tccli-intl-en 3.0.1168.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (294) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/plugins/sso/__init__.py +14 -0
  4. tccli/plugins/sso/login.py +23 -6
  5. tccli/plugins/sso/texts.py +4 -0
  6. tccli/services/__init__.py +49 -2
  7. tccli/services/advisor/advisor_client.py +10 -4
  8. tccli/services/ai3d/__init__.py +4 -0
  9. tccli/services/ai3d/ai3d_client.py +266 -0
  10. tccli/services/ai3d/v20250513/api.json +264 -0
  11. tccli/services/ai3d/v20250513/examples.json +20 -0
  12. tccli/services/aiart/aiart_client.py +5 -2
  13. tccli/services/ams/ams_client.py +20 -8
  14. tccli/services/antiddos/antiddos_client.py +350 -140
  15. tccli/services/apigateway/apigateway_client.py +465 -186
  16. tccli/services/apm/apm_client.py +835 -68
  17. tccli/services/apm/v20210622/api.json +3936 -1145
  18. tccli/services/apm/v20210622/examples.json +133 -23
  19. tccli/services/asr/asr_client.py +10 -4
  20. tccli/services/autoscaling/autoscaling_client.py +341 -114
  21. tccli/services/autoscaling/v20180419/api.json +514 -333
  22. tccli/services/autoscaling/v20180419/examples.json +46 -38
  23. tccli/services/batch/batch_client.py +140 -56
  24. tccli/services/bi/__init__.py +4 -0
  25. tccli/services/bi/bi_client.py +1498 -0
  26. tccli/services/bi/v20220105/api.json +5769 -0
  27. tccli/services/bi/v20220105/examples.json +215 -0
  28. tccli/services/billing/billing_client.py +1055 -134
  29. tccli/services/billing/v20180709/api.json +1654 -243
  30. tccli/services/billing/v20180709/examples.json +169 -25
  31. tccli/services/cam/cam_client.py +405 -162
  32. tccli/services/captcha/captcha_client.py +5 -2
  33. tccli/services/captcha/v20190722/api.json +16 -6
  34. tccli/services/captcha/v20190722/examples.json +3 -3
  35. tccli/services/car/car_client.py +165 -66
  36. tccli/services/cbs/cbs_client.py +190 -76
  37. tccli/services/ccc/ccc_client.py +1167 -268
  38. tccli/services/ccc/v20200210/api.json +2263 -202
  39. tccli/services/ccc/v20200210/examples.json +116 -12
  40. tccli/services/cdb/cdb_client.py +665 -266
  41. tccli/services/cdb/v20170320/api.json +426 -173
  42. tccli/services/cdb/v20170320/examples.json +6 -6
  43. tccli/services/cdc/cdc_client.py +100 -40
  44. tccli/services/cdc/v20201214/api.json +2 -2
  45. tccli/services/cdc/v20201214/examples.json +4 -4
  46. tccli/services/cdn/cdn_client.py +220 -88
  47. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  48. tccli/services/cdwpg/cdwpg_client.py +120 -48
  49. tccli/services/cdz/__init__.py +4 -0
  50. tccli/services/cdz/cdz_client.py +210 -0
  51. tccli/services/cdz/v20221123/api.json +233 -0
  52. tccli/services/cdz/v20221123/examples.json +12 -0
  53. tccli/services/cfg/cfg_client.py +80 -32
  54. tccli/services/cfg/v20210820/api.json +30 -10
  55. tccli/services/cfg/v20210820/examples.json +1 -1
  56. tccli/services/cfs/cfs_client.py +195 -78
  57. tccli/services/cfw/cfw_client.py +330 -132
  58. tccli/services/chdfs/chdfs_client.py +145 -58
  59. tccli/services/ciam/ciam_client.py +80 -32
  60. tccli/services/ckafka/ckafka_client.py +1033 -255
  61. tccli/services/ckafka/v20190819/api.json +3378 -1681
  62. tccli/services/ckafka/v20190819/examples.json +254 -160
  63. tccli/services/clb/clb_client.py +1054 -469
  64. tccli/services/clb/v20180317/api.json +2307 -1024
  65. tccli/services/clb/v20180317/examples.json +186 -126
  66. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  67. tccli/services/cls/cls_client.py +434 -173
  68. tccli/services/cmq/cmq_client.py +14 -803
  69. tccli/services/cmq/v20190304/api.json +173 -1367
  70. tccli/services/cmq/v20190304/examples.json +0 -120
  71. tccli/services/config/config_client.py +30 -12
  72. tccli/services/controlcenter/controlcenter_client.py +229 -2
  73. tccli/services/controlcenter/v20230110/api.json +528 -5
  74. tccli/services/controlcenter/v20230110/examples.json +32 -0
  75. tccli/services/csip/csip_client.py +339 -78
  76. tccli/services/csip/v20221121/api.json +1011 -38
  77. tccli/services/csip/v20221121/examples.json +24 -0
  78. tccli/services/ctsdb/__init__.py +4 -0
  79. tccli/services/ctsdb/ctsdb_client.py +266 -0
  80. tccli/services/ctsdb/v20230202/api.json +677 -0
  81. tccli/services/ctsdb/v20230202/examples.json +20 -0
  82. tccli/services/cvm/cvm_client.py +706 -189
  83. tccli/services/cvm/v20170312/api.json +1141 -510
  84. tccli/services/cvm/v20170312/examples.json +174 -128
  85. tccli/services/cwp/cwp_client.py +2325 -930
  86. tccli/services/cynosdb/cynosdb_client.py +3051 -575
  87. tccli/services/cynosdb/v20190107/api.json +14074 -7139
  88. tccli/services/cynosdb/v20190107/examples.json +597 -287
  89. tccli/services/dataintegration/dataintegration_client.py +5 -2
  90. tccli/services/dayu/dayu_client.py +515 -206
  91. tccli/services/dbbrain/dbbrain_client.py +210 -84
  92. tccli/services/dc/dc_client.py +90 -36
  93. tccli/services/dcdb/dcdb_client.py +310 -124
  94. tccli/services/dlc/dlc_client.py +859 -214
  95. tccli/services/dlc/v20210125/api.json +637 -13
  96. tccli/services/dlc/v20210125/examples.json +48 -0
  97. tccli/services/dms/dms_client.py +10 -4
  98. tccli/services/dnspod/dnspod_client.py +390 -111
  99. tccli/services/dnspod/v20210323/api.json +196 -0
  100. tccli/services/dnspod/v20210323/examples.json +24 -0
  101. tccli/services/domain/domain_client.py +120 -48
  102. tccli/services/dts/dts_client.py +415 -166
  103. tccli/services/eb/eb_client.py +130 -52
  104. tccli/services/ecdn/ecdn_client.py +75 -30
  105. tccli/services/ecm/ecm_client.py +620 -248
  106. tccli/services/eiam/eiam_client.py +200 -80
  107. tccli/services/emr/emr_client.py +3104 -117
  108. tccli/services/emr/v20190103/api.json +15311 -4361
  109. tccli/services/emr/v20190103/examples.json +452 -42
  110. tccli/services/es/es_client.py +105 -42
  111. tccli/services/facefusion/facefusion_client.py +15 -6
  112. tccli/services/faceid/faceid_client.py +95 -38
  113. tccli/services/faceid/v20180301/api.json +172 -45
  114. tccli/services/faceid/v20180301/examples.json +3 -3
  115. tccli/services/gaap/gaap_client.py +440 -176
  116. tccli/services/gme/gme_client.py +50 -20
  117. tccli/services/gpm/gpm_client.py +90 -36
  118. tccli/services/gse/gse_client.py +110 -44
  119. tccli/services/gwlb/gwlb_client.py +90 -36
  120. tccli/services/hunyuan/__init__.py +4 -0
  121. tccli/services/hunyuan/hunyuan_client.py +266 -0
  122. tccli/services/hunyuan/v20230901/api.json +270 -0
  123. tccli/services/hunyuan/v20230901/examples.json +20 -0
  124. tccli/services/iai/iai_client.py +145 -58
  125. tccli/services/iai/v20200303/api.json +187 -51
  126. tccli/services/iai/v20200303/examples.json +30 -12
  127. tccli/services/iap/iap_client.py +30 -12
  128. tccli/services/ims/ims_client.py +5 -2
  129. tccli/services/ims/v20201229/api.json +133 -141
  130. tccli/services/ims/v20201229/examples.json +3 -3
  131. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +516 -72
  132. tccli/services/intlpartnersmgt/v20220928/api.json +976 -60
  133. tccli/services/intlpartnersmgt/v20220928/examples.json +50 -2
  134. tccli/services/iotcloud/iotcloud_client.py +100 -40
  135. tccli/services/iotcloud/v20210408/api.json +216 -107
  136. tccli/services/iotcloud/v20210408/examples.json +9 -9
  137. tccli/services/ip/ip_client.py +30 -12
  138. tccli/services/kms/kms_client.py +1226 -227
  139. tccli/services/kms/v20190118/api.json +1562 -144
  140. tccli/services/kms/v20190118/examples.json +204 -78
  141. tccli/services/lcic/lcic_client.py +265 -106
  142. tccli/services/lighthouse/lighthouse_client.py +370 -148
  143. tccli/services/lighthouse/v20200324/api.json +14 -14
  144. tccli/services/lighthouse/v20200324/examples.json +5 -5
  145. tccli/services/live/live_client.py +804 -232
  146. tccli/services/live/v20180801/api.json +272 -0
  147. tccli/services/live/v20180801/examples.json +32 -0
  148. tccli/services/lke/__init__.py +4 -0
  149. tccli/services/lke/lke_client.py +5194 -0
  150. tccli/services/lke/v20231130/api.json +14803 -0
  151. tccli/services/lke/v20231130/examples.json +736 -0
  152. tccli/services/lkeap/__init__.py +4 -0
  153. tccli/services/lkeap/lkeap_client.py +602 -0
  154. tccli/services/lkeap/v20240522/api.json +953 -0
  155. tccli/services/lkeap/v20240522/examples.json +92 -0
  156. tccli/services/mariadb/mariadb_client.py +250 -100
  157. tccli/services/mdc/mdc_client.py +90 -36
  158. tccli/services/mdl/mdl_client.py +402 -82
  159. tccli/services/mdl/v20200326/api.json +1144 -58
  160. tccli/services/mdl/v20200326/examples.json +48 -16
  161. tccli/services/mdp/mdp_client.py +785 -122
  162. tccli/services/mdp/v20200527/api.json +1168 -44
  163. tccli/services/mdp/v20200527/examples.json +151 -79
  164. tccli/services/message/__init__.py +4 -0
  165. tccli/services/message/message_client.py +210 -0
  166. tccli/services/message/v20181225/api.json +72 -0
  167. tccli/services/message/v20181225/examples.json +13 -0
  168. tccli/services/mongodb/mongodb_client.py +1452 -136
  169. tccli/services/mongodb/v20190725/api.json +4393 -1462
  170. tccli/services/mongodb/v20190725/examples.json +265 -71
  171. tccli/services/monitor/monitor_client.py +1008 -296
  172. tccli/services/monitor/v20180724/api.json +660 -11
  173. tccli/services/monitor/v20180724/examples.json +152 -4
  174. tccli/services/mps/mps_client.py +1573 -354
  175. tccli/services/mps/v20190612/api.json +12394 -7243
  176. tccli/services/mps/v20190612/examples.json +244 -84
  177. tccli/services/msp/msp_client.py +35 -14
  178. tccli/services/ocr/ocr_client.py +596 -102
  179. tccli/services/ocr/v20181119/api.json +2271 -181
  180. tccli/services/ocr/v20181119/examples.json +70 -8
  181. tccli/services/omics/omics_client.py +100 -40
  182. tccli/services/organization/organization_client.py +580 -232
  183. tccli/services/postgres/postgres_client.py +455 -182
  184. tccli/services/postgres/v20170312/api.json +134 -109
  185. tccli/services/postgres/v20170312/examples.json +14 -14
  186. tccli/services/privatedns/privatedns_client.py +206 -60
  187. tccli/services/privatedns/v20201028/api.json +179 -0
  188. tccli/services/privatedns/v20201028/examples.json +8 -0
  189. tccli/services/pts/pts_client.py +240 -96
  190. tccli/services/quota/__init__.py +4 -0
  191. tccli/services/quota/quota_client.py +434 -0
  192. tccli/services/quota/v20241204/api.json +548 -0
  193. tccli/services/quota/v20241204/examples.json +51 -0
  194. tccli/services/rce/rce_client.py +5 -2
  195. tccli/services/redis/redis_client.py +698 -212
  196. tccli/services/redis/v20180412/api.json +968 -563
  197. tccli/services/redis/v20180412/examples.json +98 -56
  198. tccli/services/region/__init__.py +4 -0
  199. tccli/services/region/region_client.py +322 -0
  200. tccli/services/region/v20220627/api.json +399 -0
  201. tccli/services/region/v20220627/examples.json +29 -0
  202. tccli/services/rum/rum_client.py +300 -120
  203. tccli/services/scf/scf_client.py +210 -84
  204. tccli/services/ses/ses_client.py +368 -69
  205. tccli/services/ses/v20201002/api.json +240 -0
  206. tccli/services/ses/v20201002/examples.json +32 -0
  207. tccli/services/smh/__init__.py +4 -0
  208. tccli/services/smh/smh_client.py +714 -0
  209. tccli/services/smh/v20210712/api.json +1287 -0
  210. tccli/services/smh/v20210712/examples.json +85 -0
  211. tccli/services/sms/sms_client.py +90 -36
  212. tccli/services/sqlserver/sqlserver_client.py +3855 -470
  213. tccli/services/sqlserver/v20180328/api.json +9757 -3347
  214. tccli/services/sqlserver/v20180328/examples.json +480 -20
  215. tccli/services/ssl/ssl_client.py +504 -72
  216. tccli/services/ssl/v20191205/api.json +789 -21
  217. tccli/services/ssl/v20191205/examples.json +54 -0
  218. tccli/services/ssm/ssm_client.py +120 -48
  219. tccli/services/sts/sts_client.py +25 -10
  220. tccli/services/tag/tag_client.py +150 -60
  221. tccli/services/tat/tat_client.py +95 -38
  222. tccli/services/tbaas/__init__.py +4 -0
  223. tccli/services/tbaas/tbaas_client.py +378 -0
  224. tccli/services/tbaas/v20180416/api.json +551 -0
  225. tccli/services/tbaas/v20180416/examples.json +37 -0
  226. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  227. tccli/services/tcaplusdb/v20190823/api.json +836 -760
  228. tccli/services/tcaplusdb/v20190823/examples.json +3 -3
  229. tccli/services/tchd/tchd_client.py +5 -2
  230. tccli/services/tcmpp/tcmpp_client.py +520 -208
  231. tccli/services/tcr/tcr_client.py +380 -152
  232. tccli/services/tcsas/tcsas_client.py +295 -118
  233. tccli/services/tcsas/v20250106/api.json +155 -79
  234. tccli/services/tcsas/v20250106/examples.json +3 -3
  235. tccli/services/tcss/tcss_client.py +1650 -660
  236. tccli/services/tdid/tdid_client.py +240 -96
  237. tccli/services/tdmq/tdmq_client.py +2876 -466
  238. tccli/services/tdmq/v20200217/api.json +11607 -3958
  239. tccli/services/tdmq/v20200217/examples.json +562 -264
  240. tccli/services/tem/tem_client.py +280 -112
  241. tccli/services/teo/teo_client.py +4507 -966
  242. tccli/services/teo/v20220901/api.json +7341 -1405
  243. tccli/services/teo/v20220901/examples.json +679 -99
  244. tccli/services/tione/__init__.py +4 -0
  245. tccli/services/tione/tione_client.py +210 -0
  246. tccli/services/tione/v20211111/api.json +3074 -0
  247. tccli/services/tione/v20211111/examples.json +12 -0
  248. tccli/services/tiw/tiw_client.py +255 -102
  249. tccli/services/tke/tke_client.py +741 -274
  250. tccli/services/tke/v20180525/api.json +132 -7
  251. tccli/services/tke/v20180525/examples.json +42 -16
  252. tccli/services/tms/tms_client.py +5 -2
  253. tccli/services/tms/v20201229/api.json +91 -100
  254. tccli/services/tmt/tmt_client.py +5 -2
  255. tccli/services/trabbit/__init__.py +4 -0
  256. tccli/services/trabbit/trabbit_client.py +1778 -0
  257. tccli/services/trabbit/v20230418/api.json +4772 -0
  258. tccli/services/trabbit/v20230418/examples.json +237 -0
  259. tccli/services/trocket/__init__.py +4 -0
  260. tccli/services/trocket/trocket_client.py +2450 -0
  261. tccli/services/trocket/v20230308/api.json +6062 -0
  262. tccli/services/trocket/v20230308/examples.json +339 -0
  263. tccli/services/trro/trro_client.py +95 -38
  264. tccli/services/trtc/trtc_client.py +928 -192
  265. tccli/services/trtc/v20190722/api.json +1810 -256
  266. tccli/services/trtc/v20190722/examples.json +100 -6
  267. tccli/services/tts/tts_client.py +5 -2
  268. tccli/services/vclm/vclm_client.py +10 -4
  269. tccli/services/vm/v20210922/api.json +61 -30
  270. tccli/services/vm/v20210922/examples.json +0 -12
  271. tccli/services/vm/vm_client.py +20 -8
  272. tccli/services/vod/v20180717/api.json +332 -52
  273. tccli/services/vod/v20180717/examples.json +9 -1
  274. tccli/services/vod/v20240718/api.json +1105 -0
  275. tccli/services/vod/v20240718/examples.json +97 -0
  276. tccli/services/vod/vod_client.py +1316 -350
  277. tccli/services/vpc/v20170312/api.json +1166 -106
  278. tccli/services/vpc/v20170312/examples.json +197 -23
  279. tccli/services/vpc/vpc_client.py +2413 -739
  280. tccli/services/waf/v20180125/api.json +1372 -194
  281. tccli/services/waf/v20180125/examples.json +89 -1
  282. tccli/services/waf/waf_client.py +1149 -245
  283. tccli/services/wedata/v20210820/api.json +1577 -231
  284. tccli/services/wedata/v20210820/examples.json +74 -12
  285. tccli/services/wedata/v20250806/api.json +13644 -0
  286. tccli/services/wedata/v20250806/examples.json +621 -0
  287. tccli/services/wedata/wedata_client.py +6366 -1191
  288. tccli/services/yunjing/yunjing_client.py +355 -142
  289. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
  290. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +294 -230
  291. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
  292. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
  293. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
  294. {tccli_intl_en-3.0.1168.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -69,7 +72,7 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
69
72
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
73
 
71
74
 
72
- def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
75
+ def doIDCardOCR(args, parsed_globals):
73
76
  g_param = parse_global_arg(parsed_globals)
74
77
 
75
78
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -79,7 +82,10 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,18 +97,18 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
98
104
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
99
105
  client._sdkVersion += ("_CLI_" + __version__)
100
106
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.RecognizePhilippinesSssIDOCRRequest()
107
+ model = models.IDCardOCRRequest()
102
108
  model.from_json_string(json.dumps(args))
103
109
  start_time = time.time()
104
110
  while True:
105
- rsp = client.RecognizePhilippinesSssIDOCR(model)
111
+ rsp = client.IDCardOCR(model)
106
112
  result = rsp.to_json_string()
107
113
  try:
108
114
  json_obj = json.loads(result)
@@ -121,7 +127,7 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
121
127
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
122
128
 
123
129
 
124
- def doIDCardOCR(args, parsed_globals):
130
+ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
125
131
  g_param = parse_global_arg(parsed_globals)
126
132
 
127
133
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -131,7 +137,10 @@ def doIDCardOCR(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,18 +152,18 @@ def doIDCardOCR(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
150
159
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
151
160
  client._sdkVersion += ("_CLI_" + __version__)
152
161
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
153
- model = models.IDCardOCRRequest()
162
+ model = models.RecognizeBrazilDriverLicenseOCRRequest()
154
163
  model.from_json_string(json.dumps(args))
155
164
  start_time = time.time()
156
165
  while True:
157
- rsp = client.IDCardOCR(model)
166
+ rsp = client.RecognizeBrazilDriverLicenseOCR(model)
158
167
  result = rsp.to_json_string()
159
168
  try:
160
169
  json_obj = json.loads(result)
@@ -173,7 +182,7 @@ def doIDCardOCR(args, parsed_globals):
173
182
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
174
183
 
175
184
 
176
- def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
185
+ def doMLIDCardOCR(args, parsed_globals):
177
186
  g_param = parse_global_arg(parsed_globals)
178
187
 
179
188
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -183,7 +192,10 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,18 +207,18 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
202
214
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
203
215
  client._sdkVersion += ("_CLI_" + __version__)
204
216
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
205
- model = models.RecognizeBrazilDriverLicenseOCRRequest()
217
+ model = models.MLIDCardOCRRequest()
206
218
  model.from_json_string(json.dumps(args))
207
219
  start_time = time.time()
208
220
  while True:
209
- rsp = client.RecognizeBrazilDriverLicenseOCR(model)
221
+ rsp = client.MLIDCardOCR(model)
210
222
  result = rsp.to_json_string()
211
223
  try:
212
224
  json_obj = json.loads(result)
@@ -225,7 +237,7 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
225
237
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
226
238
 
227
239
 
228
- def doMLIDCardOCR(args, parsed_globals):
240
+ def doGeneralAccurateOCR(args, parsed_globals):
229
241
  g_param = parse_global_arg(parsed_globals)
230
242
 
231
243
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -235,7 +247,10 @@ def doMLIDCardOCR(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,18 +262,18 @@ def doMLIDCardOCR(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
254
269
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
255
270
  client._sdkVersion += ("_CLI_" + __version__)
256
271
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
257
- model = models.MLIDCardOCRRequest()
272
+ model = models.GeneralAccurateOCRRequest()
258
273
  model.from_json_string(json.dumps(args))
259
274
  start_time = time.time()
260
275
  while True:
261
- rsp = client.MLIDCardOCR(model)
276
+ rsp = client.GeneralAccurateOCR(model)
262
277
  result = rsp.to_json_string()
263
278
  try:
264
279
  json_obj = json.loads(result)
@@ -277,7 +292,7 @@ def doMLIDCardOCR(args, parsed_globals):
277
292
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
278
293
 
279
294
 
280
- def doGeneralAccurateOCR(args, parsed_globals):
295
+ def doSmartStructuralOCRV2(args, parsed_globals):
281
296
  g_param = parse_global_arg(parsed_globals)
282
297
 
283
298
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -287,7 +302,10 @@ def doGeneralAccurateOCR(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,18 +317,18 @@ def doGeneralAccurateOCR(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
306
324
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
307
325
  client._sdkVersion += ("_CLI_" + __version__)
308
326
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
309
- model = models.GeneralAccurateOCRRequest()
327
+ model = models.SmartStructuralOCRV2Request()
310
328
  model.from_json_string(json.dumps(args))
311
329
  start_time = time.time()
312
330
  while True:
313
- rsp = client.GeneralAccurateOCR(model)
331
+ rsp = client.SmartStructuralOCRV2(model)
314
332
  result = rsp.to_json_string()
315
333
  try:
316
334
  json_obj = json.loads(result)
@@ -329,7 +347,7 @@ def doGeneralAccurateOCR(args, parsed_globals):
329
347
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
348
 
331
349
 
332
- def doSmartStructuralOCRV2(args, parsed_globals):
350
+ def doRecognizeTableAccurateOCR(args, parsed_globals):
333
351
  g_param = parse_global_arg(parsed_globals)
334
352
 
335
353
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -339,7 +357,10 @@ def doSmartStructuralOCRV2(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,18 +372,18 @@ def doSmartStructuralOCRV2(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
358
379
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
359
380
  client._sdkVersion += ("_CLI_" + __version__)
360
381
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.SmartStructuralOCRV2Request()
382
+ model = models.RecognizeTableAccurateOCRRequest()
362
383
  model.from_json_string(json.dumps(args))
363
384
  start_time = time.time()
364
385
  while True:
365
- rsp = client.SmartStructuralOCRV2(model)
386
+ rsp = client.RecognizeTableAccurateOCR(model)
366
387
  result = rsp.to_json_string()
367
388
  try:
368
389
  json_obj = json.loads(result)
@@ -381,7 +402,7 @@ def doSmartStructuralOCRV2(args, parsed_globals):
381
402
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
403
 
383
404
 
384
- def doRecognizeTableAccurateOCR(args, parsed_globals):
405
+ def doRecognizeDetectCardCoords(args, parsed_globals):
385
406
  g_param = parse_global_arg(parsed_globals)
386
407
 
387
408
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -391,7 +412,10 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,18 +427,18 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
410
434
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
411
435
  client._sdkVersion += ("_CLI_" + __version__)
412
436
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
413
- model = models.RecognizeTableAccurateOCRRequest()
437
+ model = models.RecognizeDetectCardCoordsRequest()
414
438
  model.from_json_string(json.dumps(args))
415
439
  start_time = time.time()
416
440
  while True:
417
- rsp = client.RecognizeTableAccurateOCR(model)
441
+ rsp = client.RecognizeDetectCardCoords(model)
418
442
  result = rsp.to_json_string()
419
443
  try:
420
444
  json_obj = json.loads(result)
@@ -443,7 +467,10 @@ def doVinOCR(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doVinOCR(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +522,10 @@ def doMLIDPassportOCR(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,7 +537,7 @@ def doMLIDPassportOCR(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +577,10 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -589,6 +622,61 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
589
622
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
623
 
591
624
 
625
+ def doApplyCardVerificationExternal(args, parsed_globals):
626
+ g_param = parse_global_arg(parsed_globals)
627
+
628
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
629
+ cred = credential.CVMRoleCredential()
630
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
631
+ cred = credential.STSAssumeRoleCredential(
632
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
633
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
634
+ )
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
639
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
640
+ else:
641
+ cred = credential.Credential(
642
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
643
+ )
644
+ http_profile = HttpProfile(
645
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
646
+ reqMethod="POST",
647
+ endpoint=g_param[OptionsDefine.Endpoint],
648
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
649
+ )
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
651
+ if g_param[OptionsDefine.Language]:
652
+ profile.language = g_param[OptionsDefine.Language]
653
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
654
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
655
+ client._sdkVersion += ("_CLI_" + __version__)
656
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
657
+ model = models.ApplyCardVerificationExternalRequest()
658
+ model.from_json_string(json.dumps(args))
659
+ start_time = time.time()
660
+ while True:
661
+ rsp = client.ApplyCardVerificationExternal(model)
662
+ result = rsp.to_json_string()
663
+ try:
664
+ json_obj = json.loads(result)
665
+ except TypeError as e:
666
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
667
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
668
+ break
669
+ cur_time = time.time()
670
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
671
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
672
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
673
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
674
+ else:
675
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
676
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
677
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
678
+
679
+
592
680
  def doHKIDCardOCR(args, parsed_globals):
593
681
  g_param = parse_global_arg(parsed_globals)
594
682
 
@@ -599,7 +687,10 @@ def doHKIDCardOCR(args, parsed_globals):
599
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
689
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
695
  else:
605
696
  cred = credential.Credential(
@@ -611,7 +702,7 @@ def doHKIDCardOCR(args, parsed_globals):
611
702
  endpoint=g_param[OptionsDefine.Endpoint],
612
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
704
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
706
  if g_param[OptionsDefine.Language]:
616
707
  profile.language = g_param[OptionsDefine.Language]
617
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +742,10 @@ def doGeneralBasicOCR(args, parsed_globals):
651
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
744
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
750
  else:
657
751
  cred = credential.Credential(
@@ -663,7 +757,7 @@ def doGeneralBasicOCR(args, parsed_globals):
663
757
  endpoint=g_param[OptionsDefine.Endpoint],
664
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
759
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
761
  if g_param[OptionsDefine.Language]:
668
762
  profile.language = g_param[OptionsDefine.Language]
669
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +797,10 @@ def doPermitOCR(args, parsed_globals):
703
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
799
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
805
  else:
709
806
  cred = credential.Credential(
@@ -715,7 +812,7 @@ def doPermitOCR(args, parsed_globals):
715
812
  endpoint=g_param[OptionsDefine.Endpoint],
716
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
814
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
816
  if g_param[OptionsDefine.Language]:
720
817
  profile.language = g_param[OptionsDefine.Language]
721
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +852,10 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
755
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
854
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
860
  else:
761
861
  cred = credential.Credential(
@@ -767,7 +867,7 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
767
867
  endpoint=g_param[OptionsDefine.Endpoint],
768
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
869
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
871
  if g_param[OptionsDefine.Language]:
772
872
  profile.language = g_param[OptionsDefine.Language]
773
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -797,6 +897,61 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
797
897
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
898
 
799
899
 
900
+ def doGetCardVerificationExternalResult(args, parsed_globals):
901
+ g_param = parse_global_arg(parsed_globals)
902
+
903
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
904
+ cred = credential.CVMRoleCredential()
905
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
906
+ cred = credential.STSAssumeRoleCredential(
907
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
908
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
909
+ )
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
914
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
915
+ else:
916
+ cred = credential.Credential(
917
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
918
+ )
919
+ http_profile = HttpProfile(
920
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
921
+ reqMethod="POST",
922
+ endpoint=g_param[OptionsDefine.Endpoint],
923
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
924
+ )
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
926
+ if g_param[OptionsDefine.Language]:
927
+ profile.language = g_param[OptionsDefine.Language]
928
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
929
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
930
+ client._sdkVersion += ("_CLI_" + __version__)
931
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
932
+ model = models.GetCardVerificationExternalResultRequest()
933
+ model.from_json_string(json.dumps(args))
934
+ start_time = time.time()
935
+ while True:
936
+ rsp = client.GetCardVerificationExternalResult(model)
937
+ result = rsp.to_json_string()
938
+ try:
939
+ json_obj = json.loads(result)
940
+ except TypeError as e:
941
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
942
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
943
+ break
944
+ cur_time = time.time()
945
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
946
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
947
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
948
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
949
+ else:
950
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
951
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
952
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
953
+
954
+
800
955
  def doRecognizeMacaoIDCardOCR(args, parsed_globals):
801
956
  g_param = parse_global_arg(parsed_globals)
802
957
 
@@ -807,7 +962,10 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
807
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
964
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
970
  else:
813
971
  cred = credential.Credential(
@@ -819,7 +977,7 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
819
977
  endpoint=g_param[OptionsDefine.Endpoint],
820
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
979
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
981
  if g_param[OptionsDefine.Language]:
824
982
  profile.language = g_param[OptionsDefine.Language]
825
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -849,6 +1007,61 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
849
1007
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
1008
 
851
1009
 
1010
+ def doRecognizeBrazilCommonOCR(args, parsed_globals):
1011
+ g_param = parse_global_arg(parsed_globals)
1012
+
1013
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1014
+ cred = credential.CVMRoleCredential()
1015
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1016
+ cred = credential.STSAssumeRoleCredential(
1017
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
+ )
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1024
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1025
+ else:
1026
+ cred = credential.Credential(
1027
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1028
+ )
1029
+ http_profile = HttpProfile(
1030
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1031
+ reqMethod="POST",
1032
+ endpoint=g_param[OptionsDefine.Endpoint],
1033
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1034
+ )
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1036
+ if g_param[OptionsDefine.Language]:
1037
+ profile.language = g_param[OptionsDefine.Language]
1038
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1039
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1040
+ client._sdkVersion += ("_CLI_" + __version__)
1041
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1042
+ model = models.RecognizeBrazilCommonOCRRequest()
1043
+ model.from_json_string(json.dumps(args))
1044
+ start_time = time.time()
1045
+ while True:
1046
+ rsp = client.RecognizeBrazilCommonOCR(model)
1047
+ result = rsp.to_json_string()
1048
+ try:
1049
+ json_obj = json.loads(result)
1050
+ except TypeError as e:
1051
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1052
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1053
+ break
1054
+ cur_time = time.time()
1055
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1056
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1057
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1058
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1059
+ else:
1060
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1061
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1062
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1063
+
1064
+
852
1065
  def doTableOCR(args, parsed_globals):
853
1066
  g_param = parse_global_arg(parsed_globals)
854
1067
 
@@ -859,7 +1072,10 @@ def doTableOCR(args, parsed_globals):
859
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1074
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1080
  else:
865
1081
  cred = credential.Credential(
@@ -871,7 +1087,7 @@ def doTableOCR(args, parsed_globals):
871
1087
  endpoint=g_param[OptionsDefine.Endpoint],
872
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
1089
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
1091
  if g_param[OptionsDefine.Language]:
876
1092
  profile.language = g_param[OptionsDefine.Language]
877
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +1127,10 @@ def doHmtResidentPermitOCR(args, parsed_globals):
911
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1129
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1135
  else:
917
1136
  cred = credential.Credential(
@@ -923,7 +1142,7 @@ def doHmtResidentPermitOCR(args, parsed_globals):
923
1142
  endpoint=g_param[OptionsDefine.Endpoint],
924
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1144
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1146
  if g_param[OptionsDefine.Language]:
928
1147
  profile.language = g_param[OptionsDefine.Language]
929
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -953,6 +1172,61 @@ def doHmtResidentPermitOCR(args, parsed_globals):
953
1172
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
1173
 
955
1174
 
1175
+ def doRecognizeMexicoVTID(args, parsed_globals):
1176
+ g_param = parse_global_arg(parsed_globals)
1177
+
1178
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1179
+ cred = credential.CVMRoleCredential()
1180
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1181
+ cred = credential.STSAssumeRoleCredential(
1182
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1183
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1184
+ )
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1189
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1190
+ else:
1191
+ cred = credential.Credential(
1192
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1193
+ )
1194
+ http_profile = HttpProfile(
1195
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1196
+ reqMethod="POST",
1197
+ endpoint=g_param[OptionsDefine.Endpoint],
1198
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1199
+ )
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1201
+ if g_param[OptionsDefine.Language]:
1202
+ profile.language = g_param[OptionsDefine.Language]
1203
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1204
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1205
+ client._sdkVersion += ("_CLI_" + __version__)
1206
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1207
+ model = models.RecognizeMexicoVTIDRequest()
1208
+ model.from_json_string(json.dumps(args))
1209
+ start_time = time.time()
1210
+ while True:
1211
+ rsp = client.RecognizeMexicoVTID(model)
1212
+ result = rsp.to_json_string()
1213
+ try:
1214
+ json_obj = json.loads(result)
1215
+ except TypeError as e:
1216
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1217
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1218
+ break
1219
+ cur_time = time.time()
1220
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1221
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1222
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1223
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1224
+ else:
1225
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1226
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1227
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1228
+
1229
+
956
1230
  def doLicensePlateOCR(args, parsed_globals):
957
1231
  g_param = parse_global_arg(parsed_globals)
958
1232
 
@@ -963,7 +1237,10 @@ def doLicensePlateOCR(args, parsed_globals):
963
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1239
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1245
  else:
969
1246
  cred = credential.Credential(
@@ -975,7 +1252,7 @@ def doLicensePlateOCR(args, parsed_globals):
975
1252
  endpoint=g_param[OptionsDefine.Endpoint],
976
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1254
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1256
  if g_param[OptionsDefine.Language]:
980
1257
  profile.language = g_param[OptionsDefine.Language]
981
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1005,7 +1282,7 @@ def doLicensePlateOCR(args, parsed_globals):
1005
1282
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1283
 
1007
1284
 
1008
- def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1285
+ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1009
1286
  g_param = parse_global_arg(parsed_globals)
1010
1287
 
1011
1288
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1015,7 +1292,10 @@ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1015
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1294
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1300
  else:
1021
1301
  cred = credential.Credential(
@@ -1027,18 +1307,73 @@ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1027
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1309
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1311
  if g_param[OptionsDefine.Language]:
1032
1312
  profile.language = g_param[OptionsDefine.Language]
1033
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1034
1314
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1035
1315
  client._sdkVersion += ("_CLI_" + __version__)
1036
1316
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.RecognizeMainlandIDCardOCRRequest()
1317
+ model = models.RecognizeKoreanIDCardOCRRequest()
1038
1318
  model.from_json_string(json.dumps(args))
1039
1319
  start_time = time.time()
1040
1320
  while True:
1041
- rsp = client.RecognizeMainlandIDCardOCR(model)
1321
+ rsp = client.RecognizeKoreanIDCardOCR(model)
1322
+ result = rsp.to_json_string()
1323
+ try:
1324
+ json_obj = json.loads(result)
1325
+ except TypeError as e:
1326
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1327
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1328
+ break
1329
+ cur_time = time.time()
1330
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1331
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1332
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1333
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1334
+ else:
1335
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1336
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1337
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1338
+
1339
+
1340
+ def doExtractDocMulti(args, parsed_globals):
1341
+ g_param = parse_global_arg(parsed_globals)
1342
+
1343
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1344
+ cred = credential.CVMRoleCredential()
1345
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1346
+ cred = credential.STSAssumeRoleCredential(
1347
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1348
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1349
+ )
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1354
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1355
+ else:
1356
+ cred = credential.Credential(
1357
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1358
+ )
1359
+ http_profile = HttpProfile(
1360
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1361
+ reqMethod="POST",
1362
+ endpoint=g_param[OptionsDefine.Endpoint],
1363
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1364
+ )
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1366
+ if g_param[OptionsDefine.Language]:
1367
+ profile.language = g_param[OptionsDefine.Language]
1368
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1369
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1370
+ client._sdkVersion += ("_CLI_" + __version__)
1371
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1372
+ model = models.ExtractDocMultiRequest()
1373
+ model.from_json_string(json.dumps(args))
1374
+ start_time = time.time()
1375
+ while True:
1376
+ rsp = client.ExtractDocMulti(model)
1042
1377
  result = rsp.to_json_string()
1043
1378
  try:
1044
1379
  json_obj = json.loads(result)
@@ -1067,7 +1402,10 @@ def doSealOCR(args, parsed_globals):
1067
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1404
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1410
  else:
1073
1411
  cred = credential.Credential(
@@ -1079,7 +1417,7 @@ def doSealOCR(args, parsed_globals):
1079
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1419
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1421
  if g_param[OptionsDefine.Language]:
1084
1422
  profile.language = g_param[OptionsDefine.Language]
1085
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1119,7 +1457,10 @@ def doRecognizePhilippinesVoteIDOCR(args, parsed_globals):
1119
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1459
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1465
  else:
1125
1466
  cred = credential.Credential(
@@ -1131,7 +1472,7 @@ def doRecognizePhilippinesVoteIDOCR(args, parsed_globals):
1131
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1474
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1476
  if g_param[OptionsDefine.Language]:
1136
1477
  profile.language = g_param[OptionsDefine.Language]
1137
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1512,10 @@ def doRecognizeBrazilIDCardOCR(args, parsed_globals):
1171
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1514
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1520
  else:
1177
1521
  cred = credential.Credential(
@@ -1183,7 +1527,7 @@ def doRecognizeBrazilIDCardOCR(args, parsed_globals):
1183
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1529
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1531
  if g_param[OptionsDefine.Language]:
1188
1532
  profile.language = g_param[OptionsDefine.Language]
1189
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1567,10 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1223
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1569
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1575
  else:
1229
1576
  cred = credential.Credential(
@@ -1235,7 +1582,7 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1235
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1584
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1586
  if g_param[OptionsDefine.Language]:
1240
1587
  profile.language = g_param[OptionsDefine.Language]
1241
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1265,6 +1612,61 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1265
1612
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1266
1613
 
1267
1614
 
1615
+ def doRecognizeBrazilRNMOCR(args, parsed_globals):
1616
+ g_param = parse_global_arg(parsed_globals)
1617
+
1618
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1619
+ cred = credential.CVMRoleCredential()
1620
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1621
+ cred = credential.STSAssumeRoleCredential(
1622
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1623
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1624
+ )
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1629
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1630
+ else:
1631
+ cred = credential.Credential(
1632
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1633
+ )
1634
+ http_profile = HttpProfile(
1635
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1636
+ reqMethod="POST",
1637
+ endpoint=g_param[OptionsDefine.Endpoint],
1638
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1639
+ )
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1641
+ if g_param[OptionsDefine.Language]:
1642
+ profile.language = g_param[OptionsDefine.Language]
1643
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1644
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1645
+ client._sdkVersion += ("_CLI_" + __version__)
1646
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1647
+ model = models.RecognizeBrazilRNMOCRRequest()
1648
+ model.from_json_string(json.dumps(args))
1649
+ start_time = time.time()
1650
+ while True:
1651
+ rsp = client.RecognizeBrazilRNMOCR(model)
1652
+ result = rsp.to_json_string()
1653
+ try:
1654
+ json_obj = json.loads(result)
1655
+ except TypeError as e:
1656
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1657
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1658
+ break
1659
+ cur_time = time.time()
1660
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1661
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1662
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1663
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1664
+ else:
1665
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1666
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1667
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1668
+
1669
+
1268
1670
  def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1269
1671
  g_param = parse_global_arg(parsed_globals)
1270
1672
 
@@ -1275,7 +1677,10 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1275
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1679
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1685
  else:
1281
1686
  cred = credential.Credential(
@@ -1287,7 +1692,7 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1287
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1694
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1696
  if g_param[OptionsDefine.Language]:
1292
1697
  profile.language = g_param[OptionsDefine.Language]
1293
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1317,7 +1722,7 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1317
1722
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
1723
 
1319
1724
 
1320
- def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1725
+ def doBankCardOCR(args, parsed_globals):
1321
1726
  g_param = parse_global_arg(parsed_globals)
1322
1727
 
1323
1728
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1327,7 +1732,10 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1327
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1734
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1740
  else:
1333
1741
  cred = credential.Credential(
@@ -1339,18 +1747,18 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1339
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1749
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1751
  if g_param[OptionsDefine.Language]:
1344
1752
  profile.language = g_param[OptionsDefine.Language]
1345
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1346
1754
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1347
1755
  client._sdkVersion += ("_CLI_" + __version__)
1348
1756
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1349
- model = models.RecognizeKoreanIDCardOCRRequest()
1757
+ model = models.BankCardOCRRequest()
1350
1758
  model.from_json_string(json.dumps(args))
1351
1759
  start_time = time.time()
1352
1760
  while True:
1353
- rsp = client.RecognizeKoreanIDCardOCR(model)
1761
+ rsp = client.BankCardOCR(model)
1354
1762
  result = rsp.to_json_string()
1355
1763
  try:
1356
1764
  json_obj = json.loads(result)
@@ -1379,7 +1787,10 @@ def doMainlandPermitOCR(args, parsed_globals):
1379
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1789
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1795
  else:
1385
1796
  cred = credential.Credential(
@@ -1391,7 +1802,7 @@ def doMainlandPermitOCR(args, parsed_globals):
1391
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1804
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1806
  if g_param[OptionsDefine.Language]:
1396
1807
  profile.language = g_param[OptionsDefine.Language]
1397
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1421,7 +1832,7 @@ def doMainlandPermitOCR(args, parsed_globals):
1421
1832
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1422
1833
 
1423
1834
 
1424
- def doBankCardOCR(args, parsed_globals):
1835
+ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
1425
1836
  g_param = parse_global_arg(parsed_globals)
1426
1837
 
1427
1838
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1431,7 +1842,10 @@ def doBankCardOCR(args, parsed_globals):
1431
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1844
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1850
  else:
1437
1851
  cred = credential.Credential(
@@ -1443,18 +1857,18 @@ def doBankCardOCR(args, parsed_globals):
1443
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1859
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1861
  if g_param[OptionsDefine.Language]:
1448
1862
  profile.language = g_param[OptionsDefine.Language]
1449
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1450
1864
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1451
1865
  client._sdkVersion += ("_CLI_" + __version__)
1452
1866
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1453
- model = models.BankCardOCRRequest()
1867
+ model = models.RecognizePhilippinesSssIDOCRRequest()
1454
1868
  model.from_json_string(json.dumps(args))
1455
1869
  start_time = time.time()
1456
1870
  while True:
1457
- rsp = client.BankCardOCR(model)
1871
+ rsp = client.RecognizePhilippinesSssIDOCR(model)
1458
1872
  result = rsp.to_json_string()
1459
1873
  try:
1460
1874
  json_obj = json.loads(result)
@@ -1483,7 +1897,10 @@ def doRecognizePhilippinesDrivingLicenseOCR(args, parsed_globals):
1483
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1899
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1905
  else:
1489
1906
  cred = credential.Credential(
@@ -1495,7 +1912,7 @@ def doRecognizePhilippinesDrivingLicenseOCR(args, parsed_globals):
1495
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1914
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1916
  if g_param[OptionsDefine.Language]:
1500
1917
  profile.language = g_param[OptionsDefine.Language]
1501
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1952,10 @@ def doSmartStructuralPro(args, parsed_globals):
1535
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1954
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1960
  else:
1541
1961
  cred = credential.Credential(
@@ -1547,7 +1967,7 @@ def doSmartStructuralPro(args, parsed_globals):
1547
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1969
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1971
  if g_param[OptionsDefine.Language]:
1552
1972
  profile.language = g_param[OptionsDefine.Language]
1553
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +2007,10 @@ def doRecognizeIndonesiaIDCardOCR(args, parsed_globals):
1587
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
2009
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
2015
  else:
1593
2016
  cred = credential.Credential(
@@ -1599,7 +2022,7 @@ def doRecognizeIndonesiaIDCardOCR(args, parsed_globals):
1599
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1600
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
2024
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
2026
  if g_param[OptionsDefine.Language]:
1604
2027
  profile.language = g_param[OptionsDefine.Language]
1605
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +2062,10 @@ def doRecognizePhilippinesTinIDOCR(args, parsed_globals):
1639
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
2064
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
2070
  else:
1645
2071
  cred = credential.Credential(
@@ -1651,7 +2077,7 @@ def doRecognizePhilippinesTinIDOCR(args, parsed_globals):
1651
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1652
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
2079
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
2081
  if g_param[OptionsDefine.Language]:
1656
2082
  profile.language = g_param[OptionsDefine.Language]
1657
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +2117,10 @@ def doRecognizeKoreanDrivingLicenseOCR(args, parsed_globals):
1691
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
2119
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
2125
  else:
1697
2126
  cred = credential.Credential(
@@ -1703,7 +2132,7 @@ def doRecognizeKoreanDrivingLicenseOCR(args, parsed_globals):
1703
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1704
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
2134
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
2136
  if g_param[OptionsDefine.Language]:
1708
2137
  profile.language = g_param[OptionsDefine.Language]
1709
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +2172,10 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1743
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2174
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2180
  else:
1749
2181
  cred = credential.Credential(
@@ -1755,7 +2187,7 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1755
2187
  endpoint=g_param[OptionsDefine.Endpoint],
1756
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
2189
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
2191
  if g_param[OptionsDefine.Language]:
1760
2192
  profile.language = g_param[OptionsDefine.Language]
1761
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1785,6 +2217,61 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1785
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1786
2218
 
1787
2219
 
2220
+ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
2221
+ g_param = parse_global_arg(parsed_globals)
2222
+
2223
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2224
+ cred = credential.CVMRoleCredential()
2225
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2226
+ cred = credential.STSAssumeRoleCredential(
2227
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2228
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2229
+ )
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2234
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2235
+ else:
2236
+ cred = credential.Credential(
2237
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2238
+ )
2239
+ http_profile = HttpProfile(
2240
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2241
+ reqMethod="POST",
2242
+ endpoint=g_param[OptionsDefine.Endpoint],
2243
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2244
+ )
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2246
+ if g_param[OptionsDefine.Language]:
2247
+ profile.language = g_param[OptionsDefine.Language]
2248
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2249
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
2250
+ client._sdkVersion += ("_CLI_" + __version__)
2251
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
2252
+ model = models.RecognizeMainlandIDCardOCRRequest()
2253
+ model.from_json_string(json.dumps(args))
2254
+ start_time = time.time()
2255
+ while True:
2256
+ rsp = client.RecognizeMainlandIDCardOCR(model)
2257
+ result = rsp.to_json_string()
2258
+ try:
2259
+ json_obj = json.loads(result)
2260
+ except TypeError as e:
2261
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
2262
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2263
+ break
2264
+ cur_time = time.time()
2265
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2266
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2267
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2268
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2269
+ else:
2270
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2271
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2272
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2273
+
2274
+
1788
2275
  CLIENT_MAP = {
1789
2276
  "v20181119": ocr_client_v20181119,
1790
2277
 
@@ -1797,39 +2284,46 @@ MODELS_MAP = {
1797
2284
 
1798
2285
  ACTION_MAP = {
1799
2286
  "RecognizeThaiPinkCard": doRecognizeThaiPinkCard,
1800
- "RecognizePhilippinesSssIDOCR": doRecognizePhilippinesSssIDOCR,
1801
2287
  "IDCardOCR": doIDCardOCR,
1802
2288
  "RecognizeBrazilDriverLicenseOCR": doRecognizeBrazilDriverLicenseOCR,
1803
2289
  "MLIDCardOCR": doMLIDCardOCR,
1804
2290
  "GeneralAccurateOCR": doGeneralAccurateOCR,
1805
2291
  "SmartStructuralOCRV2": doSmartStructuralOCRV2,
1806
2292
  "RecognizeTableAccurateOCR": doRecognizeTableAccurateOCR,
2293
+ "RecognizeDetectCardCoords": doRecognizeDetectCardCoords,
1807
2294
  "VinOCR": doVinOCR,
1808
2295
  "MLIDPassportOCR": doMLIDPassportOCR,
1809
2296
  "RecognizeBrazilRNEOCR": doRecognizeBrazilRNEOCR,
2297
+ "ApplyCardVerificationExternal": doApplyCardVerificationExternal,
1810
2298
  "HKIDCardOCR": doHKIDCardOCR,
1811
2299
  "GeneralBasicOCR": doGeneralBasicOCR,
1812
2300
  "PermitOCR": doPermitOCR,
1813
2301
  "RecognizeThaiIDCardOCR": doRecognizeThaiIDCardOCR,
2302
+ "GetCardVerificationExternalResult": doGetCardVerificationExternalResult,
1814
2303
  "RecognizeMacaoIDCardOCR": doRecognizeMacaoIDCardOCR,
2304
+ "RecognizeBrazilCommonOCR": doRecognizeBrazilCommonOCR,
1815
2305
  "TableOCR": doTableOCR,
1816
2306
  "HmtResidentPermitOCR": doHmtResidentPermitOCR,
2307
+ "RecognizeMexicoVTID": doRecognizeMexicoVTID,
1817
2308
  "LicensePlateOCR": doLicensePlateOCR,
1818
- "RecognizeMainlandIDCardOCR": doRecognizeMainlandIDCardOCR,
2309
+ "RecognizeKoreanIDCardOCR": doRecognizeKoreanIDCardOCR,
2310
+ "ExtractDocMulti": doExtractDocMulti,
1819
2311
  "SealOCR": doSealOCR,
1820
2312
  "RecognizePhilippinesVoteIDOCR": doRecognizePhilippinesVoteIDOCR,
1821
2313
  "RecognizeBrazilIDCardOCR": doRecognizeBrazilIDCardOCR,
1822
2314
  "RecognizePhilippinesUMIDOCR": doRecognizePhilippinesUMIDOCR,
2315
+ "RecognizeBrazilRNMOCR": doRecognizeBrazilRNMOCR,
1823
2316
  "RecognizeSingaporeIDCardOCR": doRecognizeSingaporeIDCardOCR,
1824
- "RecognizeKoreanIDCardOCR": doRecognizeKoreanIDCardOCR,
1825
- "MainlandPermitOCR": doMainlandPermitOCR,
1826
2317
  "BankCardOCR": doBankCardOCR,
2318
+ "MainlandPermitOCR": doMainlandPermitOCR,
2319
+ "RecognizePhilippinesSssIDOCR": doRecognizePhilippinesSssIDOCR,
1827
2320
  "RecognizePhilippinesDrivingLicenseOCR": doRecognizePhilippinesDrivingLicenseOCR,
1828
2321
  "SmartStructuralPro": doSmartStructuralPro,
1829
2322
  "RecognizeIndonesiaIDCardOCR": doRecognizeIndonesiaIDCardOCR,
1830
2323
  "RecognizePhilippinesTinIDOCR": doRecognizePhilippinesTinIDOCR,
1831
2324
  "RecognizeKoreanDrivingLicenseOCR": doRecognizeKoreanDrivingLicenseOCR,
1832
2325
  "RecognizeGeneralInvoice": doRecognizeGeneralInvoice,
2326
+ "RecognizeMainlandIDCardOCR": doRecognizeMainlandIDCardOCR,
1833
2327
 
1834
2328
  }
1835
2329