Falcon Container - CrowdStrike/falconpy GitHub Wiki
Operation ID | Description | ||||
---|---|---|---|---|---|
|
Gets the registry credentials. | ||||
|
Gets the registry credentials. | ||||
|
Retrieve an assessment report for an image by specifying repository and tag. | ||||
|
Delete image details from the CrowdStrike registry. | ||||
|
Check if an image matches a policy by specifying repository and tag. | ||||
|
Retrieve an assessment report for an image by specifying repository and tag. | ||||
|
Retrieve registry entities associated with the client ID. | ||||
|
Retrieve registry entities associated with a specific UUID. | ||||
|
Delete registry entities by UUID. | ||||
|
Create registry entities using the provided detail. | ||||
|
Update the registry entity, as identified by the entity UUID, using the provided details. |
WARNING
client_id
andclient_secret
are keyword arguments that contain your CrowdStrike API credentials. Please note that all examples below do not hard code these values. (These values are ingested as strings.)CrowdStrike does not recommend hard coding API credentials or customer identifiers within source code.
Get image assessment results by providing an FQL filter and paging details.
get_combined_images
Method | Route |
---|---|
/container-security/combined/image-assessment/images/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
offset |
|
|
query | integer | The offset to start retrieving records from |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
limit |
|
|
query | integer | The maximum records to return. [1-200] |
sort |
|
|
query | string | The property to sort by (e.g. status.desc or hostname.asc) |
filter |
|
|
query | string | Filter images using a query in Falcon Query Language (FQL). Supported filters:
|
from falconpy import Hosts
# Do not hardcode API credentials!
falcon = Hosts(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.get_combined_images(offset=integer,
limit=integer,
sort="string",
filter="string"
)
print(response)
from falconpy import Hosts
# Do not hardcode API credentials!
falcon = Hosts(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.GetCombinedImages(offset=integer,
limit=integer,
sort="string",
filter="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("GetCombinedImages",
offset=integer,
limit=integer,
sort="string",
filter="string"
)
print(response)
Gets the registry credentials
get_credentials
Method | Route |
---|---|
/container-security/entities/image-registry-credentials/v1 |
- Produces: application/json
No keywords or arguments accepted.
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.get_credentials()
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.GetCredentials()
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("GetCredentials")
print(response)
Back to Table of Contents
Retrieve an assessment report for an image by specifying image ID and digest or repository and tag.
get_assessment
Method | Route |
---|---|
/reports |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
image_id |
|
|
query | string | Image ID of the image assessed. Must be provided in conjuction with digest . |
digest |
|
|
query | string | Hash digest of the image assessed. Must be provided in conjuction with image_id . |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
repository |
|
|
query | string | Repository where the image resides. Must be provided in conjuction with tag . |
tag |
|
|
query | string | Tag used for the image assessed. Must be provided in conjuction with repository . |
If both sets of parameters are provided within the same request,
image_id
anddigest
take precedence.
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.get_assessment(repository="string", tag="string")
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.GetImageAssessmentReport(repository="string", tag="string")
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("GetImageAssessmentReport", repository="string", tag="string")
print(response)
Back to Table of Contents
Delete image details from the CrowdStrike registry.
delete_image_details
Method | Route |
---|---|
/images/{} |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
image_id |
|
|
path | string | ID of the image to delete details for. |
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.delete_image_details(image_id="string")
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.DeleteImageDetails(image_id="string")
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("DeleteImageDetails", image_id="string")
print(response)
Back to Table of Contents
Check if an image matches a policy by specifying repository and tag.
image_matches_policy
Method | Route |
---|---|
/policy-checks |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
repository |
|
|
query | string | Repository where the image resides. |
tag |
|
|
query | string | Tag used for the image assessed. |
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.image_matches_policy(repository="string", tag="string")
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.ImageMatchesPolicy(repository="string", tag="string")
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("ImageMatchesPolicy", repository="string", tag="string")
print(response)
Back to Table of Contents
Check if an image matches a policy by specifying repository and tag.
read_image_vulnerabilities
Method | Route |
---|---|
/image-assessment/combined/vulnerability-lookups/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
applicationPackages |
|
|
body | list of dictionaries | List of application packages for the image. |
body |
|
|
body | dictionary | Full body payload in JSON format, not required if using other keywords. |
osversion |
|
|
body | string | Operating system version for the image to be read. |
packages |
|
|
body | list of dictionaries | List of packages to review. |
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
app_packages = [
{
"libraries": [
{
"Hash": "string",
"LayerHash": "string",
"LayerIndex": integer,
"License": "string",
"Name": "string",
"Path": "string",
"Version": "string"
}
],
"type": "string"
}
]
package_list = [
{
"LayerHash": "string",
"LayerIndex": integer,
"MajorVersion": "string",
"PackageHash": "string",
"PackageProvider": "string",
"PackageSource": "string",
"Product": "string",
"SoftwareArchitecture": "string",
"Status": "string",
"Vendor": "string"
}
]
response = falcon.read_image_vulnerabilities(osversion="string",
packages=package_list,
applicationPackages=app_packages
)
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
app_packages = [
{
"libraries": [
{
"Hash": "string",
"LayerHash": "string",
"LayerIndex": integer,
"License": "string",
"Name": "string",
"Path": "string",
"Version": "string"
}
],
"type": "string"
}
]
package_list = [
{
"LayerHash": "string",
"LayerIndex": integer,
"MajorVersion": "string",
"PackageHash": "string",
"PackageProvider": "string",
"PackageSource": "string",
"Product": "string",
"SoftwareArchitecture": "string",
"Status": "string",
"Vendor": "string"
}
]
response = falcon.ReadImageVulnerabilities(osversion="string",
packages=package_list,
applicationPackages=app_packages
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
BODY = {
"applicationPackages": [
{
"libraries": [
{
"Hash": "string",
"LayerHash": "string",
"LayerIndex": integer,
"License": "string",
"Name": "string",
"Path": "string",
"Version": "string"
}
],
"type": "string"
}
]
"osversion": "string",
"packages": [
{
"LayerHash": "string",
"LayerIndex": integer,
"MajorVersion": "string",
"PackageHash": "string",
"PackageProvider": "string",
"PackageSource": "string",
"Product": "string",
"SoftwareArchitecture": "string",
"Status": "string",
"Vendor": "string"
}
]
}
response = falcon.command("ReadImageVulnerabilities", body=BODY)
print(response)
Back to Table of Contents
Retrieve registry entities associated with the client ID.
read_registry_entities
Method | Route |
---|---|
/container-security/queries/registries/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
limit |
|
|
query | integer | Total number of records to return in the response. |
offset |
|
|
query | integer | Starting position within the overall recordset to return results. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
sort |
|
|
query | string | FQL formatted string to use to sort returned results. |
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.read_registry_entities(limit=integer, offset=integer, sort="string")
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.ReadRegistryEntities(limit=integer, offset=integer, sort="string")
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
response = falcon.command("ReadRegistryEntities", limit=integer, offset=integer, sort="string")
print(response)
Back to Table of Contents
Retrieve registry entities associated with a specific UUID.
read_registry_entities_by_uuid
Method | Route |
---|---|
/container-security/entities/registries/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Registry entity UUIDs to retrieve. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.read_registry_entities_by_uuid(ids=id_list)
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.ReadRegistryEntitiesByUUID(ids=id_list)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("ReadRegistryEntitiesByUUID", ids=id_list)
print(response)
Back to Table of Contents
Delete registry entities by UUID.
delete_registry_entities
Method | Route |
---|---|
/container-security/entities/registries/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
ids |
|
|
query | string or list of strings | Registry entity UUIDs to delete. |
parameters |
|
|
query | dictionary | Full query string parameters payload in JSON format. |
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.delete_registry_entities(ids=id_list)
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.DeleteRegistryEntities(ids=id_list)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
id_list = 'ID1,ID2,ID3' # Can also pass a list here: ['ID1', 'ID2', 'ID3']
response = falcon.command("DeleteRegistryEntities", ids=id_list)
print(response)
Back to Table of Contents
Create registry entities using the provided detail.
create_registry_entities
Method | Route |
---|---|
/container-security/entities/registries/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
aws_iam_role |
|
|
body (credential) | string | Container registry username (AWS ECR). |
aws_external_id |
|
|
body (credential) | string | Container registry password (AWS ECR). |
body |
|
|
body | dictionary | Full body payload in JSON format, not required if using other keywords. |
compartment_ids |
|
|
body (credential) | list of strings | Compartment IDs (OCR (Oracle)). |
credential_type |
|
|
body (credential) | string | Credential type (GitHub, GitLab). |
domain_url |
|
|
body (credential) | string | Domain URL (GitHub, GitLab). |
password |
|
|
body (credential) | string | Container registry password. |
project_id |
|
|
body (credential) | string | Cloud Project ID (GAR, GCR (Google)). |
scope_name |
|
|
body (credential) | string | Scope name (GAR, GCR (Google), OCR (Oracle)). |
service_account_json |
|
|
body (credential) | dictionary | GAR / GCR credential dictionary. Keys:
|
type |
|
|
body | string | The type of registry you want to connect (such as Amazon ECR). Available values:
body payload.Review the Required Credential Values table for more detail regarding specific registry requirements. |
url |
|
|
body | string | The URL used to log in to the registry. Note: If your registry URL contains an alias, provide just the base URL as the value. Example: https://docker.io/ This argument is required and must be provided as a keyword or as part of the body payload.
|
url_uniqueness_key |
|
|
body | string | The registry URL alias. Example: https://docker.io/ Available with
|
user_defined_alias |
|
|
body | string | A user-friendly name for the registry. This appears as the Registry name on the Registry connections page in the Falcon console. |
username |
|
|
body (credential) | string | Container registry username. |
Registry | Type | Required credential values |
---|---|---|
Amazon Elastic Container Registry | ecr |
|
Docker Hub | dockerhub |
|
Docker Registry v2 | docker |
|
GitHub | github |
|
GitLab Cloud | gitlab |
|
GitLab On-prem | gitlab |
|
Google Artifact Registry | gar |
|
Google Container Registry | gcr |
|
IBM Cloud | icr |
|
JFrog Artifactory | artifactory |
|
Microsoft Azure Container Registry | acr |
|
Oracle Container Registry | oracle |
|
Red Hat OpenShift | openshift |
|
Sonatype Nexus | nexus |
|
Quay.io (Red Hat) | quay.io |
|
VMWare Harbor | harbor |
|
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
svc_acct = {
"type": "string",
"private_key_id": "string",
"private_key": "string",
"client_email": "string",
"client_id": "string",
"project_id": "string"
}
compartments = [
"string",
"string"
]
# Review the Required Credential Values table for more
# detail regarding which keywords to use for your registry.
response = falcon.create_registry_entities(aws_iam_role="string",
aws_external_id="string",
compartment_ids=compartments,
credential_type="string",
domain_url="string",
password="string",
project_id="string",
scope_name="string",
service_account_json=svc_acct,
type="string",
url="string",
url_uniqueness_key="string",
user_defined_alias="string",
username="string"
)
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
svc_acct = {
"type": "string",
"private_key_id": "string",
"private_key": "string",
"client_email": "string",
"client_id": "string",
"project_id": "string"
}
compartments = [
"string",
"string"
]
# Review the Required Credential Values table for more
# detail regarding which keywords to use for your registry.
response = falcon.CreateRegistryEntities(aws_iam_role="string",
aws_external_id="string",
compartment_ids=compartments,
credential_type="string",
domain_url="string",
password="string",
project_id="string",
scope_name="string",
service_account_json=svc_acct,
type="string",
url="string",
url_uniqueness_key="string",
user_defined_alias="string",
username="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
svc_acct = {
"type": "string",
"private_key_id": "string",
"private_key": "string",
"client_email": "string",
"client_id": "string",
"project_id": "string"
}
compartments = [
"string",
"string"
]
# Review the Required Credential Values table for more
# detail regarding which keys to use for your registry.
body_payload = {
"type": "string",
"url": "string",
"url_uniqueness_key": "string",
"user_defined_alias": "string",
"credential": {
"aws_iam_role": "string",
"aws_external_id": "string",
"compartment_ids": compartments,
"credential_type": "string",
"domain_url": "string",
"password": "string",
"project_id": "string",
"scope_name": "string",
"service_account_json": svc_acct,
"username": "string"
}
}
response = falcon.command("CreateRegistryEntities", body=body_payload)
print(response)
Back to Table of Contents
Update the registry entity, as identified by the entity UUID, using the provided details.
update_registry_entities
Method | Route |
---|---|
/container-security/entities/registries/v1 |
- Produces: application/json
Name | Service | Uber | Type | Data type | Description |
---|---|---|---|---|---|
aws_iam_role |
|
|
body (credential) | string | Container registry username (AWS ECR). |
aws_external_id |
|
|
body (credential) | string | Container registry password (AWS ECR). |
body |
|
|
body | dictionary | Full body payload in JSON format, not required if using other keywords. |
compartment_ids |
|
|
body (credential) | list of strings | Compartment IDs (OCR (Oracle)). |
credential_type |
|
|
body (credential) | string | Credential type (GitHub, GitLab). |
domain_url |
|
|
body (credential) | string | Domain URL (GitHub, GitLab). |
id |
|
|
body | string | Container registry record UUID. |
password |
|
|
body (credential) | string | Container registry password. |
project_id |
|
|
body (credential) | string | Cloud Project ID (GAR, GCR (Google)). |
scope_name |
|
|
body (credential) | string | Scope name (GAR, GCR (Google), OCR (Oracle)). |
service_account_json |
|
|
body (credential) | dictionary | GAR / GCR credential dictionary. Keys:
|
state |
|
|
body | string | Container registry state.
|
type |
|
|
body | string | The type of registry you want to connect (such as Amazon ECR). Available values:
body payload.Review the Required Credential Values table for more detail regarding specific registry requirements. |
url |
|
|
body | string | The URL used to log in to the registry. Note: If your registry URL contains an alias, provide just the base URL as the value. Example: https://docker.io/ This argument is required and must be provided as a keyword or as part of the body payload.
|
url_uniqueness_key |
|
|
body | string | The registry URL alias. Example: https://docker.io/ Available with
|
user_defined_alias |
|
|
body | string | A user-friendly name for the registry. This appears as the Registry name on the Registry connections page in the Falcon console. |
username |
|
|
body (credential) | string | Container registry username. |
Registry | Type | Required credential values |
---|---|---|
Amazon Elastic Container Registry | ecr |
|
Docker Hub | dockerhub |
|
Docker Registry v2 | docker |
|
GitHub | github |
|
GitLab Cloud | gitlab |
|
GitLab On-prem | gitlab |
|
Google Artifact Registry | gar |
|
Google Container Registry | gcr |
|
IBM Cloud | icr |
|
JFrog Artifactory | artifactory |
|
Microsoft Azure Container Registry | acr |
|
Oracle Container Registry | oracle |
|
Red Hat OpenShift | openshift |
|
Sonatype Nexus | nexus |
|
Quay.io (Red Hat) | quay.io |
|
VMWare Harbor | harbor |
|
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
svc_acct = {
"type": "string",
"private_key_id": "string",
"private_key": "string",
"client_email": "string",
"client_id": "string",
"project_id": "string"
}
compartments = [
"string",
"string"
]
# Review the Required Credential Values table for more
# detail regarding which keywords to use for your registry.
response = falcon.update_registry_entities(aws_iam_role="string",
aws_external_id="string",
compartment_ids=compartments,
credential_type="string",
domain_url="string",
id="string",
password="string",
project_id="string",
scope_name="string",
service_account_json=svc_acct,
state="string",
type="string",
url="string",
url_uniqueness_key="string",
user_defined_alias="string",
username="string"
)
print(response)
from falconpy import FalconContainer
# Do not hardcode API credentials!
falcon = FalconContainer(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
svc_acct = {
"type": "string",
"private_key_id": "string",
"private_key": "string",
"client_email": "string",
"client_id": "string",
"project_id": "string"
}
compartments = [
"string",
"string"
]
# Review the Required Credential Values table for more
# detail regarding which keywords to use for your registry.
response = falcon.UpdateRegistryEntities(aws_iam_role="string",
aws_external_id="string",
compartment_ids=compartments,
credential_type="string",
domain_url="string",
id="string",
password="string",
project_id="string",
scope_name="string",
service_account_json=svc_acct,
state="string",
type="string",
url="string",
url_uniqueness_key="string",
user_defined_alias="string",
username="string"
)
print(response)
from falconpy import APIHarnessV2
# Do not hardcode API credentials!
falcon = APIHarnessV2(client_id=CLIENT_ID,
client_secret=CLIENT_SECRET
)
svc_acct = {
"type": "string",
"private_key_id": "string",
"private_key": "string",
"client_email": "string",
"client_id": "string",
"project_id": "string"
}
compartments = [
"string",
"string"
]
# Review the Required Credential Values table for more
# detail regarding which keys to use for your registry.
body_payload = {
"id": "string",
"state": "string",
"type": "string",
"url": "string",
"url_uniqueness_key": "string",
"user_defined_alias": "string",
"credential": {
"aws_iam_role": "string",
"aws_external_id": "string",
"compartment_ids": compartments,
"credential_type": "string",
"domain_url": "string",
"password": "string",
"project_id": "string",
"scope_name": "string",
"service_account_json": svc_acct,
"username": "string"
}
}
response = falcon.command("UpdateRegistryEntities", body=body_payload)
print(response)
Back to Table of Contents