@@ 983-1073 (lines=91) @@ | ||
980 | cmd.add_element("copy", note_id) |
|
981 | return self._send_xml_command(cmd) |
|
982 | ||
983 | def create_override( |
|
984 | self, |
|
985 | text: str, |
|
986 | nvt_oid: str, |
|
987 | *, |
|
988 | days_active: Optional[int] = None, |
|
989 | hosts: Optional[List[str]] = None, |
|
990 | port: Optional[int] = None, |
|
991 | result_id: Optional[str] = None, |
|
992 | severity: Optional[Severity] = None, |
|
993 | new_severity: Optional[Severity] = None, |
|
994 | task_id: Optional[str] = None, |
|
995 | threat: Optional[SeverityLevel] = None, |
|
996 | new_threat: Optional[SeverityLevel] = None, |
|
997 | ) -> Any: |
|
998 | """Create a new override |
|
999 | ||
1000 | Arguments: |
|
1001 | text: Text of the new override |
|
1002 | nvt_id: OID of the nvt to which override applies |
|
1003 | days_active: Days override will be active. -1 on always, 0 off |
|
1004 | hosts: A list of host addresses |
|
1005 | port: Port to which the override applies |
|
1006 | result_id: UUID of a result to which override applies |
|
1007 | severity: Severity to which override applies |
|
1008 | new_severity: New severity for result |
|
1009 | task_id: UUID of task to which override applies |
|
1010 | threat: Severity level to which override applies. Will be converted |
|
1011 | to severity. |
|
1012 | new_threat: New severity level for results. Will be converted to |
|
1013 | new_severity. |
|
1014 | ||
1015 | Returns: |
|
1016 | The response. See :py:meth:`send_command` for details. |
|
1017 | """ |
|
1018 | if not text: |
|
1019 | raise RequiredArgument( |
|
1020 | function=self.create_override.__name__, argument='text' |
|
1021 | ) |
|
1022 | ||
1023 | if not nvt_oid: |
|
1024 | raise RequiredArgument( |
|
1025 | function=self.create_override.__name__, argument='nvt_oid' |
|
1026 | ) |
|
1027 | ||
1028 | cmd = XmlCommand("create_override") |
|
1029 | cmd.add_element("text", text) |
|
1030 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
1031 | ||
1032 | if days_active is not None: |
|
1033 | cmd.add_element("active", str(days_active)) |
|
1034 | ||
1035 | if hosts: |
|
1036 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
1037 | ||
1038 | if port: |
|
1039 | cmd.add_element("port", str(port)) |
|
1040 | ||
1041 | if result_id: |
|
1042 | cmd.add_element("result", attrs={"id": result_id}) |
|
1043 | ||
1044 | if severity: |
|
1045 | cmd.add_element("severity", str(severity)) |
|
1046 | ||
1047 | if new_severity: |
|
1048 | cmd.add_element("new_severity", str(new_severity)) |
|
1049 | ||
1050 | if task_id: |
|
1051 | cmd.add_element("task", attrs={"id": task_id}) |
|
1052 | ||
1053 | if threat is not None: |
|
1054 | if not isinstance(threat, SeverityLevel): |
|
1055 | raise InvalidArgumentType( |
|
1056 | function=self.create_override.__name__, |
|
1057 | argument="threat", |
|
1058 | arg_type=SeverityLevel.__name__, |
|
1059 | ) |
|
1060 | ||
1061 | cmd.add_element("threat", threat.value) |
|
1062 | ||
1063 | if new_threat is not None: |
|
1064 | if not isinstance(new_threat, SeverityLevel): |
|
1065 | raise InvalidArgumentType( |
|
1066 | function=self.create_override.__name__, |
|
1067 | argument="new_threat", |
|
1068 | arg_type=SeverityLevel.__name__, |
|
1069 | ) |
|
1070 | ||
1071 | cmd.add_element("new_threat", new_threat.value) |
|
1072 | ||
1073 | return self._send_xml_command(cmd) |
|
1074 | ||
1075 | def clone_override(self, override_id: str) -> Any: |
|
1076 | """Clone an existing override |
|
@@ 5175-5264 (lines=90) @@ | ||
5172 | ||
5173 | return self._send_xml_command(cmd) |
|
5174 | ||
5175 | def modify_override( |
|
5176 | self, |
|
5177 | override_id: str, |
|
5178 | text: str, |
|
5179 | *, |
|
5180 | days_active: Optional[int] = None, |
|
5181 | hosts: Optional[List[str]] = None, |
|
5182 | port: Optional[int] = None, |
|
5183 | result_id: Optional[str] = None, |
|
5184 | severity: Optional[Severity] = None, |
|
5185 | new_severity: Optional[Severity] = None, |
|
5186 | task_id: Optional[str] = None, |
|
5187 | threat: Optional[SeverityLevel] = None, |
|
5188 | new_threat: Optional[SeverityLevel] = None, |
|
5189 | ) -> Any: |
|
5190 | """Modifies an existing override. |
|
5191 | ||
5192 | Arguments: |
|
5193 | override_id: UUID of override to modify. |
|
5194 | text: The text of the override. |
|
5195 | days_active: Days override will be active. -1 on always, |
|
5196 | 0 off. |
|
5197 | hosts: A list of host addresses |
|
5198 | port: Port to which override applies. |
|
5199 | result_id: Result to which override applies. |
|
5200 | severity: Severity to which override applies. |
|
5201 | new_severity: New severity score for result. |
|
5202 | task_id: Task to which override applies. |
|
5203 | threat: Threat level to which override applies. |
|
5204 | Will be converted to severity. |
|
5205 | new_threat: New threat level for results. Will be converted to |
|
5206 | new_severity. |
|
5207 | ||
5208 | Returns: |
|
5209 | The response. See :py:meth:`send_command` for details. |
|
5210 | """ |
|
5211 | if not override_id: |
|
5212 | raise RequiredArgument( |
|
5213 | function=self.modify_override.__name__, argument='override_id' |
|
5214 | ) |
|
5215 | if not text: |
|
5216 | raise RequiredArgument( |
|
5217 | function=self.modify_override.__name__, argument='text' |
|
5218 | ) |
|
5219 | ||
5220 | cmd = XmlCommand("modify_override") |
|
5221 | cmd.set_attribute("override_id", override_id) |
|
5222 | cmd.add_element("text", text) |
|
5223 | ||
5224 | if days_active is not None: |
|
5225 | cmd.add_element("active", str(days_active)) |
|
5226 | ||
5227 | if hosts: |
|
5228 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
5229 | ||
5230 | if port: |
|
5231 | cmd.add_element("port", str(port)) |
|
5232 | ||
5233 | if result_id: |
|
5234 | cmd.add_element("result", attrs={"id": result_id}) |
|
5235 | ||
5236 | if severity: |
|
5237 | cmd.add_element("severity", str(severity)) |
|
5238 | ||
5239 | if new_severity: |
|
5240 | cmd.add_element("new_severity", str(new_severity)) |
|
5241 | ||
5242 | if task_id: |
|
5243 | cmd.add_element("task", attrs={"id": task_id}) |
|
5244 | ||
5245 | if threat is not None: |
|
5246 | if not isinstance(threat, SeverityLevel): |
|
5247 | raise InvalidArgumentType( |
|
5248 | function=self.modify_override.__name__, |
|
5249 | argument='threat', |
|
5250 | arg_type=SeverityLevel.__name__, |
|
5251 | ) |
|
5252 | cmd.add_element("threat", threat.value) |
|
5253 | ||
5254 | if new_threat is not None: |
|
5255 | if not isinstance(new_threat, SeverityLevel): |
|
5256 | raise InvalidArgumentType( |
|
5257 | function=self.modify_override.__name__, |
|
5258 | argument='new_threat', |
|
5259 | arg_type=SeverityLevel.__name__, |
|
5260 | ) |
|
5261 | ||
5262 | cmd.add_element("new_threat", new_threat.value) |
|
5263 | ||
5264 | return self._send_xml_command(cmd) |
|
5265 | ||
5266 | def modify_permission( |
|
5267 | self, |
@@ 3564-3654 (lines=91) @@ | ||
3561 | cmd.add_element("copy", note_id) |
|
3562 | return self._send_xml_command(cmd) |
|
3563 | ||
3564 | def create_override( |
|
3565 | self, |
|
3566 | text: str, |
|
3567 | nvt_oid: str, |
|
3568 | *, |
|
3569 | days_active: Optional[int] = None, |
|
3570 | hosts: Optional[List[str]] = None, |
|
3571 | port: Optional[int] = None, |
|
3572 | result_id: Optional[str] = None, |
|
3573 | severity: Optional[Severity] = None, |
|
3574 | new_severity: Optional[Severity] = None, |
|
3575 | task_id: Optional[str] = None, |
|
3576 | threat: Optional[SeverityLevel] = None, |
|
3577 | new_threat: Optional[SeverityLevel] = None, |
|
3578 | ) -> Any: |
|
3579 | """Create a new override |
|
3580 | ||
3581 | Arguments: |
|
3582 | text: Text of the new override |
|
3583 | nvt_id: OID of the nvt to which override applies |
|
3584 | days_active: Days override will be active. -1 on always, 0 off |
|
3585 | hosts: A list of host addresses |
|
3586 | port: Port to which the override applies |
|
3587 | result_id: UUID of a result to which override applies |
|
3588 | severity: Severity to which override applies |
|
3589 | new_severity: New severity for result |
|
3590 | task_id: UUID of task to which override applies |
|
3591 | threat: Severity level to which override applies. Will be converted |
|
3592 | to severity. |
|
3593 | new_threat: New severity level for results. Will be converted to |
|
3594 | new_severity. |
|
3595 | ||
3596 | Returns: |
|
3597 | The response. See :py:meth:`send_command` for details. |
|
3598 | """ |
|
3599 | if not text: |
|
3600 | raise RequiredArgument( |
|
3601 | function=self.create_override.__name__, argument='text' |
|
3602 | ) |
|
3603 | ||
3604 | if not nvt_oid: |
|
3605 | raise RequiredArgument( |
|
3606 | function=self.create_override.__name__, argument='nvt_oid' |
|
3607 | ) |
|
3608 | ||
3609 | cmd = XmlCommand("create_override") |
|
3610 | cmd.add_element("text", text) |
|
3611 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
3612 | ||
3613 | if days_active is not None: |
|
3614 | cmd.add_element("active", str(days_active)) |
|
3615 | ||
3616 | if hosts: |
|
3617 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
3618 | ||
3619 | if port: |
|
3620 | cmd.add_element("port", str(port)) |
|
3621 | ||
3622 | if result_id: |
|
3623 | cmd.add_element("result", attrs={"id": result_id}) |
|
3624 | ||
3625 | if severity: |
|
3626 | cmd.add_element("severity", str(severity)) |
|
3627 | ||
3628 | if new_severity: |
|
3629 | cmd.add_element("new_severity", str(new_severity)) |
|
3630 | ||
3631 | if task_id: |
|
3632 | cmd.add_element("task", attrs={"id": task_id}) |
|
3633 | ||
3634 | if threat is not None: |
|
3635 | if not isinstance(threat, SeverityLevel): |
|
3636 | raise InvalidArgumentType( |
|
3637 | function=self.create_override.__name__, |
|
3638 | argument="threat", |
|
3639 | arg_type=SeverityLevel.__name__, |
|
3640 | ) |
|
3641 | ||
3642 | cmd.add_element("threat", threat.value) |
|
3643 | ||
3644 | if new_threat is not None: |
|
3645 | if not isinstance(new_threat, SeverityLevel): |
|
3646 | raise InvalidArgumentType( |
|
3647 | function=self.create_override.__name__, |
|
3648 | argument="new_threat", |
|
3649 | arg_type=SeverityLevel.__name__, |
|
3650 | ) |
|
3651 | ||
3652 | cmd.add_element("new_threat", new_threat.value) |
|
3653 | ||
3654 | return self._send_xml_command(cmd) |
|
3655 | ||
3656 | def clone_override(self, override_id: str) -> Any: |
|
3657 | """Clone an existing override |
|
@@ 6488-6577 (lines=90) @@ | ||
6485 | ||
6486 | return self._send_xml_command(cmd) |
|
6487 | ||
6488 | def modify_override( |
|
6489 | self, |
|
6490 | override_id: str, |
|
6491 | text: str, |
|
6492 | *, |
|
6493 | days_active: Optional[int] = None, |
|
6494 | hosts: Optional[List[str]] = None, |
|
6495 | port: Optional[int] = None, |
|
6496 | result_id: Optional[str] = None, |
|
6497 | severity: Optional[Severity] = None, |
|
6498 | new_severity: Optional[Severity] = None, |
|
6499 | task_id: Optional[str] = None, |
|
6500 | threat: Optional[SeverityLevel] = None, |
|
6501 | new_threat: Optional[SeverityLevel] = None, |
|
6502 | ) -> Any: |
|
6503 | """Modifies an existing override. |
|
6504 | ||
6505 | Arguments: |
|
6506 | override_id: UUID of override to modify. |
|
6507 | text: The text of the override. |
|
6508 | days_active: Days override will be active. -1 on always, |
|
6509 | 0 off. |
|
6510 | hosts: A list of host addresses |
|
6511 | port: Port to which override applies. |
|
6512 | result_id: Result to which override applies. |
|
6513 | severity: Severity to which override applies. |
|
6514 | new_severity: New severity score for result. |
|
6515 | task_id: Task to which override applies. |
|
6516 | threat: Threat level to which override applies. |
|
6517 | Will be converted to severity. |
|
6518 | new_threat: New threat level for results. Will be converted to |
|
6519 | new_severity. |
|
6520 | ||
6521 | Returns: |
|
6522 | The response. See :py:meth:`send_command` for details. |
|
6523 | """ |
|
6524 | if not override_id: |
|
6525 | raise RequiredArgument( |
|
6526 | function=self.modify_override.__name__, argument='override_id' |
|
6527 | ) |
|
6528 | if not text: |
|
6529 | raise RequiredArgument( |
|
6530 | function=self.modify_override.__name__, argument='text' |
|
6531 | ) |
|
6532 | ||
6533 | cmd = XmlCommand("modify_override") |
|
6534 | cmd.set_attribute("override_id", override_id) |
|
6535 | cmd.add_element("text", text) |
|
6536 | ||
6537 | if days_active is not None: |
|
6538 | cmd.add_element("active", str(days_active)) |
|
6539 | ||
6540 | if hosts: |
|
6541 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
6542 | ||
6543 | if port: |
|
6544 | cmd.add_element("port", str(port)) |
|
6545 | ||
6546 | if result_id: |
|
6547 | cmd.add_element("result", attrs={"id": result_id}) |
|
6548 | ||
6549 | if severity: |
|
6550 | cmd.add_element("severity", str(severity)) |
|
6551 | ||
6552 | if new_severity: |
|
6553 | cmd.add_element("new_severity", str(new_severity)) |
|
6554 | ||
6555 | if task_id: |
|
6556 | cmd.add_element("task", attrs={"id": task_id}) |
|
6557 | ||
6558 | if threat is not None: |
|
6559 | if not isinstance(threat, SeverityLevel): |
|
6560 | raise InvalidArgumentType( |
|
6561 | function=self.modify_override.__name__, |
|
6562 | argument='threat', |
|
6563 | arg_type=SeverityLevel.__name__, |
|
6564 | ) |
|
6565 | cmd.add_element("threat", threat.value) |
|
6566 | ||
6567 | if new_threat is not None: |
|
6568 | if not isinstance(new_threat, SeverityLevel): |
|
6569 | raise InvalidArgumentType( |
|
6570 | function=self.modify_override.__name__, |
|
6571 | argument='new_threat', |
|
6572 | arg_type=SeverityLevel.__name__, |
|
6573 | ) |
|
6574 | ||
6575 | cmd.add_element("new_threat", new_threat.value) |
|
6576 | ||
6577 | return self._send_xml_command(cmd) |
|
6578 | ||
6579 | def modify_port_list( |
|
6580 | self, |