| @@ 3532-3622 (lines=91) @@ | ||
| 3529 | cmd.add_element("copy", note_id) |
|
| 3530 | return self._send_xml_command(cmd) |
|
| 3531 | ||
| 3532 | def create_override( |
|
| 3533 | self, |
|
| 3534 | text: str, |
|
| 3535 | nvt_oid: str, |
|
| 3536 | *, |
|
| 3537 | days_active: Optional[int] = None, |
|
| 3538 | hosts: Optional[List[str]] = None, |
|
| 3539 | port: Optional[int] = None, |
|
| 3540 | result_id: Optional[str] = None, |
|
| 3541 | severity: Optional[Severity] = None, |
|
| 3542 | new_severity: Optional[Severity] = None, |
|
| 3543 | task_id: Optional[str] = None, |
|
| 3544 | threat: Optional[SeverityLevel] = None, |
|
| 3545 | new_threat: Optional[SeverityLevel] = None, |
|
| 3546 | ) -> Any: |
|
| 3547 | """Create a new override |
|
| 3548 | ||
| 3549 | Arguments: |
|
| 3550 | text: Text of the new override |
|
| 3551 | nvt_id: OID of the nvt to which override applies |
|
| 3552 | days_active: Days override will be active. -1 on always, 0 off |
|
| 3553 | hosts: A list of host addresses |
|
| 3554 | port: Port to which the override applies |
|
| 3555 | result_id: UUID of a result to which override applies |
|
| 3556 | severity: Severity to which override applies |
|
| 3557 | new_severity: New severity for result |
|
| 3558 | task_id: UUID of task to which override applies |
|
| 3559 | threat: Severity level to which override applies. Will be converted |
|
| 3560 | to severity. |
|
| 3561 | new_threat: New severity level for results. Will be converted to |
|
| 3562 | new_severity. |
|
| 3563 | ||
| 3564 | Returns: |
|
| 3565 | The response. See :py:meth:`send_command` for details. |
|
| 3566 | """ |
|
| 3567 | if not text: |
|
| 3568 | raise RequiredArgument( |
|
| 3569 | function=self.create_override.__name__, argument='text' |
|
| 3570 | ) |
|
| 3571 | ||
| 3572 | if not nvt_oid: |
|
| 3573 | raise RequiredArgument( |
|
| 3574 | function=self.create_override.__name__, argument='nvt_oid' |
|
| 3575 | ) |
|
| 3576 | ||
| 3577 | cmd = XmlCommand("create_override") |
|
| 3578 | cmd.add_element("text", text) |
|
| 3579 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
| 3580 | ||
| 3581 | if days_active is not None: |
|
| 3582 | cmd.add_element("active", str(days_active)) |
|
| 3583 | ||
| 3584 | if hosts: |
|
| 3585 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 3586 | ||
| 3587 | if port: |
|
| 3588 | cmd.add_element("port", str(port)) |
|
| 3589 | ||
| 3590 | if result_id: |
|
| 3591 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 3592 | ||
| 3593 | if severity: |
|
| 3594 | cmd.add_element("severity", str(severity)) |
|
| 3595 | ||
| 3596 | if new_severity: |
|
| 3597 | cmd.add_element("new_severity", str(new_severity)) |
|
| 3598 | ||
| 3599 | if task_id: |
|
| 3600 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 3601 | ||
| 3602 | if threat is not None: |
|
| 3603 | if not isinstance(threat, SeverityLevel): |
|
| 3604 | raise InvalidArgumentType( |
|
| 3605 | function=self.create_override.__name__, |
|
| 3606 | argument="threat", |
|
| 3607 | arg_type=SeverityLevel.__name__, |
|
| 3608 | ) |
|
| 3609 | ||
| 3610 | cmd.add_element("threat", threat.value) |
|
| 3611 | ||
| 3612 | if new_threat is not None: |
|
| 3613 | if not isinstance(new_threat, SeverityLevel): |
|
| 3614 | raise InvalidArgumentType( |
|
| 3615 | function=self.create_override.__name__, |
|
| 3616 | argument="new_threat", |
|
| 3617 | arg_type=SeverityLevel.__name__, |
|
| 3618 | ) |
|
| 3619 | ||
| 3620 | cmd.add_element("new_threat", new_threat.value) |
|
| 3621 | ||
| 3622 | return self._send_xml_command(cmd) |
|
| 3623 | ||
| 3624 | def clone_override(self, override_id: str) -> Any: |
|
| 3625 | """Clone an existing override |
|
| @@ 6456-6545 (lines=90) @@ | ||
| 6453 | ||
| 6454 | return self._send_xml_command(cmd) |
|
| 6455 | ||
| 6456 | def modify_override( |
|
| 6457 | self, |
|
| 6458 | override_id: str, |
|
| 6459 | text: str, |
|
| 6460 | *, |
|
| 6461 | days_active: Optional[int] = None, |
|
| 6462 | hosts: Optional[List[str]] = None, |
|
| 6463 | port: Optional[int] = None, |
|
| 6464 | result_id: Optional[str] = None, |
|
| 6465 | severity: Optional[Severity] = None, |
|
| 6466 | new_severity: Optional[Severity] = None, |
|
| 6467 | task_id: Optional[str] = None, |
|
| 6468 | threat: Optional[SeverityLevel] = None, |
|
| 6469 | new_threat: Optional[SeverityLevel] = None, |
|
| 6470 | ) -> Any: |
|
| 6471 | """Modifies an existing override. |
|
| 6472 | ||
| 6473 | Arguments: |
|
| 6474 | override_id: UUID of override to modify. |
|
| 6475 | text: The text of the override. |
|
| 6476 | days_active: Days override will be active. -1 on always, |
|
| 6477 | 0 off. |
|
| 6478 | hosts: A list of host addresses |
|
| 6479 | port: Port to which override applies. |
|
| 6480 | result_id: Result to which override applies. |
|
| 6481 | severity: Severity to which override applies. |
|
| 6482 | new_severity: New severity score for result. |
|
| 6483 | task_id: Task to which override applies. |
|
| 6484 | threat: Threat level to which override applies. |
|
| 6485 | Will be converted to severity. |
|
| 6486 | new_threat: New threat level for results. Will be converted to |
|
| 6487 | new_severity. |
|
| 6488 | ||
| 6489 | Returns: |
|
| 6490 | The response. See :py:meth:`send_command` for details. |
|
| 6491 | """ |
|
| 6492 | if not override_id: |
|
| 6493 | raise RequiredArgument( |
|
| 6494 | function=self.modify_override.__name__, argument='override_id' |
|
| 6495 | ) |
|
| 6496 | if not text: |
|
| 6497 | raise RequiredArgument( |
|
| 6498 | function=self.modify_override.__name__, argument='text' |
|
| 6499 | ) |
|
| 6500 | ||
| 6501 | cmd = XmlCommand("modify_override") |
|
| 6502 | cmd.set_attribute("override_id", override_id) |
|
| 6503 | cmd.add_element("text", text) |
|
| 6504 | ||
| 6505 | if days_active is not None: |
|
| 6506 | cmd.add_element("active", str(days_active)) |
|
| 6507 | ||
| 6508 | if hosts: |
|
| 6509 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 6510 | ||
| 6511 | if port: |
|
| 6512 | cmd.add_element("port", str(port)) |
|
| 6513 | ||
| 6514 | if result_id: |
|
| 6515 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 6516 | ||
| 6517 | if severity: |
|
| 6518 | cmd.add_element("severity", str(severity)) |
|
| 6519 | ||
| 6520 | if new_severity: |
|
| 6521 | cmd.add_element("new_severity", str(new_severity)) |
|
| 6522 | ||
| 6523 | if task_id: |
|
| 6524 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 6525 | ||
| 6526 | if threat is not None: |
|
| 6527 | if not isinstance(threat, SeverityLevel): |
|
| 6528 | raise InvalidArgumentType( |
|
| 6529 | function=self.modify_override.__name__, |
|
| 6530 | argument='threat', |
|
| 6531 | arg_type=SeverityLevel.__name__, |
|
| 6532 | ) |
|
| 6533 | cmd.add_element("threat", threat.value) |
|
| 6534 | ||
| 6535 | if new_threat is not None: |
|
| 6536 | if not isinstance(new_threat, SeverityLevel): |
|
| 6537 | raise InvalidArgumentType( |
|
| 6538 | function=self.modify_override.__name__, |
|
| 6539 | argument='new_threat', |
|
| 6540 | arg_type=SeverityLevel.__name__, |
|
| 6541 | ) |
|
| 6542 | ||
| 6543 | cmd.add_element("new_threat", new_threat.value) |
|
| 6544 | ||
| 6545 | return self._send_xml_command(cmd) |
|
| 6546 | ||
| 6547 | def modify_port_list( |
|
| 6548 | self, |
|
| @@ 983-1073 (lines=91) @@ | ||
| 980 | cmd.add_element("copy", note_id) |
|
| 981 | return self._send_xml_command(cmd) |
|
| 982 | ||
| 983 | def create_override( |
|
| 984 | self, |
|
| 985 | text: str, |
|
| 986 | nvt_oid: str, |
|
| 987 | *, |
|
| 988 | days_active: Optional[int] = None, |
|
| 989 | hosts: Optional[List[str]] = None, |
|
| 990 | port: Optional[int] = None, |
|
| 991 | result_id: Optional[str] = None, |
|
| 992 | severity: Optional[Severity] = None, |
|
| 993 | new_severity: Optional[Severity] = None, |
|
| 994 | task_id: Optional[str] = None, |
|
| 995 | threat: Optional[SeverityLevel] = None, |
|
| 996 | new_threat: Optional[SeverityLevel] = None, |
|
| 997 | ) -> Any: |
|
| 998 | """Create a new override |
|
| 999 | ||
| 1000 | Arguments: |
|
| 1001 | text: Text of the new override |
|
| 1002 | nvt_id: OID of the nvt to which override applies |
|
| 1003 | days_active: Days override will be active. -1 on always, 0 off |
|
| 1004 | hosts: A list of host addresses |
|
| 1005 | port: Port to which the override applies |
|
| 1006 | result_id: UUID of a result to which override applies |
|
| 1007 | severity: Severity to which override applies |
|
| 1008 | new_severity: New severity for result |
|
| 1009 | task_id: UUID of task to which override applies |
|
| 1010 | threat: Severity level to which override applies. Will be converted |
|
| 1011 | to severity. |
|
| 1012 | new_threat: New severity level for results. Will be converted to |
|
| 1013 | new_severity. |
|
| 1014 | ||
| 1015 | Returns: |
|
| 1016 | The response. See :py:meth:`send_command` for details. |
|
| 1017 | """ |
|
| 1018 | if not text: |
|
| 1019 | raise RequiredArgument( |
|
| 1020 | function=self.create_override.__name__, argument='text' |
|
| 1021 | ) |
|
| 1022 | ||
| 1023 | if not nvt_oid: |
|
| 1024 | raise RequiredArgument( |
|
| 1025 | function=self.create_override.__name__, argument='nvt_oid' |
|
| 1026 | ) |
|
| 1027 | ||
| 1028 | cmd = XmlCommand("create_override") |
|
| 1029 | cmd.add_element("text", text) |
|
| 1030 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
| 1031 | ||
| 1032 | if days_active is not None: |
|
| 1033 | cmd.add_element("active", str(days_active)) |
|
| 1034 | ||
| 1035 | if hosts: |
|
| 1036 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 1037 | ||
| 1038 | if port: |
|
| 1039 | cmd.add_element("port", str(port)) |
|
| 1040 | ||
| 1041 | if result_id: |
|
| 1042 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 1043 | ||
| 1044 | if severity: |
|
| 1045 | cmd.add_element("severity", str(severity)) |
|
| 1046 | ||
| 1047 | if new_severity: |
|
| 1048 | cmd.add_element("new_severity", str(new_severity)) |
|
| 1049 | ||
| 1050 | if task_id: |
|
| 1051 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 1052 | ||
| 1053 | if threat is not None: |
|
| 1054 | if not isinstance(threat, SeverityLevel): |
|
| 1055 | raise InvalidArgumentType( |
|
| 1056 | function=self.create_override.__name__, |
|
| 1057 | argument="threat", |
|
| 1058 | arg_type=SeverityLevel.__name__, |
|
| 1059 | ) |
|
| 1060 | ||
| 1061 | cmd.add_element("threat", threat.value) |
|
| 1062 | ||
| 1063 | if new_threat is not None: |
|
| 1064 | if not isinstance(new_threat, SeverityLevel): |
|
| 1065 | raise InvalidArgumentType( |
|
| 1066 | function=self.create_override.__name__, |
|
| 1067 | argument="new_threat", |
|
| 1068 | arg_type=SeverityLevel.__name__, |
|
| 1069 | ) |
|
| 1070 | ||
| 1071 | cmd.add_element("new_threat", new_threat.value) |
|
| 1072 | ||
| 1073 | return self._send_xml_command(cmd) |
|
| 1074 | ||
| 1075 | def clone_override(self, override_id: str) -> Any: |
|
| 1076 | """Clone an existing override |
|
| @@ 5175-5264 (lines=90) @@ | ||
| 5172 | ||
| 5173 | return self._send_xml_command(cmd) |
|
| 5174 | ||
| 5175 | def modify_override( |
|
| 5176 | self, |
|
| 5177 | override_id: str, |
|
| 5178 | text: str, |
|
| 5179 | *, |
|
| 5180 | days_active: Optional[int] = None, |
|
| 5181 | hosts: Optional[List[str]] = None, |
|
| 5182 | port: Optional[int] = None, |
|
| 5183 | result_id: Optional[str] = None, |
|
| 5184 | severity: Optional[Severity] = None, |
|
| 5185 | new_severity: Optional[Severity] = None, |
|
| 5186 | task_id: Optional[str] = None, |
|
| 5187 | threat: Optional[SeverityLevel] = None, |
|
| 5188 | new_threat: Optional[SeverityLevel] = None, |
|
| 5189 | ) -> Any: |
|
| 5190 | """Modifies an existing override. |
|
| 5191 | ||
| 5192 | Arguments: |
|
| 5193 | override_id: UUID of override to modify. |
|
| 5194 | text: The text of the override. |
|
| 5195 | days_active: Days override will be active. -1 on always, |
|
| 5196 | 0 off. |
|
| 5197 | hosts: A list of host addresses |
|
| 5198 | port: Port to which override applies. |
|
| 5199 | result_id: Result to which override applies. |
|
| 5200 | severity: Severity to which override applies. |
|
| 5201 | new_severity: New severity score for result. |
|
| 5202 | task_id: Task to which override applies. |
|
| 5203 | threat: Threat level to which override applies. |
|
| 5204 | Will be converted to severity. |
|
| 5205 | new_threat: New threat level for results. Will be converted to |
|
| 5206 | new_severity. |
|
| 5207 | ||
| 5208 | Returns: |
|
| 5209 | The response. See :py:meth:`send_command` for details. |
|
| 5210 | """ |
|
| 5211 | if not override_id: |
|
| 5212 | raise RequiredArgument( |
|
| 5213 | function=self.modify_override.__name__, argument='override_id' |
|
| 5214 | ) |
|
| 5215 | if not text: |
|
| 5216 | raise RequiredArgument( |
|
| 5217 | function=self.modify_override.__name__, argument='text' |
|
| 5218 | ) |
|
| 5219 | ||
| 5220 | cmd = XmlCommand("modify_override") |
|
| 5221 | cmd.set_attribute("override_id", override_id) |
|
| 5222 | cmd.add_element("text", text) |
|
| 5223 | ||
| 5224 | if days_active is not None: |
|
| 5225 | cmd.add_element("active", str(days_active)) |
|
| 5226 | ||
| 5227 | if hosts: |
|
| 5228 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 5229 | ||
| 5230 | if port: |
|
| 5231 | cmd.add_element("port", str(port)) |
|
| 5232 | ||
| 5233 | if result_id: |
|
| 5234 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 5235 | ||
| 5236 | if severity: |
|
| 5237 | cmd.add_element("severity", str(severity)) |
|
| 5238 | ||
| 5239 | if new_severity: |
|
| 5240 | cmd.add_element("new_severity", str(new_severity)) |
|
| 5241 | ||
| 5242 | if task_id: |
|
| 5243 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 5244 | ||
| 5245 | if threat is not None: |
|
| 5246 | if not isinstance(threat, SeverityLevel): |
|
| 5247 | raise InvalidArgumentType( |
|
| 5248 | function=self.modify_override.__name__, |
|
| 5249 | argument='threat', |
|
| 5250 | arg_type=SeverityLevel.__name__, |
|
| 5251 | ) |
|
| 5252 | cmd.add_element("threat", threat.value) |
|
| 5253 | ||
| 5254 | if new_threat is not None: |
|
| 5255 | if not isinstance(new_threat, SeverityLevel): |
|
| 5256 | raise InvalidArgumentType( |
|
| 5257 | function=self.modify_override.__name__, |
|
| 5258 | argument='new_threat', |
|
| 5259 | arg_type=SeverityLevel.__name__, |
|
| 5260 | ) |
|
| 5261 | ||
| 5262 | cmd.add_element("new_threat", new_threat.value) |
|
| 5263 | ||
| 5264 | return self._send_xml_command(cmd) |
|
| 5265 | ||
| 5266 | def modify_permission( |
|
| 5267 | self, |
|