseShellRulesResponse",
|
1093
1093
|
"status": "online"
|
1094
1094
|
},
|
1095
|
+
"DescribeRiskDnsEventList": {
|
1096
|
+
"document": "获取恶意请求事件列表",
|
1097
|
+
"input": "DescribeRiskDnsEventListRequest",
|
1098
|
+
"name": "获取恶意请求事件列表",
|
1099
|
+
"output": "DescribeRiskDnsEventListResponse",
|
1100
|
+
"status": "online"
|
1101
|
+
},
|
1095
1102
|
"DescribeRiskDnsList": {
|
1096
1103
|
"document": "入侵检测,获取恶意请求列表",
|
1097
1104
|
"input": "DescribeRiskDnsListRequest",
|
@@ -19665,6 +19672,87 @@
|
|
19665
19672
|
],
|
19666
19673
|
"type": "object"
|
19667
19674
|
},
|
19675
|
+
"DescribeRiskDnsEventListRequest": {
|
19676
|
+
"document": "DescribeRiskDnsEventList请求参数结构体",
|
19677
|
+
"members": [
|
19678
|
+
{
|
19679
|
+
"default": "",
|
19680
|
+
"document": "<li>IpOrName - String - 是否必填:否 - 主机Ip或别名筛选</li>\n<li>HostId - String - 是否必填:否 - 主机Id</li>\n<li>AgentId - String - 是否必填:否 - 客户端Id</li>\n<li>PolicyType - String - 是否必填:否 - 策略类型,0:系统策略1:用户自定义策略</li>\n<li>Domain - String - 是否必填:否 - 域名(先对域名做urlencode,再base64)</li>\n<li>HandleStatus - String - 是否必填:否 - 状态筛选0:待处理;2:信任;3:不信任</li>\n<li>BeginTime - String - 是否必填:否 - 最近访问开始时间</li>\n<li>EndTime - String - 是否必填:否 - 最近访问结束时间</li>",
|
19681
|
+
"example": "10",
|
19682
|
+
"member": "Filter",
|
19683
|
+
"name": "Filters",
|
19684
|
+
"required": false,
|
19685
|
+
"type": "list"
|
19686
|
+
},
|
19687
|
+
{
|
19688
|
+
"default": "",
|
19689
|
+
"document": "需要返回的数量,默认为10,最大值为100",
|
19690
|
+
"example": "0",
|
19691
|
+
"member": "int64",
|
19692
|
+
"name": "Limit",
|
19693
|
+
"required": false,
|
19694
|
+
"type": "int"
|
19695
|
+
},
|
19696
|
+
{
|
19697
|
+
"default": "",
|
19698
|
+
"document": "偏移量,默认为0。",
|
19699
|
+
"example": "[]",
|
19700
|
+
"member": "int64",
|
19701
|
+
"name": "Offset",
|
19702
|
+
"required": false,
|
19703
|
+
"type": "int"
|
19704
|
+
},
|
19705
|
+
{
|
19706
|
+
"default": "",
|
19707
|
+
"document": "排序方式:根据请求次数排序:[asc:升序|desc:降序]",
|
19708
|
+
"example": "asc",
|
19709
|
+
"member": "string",
|
19710
|
+
"name": "Order",
|
19711
|
+
"required": false,
|
19712
|
+
"type": "string"
|
19713
|
+
},
|
19714
|
+
{
|
19715
|
+
"default": "",
|
19716
|
+
"document": "排序字段:[AccessCount:请求次数|LastTime:最近请求时间]",
|
19717
|
+
"example": "AccessCount",
|
19718
|
+
"member": "string",
|
19719
|
+
"name": "By",
|
19720
|
+
"required": false,
|
19721
|
+
"type": "string"
|
19722
|
+
}
|
19723
|
+
],
|
19724
|
+
"type": "object"
|
19725
|
+
},
|
19726
|
+
"DescribeRiskDnsEventListResponse": {
|
19727
|
+
"document": "DescribeRiskDnsEventList返回参数结构体",
|
19728
|
+
"members": [
|
19729
|
+
{
|
19730
|
+
"document": "恶意请求事件列表\n注意:此字段可能返回 null,表示取不到有效值。",
|
19731
|
+
"example": "无",
|
19732
|
+
"member": "RiskDnsEvent",
|
19733
|
+
"name": "List",
|
19734
|
+
"required": true,
|
19735
|
+
"type": "list",
|
19736
|
+
"value_allowed_null": true
|
19737
|
+
},
|
19738
|
+
{
|
19739
|
+
"document": "总数",
|
19740
|
+
"example": "无",
|
19741
|
+
"member": "int64",
|
19742
|
+
"name": "TotalCount",
|
19743
|
+
"required": true,
|
19744
|
+
"type": "int",
|
19745
|
+
"value_allowed_null": false
|
19746
|
+
},
|
19747
|
+
{
|
19748
|
+
"document": "唯一请求 ID,每次请求都会返回。定位问题时需要提供该次请求的 RequestId。",
|
19749
|
+
"member": "string",
|
19750
|
+
"name": "RequestId",
|
19751
|
+
"type": "string"
|
19752
|
+
}
|
19753
|
+
],
|
19754
|
+
"type": "object"
|
19755
|
+
},
|
19668
19756
|
"DescribeRiskDnsListRequest": {
|
19669
19757
|
"document": "DescribeRiskDnsList请求参数结构体",
|
19670
19758
|
"members": [
|
@@ -29154,6 +29242,237 @@
|
|
29154
29242
|
],
|
29155
29243
|
"usage": "out"
|
29156
29244
|
},
|
29245
|
+
"RiskDnsEvent": {
|
29246
|
+
"document": "恶意请求事件",
|
29247
|
+
"members": [
|
29248
|
+
{
|
29249
|
+
"document": "事件Id",
|
29250
|
+
"example": "153",
|
29251
|
+
"member": "int64",
|
29252
|
+
"name": "Id",
|
29253
|
+
"required": false,
|
29254
|
+
"type": "int",
|
29255
|
+
"value_allowed_null": false
|
29256
|
+
},
|
29257
|
+
{
|
29258
|
+
"document": "策略ID",
|
29259
|
+
"example": "10000",
|
29260
|
+
"member": "int64",
|
29261
|
+
"name": "PolicyId",
|
29262
|
+
"required": false,
|
29263
|
+
"type": "int",
|
29264
|
+
"value_allowed_null": false
|
29265
|
+
},
|
29266
|
+
{
|
29267
|
+
"document": "命中策略类型[-1:未知|0系统|1:用户]",
|
29268
|
+
"example": "1",
|
29269
|
+
"member": "int64",
|
29270
|
+
"name": "PolicyType",
|
29271
|
+
"required": false,
|
29272
|
+
"type": "int",
|
29273
|
+
"value_allowed_null": false
|
29274
|
+
},
|
29275
|
+
{
|
29276
|
+
"document": "命中策略名称",
|
29277
|
+
"example": "test",
|
29278
|
+
"member": "string",
|
29279
|
+
"name": "PolicyName",
|
29280
|
+
"required": false,
|
29281
|
+
"type": "string",
|
29282
|
+
"value_allowed_null": false
|
29283
|
+
},
|
29284
|
+
{
|
29285
|
+
"document": "保护级别[0:基础版|1:专业版|2:旗舰版]",
|
29286
|
+
"example": "1",
|
29287
|
+
"member": "int64",
|
29288
|
+
"name": "ProtectLevel",
|
29289
|
+
"required": false,
|
29290
|
+
"type": "int",
|
29291
|
+
"value_allowed_null": false
|
29292
|
+
},
|
29293
|
+
{
|
29294
|
+
"document": "主机ID",
|
29295
|
+
"example": "d1f53e38-3f03-4a72-bf16-afa78ed698f2",
|
29296
|
+
"member": "string",
|
29297
|
+
"name": "HostId",
|
29298
|
+
"required": false,
|
29299
|
+
"type": "string",
|
29300
|
+
"value_allowed_null": false
|
29301
|
+
},
|
29302
|
+
{
|
29303
|
+
"document": "主机名称",
|
29304
|
+
"example": "test",
|
29305
|
+
"member": "string",
|
29306
|
+
"name": "HostName",
|
29307
|
+
"required": false,
|
29308
|
+
"type": "string",
|
29309
|
+
"value_allowed_null": false
|
29310
|
+
},
|
29311
|
+
{
|
29312
|
+
"document": "主机IP",
|
29313
|
+
"example": "10.0.0.1",
|
29314
|
+
"member": "string",
|
29315
|
+
"name": "HostIp",
|
29316
|
+
"required": false,
|
29317
|
+
"type": "string",
|
29318
|
+
"value_allowed_null": false
|
29319
|
+
},
|
29320
|
+
{
|
29321
|
+
"document": "外网IP",
|
29322
|
+
"example": "123.22.3.1",
|
29323
|
+
"member": "string",
|
29324
|
+
"name": "WanIp",
|
29325
|
+
"required": false,
|
29326
|
+
"type": "string",
|
29327
|
+
"value_allowed_null": false
|
29328
|
+
},
|
29329
|
+
{
|
29330
|
+
"document": "客户端ID",
|
29331
|
+
"example": "a1f53e38-3f03-4a72-bf16-afa78dd698f3",
|
29332
|
+
"member": "string",
|
29333
|
+
"name": "AgentId",
|
29334
|
+
"required": false,
|
29335
|
+
"type": "string",
|
29336
|
+
"value_allowed_null": false
|
29337
|
+
},
|
29338
|
+
{
|
29339
|
+
"document": "访问域名",
|
29340
|
+
"example": "re.r3r3.org",
|
29341
|
+
"member": "string",
|
29342
|
+
"name": "Domain",
|
29343
|
+
"required": false,
|
29344
|
+
"type": "string",
|
29345
|
+
"value_allowed_null": false
|
29346
|
+
},
|
29347
|
+
{
|
29348
|
+
"document": "标签特性",
|
29349
|
+
"example": "[\"vueir\",\"mle\"]",
|
29350
|
+
"member": "string",
|
29351
|
+
"name": "Tags",
|
29352
|
+
"required": false,
|
29353
|
+
"type": "list",
|
29354
|
+
"value_allowed_null": false
|
29355
|
+
},
|
29356
|
+
{
|
29357
|
+
"document": "访问次数",
|
29358
|
+
"example": "10",
|
29359
|
+
"member": "int64",
|
29360
|
+
"name": "AccessCount",
|
29361
|
+
"required": false,
|
29362
|
+
"type": "int",
|
29363
|
+
"value_allowed_null": false
|
29364
|
+
},
|
29365
|
+
{
|
29366
|
+
"document": "威胁描述",
|
29367
|
+
"example": "威胁描述",
|
29368
|
+
"member": "string",
|
29369
|
+
"name": "ThreatDesc",
|
29370
|
+
"required": false,
|
29371
|
+
"type": "string",
|
29372
|
+
"value_allowed_null": false
|
29373
|
+
},
|
29374
|
+
{
|
29375
|
+
"document": "修复方案",
|
29376
|
+
"example": "无",
|
29377
|
+
"member": "string",
|
29378
|
+
"name": "SuggestSolution",
|
29379
|
+
"required": false,
|
29380
|
+
"type": "string",
|
29381
|
+
"value_allowed_null": false
|
29382
|
+
},
|
29383
|
+
{
|
29384
|
+
"document": "参考链接",
|
29385
|
+
"example": "http://www.vxjump.net/files/virus_analysis/virut%20botnet%20anal",
|
29386
|
+
"member": "string",
|
29387
|
+
"name": "ReferenceLink",
|
29388
|
+
"required": false,
|
29389
|
+
"type": "string",
|
29390
|
+
"value_allowed_null": false
|
29391
|
+
},
|
29392
|
+
{
|
29393
|
+
"document": "处理状态;[0:待处理|2:已加白|3:非信任状态|4:已处理|5:已忽略]",
|
29394
|
+
"example": "1",
|
29395
|
+
"member": "int64",
|
29396
|
+
"name": "HandleStatus",
|
29397
|
+
"required": false,
|
29398
|
+
"type": "int",
|
29399
|
+
"value_allowed_null": false
|
29400
|
+
},
|
29401
|
+
{
|
29402
|
+
"document": "进程ID",
|
29403
|
+
"example": "1",
|
29404
|
+
"member": "int64",
|
29405
|
+
"name": "Pid",
|
29406
|
+
"required": false,
|
29407
|
+
"type": "int",
|
29408
|
+
"value_allowed_null": false
|
29409
|
+
},
|
29410
|
+
{
|
29411
|
+
"document": "进程名",
|
29412
|
+
"example": "pidname",
|
29413
|
+
"member": "string",
|
29414
|
+
"name": "ProcessName",
|
29415
|
+
"required": false,
|
29416
|
+
"type": "string",
|
29417
|
+
"value_allowed_null": false
|
29418
|
+
},
|
29419
|
+
{
|
29420
|
+
"document": "进程MD5",
|
29421
|
+
"example": "3c59dc048e8850243be8079a5c74d079",
|
29422
|
+
"member": "string",
|
29423
|
+
"name": "ProcessMd5",
|
29424
|
+
"required": false,
|
29425
|
+
"type": "string",
|
29426
|
+
"value_allowed_null": false
|
29427
|
+
},
|
29428
|
+
{
|
29429
|
+
"document": "命令行",
|
29430
|
+
"example": "cmd",
|
29431
|
+
"member": "string",
|
29432
|
+
"name": "CmdLine",
|
29433
|
+
"required": false,
|
29434
|
+
"type": "string",
|
29435
|
+
"value_allowed_null": false
|
29436
|
+
},
|
29437
|
+
{
|
29438
|
+
"document": "首次访问时间",
|
29439
|
+
"example": "2021-04-26 15:19:04",
|
29440
|
+
"member": "string",
|
29441
|
+
"name": "FirstTime",
|
29442
|
+
"required": false,
|
29443
|
+
"type": "string",
|
29444
|
+
"value_allowed_null": false
|
29445
|
+
},
|
29446
|
+
{
|
29447
|
+
"document": "最近访问时间",
|
29448
|
+
"example": "2022-07-15 11:27:01",
|
29449
|
+
"member": "string",
|
29450
|
+
"name": "LastTime",
|
29451
|
+
"required": false,
|
29452
|
+
"type": "string",
|
29453
|
+
"value_allowed_null": false
|
29454
|
+
},
|
29455
|
+
{
|
29456
|
+
"document": "主机在线状态[OFFLINE:离线|ONLINE:在线|UNKNOWN:未知]",
|
29457
|
+
"example": "ONLINE",
|
29458
|
+
"member": "string",
|
29459
|
+
"name": "HostStatus",
|
29460
|
+
"required": false,
|
29461
|
+
"type": "string",
|
29462
|
+
"value_allowed_null": false
|
29463
|
+
},
|
29464
|
+
{
|
29465
|
+
"document": "附加信息\n注意:此字段可能返回 null,表示取不到有效值。",
|
29466
|
+
"example": "无",
|
29467
|
+
"member": "MachineExtraInfo",
|
29468
|
+
"name": "MachineExtraInfo",
|
29469
|
+
"required": false,
|
29470
|
+
"type": "object",
|
29471
|
+
"value_allowed_null": true
|
29472
|
+
}
|
29473
|
+
],
|
29474
|
+
"usage": "out"
|
29475
|
+
},
|
29157
29476
|
"RiskDnsList": {
|
29158
29477
|
"document": "恶意请求列表",
|
29159
29478
|
"members": [
|
@@ -1260,6 +1260,14 @@
|
|
1260
1260
|
"title": "获取反弹Shell规则列表"
|
1261
1261
|
}
|
1262
1262
|
],
|
1263
|
+
"DescribeRiskDnsEventList": [
|
1264
|
+
{
|
1265
|
+
"document": "",
|
1266
|
+
"input": "POST / HTTP/1.1\nHost: cwp.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: DescribeRiskDnsEventList\n<公共请求参数>\n\n{}",
|
1267
|
+
"output": "{\n \"Response\": {\n \"List\": [\n {\n \"Id\": 10368,\n \"PolicyId\": 5000179,\n \"PolicyType\": 1,\n \"PolicyName\": \"v_llzlu拦截\",\n \"ProtectLevel\": 2,\n \"HostId\": \"02db9a21-78fe-4a4c-b96f-a11bf819a962\",\n \"HostName\": \"v_llzlu恶意请求\",\n \"HostIp\": \"192.168.111.28\",\n \"WanIp\": \"43.138.255.181\",\n \"HostStatus\": \"OFFLINE\",\n \"AgentId\": \"02db9a21-78fe-4a4c-b96f-a11bf819a962\",\n \"Domain\": \"183.60.95.201\",\n \"Tags\": [],\n \"AccessCount\": 1,\n \"ThreatDesc\": \"发现主机存在访问恶意IP/域名的行为,您的主机可能已经失陷。\\n恶意IP/域名可能是黑客的远控服务器、恶意软件下载源、矿池地址等。\",\n \"SuggestSolution\": \"1.检查恶意进程及非法端口,删除可疑的启动项和定时任务;\\n2.隔离或者删除相关的木马文件;\\n3.对系统进行风险排查,并进行安全加固,详情可参考如下链接: \\n【Linux】https://cloud.tencent.com/document/product/296/9604 \\n【Windows】https://cloud.tencent.com/document/product/296/9605\",\n \"ReferenceLink\": \"\",\n \"HandleStatus\": 6,\n \"Pid\": 1387042,\n \"ProcessName\": \"/usr/bin/ping\",\n \"ProcessMd5\": \"7f42e35e3065eaa9a58b89e249e8cbc7\",\n \"CmdLine\": \"ping 183.60.95.201 \",\n \"FirstTime\": \"2022-09-19 14:57:23\",\n \"LastTime\": \"2022-09-19 14:57:23\"\n }\n ],\n \"RequestId\": \"130e109f-a922-4d16-827d-b17a366125a2\",\n \"TotalCount\": 9989\n }\n}",
|
1268
|
+
"title": "获取恶意请求事件列表"
|
1269
|
+
}
|
1270
|
+
],
|
1263
1271
|
"DescribeRiskDnsList": [
|
1264
1272
|
{
|
1265
1273
|
"document": "入侵检测-获取恶意请求列表",
|
@@ -325,7 +325,7 @@
|
|
325
325
|
"DescribeForbiddenTablePro": {
|
326
326
|
"document": "本接口(DescribeForbiddenTablePro)用于获取被禁用的表属性列表",
|
327
327
|
"input": "DescribeForbiddenTableProRequest",
|
328
|
-
"name": "
|
328
|
+
"name": "获取被禁用的表属性列表(新)",
|
329
329
|
"output": "DescribeForbiddenTableProResponse",
|
330
330
|
"status": "online"
|
331
331
|
},
|
@@ -2350,7 +2350,7 @@
|
|
2350
2350
|
"type": "object"
|
2351
2351
|
},
|
2352
2352
|
{
|
2353
|
-
"document": "身份证件类型:\nID_CARD 身份证\nPASSPORT 护照\nHONGKONG_AND_MACAO
|
2353
|
+
"document": "身份证件类型:\nID_CARD 身份证\nPASSPORT 护照\nHONGKONG_AND_MACAO 中国香港\nFOREIGN_ID_CARD 境外身份\nHONGKONG_MACAO_AND_TAIWAN 中国台湾",
|
2354
2354
|
"example": "无",
|
2355
2355
|
"member": "string",
|
2356
2356
|
"name": "IdCardType",
|