| @@ 983-1073 (lines=91) @@ | ||
| 980 | cmd.add_element("copy", note_id) |
|
| 981 | return self._send_xml_command(cmd) |
|
| 982 | ||
| 983 | def create_override( |
|
| 984 | self, |
|
| 985 | text: str, |
|
| 986 | nvt_oid: str, |
|
| 987 | *, |
|
| 988 | days_active: Optional[int] = None, |
|
| 989 | hosts: Optional[List[str]] = None, |
|
| 990 | port: Optional[int] = None, |
|
| 991 | result_id: Optional[str] = None, |
|
| 992 | severity: Optional[Severity] = None, |
|
| 993 | new_severity: Optional[Severity] = None, |
|
| 994 | task_id: Optional[str] = None, |
|
| 995 | threat: Optional[SeverityLevel] = None, |
|
| 996 | new_threat: Optional[SeverityLevel] = None, |
|
| 997 | ) -> Any: |
|
| 998 | """Create a new override |
|
| 999 | ||
| 1000 | Arguments: |
|
| 1001 | text: Text of the new override |
|
| 1002 | nvt_id: OID of the nvt to which override applies |
|
| 1003 | days_active: Days override will be active. -1 on always, 0 off |
|
| 1004 | hosts: A list of host addresses |
|
| 1005 | port: Port to which the override applies |
|
| 1006 | result_id: UUID of a result to which override applies |
|
| 1007 | severity: Severity to which override applies |
|
| 1008 | new_severity: New severity for result |
|
| 1009 | task_id: UUID of task to which override applies |
|
| 1010 | threat: Severity level to which override applies. Will be converted |
|
| 1011 | to severity. |
|
| 1012 | new_threat: New severity level for results. Will be converted to |
|
| 1013 | new_severity. |
|
| 1014 | ||
| 1015 | Returns: |
|
| 1016 | The response. See :py:meth:`send_command` for details. |
|
| 1017 | """ |
|
| 1018 | if not text: |
|
| 1019 | raise RequiredArgument( |
|
| 1020 | function=self.create_override.__name__, argument='text' |
|
| 1021 | ) |
|
| 1022 | ||
| 1023 | if not nvt_oid: |
|
| 1024 | raise RequiredArgument( |
|
| 1025 | function=self.create_override.__name__, argument='nvt_oid' |
|
| 1026 | ) |
|
| 1027 | ||
| 1028 | cmd = XmlCommand("create_override") |
|
| 1029 | cmd.add_element("text", text) |
|
| 1030 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
| 1031 | ||
| 1032 | if days_active is not None: |
|
| 1033 | cmd.add_element("active", str(days_active)) |
|
| 1034 | ||
| 1035 | if hosts: |
|
| 1036 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 1037 | ||
| 1038 | if port: |
|
| 1039 | cmd.add_element("port", str(port)) |
|
| 1040 | ||
| 1041 | if result_id: |
|
| 1042 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 1043 | ||
| 1044 | if severity: |
|
| 1045 | cmd.add_element("severity", str(severity)) |
|
| 1046 | ||
| 1047 | if new_severity: |
|
| 1048 | cmd.add_element("new_severity", str(new_severity)) |
|
| 1049 | ||
| 1050 | if task_id: |
|
| 1051 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 1052 | ||
| 1053 | if threat is not None: |
|
| 1054 | if not isinstance(threat, SeverityLevel): |
|
| 1055 | raise InvalidArgumentType( |
|
| 1056 | function=self.create_override.__name__, |
|
| 1057 | argument="threat", |
|
| 1058 | arg_type=SeverityLevel.__name__, |
|
| 1059 | ) |
|
| 1060 | ||
| 1061 | cmd.add_element("threat", threat.value) |
|
| 1062 | ||
| 1063 | if new_threat is not None: |
|
| 1064 | if not isinstance(new_threat, SeverityLevel): |
|
| 1065 | raise InvalidArgumentType( |
|
| 1066 | function=self.create_override.__name__, |
|
| 1067 | argument="new_threat", |
|
| 1068 | arg_type=SeverityLevel.__name__, |
|
| 1069 | ) |
|
| 1070 | ||
| 1071 | cmd.add_element("new_threat", new_threat.value) |
|
| 1072 | ||
| 1073 | return self._send_xml_command(cmd) |
|
| 1074 | ||
| 1075 | def clone_override(self, override_id: str) -> Any: |
|
| 1076 | """Clone an existing override |
|
| @@ 5175-5264 (lines=90) @@ | ||
| 5172 | ||
| 5173 | return self._send_xml_command(cmd) |
|
| 5174 | ||
| 5175 | def modify_override( |
|
| 5176 | self, |
|
| 5177 | override_id: str, |
|
| 5178 | text: str, |
|
| 5179 | *, |
|
| 5180 | days_active: Optional[int] = None, |
|
| 5181 | hosts: Optional[List[str]] = None, |
|
| 5182 | port: Optional[int] = None, |
|
| 5183 | result_id: Optional[str] = None, |
|
| 5184 | severity: Optional[Severity] = None, |
|
| 5185 | new_severity: Optional[Severity] = None, |
|
| 5186 | task_id: Optional[str] = None, |
|
| 5187 | threat: Optional[SeverityLevel] = None, |
|
| 5188 | new_threat: Optional[SeverityLevel] = None, |
|
| 5189 | ) -> Any: |
|
| 5190 | """Modifies an existing override. |
|
| 5191 | ||
| 5192 | Arguments: |
|
| 5193 | override_id: UUID of override to modify. |
|
| 5194 | text: The text of the override. |
|
| 5195 | days_active: Days override will be active. -1 on always, |
|
| 5196 | 0 off. |
|
| 5197 | hosts: A list of host addresses |
|
| 5198 | port: Port to which override applies. |
|
| 5199 | result_id: Result to which override applies. |
|
| 5200 | severity: Severity to which override applies. |
|
| 5201 | new_severity: New severity score for result. |
|
| 5202 | task_id: Task to which override applies. |
|
| 5203 | threat: Threat level to which override applies. |
|
| 5204 | Will be converted to severity. |
|
| 5205 | new_threat: New threat level for results. Will be converted to |
|
| 5206 | new_severity. |
|
| 5207 | ||
| 5208 | Returns: |
|
| 5209 | The response. See :py:meth:`send_command` for details. |
|
| 5210 | """ |
|
| 5211 | if not override_id: |
|
| 5212 | raise RequiredArgument( |
|
| 5213 | function=self.modify_override.__name__, argument='override_id' |
|
| 5214 | ) |
|
| 5215 | if not text: |
|
| 5216 | raise RequiredArgument( |
|
| 5217 | function=self.modify_override.__name__, argument='text' |
|
| 5218 | ) |
|
| 5219 | ||
| 5220 | cmd = XmlCommand("modify_override") |
|
| 5221 | cmd.set_attribute("override_id", override_id) |
|
| 5222 | cmd.add_element("text", text) |
|
| 5223 | ||
| 5224 | if days_active is not None: |
|
| 5225 | cmd.add_element("active", str(days_active)) |
|
| 5226 | ||
| 5227 | if hosts: |
|
| 5228 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 5229 | ||
| 5230 | if port: |
|
| 5231 | cmd.add_element("port", str(port)) |
|
| 5232 | ||
| 5233 | if result_id: |
|
| 5234 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 5235 | ||
| 5236 | if severity: |
|
| 5237 | cmd.add_element("severity", str(severity)) |
|
| 5238 | ||
| 5239 | if new_severity: |
|
| 5240 | cmd.add_element("new_severity", str(new_severity)) |
|
| 5241 | ||
| 5242 | if task_id: |
|
| 5243 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 5244 | ||
| 5245 | if threat is not None: |
|
| 5246 | if not isinstance(threat, SeverityLevel): |
|
| 5247 | raise InvalidArgumentType( |
|
| 5248 | function=self.modify_override.__name__, |
|
| 5249 | argument='threat', |
|
| 5250 | arg_type=SeverityLevel.__name__, |
|
| 5251 | ) |
|
| 5252 | cmd.add_element("threat", threat.value) |
|
| 5253 | ||
| 5254 | if new_threat is not None: |
|
| 5255 | if not isinstance(new_threat, SeverityLevel): |
|
| 5256 | raise InvalidArgumentType( |
|
| 5257 | function=self.modify_override.__name__, |
|
| 5258 | argument='new_threat', |
|
| 5259 | arg_type=SeverityLevel.__name__, |
|
| 5260 | ) |
|
| 5261 | ||
| 5262 | cmd.add_element("new_threat", new_threat.value) |
|
| 5263 | ||
| 5264 | return self._send_xml_command(cmd) |
|
| 5265 | ||
| 5266 | def modify_permission( |
|
| 5267 | self, |
|
| @@ 3564-3654 (lines=91) @@ | ||
| 3561 | cmd.add_element("copy", note_id) |
|
| 3562 | return self._send_xml_command(cmd) |
|
| 3563 | ||
| 3564 | def create_override( |
|
| 3565 | self, |
|
| 3566 | text: str, |
|
| 3567 | nvt_oid: str, |
|
| 3568 | *, |
|
| 3569 | days_active: Optional[int] = None, |
|
| 3570 | hosts: Optional[List[str]] = None, |
|
| 3571 | port: Optional[int] = None, |
|
| 3572 | result_id: Optional[str] = None, |
|
| 3573 | severity: Optional[Severity] = None, |
|
| 3574 | new_severity: Optional[Severity] = None, |
|
| 3575 | task_id: Optional[str] = None, |
|
| 3576 | threat: Optional[SeverityLevel] = None, |
|
| 3577 | new_threat: Optional[SeverityLevel] = None, |
|
| 3578 | ) -> Any: |
|
| 3579 | """Create a new override |
|
| 3580 | ||
| 3581 | Arguments: |
|
| 3582 | text: Text of the new override |
|
| 3583 | nvt_id: OID of the nvt to which override applies |
|
| 3584 | days_active: Days override will be active. -1 on always, 0 off |
|
| 3585 | hosts: A list of host addresses |
|
| 3586 | port: Port to which the override applies |
|
| 3587 | result_id: UUID of a result to which override applies |
|
| 3588 | severity: Severity to which override applies |
|
| 3589 | new_severity: New severity for result |
|
| 3590 | task_id: UUID of task to which override applies |
|
| 3591 | threat: Severity level to which override applies. Will be converted |
|
| 3592 | to severity. |
|
| 3593 | new_threat: New severity level for results. Will be converted to |
|
| 3594 | new_severity. |
|
| 3595 | ||
| 3596 | Returns: |
|
| 3597 | The response. See :py:meth:`send_command` for details. |
|
| 3598 | """ |
|
| 3599 | if not text: |
|
| 3600 | raise RequiredArgument( |
|
| 3601 | function=self.create_override.__name__, argument='text' |
|
| 3602 | ) |
|
| 3603 | ||
| 3604 | if not nvt_oid: |
|
| 3605 | raise RequiredArgument( |
|
| 3606 | function=self.create_override.__name__, argument='nvt_oid' |
|
| 3607 | ) |
|
| 3608 | ||
| 3609 | cmd = XmlCommand("create_override") |
|
| 3610 | cmd.add_element("text", text) |
|
| 3611 | cmd.add_element("nvt", attrs={"oid": nvt_oid}) |
|
| 3612 | ||
| 3613 | if days_active is not None: |
|
| 3614 | cmd.add_element("active", str(days_active)) |
|
| 3615 | ||
| 3616 | if hosts: |
|
| 3617 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 3618 | ||
| 3619 | if port: |
|
| 3620 | cmd.add_element("port", str(port)) |
|
| 3621 | ||
| 3622 | if result_id: |
|
| 3623 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 3624 | ||
| 3625 | if severity: |
|
| 3626 | cmd.add_element("severity", str(severity)) |
|
| 3627 | ||
| 3628 | if new_severity: |
|
| 3629 | cmd.add_element("new_severity", str(new_severity)) |
|
| 3630 | ||
| 3631 | if task_id: |
|
| 3632 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 3633 | ||
| 3634 | if threat is not None: |
|
| 3635 | if not isinstance(threat, SeverityLevel): |
|
| 3636 | raise InvalidArgumentType( |
|
| 3637 | function=self.create_override.__name__, |
|
| 3638 | argument="threat", |
|
| 3639 | arg_type=SeverityLevel.__name__, |
|
| 3640 | ) |
|
| 3641 | ||
| 3642 | cmd.add_element("threat", threat.value) |
|
| 3643 | ||
| 3644 | if new_threat is not None: |
|
| 3645 | if not isinstance(new_threat, SeverityLevel): |
|
| 3646 | raise InvalidArgumentType( |
|
| 3647 | function=self.create_override.__name__, |
|
| 3648 | argument="new_threat", |
|
| 3649 | arg_type=SeverityLevel.__name__, |
|
| 3650 | ) |
|
| 3651 | ||
| 3652 | cmd.add_element("new_threat", new_threat.value) |
|
| 3653 | ||
| 3654 | return self._send_xml_command(cmd) |
|
| 3655 | ||
| 3656 | def clone_override(self, override_id: str) -> Any: |
|
| 3657 | """Clone an existing override |
|
| @@ 6488-6577 (lines=90) @@ | ||
| 6485 | ||
| 6486 | return self._send_xml_command(cmd) |
|
| 6487 | ||
| 6488 | def modify_override( |
|
| 6489 | self, |
|
| 6490 | override_id: str, |
|
| 6491 | text: str, |
|
| 6492 | *, |
|
| 6493 | days_active: Optional[int] = None, |
|
| 6494 | hosts: Optional[List[str]] = None, |
|
| 6495 | port: Optional[int] = None, |
|
| 6496 | result_id: Optional[str] = None, |
|
| 6497 | severity: Optional[Severity] = None, |
|
| 6498 | new_severity: Optional[Severity] = None, |
|
| 6499 | task_id: Optional[str] = None, |
|
| 6500 | threat: Optional[SeverityLevel] = None, |
|
| 6501 | new_threat: Optional[SeverityLevel] = None, |
|
| 6502 | ) -> Any: |
|
| 6503 | """Modifies an existing override. |
|
| 6504 | ||
| 6505 | Arguments: |
|
| 6506 | override_id: UUID of override to modify. |
|
| 6507 | text: The text of the override. |
|
| 6508 | days_active: Days override will be active. -1 on always, |
|
| 6509 | 0 off. |
|
| 6510 | hosts: A list of host addresses |
|
| 6511 | port: Port to which override applies. |
|
| 6512 | result_id: Result to which override applies. |
|
| 6513 | severity: Severity to which override applies. |
|
| 6514 | new_severity: New severity score for result. |
|
| 6515 | task_id: Task to which override applies. |
|
| 6516 | threat: Threat level to which override applies. |
|
| 6517 | Will be converted to severity. |
|
| 6518 | new_threat: New threat level for results. Will be converted to |
|
| 6519 | new_severity. |
|
| 6520 | ||
| 6521 | Returns: |
|
| 6522 | The response. See :py:meth:`send_command` for details. |
|
| 6523 | """ |
|
| 6524 | if not override_id: |
|
| 6525 | raise RequiredArgument( |
|
| 6526 | function=self.modify_override.__name__, argument='override_id' |
|
| 6527 | ) |
|
| 6528 | if not text: |
|
| 6529 | raise RequiredArgument( |
|
| 6530 | function=self.modify_override.__name__, argument='text' |
|
| 6531 | ) |
|
| 6532 | ||
| 6533 | cmd = XmlCommand("modify_override") |
|
| 6534 | cmd.set_attribute("override_id", override_id) |
|
| 6535 | cmd.add_element("text", text) |
|
| 6536 | ||
| 6537 | if days_active is not None: |
|
| 6538 | cmd.add_element("active", str(days_active)) |
|
| 6539 | ||
| 6540 | if hosts: |
|
| 6541 | cmd.add_element("hosts", _to_comma_list(hosts)) |
|
| 6542 | ||
| 6543 | if port: |
|
| 6544 | cmd.add_element("port", str(port)) |
|
| 6545 | ||
| 6546 | if result_id: |
|
| 6547 | cmd.add_element("result", attrs={"id": result_id}) |
|
| 6548 | ||
| 6549 | if severity: |
|
| 6550 | cmd.add_element("severity", str(severity)) |
|
| 6551 | ||
| 6552 | if new_severity: |
|
| 6553 | cmd.add_element("new_severity", str(new_severity)) |
|
| 6554 | ||
| 6555 | if task_id: |
|
| 6556 | cmd.add_element("task", attrs={"id": task_id}) |
|
| 6557 | ||
| 6558 | if threat is not None: |
|
| 6559 | if not isinstance(threat, SeverityLevel): |
|
| 6560 | raise InvalidArgumentType( |
|
| 6561 | function=self.modify_override.__name__, |
|
| 6562 | argument='threat', |
|
| 6563 | arg_type=SeverityLevel.__name__, |
|
| 6564 | ) |
|
| 6565 | cmd.add_element("threat", threat.value) |
|
| 6566 | ||
| 6567 | if new_threat is not None: |
|
| 6568 | if not isinstance(new_threat, SeverityLevel): |
|
| 6569 | raise InvalidArgumentType( |
|
| 6570 | function=self.modify_override.__name__, |
|
| 6571 | argument='new_threat', |
|
| 6572 | arg_type=SeverityLevel.__name__, |
|
| 6573 | ) |
|
| 6574 | ||
| 6575 | cmd.add_element("new_threat", new_threat.value) |
|
| 6576 | ||
| 6577 | return self._send_xml_command(cmd) |
|
| 6578 | ||
| 6579 | def modify_port_list( |
|
| 6580 | self, |
|