tccli-intl-en 3.0.1241.1__py2.py3-none-any.whl → 3.1.16.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (239) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/services/__init__.py +29 -1
  4. tccli/services/advisor/advisor_client.py +10 -4
  5. tccli/services/ai3d/__init__.py +4 -0
  6. tccli/services/ai3d/ai3d_client.py +266 -0
  7. tccli/services/ai3d/v20250513/api.json +264 -0
  8. tccli/services/ai3d/v20250513/examples.json +20 -0
  9. tccli/services/aiart/aiart_client.py +5 -2
  10. tccli/services/ams/ams_client.py +20 -8
  11. tccli/services/antiddos/antiddos_client.py +350 -140
  12. tccli/services/apigateway/apigateway_client.py +465 -186
  13. tccli/services/apm/apm_client.py +835 -68
  14. tccli/services/apm/v20210622/api.json +3936 -1145
  15. tccli/services/apm/v20210622/examples.json +133 -23
  16. tccli/services/asr/asr_client.py +10 -4
  17. tccli/services/autoscaling/autoscaling_client.py +290 -116
  18. tccli/services/autoscaling/v20180419/api.json +78 -28
  19. tccli/services/batch/batch_client.py +140 -56
  20. tccli/services/bi/bi_client.py +1244 -6
  21. tccli/services/bi/v20220105/api.json +5340 -107
  22. tccli/services/bi/v20220105/examples.json +196 -1
  23. tccli/services/billing/billing_client.py +210 -84
  24. tccli/services/cam/cam_client.py +405 -162
  25. tccli/services/captcha/captcha_client.py +5 -2
  26. tccli/services/car/car_client.py +165 -66
  27. tccli/services/cbs/cbs_client.py +190 -76
  28. tccli/services/ccc/ccc_client.py +794 -160
  29. tccli/services/ccc/v20200210/api.json +1748 -217
  30. tccli/services/ccc/v20200210/examples.json +64 -0
  31. tccli/services/cdb/cdb_client.py +665 -266
  32. tccli/services/cdb/v20170320/api.json +334 -134
  33. tccli/services/cdb/v20170320/examples.json +3 -3
  34. tccli/services/cdc/cdc_client.py +100 -40
  35. tccli/services/cdc/v20201214/api.json +2 -2
  36. tccli/services/cdc/v20201214/examples.json +4 -4
  37. tccli/services/cdn/cdn_client.py +220 -88
  38. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  39. tccli/services/cdwpg/cdwpg_client.py +120 -48
  40. tccli/services/cdz/__init__.py +4 -0
  41. tccli/services/cdz/cdz_client.py +210 -0
  42. tccli/services/cdz/v20221123/api.json +233 -0
  43. tccli/services/cdz/v20221123/examples.json +12 -0
  44. tccli/services/cfg/cfg_client.py +80 -32
  45. tccli/services/cfs/cfs_client.py +195 -78
  46. tccli/services/cfw/cfw_client.py +330 -132
  47. tccli/services/chdfs/chdfs_client.py +145 -58
  48. tccli/services/ciam/ciam_client.py +80 -32
  49. tccli/services/ckafka/ckafka_client.py +1033 -255
  50. tccli/services/ckafka/v20190819/api.json +3378 -1681
  51. tccli/services/ckafka/v20190819/examples.json +254 -160
  52. tccli/services/clb/clb_client.py +1054 -469
  53. tccli/services/clb/v20180317/api.json +2273 -1020
  54. tccli/services/clb/v20180317/examples.json +184 -124
  55. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  56. tccli/services/cls/cls_client.py +434 -173
  57. tccli/services/cmq/cmq_client.py +14 -803
  58. tccli/services/cmq/v20190304/api.json +173 -1367
  59. tccli/services/cmq/v20190304/examples.json +0 -120
  60. tccli/services/config/config_client.py +30 -12
  61. tccli/services/controlcenter/controlcenter_client.py +229 -2
  62. tccli/services/controlcenter/v20230110/api.json +528 -5
  63. tccli/services/controlcenter/v20230110/examples.json +32 -0
  64. tccli/services/csip/csip_client.py +170 -68
  65. tccli/services/ctsdb/ctsdb_client.py +10 -4
  66. tccli/services/cvm/cvm_client.py +706 -189
  67. tccli/services/cvm/v20170312/api.json +851 -382
  68. tccli/services/cvm/v20170312/examples.json +173 -127
  69. tccli/services/cwp/cwp_client.py +2325 -930
  70. tccli/services/cynosdb/cynosdb_client.py +1887 -577
  71. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  72. tccli/services/cynosdb/v20190107/examples.json +132 -4
  73. tccli/services/dataintegration/dataintegration_client.py +5 -2
  74. tccli/services/dayu/dayu_client.py +515 -206
  75. tccli/services/dbbrain/dbbrain_client.py +210 -84
  76. tccli/services/dc/dc_client.py +90 -36
  77. tccli/services/dcdb/dcdb_client.py +310 -124
  78. tccli/services/dlc/dlc_client.py +859 -214
  79. tccli/services/dlc/v20210125/api.json +637 -13
  80. tccli/services/dlc/v20210125/examples.json +48 -0
  81. tccli/services/dms/dms_client.py +10 -4
  82. tccli/services/dnspod/dnspod_client.py +302 -76
  83. tccli/services/dnspod/v20210323/api.json +153 -0
  84. tccli/services/dnspod/v20210323/examples.json +16 -0
  85. tccli/services/domain/domain_client.py +120 -48
  86. tccli/services/dts/dts_client.py +415 -166
  87. tccli/services/eb/eb_client.py +130 -52
  88. tccli/services/ecdn/ecdn_client.py +75 -30
  89. tccli/services/ecm/ecm_client.py +620 -248
  90. tccli/services/eiam/eiam_client.py +200 -80
  91. tccli/services/emr/emr_client.py +2815 -146
  92. tccli/services/emr/v20190103/api.json +14527 -4841
  93. tccli/services/emr/v20190103/examples.json +404 -36
  94. tccli/services/es/es_client.py +105 -42
  95. tccli/services/facefusion/facefusion_client.py +15 -6
  96. tccli/services/faceid/faceid_client.py +95 -38
  97. tccli/services/faceid/v20180301/api.json +107 -14
  98. tccli/services/faceid/v20180301/examples.json +3 -3
  99. tccli/services/gaap/gaap_client.py +440 -176
  100. tccli/services/gme/gme_client.py +50 -20
  101. tccli/services/gpm/gpm_client.py +90 -36
  102. tccli/services/gse/gse_client.py +110 -44
  103. tccli/services/gwlb/gwlb_client.py +90 -36
  104. tccli/services/hunyuan/__init__.py +4 -0
  105. tccli/services/hunyuan/hunyuan_client.py +266 -0
  106. tccli/services/hunyuan/v20230901/api.json +270 -0
  107. tccli/services/hunyuan/v20230901/examples.json +20 -0
  108. tccli/services/iai/iai_client.py +145 -58
  109. tccli/services/iap/iap_client.py +30 -12
  110. tccli/services/ims/ims_client.py +5 -2
  111. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
  112. tccli/services/intlpartnersmgt/v20220928/api.json +11 -11
  113. tccli/services/iotcloud/iotcloud_client.py +100 -40
  114. tccli/services/ip/ip_client.py +30 -12
  115. tccli/services/kms/kms_client.py +340 -136
  116. tccli/services/kms/v20190118/api.json +80 -3
  117. tccli/services/kms/v20190118/examples.json +3 -3
  118. tccli/services/lcic/lcic_client.py +265 -106
  119. tccli/services/lighthouse/lighthouse_client.py +370 -148
  120. tccli/services/lighthouse/v20200324/api.json +14 -14
  121. tccli/services/lighthouse/v20200324/examples.json +5 -5
  122. tccli/services/live/live_client.py +600 -240
  123. tccli/services/lke/lke_client.py +450 -180
  124. tccli/services/lke/v20231130/api.json +182 -39
  125. tccli/services/lkeap/__init__.py +4 -0
  126. tccli/services/lkeap/lkeap_client.py +602 -0
  127. tccli/services/lkeap/v20240522/api.json +953 -0
  128. tccli/services/lkeap/v20240522/examples.json +92 -0
  129. tccli/services/mariadb/mariadb_client.py +250 -100
  130. tccli/services/mdc/mdc_client.py +90 -36
  131. tccli/services/mdl/mdl_client.py +357 -90
  132. tccli/services/mdl/v20200326/api.json +791 -24
  133. tccli/services/mdl/v20200326/examples.json +40 -16
  134. tccli/services/mdp/mdp_client.py +734 -124
  135. tccli/services/mdp/v20200527/api.json +748 -23
  136. tccli/services/mdp/v20200527/examples.json +143 -79
  137. tccli/services/message/__init__.py +4 -0
  138. tccli/services/message/message_client.py +210 -0
  139. tccli/services/message/v20181225/api.json +72 -0
  140. tccli/services/message/v20181225/examples.json +13 -0
  141. tccli/services/mongodb/mongodb_client.py +1404 -141
  142. tccli/services/mongodb/v20190725/api.json +2919 -677
  143. tccli/services/mongodb/v20190725/examples.json +190 -22
  144. tccli/services/monitor/monitor_client.py +1008 -296
  145. tccli/services/monitor/v20180724/api.json +660 -11
  146. tccli/services/monitor/v20180724/examples.json +152 -4
  147. tccli/services/mps/mps_client.py +1489 -429
  148. tccli/services/mps/v20190612/api.json +4750 -1077
  149. tccli/services/mps/v20190612/examples.json +182 -70
  150. tccli/services/msp/msp_client.py +35 -14
  151. tccli/services/ocr/ocr_client.py +417 -82
  152. tccli/services/ocr/v20181119/api.json +1486 -103
  153. tccli/services/ocr/v20181119/examples.json +42 -4
  154. tccli/services/omics/omics_client.py +100 -40
  155. tccli/services/organization/organization_client.py +580 -232
  156. tccli/services/postgres/postgres_client.py +455 -182
  157. tccli/services/privatedns/privatedns_client.py +155 -62
  158. tccli/services/pts/pts_client.py +240 -96
  159. tccli/services/quota/__init__.py +4 -0
  160. tccli/services/quota/quota_client.py +434 -0
  161. tccli/services/quota/v20241204/api.json +548 -0
  162. tccli/services/quota/v20241204/examples.json +51 -0
  163. tccli/services/rce/rce_client.py +5 -2
  164. tccli/services/redis/redis_client.py +545 -218
  165. tccli/services/redis/v20180412/api.json +225 -113
  166. tccli/services/redis/v20180412/examples.json +19 -19
  167. tccli/services/region/region_client.py +15 -6
  168. tccli/services/rum/rum_client.py +300 -120
  169. tccli/services/scf/scf_client.py +210 -84
  170. tccli/services/ses/ses_client.py +145 -58
  171. tccli/services/smh/__init__.py +4 -0
  172. tccli/services/smh/smh_client.py +714 -0
  173. tccli/services/smh/v20210712/api.json +1287 -0
  174. tccli/services/smh/v20210712/examples.json +85 -0
  175. tccli/services/sms/sms_client.py +90 -36
  176. tccli/services/sqlserver/sqlserver_client.py +3855 -470
  177. tccli/services/sqlserver/v20180328/api.json +9725 -3356
  178. tccli/services/sqlserver/v20180328/examples.json +470 -10
  179. tccli/services/ssl/ssl_client.py +190 -76
  180. tccli/services/ssm/ssm_client.py +120 -48
  181. tccli/services/sts/sts_client.py +25 -10
  182. tccli/services/tag/tag_client.py +150 -60
  183. tccli/services/tat/tat_client.py +95 -38
  184. tccli/services/tbaas/tbaas_client.py +20 -8
  185. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  186. tccli/services/tcaplusdb/v20190823/api.json +836 -760
  187. tccli/services/tcaplusdb/v20190823/examples.json +3 -3
  188. tccli/services/tchd/tchd_client.py +5 -2
  189. tccli/services/tcmpp/tcmpp_client.py +520 -208
  190. tccli/services/tcr/tcr_client.py +380 -152
  191. tccli/services/tcsas/tcsas_client.py +295 -118
  192. tccli/services/tcsas/v20250106/api.json +155 -79
  193. tccli/services/tcsas/v20250106/examples.json +3 -3
  194. tccli/services/tcss/tcss_client.py +1650 -660
  195. tccli/services/tdid/tdid_client.py +240 -96
  196. tccli/services/tdmq/tdmq_client.py +2876 -466
  197. tccli/services/tdmq/v20200217/api.json +11607 -3958
  198. tccli/services/tdmq/v20200217/examples.json +562 -264
  199. tccli/services/tem/tem_client.py +280 -112
  200. tccli/services/teo/teo_client.py +1590 -540
  201. tccli/services/teo/v20220901/api.json +703 -71
  202. tccli/services/teo/v20220901/examples.json +88 -22
  203. tccli/services/tione/__init__.py +4 -0
  204. tccli/services/tione/tione_client.py +210 -0
  205. tccli/services/tione/v20211111/api.json +3074 -0
  206. tccli/services/tione/v20211111/examples.json +12 -0
  207. tccli/services/tiw/tiw_client.py +255 -102
  208. tccli/services/tke/tke_client.py +690 -276
  209. tccli/services/tms/tms_client.py +5 -2
  210. tccli/services/tmt/tmt_client.py +5 -2
  211. tccli/services/trabbit/trabbit_client.py +145 -58
  212. tccli/services/trocket/__init__.py +4 -0
  213. tccli/services/trocket/trocket_client.py +2450 -0
  214. tccli/services/trocket/v20230308/api.json +6062 -0
  215. tccli/services/trocket/v20230308/examples.json +339 -0
  216. tccli/services/trro/trro_client.py +95 -38
  217. tccli/services/trtc/trtc_client.py +255 -102
  218. tccli/services/trtc/v20190722/api.json +135 -31
  219. tccli/services/trtc/v20190722/examples.json +7 -7
  220. tccli/services/tts/tts_client.py +5 -2
  221. tccli/services/vclm/vclm_client.py +10 -4
  222. tccli/services/vm/vm_client.py +20 -8
  223. tccli/services/vod/vod_client.py +895 -358
  224. tccli/services/vpc/v20170312/api.json +1032 -134
  225. tccli/services/vpc/v20170312/examples.json +119 -23
  226. tccli/services/vpc/vpc_client.py +2159 -644
  227. tccli/services/waf/v20180125/api.json +1372 -194
  228. tccli/services/waf/v20180125/examples.json +89 -1
  229. tccli/services/waf/waf_client.py +1149 -245
  230. tccli/services/wedata/v20250806/api.json +13644 -0
  231. tccli/services/wedata/v20250806/examples.json +621 -0
  232. tccli/services/wedata/wedata_client.py +6067 -1263
  233. tccli/services/yunjing/yunjing_client.py +355 -142
  234. {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/METADATA +4 -7
  235. {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/RECORD +239 -201
  236. {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/WHEEL +1 -1
  237. {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/entry_points.txt +0 -1
  238. {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/LICENSE +0 -0
  239. {tccli_intl_en-3.0.1241.1.dist-info → tccli_intl_en-3.1.16.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doIDCardOCR(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doIDCardOCR(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doMLIDCardOCR(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doMLIDCardOCR(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doGeneralAccurateOCR(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doGeneralAccurateOCR(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doSmartStructuralOCRV2(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doSmartStructuralOCRV2(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -381,6 +402,61 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
381
402
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
403
 
383
404
 
405
+ def doRecognizeDetectCardCoords(args, parsed_globals):
406
+ g_param = parse_global_arg(parsed_globals)
407
+
408
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
409
+ cred = credential.CVMRoleCredential()
410
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
411
+ cred = credential.STSAssumeRoleCredential(
412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
413
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
414
+ )
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
419
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
420
+ else:
421
+ cred = credential.Credential(
422
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
423
+ )
424
+ http_profile = HttpProfile(
425
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
426
+ reqMethod="POST",
427
+ endpoint=g_param[OptionsDefine.Endpoint],
428
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
429
+ )
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
431
+ if g_param[OptionsDefine.Language]:
432
+ profile.language = g_param[OptionsDefine.Language]
433
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
434
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
435
+ client._sdkVersion += ("_CLI_" + __version__)
436
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
437
+ model = models.RecognizeDetectCardCoordsRequest()
438
+ model.from_json_string(json.dumps(args))
439
+ start_time = time.time()
440
+ while True:
441
+ rsp = client.RecognizeDetectCardCoords(model)
442
+ result = rsp.to_json_string()
443
+ try:
444
+ json_obj = json.loads(result)
445
+ except TypeError as e:
446
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
447
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
448
+ break
449
+ cur_time = time.time()
450
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
451
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
452
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
453
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
454
+ else:
455
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
456
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
457
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
458
+
459
+
384
460
  def doVinOCR(args, parsed_globals):
385
461
  g_param = parse_global_arg(parsed_globals)
386
462
 
@@ -391,7 +467,10 @@ def doVinOCR(args, parsed_globals):
391
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
469
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
475
  else:
397
476
  cred = credential.Credential(
@@ -403,7 +482,7 @@ def doVinOCR(args, parsed_globals):
403
482
  endpoint=g_param[OptionsDefine.Endpoint],
404
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
484
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
486
  if g_param[OptionsDefine.Language]:
408
487
  profile.language = g_param[OptionsDefine.Language]
409
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +522,10 @@ def doMLIDPassportOCR(args, parsed_globals):
443
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
524
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
530
  else:
449
531
  cred = credential.Credential(
@@ -455,7 +537,7 @@ def doMLIDPassportOCR(args, parsed_globals):
455
537
  endpoint=g_param[OptionsDefine.Endpoint],
456
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
539
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
541
  if g_param[OptionsDefine.Language]:
460
542
  profile.language = g_param[OptionsDefine.Language]
461
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +577,10 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
495
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
579
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
585
  else:
501
586
  cred = credential.Credential(
@@ -507,7 +592,7 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
507
592
  endpoint=g_param[OptionsDefine.Endpoint],
508
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
594
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
596
  if g_param[OptionsDefine.Language]:
512
597
  profile.language = g_param[OptionsDefine.Language]
513
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -537,6 +622,61 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
537
622
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
623
 
539
624
 
625
+ def doApplyCardVerificationExternal(args, parsed_globals):
626
+ g_param = parse_global_arg(parsed_globals)
627
+
628
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
629
+ cred = credential.CVMRoleCredential()
630
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
631
+ cred = credential.STSAssumeRoleCredential(
632
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
633
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
634
+ )
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
639
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
640
+ else:
641
+ cred = credential.Credential(
642
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
643
+ )
644
+ http_profile = HttpProfile(
645
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
646
+ reqMethod="POST",
647
+ endpoint=g_param[OptionsDefine.Endpoint],
648
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
649
+ )
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
651
+ if g_param[OptionsDefine.Language]:
652
+ profile.language = g_param[OptionsDefine.Language]
653
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
654
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
655
+ client._sdkVersion += ("_CLI_" + __version__)
656
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
657
+ model = models.ApplyCardVerificationExternalRequest()
658
+ model.from_json_string(json.dumps(args))
659
+ start_time = time.time()
660
+ while True:
661
+ rsp = client.ApplyCardVerificationExternal(model)
662
+ result = rsp.to_json_string()
663
+ try:
664
+ json_obj = json.loads(result)
665
+ except TypeError as e:
666
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
667
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
668
+ break
669
+ cur_time = time.time()
670
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
671
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
672
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
673
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
674
+ else:
675
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
676
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
677
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
678
+
679
+
540
680
  def doHKIDCardOCR(args, parsed_globals):
541
681
  g_param = parse_global_arg(parsed_globals)
542
682
 
@@ -547,7 +687,10 @@ def doHKIDCardOCR(args, parsed_globals):
547
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
689
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
695
  else:
553
696
  cred = credential.Credential(
@@ -559,7 +702,7 @@ def doHKIDCardOCR(args, parsed_globals):
559
702
  endpoint=g_param[OptionsDefine.Endpoint],
560
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
704
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
706
  if g_param[OptionsDefine.Language]:
564
707
  profile.language = g_param[OptionsDefine.Language]
565
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +742,10 @@ def doGeneralBasicOCR(args, parsed_globals):
599
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
744
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
750
  else:
605
751
  cred = credential.Credential(
@@ -611,7 +757,7 @@ def doGeneralBasicOCR(args, parsed_globals):
611
757
  endpoint=g_param[OptionsDefine.Endpoint],
612
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
759
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
761
  if g_param[OptionsDefine.Language]:
616
762
  profile.language = g_param[OptionsDefine.Language]
617
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +797,10 @@ def doPermitOCR(args, parsed_globals):
651
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
799
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
805
  else:
657
806
  cred = credential.Credential(
@@ -663,7 +812,7 @@ def doPermitOCR(args, parsed_globals):
663
812
  endpoint=g_param[OptionsDefine.Endpoint],
664
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
814
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
816
  if g_param[OptionsDefine.Language]:
668
817
  profile.language = g_param[OptionsDefine.Language]
669
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +852,10 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
703
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
854
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
860
  else:
709
861
  cred = credential.Credential(
@@ -715,7 +867,7 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
715
867
  endpoint=g_param[OptionsDefine.Endpoint],
716
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
869
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
871
  if g_param[OptionsDefine.Language]:
720
872
  profile.language = g_param[OptionsDefine.Language]
721
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -745,6 +897,61 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
745
897
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
898
 
747
899
 
900
+ def doGetCardVerificationExternalResult(args, parsed_globals):
901
+ g_param = parse_global_arg(parsed_globals)
902
+
903
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
904
+ cred = credential.CVMRoleCredential()
905
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
906
+ cred = credential.STSAssumeRoleCredential(
907
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
908
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
909
+ )
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
914
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
915
+ else:
916
+ cred = credential.Credential(
917
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
918
+ )
919
+ http_profile = HttpProfile(
920
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
921
+ reqMethod="POST",
922
+ endpoint=g_param[OptionsDefine.Endpoint],
923
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
924
+ )
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
926
+ if g_param[OptionsDefine.Language]:
927
+ profile.language = g_param[OptionsDefine.Language]
928
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
929
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
930
+ client._sdkVersion += ("_CLI_" + __version__)
931
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
932
+ model = models.GetCardVerificationExternalResultRequest()
933
+ model.from_json_string(json.dumps(args))
934
+ start_time = time.time()
935
+ while True:
936
+ rsp = client.GetCardVerificationExternalResult(model)
937
+ result = rsp.to_json_string()
938
+ try:
939
+ json_obj = json.loads(result)
940
+ except TypeError as e:
941
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
942
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
943
+ break
944
+ cur_time = time.time()
945
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
946
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
947
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
948
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
949
+ else:
950
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
951
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
952
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
953
+
954
+
748
955
  def doRecognizeMacaoIDCardOCR(args, parsed_globals):
749
956
  g_param = parse_global_arg(parsed_globals)
750
957
 
@@ -755,7 +962,10 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
755
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
964
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
970
  else:
761
971
  cred = credential.Credential(
@@ -767,7 +977,7 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
767
977
  endpoint=g_param[OptionsDefine.Endpoint],
768
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
979
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
981
  if g_param[OptionsDefine.Language]:
772
982
  profile.language = g_param[OptionsDefine.Language]
773
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -797,6 +1007,61 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
797
1007
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
1008
 
799
1009
 
1010
+ def doRecognizeBrazilCommonOCR(args, parsed_globals):
1011
+ g_param = parse_global_arg(parsed_globals)
1012
+
1013
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1014
+ cred = credential.CVMRoleCredential()
1015
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1016
+ cred = credential.STSAssumeRoleCredential(
1017
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1018
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1019
+ )
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1024
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1025
+ else:
1026
+ cred = credential.Credential(
1027
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1028
+ )
1029
+ http_profile = HttpProfile(
1030
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1031
+ reqMethod="POST",
1032
+ endpoint=g_param[OptionsDefine.Endpoint],
1033
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1034
+ )
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1036
+ if g_param[OptionsDefine.Language]:
1037
+ profile.language = g_param[OptionsDefine.Language]
1038
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1039
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1040
+ client._sdkVersion += ("_CLI_" + __version__)
1041
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1042
+ model = models.RecognizeBrazilCommonOCRRequest()
1043
+ model.from_json_string(json.dumps(args))
1044
+ start_time = time.time()
1045
+ while True:
1046
+ rsp = client.RecognizeBrazilCommonOCR(model)
1047
+ result = rsp.to_json_string()
1048
+ try:
1049
+ json_obj = json.loads(result)
1050
+ except TypeError as e:
1051
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1052
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1053
+ break
1054
+ cur_time = time.time()
1055
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1056
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1057
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1058
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1059
+ else:
1060
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1061
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1062
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1063
+
1064
+
800
1065
  def doTableOCR(args, parsed_globals):
801
1066
  g_param = parse_global_arg(parsed_globals)
802
1067
 
@@ -807,7 +1072,10 @@ def doTableOCR(args, parsed_globals):
807
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
1074
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
1080
  else:
813
1081
  cred = credential.Credential(
@@ -819,7 +1087,7 @@ def doTableOCR(args, parsed_globals):
819
1087
  endpoint=g_param[OptionsDefine.Endpoint],
820
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
1089
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
1091
  if g_param[OptionsDefine.Language]:
824
1092
  profile.language = g_param[OptionsDefine.Language]
825
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +1127,10 @@ def doHmtResidentPermitOCR(args, parsed_globals):
859
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
1129
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
1135
  else:
865
1136
  cred = credential.Credential(
@@ -871,7 +1142,7 @@ def doHmtResidentPermitOCR(args, parsed_globals):
871
1142
  endpoint=g_param[OptionsDefine.Endpoint],
872
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
1144
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
1146
  if g_param[OptionsDefine.Language]:
876
1147
  profile.language = g_param[OptionsDefine.Language]
877
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +1182,10 @@ def doRecognizeMexicoVTID(args, parsed_globals):
911
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1184
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1190
  else:
917
1191
  cred = credential.Credential(
@@ -923,7 +1197,7 @@ def doRecognizeMexicoVTID(args, parsed_globals):
923
1197
  endpoint=g_param[OptionsDefine.Endpoint],
924
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1199
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1201
  if g_param[OptionsDefine.Language]:
928
1202
  profile.language = g_param[OptionsDefine.Language]
929
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -963,7 +1237,10 @@ def doLicensePlateOCR(args, parsed_globals):
963
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1239
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1245
  else:
969
1246
  cred = credential.Credential(
@@ -975,7 +1252,7 @@ def doLicensePlateOCR(args, parsed_globals):
975
1252
  endpoint=g_param[OptionsDefine.Endpoint],
976
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1254
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1256
  if g_param[OptionsDefine.Language]:
980
1257
  profile.language = g_param[OptionsDefine.Language]
981
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1292,10 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1015
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1294
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1300
  else:
1021
1301
  cred = credential.Credential(
@@ -1027,7 +1307,7 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1027
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1309
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1311
  if g_param[OptionsDefine.Language]:
1032
1312
  profile.language = g_param[OptionsDefine.Language]
1033
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1057,7 +1337,7 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1057
1337
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1338
 
1059
1339
 
1060
- def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1340
+ def doExtractDocMulti(args, parsed_globals):
1061
1341
  g_param = parse_global_arg(parsed_globals)
1062
1342
 
1063
1343
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1067,7 +1347,10 @@ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1067
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1349
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1355
  else:
1073
1356
  cred = credential.Credential(
@@ -1079,18 +1362,18 @@ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1079
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1364
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1366
  if g_param[OptionsDefine.Language]:
1084
1367
  profile.language = g_param[OptionsDefine.Language]
1085
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
1369
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1087
1370
  client._sdkVersion += ("_CLI_" + __version__)
1088
1371
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.RecognizeMainlandIDCardOCRRequest()
1372
+ model = models.ExtractDocMultiRequest()
1090
1373
  model.from_json_string(json.dumps(args))
1091
1374
  start_time = time.time()
1092
1375
  while True:
1093
- rsp = client.RecognizeMainlandIDCardOCR(model)
1376
+ rsp = client.ExtractDocMulti(model)
1094
1377
  result = rsp.to_json_string()
1095
1378
  try:
1096
1379
  json_obj = json.loads(result)
@@ -1119,7 +1402,10 @@ def doSealOCR(args, parsed_globals):
1119
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1404
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1410
  else:
1125
1411
  cred = credential.Credential(
@@ -1131,7 +1417,7 @@ def doSealOCR(args, parsed_globals):
1131
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1419
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1421
  if g_param[OptionsDefine.Language]:
1136
1422
  profile.language = g_param[OptionsDefine.Language]
1137
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1457,10 @@ def doRecognizePhilippinesVoteIDOCR(args, parsed_globals):
1171
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1459
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1465
  else:
1177
1466
  cred = credential.Credential(
@@ -1183,7 +1472,7 @@ def doRecognizePhilippinesVoteIDOCR(args, parsed_globals):
1183
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1474
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1476
  if g_param[OptionsDefine.Language]:
1188
1477
  profile.language = g_param[OptionsDefine.Language]
1189
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1512,10 @@ def doRecognizeBrazilIDCardOCR(args, parsed_globals):
1223
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1514
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1520
  else:
1229
1521
  cred = credential.Credential(
@@ -1235,7 +1527,7 @@ def doRecognizeBrazilIDCardOCR(args, parsed_globals):
1235
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1529
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1531
  if g_param[OptionsDefine.Language]:
1240
1532
  profile.language = g_param[OptionsDefine.Language]
1241
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1567,10 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1275
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1569
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1575
  else:
1281
1576
  cred = credential.Credential(
@@ -1287,7 +1582,7 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1287
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1584
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1586
  if g_param[OptionsDefine.Language]:
1292
1587
  profile.language = g_param[OptionsDefine.Language]
1293
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1327,7 +1622,10 @@ def doRecognizeBrazilRNMOCR(args, parsed_globals):
1327
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1624
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1630
  else:
1333
1631
  cred = credential.Credential(
@@ -1339,7 +1637,7 @@ def doRecognizeBrazilRNMOCR(args, parsed_globals):
1339
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1639
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1641
  if g_param[OptionsDefine.Language]:
1344
1642
  profile.language = g_param[OptionsDefine.Language]
1345
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1677,10 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1379
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1679
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1685
  else:
1385
1686
  cred = credential.Credential(
@@ -1391,7 +1692,7 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1391
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1694
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1696
  if g_param[OptionsDefine.Language]:
1396
1697
  profile.language = g_param[OptionsDefine.Language]
1397
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1732,10 @@ def doBankCardOCR(args, parsed_globals):
1431
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1734
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1740
  else:
1437
1741
  cred = credential.Credential(
@@ -1443,7 +1747,7 @@ def doBankCardOCR(args, parsed_globals):
1443
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1749
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1751
  if g_param[OptionsDefine.Language]:
1448
1752
  profile.language = g_param[OptionsDefine.Language]
1449
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1787,10 @@ def doMainlandPermitOCR(args, parsed_globals):
1483
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1789
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1795
  else:
1489
1796
  cred = credential.Credential(
@@ -1495,7 +1802,7 @@ def doMainlandPermitOCR(args, parsed_globals):
1495
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1804
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1806
  if g_param[OptionsDefine.Language]:
1500
1807
  profile.language = g_param[OptionsDefine.Language]
1501
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1842,10 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
1535
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1844
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1850
  else:
1541
1851
  cred = credential.Credential(
@@ -1547,7 +1857,7 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
1547
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1859
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1861
  if g_param[OptionsDefine.Language]:
1552
1862
  profile.language = g_param[OptionsDefine.Language]
1553
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +1897,10 @@ def doRecognizePhilippinesDrivingLicenseOCR(args, parsed_globals):
1587
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1899
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1905
  else:
1593
1906
  cred = credential.Credential(
@@ -1599,7 +1912,7 @@ def doRecognizePhilippinesDrivingLicenseOCR(args, parsed_globals):
1599
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1914
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1916
  if g_param[OptionsDefine.Language]:
1604
1917
  profile.language = g_param[OptionsDefine.Language]
1605
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1952,10 @@ def doSmartStructuralPro(args, parsed_globals):
1639
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1954
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1960
  else:
1645
1961
  cred = credential.Credential(
@@ -1651,7 +1967,7 @@ def doSmartStructuralPro(args, parsed_globals):
1651
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1969
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1971
  if g_param[OptionsDefine.Language]:
1656
1972
  profile.language = g_param[OptionsDefine.Language]
1657
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +2007,10 @@ def doRecognizeIndonesiaIDCardOCR(args, parsed_globals):
1691
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
2009
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
2015
  else:
1697
2016
  cred = credential.Credential(
@@ -1703,7 +2022,7 @@ def doRecognizeIndonesiaIDCardOCR(args, parsed_globals):
1703
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1704
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
2024
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
2026
  if g_param[OptionsDefine.Language]:
1708
2027
  profile.language = g_param[OptionsDefine.Language]
1709
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +2062,10 @@ def doRecognizePhilippinesTinIDOCR(args, parsed_globals):
1743
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
2064
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
2070
  else:
1749
2071
  cred = credential.Credential(
@@ -1755,7 +2077,7 @@ def doRecognizePhilippinesTinIDOCR(args, parsed_globals):
1755
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1756
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
2079
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
2081
  if g_param[OptionsDefine.Language]:
1760
2082
  profile.language = g_param[OptionsDefine.Language]
1761
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1795,7 +2117,10 @@ def doRecognizeKoreanDrivingLicenseOCR(args, parsed_globals):
1795
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
2119
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
2125
  else:
1801
2126
  cred = credential.Credential(
@@ -1807,7 +2132,7 @@ def doRecognizeKoreanDrivingLicenseOCR(args, parsed_globals):
1807
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1808
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
2134
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
2136
  if g_param[OptionsDefine.Language]:
1812
2137
  profile.language = g_param[OptionsDefine.Language]
1813
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +2172,10 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1847
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2174
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2180
  else:
1853
2181
  cred = credential.Credential(
@@ -1859,7 +2187,7 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1859
2187
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2189
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2191
  if g_param[OptionsDefine.Language]:
1864
2192
  profile.language = g_param[OptionsDefine.Language]
1865
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1889,7 +2217,7 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1889
2217
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
2218
 
1891
2219
 
1892
- def doExtractDocMulti(args, parsed_globals):
2220
+ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1893
2221
  g_param = parse_global_arg(parsed_globals)
1894
2222
 
1895
2223
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1899,7 +2227,10 @@ def doExtractDocMulti(args, parsed_globals):
1899
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2229
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2235
  else:
1905
2236
  cred = credential.Credential(
@@ -1911,18 +2242,18 @@ def doExtractDocMulti(args, parsed_globals):
1911
2242
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2244
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2246
  if g_param[OptionsDefine.Language]:
1916
2247
  profile.language = g_param[OptionsDefine.Language]
1917
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1918
2249
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1919
2250
  client._sdkVersion += ("_CLI_" + __version__)
1920
2251
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.ExtractDocMultiRequest()
2252
+ model = models.RecognizeMainlandIDCardOCRRequest()
1922
2253
  model.from_json_string(json.dumps(args))
1923
2254
  start_time = time.time()
1924
2255
  while True:
1925
- rsp = client.ExtractDocMulti(model)
2256
+ rsp = client.RecognizeMainlandIDCardOCR(model)
1926
2257
  result = rsp.to_json_string()
1927
2258
  try:
1928
2259
  json_obj = json.loads(result)
@@ -1959,20 +2290,24 @@ ACTION_MAP = {
1959
2290
  "GeneralAccurateOCR": doGeneralAccurateOCR,
1960
2291
  "SmartStructuralOCRV2": doSmartStructuralOCRV2,
1961
2292
  "RecognizeTableAccurateOCR": doRecognizeTableAccurateOCR,
2293
+ "RecognizeDetectCardCoords": doRecognizeDetectCardCoords,
1962
2294
  "VinOCR": doVinOCR,
1963
2295
  "MLIDPassportOCR": doMLIDPassportOCR,
1964
2296
  "RecognizeBrazilRNEOCR": doRecognizeBrazilRNEOCR,
2297
+ "ApplyCardVerificationExternal": doApplyCardVerificationExternal,
1965
2298
  "HKIDCardOCR": doHKIDCardOCR,
1966
2299
  "GeneralBasicOCR": doGeneralBasicOCR,
1967
2300
  "PermitOCR": doPermitOCR,
1968
2301
  "RecognizeThaiIDCardOCR": doRecognizeThaiIDCardOCR,
2302
+ "GetCardVerificationExternalResult": doGetCardVerificationExternalResult,
1969
2303
  "RecognizeMacaoIDCardOCR": doRecognizeMacaoIDCardOCR,
2304
+ "RecognizeBrazilCommonOCR": doRecognizeBrazilCommonOCR,
1970
2305
  "TableOCR": doTableOCR,
1971
2306
  "HmtResidentPermitOCR": doHmtResidentPermitOCR,
1972
2307
  "RecognizeMexicoVTID": doRecognizeMexicoVTID,
1973
2308
  "LicensePlateOCR": doLicensePlateOCR,
1974
2309
  "RecognizeKoreanIDCardOCR": doRecognizeKoreanIDCardOCR,
1975
- "RecognizeMainlandIDCardOCR": doRecognizeMainlandIDCardOCR,
2310
+ "ExtractDocMulti": doExtractDocMulti,
1976
2311
  "SealOCR": doSealOCR,
1977
2312
  "RecognizePhilippinesVoteIDOCR": doRecognizePhilippinesVoteIDOCR,
1978
2313
  "RecognizeBrazilIDCardOCR": doRecognizeBrazilIDCardOCR,
@@ -1988,7 +2323,7 @@ ACTION_MAP = {
1988
2323
  "RecognizePhilippinesTinIDOCR": doRecognizePhilippinesTinIDOCR,
1989
2324
  "RecognizeKoreanDrivingLicenseOCR": doRecognizeKoreanDrivingLicenseOCR,
1990
2325
  "RecognizeGeneralInvoice": doRecognizeGeneralInvoice,
1991
- "ExtractDocMulti": doExtractDocMulti,
2326
+ "RecognizeMainlandIDCardOCR": doRecognizeMainlandIDCardOCR,
1992
2327
 
1993
2328
  }
1994
2329