| @@ 302-390 (lines=89) @@ | ||
| 299 | ||
| 300 | return self._send_xml_command(cmd) |
|
| 301 | ||
| 302 | def modify_override( |
|
| 303 | self, |
|
| 304 | override_id: str, |
|
| 305 | text: str, |
|
| 306 | *, |
|
| 307 | days_active: Optional[int] = None, |
|
| 308 | hosts: Optional[List[str]] = None, |
|
| 309 | port: Optional[int] = None, |
|
| 310 | result_id: Optional[str] = None, |
|
| 311 | severity: Optional[Severity] = None, |
|
| 312 | new_severity: Optional[Severity] = None, |
|
| 313 | task_id: Optional[str] = None, |
|
| 314 | threat: Optional[SeverityLevel] = None, |
|
| 315 | new_threat: Optional[SeverityLevel] = None |
|
| 316 | ) -> Any: |
|
| 317 | """Modifies an existing override. |
|
| 318 | ||
| 319 | Arguments: |
|
| 320 | override_id: UUID of override to modify. |
|
| 321 | text: The text of the override. |
|
| 322 | days_active: Days override will be active. -1 on always, |
|
| 323 | 0 off. |
|
| 324 | hosts: A list of host addresses |
|
| 325 | port: Port to which override applies. |
|
| 326 | result_id: Result to which override applies. |
|
| 327 | severity: Severity to which override applies. |
|
| 328 | new_severity: New severity score for result. |
|
| 329 | task_id: Task to which override applies. |
|
| 330 | threat: Threat level to which override applies. |
|
| 331 | Will be converted to severity. |
|
| 332 | new_threat: New threat level for results. Will be converted to |
|
| 333 | new_severity. |
|
| 334 | ||
| 335 | Returns: |
|
| 336 | The response. See :py:meth:`send_command` for details. |
|
| 337 | """ |
|
| 338 | if not override_id: |
|
| 339 | raise RequiredArgument( |
|
| 340 | function=self.modify_override.__name__, argument='override_id' |
|
| 341 | ) |
|
| 342 | if not text: |
|
| 343 | raise RequiredArgument( |
|
| 344 | function=self.modify_override.__name__, argument='text' |
|
| 345 | ) |
|
| 346 | ||
| 347 | cmd = XmlCommand("modify_override") |
|
| 348 | cmd.set_attribute("override_id", override_id) |
|
| 349 | cmd.add_element("text", text) |
|
| 350 | ||
| 351 | if days_active is not None: |
|
| 352 | cmd.add_element("active", str(days_active)) |
|
| 353 | ||
| 354 | if hosts: |
|
| 355 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 356 | ||
| 357 | if port: |
|
| 358 | cmd.add_element("port", str(port)) |
|
| 359 | ||
| 360 | if result_id: |
|
| 361 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 362 | ||
| 363 | if severity: |
|
| 364 | cmd.add_element("severity", str(severity)) |
|
| 365 | ||
| 366 | if new_severity: |
|
| 367 | cmd.add_element("new_severity", str(new_severity)) |
|
| 368 | ||
| 369 | if task_id: |
|
| 370 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 371 | ||
| 372 | if threat is not None: |
|
| 373 | deprecation( |
|
| 374 | "The threat parameter has been removed in GMP" |
|
| 375 | " version {}{}".format( |
|
| 376 | self.get_protocol_version()[0], |
|
| 377 | self.get_protocol_version()[1], |
|
| 378 | ) |
|
| 379 | ) |
|
| 380 | ||
| 381 | if new_threat is not None: |
|
| 382 | deprecation( |
|
| 383 | "The new_threat parameter has been removed in GMP" |
|
| 384 | " version {}{}".format( |
|
| 385 | self.get_protocol_version()[0], |
|
| 386 | self.get_protocol_version()[1], |
|
| 387 | ) |
|
| 388 | ) |
|
| 389 | ||
| 390 | return self._send_xml_command(cmd) |
|
| 391 | ||
| @@ 139-227 (lines=89) @@ | ||
| 136 | ||
| 137 | return self._send_xml_command(cmd) |
|
| 138 | ||
| 139 | def create_override( |
|
| 140 | self, |
|
| 141 | text: str, |
|
| 142 | nvt_oid: str, |
|
| 143 | *, |
|
| 144 | days_active: Optional[int] = None, |
|
| 145 | hosts: Optional[List[str]] = None, |
|
| 146 | port: Optional[int] = None, |
|
| 147 | result_id: Optional[str] = None, |
|
| 148 | severity: Optional[Severity] = None, |
|
| 149 | new_severity: Optional[Severity] = None, |
|
| 150 | task_id: Optional[str] = None, |
|
| 151 | threat: Optional[SeverityLevel] = None, |
|
| 152 | new_threat: Optional[SeverityLevel] = None |
|
| 153 | ) -> Any: |
|
| 154 | """Create a new override |
|
| 155 | ||
| 156 | Arguments: |
|
| 157 | text: Text of the new override |
|
| 158 | nvt_id: OID of the nvt to which override applies |
|
| 159 | days_active: Days override will be active. -1 on always, 0 off |
|
| 160 | hosts: A list of host addresses |
|
| 161 | port: Port to which the override applies |
|
| 162 | result_id: UUID of a result to which override applies |
|
| 163 | severity: Severity to which override applies |
|
| 164 | new_severity: New severity for result |
|
| 165 | task_id: UUID of task to which override applies |
|
| 166 | threat: Severity level to which override applies. Will be converted |
|
| 167 | to severity. |
|
| 168 | new_threat: New severity level for results. Will be converted to |
|
| 169 | new_severity. |
|
| 170 | ||
| 171 | Returns: |
|
| 172 | The response. See :py:meth:`send_command` for details. |
|
| 173 | """ |
|
| 174 | if not text: |
|
| 175 | raise RequiredArgument( |
|
| 176 | function=self.create_override.__name__, argument='text' |
|
| 177 | ) |
|
| 178 | ||
| 179 | if not nvt_oid: |
|
| 180 | raise RequiredArgument( |
|
| 181 | function=self.create_override.__name__, argument='nvt_oid' |
|
| 182 | ) |
|
| 183 | ||
| 184 | cmd = XmlCommand("create_override") |
|
| 185 | cmd.add_element("text", text) |
|
| 186 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
| 187 | ||
| 188 | if days_active is not None: |
|
| 189 | cmd.add_element("active", str(days_active)) |
|
| 190 | ||
| 191 | if hosts: |
|
| 192 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 193 | ||
| 194 | if port: |
|
| 195 | cmd.add_element("port", str(port)) |
|
| 196 | ||
| 197 | if result_id: |
|
| 198 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 199 | ||
| 200 | if severity: |
|
| 201 | cmd.add_element("severity", str(severity)) |
|
| 202 | ||
| 203 | if new_severity: |
|
| 204 | cmd.add_element("new_severity", str(new_severity)) |
|
| 205 | ||
| 206 | if task_id: |
|
| 207 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 208 | ||
| 209 | if threat is not None: |
|
| 210 | deprecation( |
|
| 211 | "The threat parameter has been removed in GMP" |
|
| 212 | " version {}{}".format( |
|
| 213 | self.get_protocol_version()[0], |
|
| 214 | self.get_protocol_version()[1], |
|
| 215 | ) |
|
| 216 | ) |
|
| 217 | ||
| 218 | if new_threat is not None: |
|
| 219 | deprecation( |
|
| 220 | "The new_threat parameter has been removed in GMP" |
|
| 221 | " version {}{}".format( |
|
| 222 | self.get_protocol_version()[0], |
|
| 223 | self.get_protocol_version()[1], |
|
| 224 | ) |
|
| 225 | ) |
|
| 226 | ||
| 227 | return self._send_xml_command(cmd) |
|
| 228 | ||
| 229 | def modify_note( |
|
| 230 | self, |
|