tccli-intl-en 3.0.1265.1__py2.py3-none-any.whl → 3.1.1.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +1 -1
  3. tccli/services/__init__.py +5 -1
  4. tccli/services/advisor/advisor_client.py +10 -4
  5. tccli/services/aiart/aiart_client.py +5 -2
  6. tccli/services/ams/ams_client.py +20 -8
  7. tccli/services/antiddos/antiddos_client.py +350 -140
  8. tccli/services/apigateway/apigateway_client.py +465 -186
  9. tccli/services/apm/apm_client.py +835 -68
  10. tccli/services/apm/v20210622/api.json +3936 -1145
  11. tccli/services/apm/v20210622/examples.json +133 -23
  12. tccli/services/asr/asr_client.py +10 -4
  13. tccli/services/autoscaling/autoscaling_client.py +290 -116
  14. tccli/services/autoscaling/v20180419/api.json +1 -1
  15. tccli/services/batch/batch_client.py +140 -56
  16. tccli/services/bi/bi_client.py +120 -48
  17. tccli/services/billing/billing_client.py +210 -84
  18. tccli/services/cam/cam_client.py +405 -162
  19. tccli/services/captcha/captcha_client.py +5 -2
  20. tccli/services/car/car_client.py +165 -66
  21. tccli/services/cbs/cbs_client.py +190 -76
  22. tccli/services/ccc/ccc_client.py +515 -146
  23. tccli/services/ccc/v20200210/api.json +511 -27
  24. tccli/services/ccc/v20200210/examples.json +24 -0
  25. tccli/services/cdb/cdb_client.py +665 -266
  26. tccli/services/cdc/cdc_client.py +100 -40
  27. tccli/services/cdn/cdn_client.py +220 -88
  28. tccli/services/cdwdoris/cdwdoris_client.py +385 -154
  29. tccli/services/cdwpg/cdwpg_client.py +120 -48
  30. tccli/services/cdz/cdz_client.py +5 -2
  31. tccli/services/cfg/cfg_client.py +80 -32
  32. tccli/services/cfs/cfs_client.py +195 -78
  33. tccli/services/cfw/cfw_client.py +330 -132
  34. tccli/services/chdfs/chdfs_client.py +145 -58
  35. tccli/services/ciam/ciam_client.py +80 -32
  36. tccli/services/ckafka/ckafka_client.py +629 -131
  37. tccli/services/ckafka/v20190819/api.json +2749 -1470
  38. tccli/services/ckafka/v20190819/examples.json +209 -155
  39. tccli/services/clb/clb_client.py +415 -166
  40. tccli/services/clb/v20180317/api.json +1022 -647
  41. tccli/services/clb/v20180317/examples.json +19 -19
  42. tccli/services/cloudaudit/cloudaudit_client.py +90 -36
  43. tccli/services/cls/cls_client.py +434 -173
  44. tccli/services/cmq/cmq_client.py +10 -4
  45. tccli/services/config/config_client.py +30 -12
  46. tccli/services/controlcenter/controlcenter_client.py +5 -2
  47. tccli/services/csip/csip_client.py +170 -68
  48. tccli/services/ctsdb/ctsdb_client.py +10 -4
  49. tccli/services/cvm/cvm_client.py +420 -168
  50. tccli/services/cvm/v20170312/api.json +280 -174
  51. tccli/services/cvm/v20170312/examples.json +116 -116
  52. tccli/services/cwp/cwp_client.py +2325 -930
  53. tccli/services/cynosdb/cynosdb_client.py +1887 -577
  54. tccli/services/cynosdb/v20190107/api.json +11763 -7697
  55. tccli/services/cynosdb/v20190107/examples.json +132 -4
  56. tccli/services/dataintegration/dataintegration_client.py +5 -2
  57. tccli/services/dayu/dayu_client.py +515 -206
  58. tccli/services/dbbrain/dbbrain_client.py +210 -84
  59. tccli/services/dc/dc_client.py +90 -36
  60. tccli/services/dcdb/dcdb_client.py +310 -124
  61. tccli/services/dlc/dlc_client.py +808 -216
  62. tccli/services/dlc/v20210125/api.json +534 -13
  63. tccli/services/dlc/v20210125/examples.json +40 -0
  64. tccli/services/dms/dms_client.py +10 -4
  65. tccli/services/dnspod/dnspod_client.py +200 -80
  66. tccli/services/domain/domain_client.py +120 -48
  67. tccli/services/dts/dts_client.py +415 -166
  68. tccli/services/eb/eb_client.py +130 -52
  69. tccli/services/ecdn/ecdn_client.py +75 -30
  70. tccli/services/ecm/ecm_client.py +620 -248
  71. tccli/services/eiam/eiam_client.py +200 -80
  72. tccli/services/emr/emr_client.py +385 -154
  73. tccli/services/es/es_client.py +105 -42
  74. tccli/services/facefusion/facefusion_client.py +15 -6
  75. tccli/services/faceid/faceid_client.py +95 -38
  76. tccli/services/faceid/v20180301/examples.json +2 -2
  77. tccli/services/gaap/gaap_client.py +440 -176
  78. tccli/services/gme/gme_client.py +50 -20
  79. tccli/services/gpm/gpm_client.py +90 -36
  80. tccli/services/gse/gse_client.py +110 -44
  81. tccli/services/gwlb/gwlb_client.py +90 -36
  82. tccli/services/iai/iai_client.py +145 -58
  83. tccli/services/iap/iap_client.py +30 -12
  84. tccli/services/ims/ims_client.py +5 -2
  85. tccli/services/intlpartnersmgt/intlpartnersmgt_client.py +210 -84
  86. tccli/services/iotcloud/iotcloud_client.py +100 -40
  87. tccli/services/ip/ip_client.py +30 -12
  88. tccli/services/kms/kms_client.py +340 -136
  89. tccli/services/lcic/lcic_client.py +265 -106
  90. tccli/services/lighthouse/lighthouse_client.py +370 -148
  91. tccli/services/live/live_client.py +600 -240
  92. tccli/services/lke/lke_client.py +450 -180
  93. tccli/services/lkeap/lkeap_client.py +142 -12
  94. tccli/services/lkeap/v20240522/api.json +263 -0
  95. tccli/services/lkeap/v20240522/examples.json +35 -1
  96. tccli/services/mariadb/mariadb_client.py +250 -100
  97. tccli/services/mdc/mdc_client.py +90 -36
  98. tccli/services/mdl/mdl_client.py +165 -66
  99. tccli/services/mdl/v20200326/api.json +186 -12
  100. tccli/services/mdl/v20200326/examples.json +16 -16
  101. tccli/services/mdp/mdp_client.py +416 -124
  102. tccli/services/mdp/v20200527/api.json +146 -14
  103. tccli/services/mdp/v20200527/examples.json +95 -79
  104. tccli/services/message/__init__.py +4 -0
  105. tccli/services/message/message_client.py +210 -0
  106. tccli/services/message/v20181225/api.json +72 -0
  107. tccli/services/message/v20181225/examples.json +13 -0
  108. tccli/services/mongodb/mongodb_client.py +369 -58
  109. tccli/services/mongodb/v20190725/api.json +811 -226
  110. tccli/services/mongodb/v20190725/examples.json +54 -22
  111. tccli/services/monitor/monitor_client.py +1008 -296
  112. tccli/services/monitor/v20180724/api.json +657 -8
  113. tccli/services/monitor/v20180724/examples.json +152 -4
  114. tccli/services/mps/mps_client.py +684 -184
  115. tccli/services/mps/v20190612/api.json +1656 -222
  116. tccli/services/mps/v20190612/examples.json +60 -10
  117. tccli/services/msp/msp_client.py +35 -14
  118. tccli/services/ocr/ocr_client.py +246 -76
  119. tccli/services/ocr/v20181119/api.json +119 -10
  120. tccli/services/ocr/v20181119/examples.json +8 -0
  121. tccli/services/omics/omics_client.py +100 -40
  122. tccli/services/organization/organization_client.py +580 -232
  123. tccli/services/postgres/postgres_client.py +455 -182
  124. tccli/services/privatedns/privatedns_client.py +155 -62
  125. tccli/services/pts/pts_client.py +240 -96
  126. tccli/services/quota/quota_client.py +229 -2
  127. tccli/services/quota/v20241204/api.json +451 -2
  128. tccli/services/quota/v20241204/examples.json +42 -3
  129. tccli/services/rce/rce_client.py +5 -2
  130. tccli/services/redis/redis_client.py +545 -218
  131. tccli/services/redis/v20180412/api.json +225 -113
  132. tccli/services/redis/v20180412/examples.json +19 -19
  133. tccli/services/region/region_client.py +15 -6
  134. tccli/services/rum/rum_client.py +300 -120
  135. tccli/services/scf/scf_client.py +210 -84
  136. tccli/services/ses/ses_client.py +145 -58
  137. tccli/services/sms/sms_client.py +90 -36
  138. tccli/services/sqlserver/sqlserver_client.py +695 -278
  139. tccli/services/ssl/ssl_client.py +190 -76
  140. tccli/services/ssm/ssm_client.py +120 -48
  141. tccli/services/sts/sts_client.py +25 -10
  142. tccli/services/tag/tag_client.py +150 -60
  143. tccli/services/tat/tat_client.py +95 -38
  144. tccli/services/tbaas/tbaas_client.py +20 -8
  145. tccli/services/tcaplusdb/tcaplusdb_client.py +260 -104
  146. tccli/services/tchd/tchd_client.py +5 -2
  147. tccli/services/tcmpp/tcmpp_client.py +520 -208
  148. tccli/services/tcr/tcr_client.py +380 -152
  149. tccli/services/tcsas/tcsas_client.py +295 -118
  150. tccli/services/tcsas/v20250106/api.json +101 -61
  151. tccli/services/tcsas/v20250106/examples.json +2 -2
  152. tccli/services/tcss/tcss_client.py +1650 -660
  153. tccli/services/tdid/tdid_client.py +240 -96
  154. tccli/services/tdmq/tdmq_client.py +470 -188
  155. tccli/services/tem/tem_client.py +280 -112
  156. tccli/services/teo/teo_client.py +1365 -483
  157. tccli/services/teo/v20220901/api.json +354 -39
  158. tccli/services/teo/v20220901/examples.json +24 -0
  159. tccli/services/tione/tione_client.py +5 -2
  160. tccli/services/tiw/tiw_client.py +255 -102
  161. tccli/services/tke/tke_client.py +690 -276
  162. tccli/services/tms/tms_client.py +5 -2
  163. tccli/services/tmt/tmt_client.py +5 -2
  164. tccli/services/trabbit/trabbit_client.py +145 -58
  165. tccli/services/trro/trro_client.py +95 -38
  166. tccli/services/trtc/trtc_client.py +255 -102
  167. tccli/services/trtc/v20190722/api.json +11 -11
  168. tccli/services/trtc/v20190722/examples.json +7 -7
  169. tccli/services/tts/tts_client.py +5 -2
  170. tccli/services/vclm/vclm_client.py +10 -4
  171. tccli/services/vm/vm_client.py +20 -8
  172. tccli/services/vod/vod_client.py +895 -358
  173. tccli/services/vpc/v20170312/api.json +970 -75
  174. tccli/services/vpc/v20170312/examples.json +106 -10
  175. tccli/services/vpc/vpc_client.py +2159 -644
  176. tccli/services/waf/waf_client.py +535 -214
  177. tccli/services/wedata/v20250806/api.json +13644 -0
  178. tccli/services/wedata/v20250806/examples.json +621 -0
  179. tccli/services/wedata/wedata_client.py +6067 -1263
  180. tccli/services/yunjing/yunjing_client.py +355 -142
  181. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/METADATA +4 -7
  182. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/RECORD +186 -180
  183. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/WHEEL +1 -1
  184. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/entry_points.txt +0 -1
  185. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/LICENSE +0 -0
  186. {tccli_intl_en-3.0.1265.1.dist-info → tccli_intl_en-3.1.1.1.dist-info}/top_level.txt +0 -0
@@ -27,7 +27,10 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doRecognizeThaiPinkCard(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doIDCardOCR(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doIDCardOCR(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doRecognizeBrazilDriverLicenseOCR(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doMLIDCardOCR(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doMLIDCardOCR(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doGeneralAccurateOCR(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doGeneralAccurateOCR(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doSmartStructuralOCRV2(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doSmartStructuralOCRV2(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -381,6 +402,61 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
381
402
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
382
403
 
383
404
 
405
+ def doRecognizeDetectCardCoords(args, parsed_globals):
406
+ g_param = parse_global_arg(parsed_globals)
407
+
408
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
409
+ cred = credential.CVMRoleCredential()
410
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
411
+ cred = credential.STSAssumeRoleCredential(
412
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
413
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
414
+ )
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
419
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
420
+ else:
421
+ cred = credential.Credential(
422
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
423
+ )
424
+ http_profile = HttpProfile(
425
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
426
+ reqMethod="POST",
427
+ endpoint=g_param[OptionsDefine.Endpoint],
428
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
429
+ )
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
431
+ if g_param[OptionsDefine.Language]:
432
+ profile.language = g_param[OptionsDefine.Language]
433
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
434
+ client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
435
+ client._sdkVersion += ("_CLI_" + __version__)
436
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
437
+ model = models.RecognizeDetectCardCoordsRequest()
438
+ model.from_json_string(json.dumps(args))
439
+ start_time = time.time()
440
+ while True:
441
+ rsp = client.RecognizeDetectCardCoords(model)
442
+ result = rsp.to_json_string()
443
+ try:
444
+ json_obj = json.loads(result)
445
+ except TypeError as e:
446
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
447
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
448
+ break
449
+ cur_time = time.time()
450
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
451
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
452
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
453
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
454
+ else:
455
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
456
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
457
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
458
+
459
+
384
460
  def doVinOCR(args, parsed_globals):
385
461
  g_param = parse_global_arg(parsed_globals)
386
462
 
@@ -391,7 +467,10 @@ def doVinOCR(args, parsed_globals):
391
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
469
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
475
  else:
397
476
  cred = credential.Credential(
@@ -403,7 +482,7 @@ def doVinOCR(args, parsed_globals):
403
482
  endpoint=g_param[OptionsDefine.Endpoint],
404
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
484
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
486
  if g_param[OptionsDefine.Language]:
408
487
  profile.language = g_param[OptionsDefine.Language]
409
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +522,10 @@ def doMLIDPassportOCR(args, parsed_globals):
443
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
524
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
530
  else:
449
531
  cred = credential.Credential(
@@ -455,7 +537,7 @@ def doMLIDPassportOCR(args, parsed_globals):
455
537
  endpoint=g_param[OptionsDefine.Endpoint],
456
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
539
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
541
  if g_param[OptionsDefine.Language]:
460
542
  profile.language = g_param[OptionsDefine.Language]
461
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -495,7 +577,10 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
495
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
579
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
585
  else:
501
586
  cred = credential.Credential(
@@ -507,7 +592,7 @@ def doRecognizeBrazilRNEOCR(args, parsed_globals):
507
592
  endpoint=g_param[OptionsDefine.Endpoint],
508
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
594
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
596
  if g_param[OptionsDefine.Language]:
512
597
  profile.language = g_param[OptionsDefine.Language]
513
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -547,7 +632,10 @@ def doHKIDCardOCR(args, parsed_globals):
547
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
634
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
640
  else:
553
641
  cred = credential.Credential(
@@ -559,7 +647,7 @@ def doHKIDCardOCR(args, parsed_globals):
559
647
  endpoint=g_param[OptionsDefine.Endpoint],
560
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
649
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
651
  if g_param[OptionsDefine.Language]:
564
652
  profile.language = g_param[OptionsDefine.Language]
565
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +687,10 @@ def doGeneralBasicOCR(args, parsed_globals):
599
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
689
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
695
  else:
605
696
  cred = credential.Credential(
@@ -611,7 +702,7 @@ def doGeneralBasicOCR(args, parsed_globals):
611
702
  endpoint=g_param[OptionsDefine.Endpoint],
612
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
704
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
706
  if g_param[OptionsDefine.Language]:
616
707
  profile.language = g_param[OptionsDefine.Language]
617
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +742,10 @@ def doPermitOCR(args, parsed_globals):
651
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
744
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
750
  else:
657
751
  cred = credential.Credential(
@@ -663,7 +757,7 @@ def doPermitOCR(args, parsed_globals):
663
757
  endpoint=g_param[OptionsDefine.Endpoint],
664
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
759
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
761
  if g_param[OptionsDefine.Language]:
668
762
  profile.language = g_param[OptionsDefine.Language]
669
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -703,7 +797,10 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
703
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
799
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
805
  else:
709
806
  cred = credential.Credential(
@@ -715,7 +812,7 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
715
812
  endpoint=g_param[OptionsDefine.Endpoint],
716
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
814
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
816
  if g_param[OptionsDefine.Language]:
720
817
  profile.language = g_param[OptionsDefine.Language]
721
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -755,7 +852,10 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
755
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
854
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
860
  else:
761
861
  cred = credential.Credential(
@@ -767,7 +867,7 @@ def doRecognizeMacaoIDCardOCR(args, parsed_globals):
767
867
  endpoint=g_param[OptionsDefine.Endpoint],
768
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
869
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
871
  if g_param[OptionsDefine.Language]:
772
872
  profile.language = g_param[OptionsDefine.Language]
773
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -807,7 +907,10 @@ def doRecognizeBrazilCommonOCR(args, parsed_globals):
807
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
909
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
915
  else:
813
916
  cred = credential.Credential(
@@ -819,7 +922,7 @@ def doRecognizeBrazilCommonOCR(args, parsed_globals):
819
922
  endpoint=g_param[OptionsDefine.Endpoint],
820
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
924
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
926
  if g_param[OptionsDefine.Language]:
824
927
  profile.language = g_param[OptionsDefine.Language]
825
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -859,7 +962,10 @@ def doTableOCR(args, parsed_globals):
859
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
964
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
970
  else:
865
971
  cred = credential.Credential(
@@ -871,7 +977,7 @@ def doTableOCR(args, parsed_globals):
871
977
  endpoint=g_param[OptionsDefine.Endpoint],
872
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
979
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
981
  if g_param[OptionsDefine.Language]:
876
982
  profile.language = g_param[OptionsDefine.Language]
877
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -911,7 +1017,10 @@ def doHmtResidentPermitOCR(args, parsed_globals):
911
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
1019
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
1025
  else:
917
1026
  cred = credential.Credential(
@@ -923,7 +1032,7 @@ def doHmtResidentPermitOCR(args, parsed_globals):
923
1032
  endpoint=g_param[OptionsDefine.Endpoint],
924
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
1034
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
1036
  if g_param[OptionsDefine.Language]:
928
1037
  profile.language = g_param[OptionsDefine.Language]
929
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -963,7 +1072,10 @@ def doRecognizeMexicoVTID(args, parsed_globals):
963
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1074
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1080
  else:
969
1081
  cred = credential.Credential(
@@ -975,7 +1087,7 @@ def doRecognizeMexicoVTID(args, parsed_globals):
975
1087
  endpoint=g_param[OptionsDefine.Endpoint],
976
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1089
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1091
  if g_param[OptionsDefine.Language]:
980
1092
  profile.language = g_param[OptionsDefine.Language]
981
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1015,7 +1127,10 @@ def doLicensePlateOCR(args, parsed_globals):
1015
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1129
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1135
  else:
1021
1136
  cred = credential.Credential(
@@ -1027,7 +1142,7 @@ def doLicensePlateOCR(args, parsed_globals):
1027
1142
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1144
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1146
  if g_param[OptionsDefine.Language]:
1032
1147
  profile.language = g_param[OptionsDefine.Language]
1033
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1067,7 +1182,10 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1067
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1184
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1190
  else:
1073
1191
  cred = credential.Credential(
@@ -1079,7 +1197,7 @@ def doRecognizeKoreanIDCardOCR(args, parsed_globals):
1079
1197
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1199
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1201
  if g_param[OptionsDefine.Language]:
1084
1202
  profile.language = g_param[OptionsDefine.Language]
1085
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1119,7 +1237,10 @@ def doExtractDocMulti(args, parsed_globals):
1119
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1239
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1245
  else:
1125
1246
  cred = credential.Credential(
@@ -1131,7 +1252,7 @@ def doExtractDocMulti(args, parsed_globals):
1131
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1254
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1256
  if g_param[OptionsDefine.Language]:
1136
1257
  profile.language = g_param[OptionsDefine.Language]
1137
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1292,10 @@ def doSealOCR(args, parsed_globals):
1171
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1294
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1300
  else:
1177
1301
  cred = credential.Credential(
@@ -1183,7 +1307,7 @@ def doSealOCR(args, parsed_globals):
1183
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1309
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1311
  if g_param[OptionsDefine.Language]:
1188
1312
  profile.language = g_param[OptionsDefine.Language]
1189
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1347,10 @@ def doRecognizePhilippinesVoteIDOCR(args, parsed_globals):
1223
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1349
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1355
  else:
1229
1356
  cred = credential.Credential(
@@ -1235,7 +1362,7 @@ def doRecognizePhilippinesVoteIDOCR(args, parsed_globals):
1235
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1364
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1366
  if g_param[OptionsDefine.Language]:
1240
1367
  profile.language = g_param[OptionsDefine.Language]
1241
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1402,10 @@ def doRecognizeBrazilIDCardOCR(args, parsed_globals):
1275
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1404
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1410
  else:
1281
1411
  cred = credential.Credential(
@@ -1287,7 +1417,7 @@ def doRecognizeBrazilIDCardOCR(args, parsed_globals):
1287
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1419
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1421
  if g_param[OptionsDefine.Language]:
1292
1422
  profile.language = g_param[OptionsDefine.Language]
1293
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1327,7 +1457,10 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1327
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1459
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1465
  else:
1333
1466
  cred = credential.Credential(
@@ -1339,7 +1472,7 @@ def doRecognizePhilippinesUMIDOCR(args, parsed_globals):
1339
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1474
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1476
  if g_param[OptionsDefine.Language]:
1344
1477
  profile.language = g_param[OptionsDefine.Language]
1345
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1512,10 @@ def doRecognizeBrazilRNMOCR(args, parsed_globals):
1379
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1514
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1520
  else:
1385
1521
  cred = credential.Credential(
@@ -1391,7 +1527,7 @@ def doRecognizeBrazilRNMOCR(args, parsed_globals):
1391
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1529
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1531
  if g_param[OptionsDefine.Language]:
1396
1532
  profile.language = g_param[OptionsDefine.Language]
1397
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1567,10 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1431
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1569
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1575
  else:
1437
1576
  cred = credential.Credential(
@@ -1443,7 +1582,7 @@ def doRecognizeSingaporeIDCardOCR(args, parsed_globals):
1443
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1584
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1586
  if g_param[OptionsDefine.Language]:
1448
1587
  profile.language = g_param[OptionsDefine.Language]
1449
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1622,10 @@ def doBankCardOCR(args, parsed_globals):
1483
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1624
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1630
  else:
1489
1631
  cred = credential.Credential(
@@ -1495,7 +1637,7 @@ def doBankCardOCR(args, parsed_globals):
1495
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1639
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1641
  if g_param[OptionsDefine.Language]:
1500
1642
  profile.language = g_param[OptionsDefine.Language]
1501
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1677,10 @@ def doMainlandPermitOCR(args, parsed_globals):
1535
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1679
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1685
  else:
1541
1686
  cred = credential.Credential(
@@ -1547,7 +1692,7 @@ def doMainlandPermitOCR(args, parsed_globals):
1547
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1694
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1696
  if g_param[OptionsDefine.Language]:
1552
1697
  profile.language = g_param[OptionsDefine.Language]
1553
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +1732,10 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
1587
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1734
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1740
  else:
1593
1741
  cred = credential.Credential(
@@ -1599,7 +1747,7 @@ def doRecognizePhilippinesSssIDOCR(args, parsed_globals):
1599
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1749
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1751
  if g_param[OptionsDefine.Language]:
1604
1752
  profile.language = g_param[OptionsDefine.Language]
1605
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1787,10 @@ def doRecognizePhilippinesDrivingLicenseOCR(args, parsed_globals):
1639
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1789
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1795
  else:
1645
1796
  cred = credential.Credential(
@@ -1651,7 +1802,7 @@ def doRecognizePhilippinesDrivingLicenseOCR(args, parsed_globals):
1651
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1804
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1806
  if g_param[OptionsDefine.Language]:
1656
1807
  profile.language = g_param[OptionsDefine.Language]
1657
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +1842,10 @@ def doSmartStructuralPro(args, parsed_globals):
1691
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1844
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1850
  else:
1697
1851
  cred = credential.Credential(
@@ -1703,7 +1857,7 @@ def doSmartStructuralPro(args, parsed_globals):
1703
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1859
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1861
  if g_param[OptionsDefine.Language]:
1708
1862
  profile.language = g_param[OptionsDefine.Language]
1709
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +1897,10 @@ def doRecognizeIndonesiaIDCardOCR(args, parsed_globals):
1743
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
1899
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
1905
  else:
1749
1906
  cred = credential.Credential(
@@ -1755,7 +1912,7 @@ def doRecognizeIndonesiaIDCardOCR(args, parsed_globals):
1755
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1756
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
1914
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
1916
  if g_param[OptionsDefine.Language]:
1760
1917
  profile.language = g_param[OptionsDefine.Language]
1761
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1795,7 +1952,10 @@ def doRecognizePhilippinesTinIDOCR(args, parsed_globals):
1795
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
1954
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
1960
  else:
1801
1961
  cred = credential.Credential(
@@ -1807,7 +1967,7 @@ def doRecognizePhilippinesTinIDOCR(args, parsed_globals):
1807
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1808
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
1969
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
1971
  if g_param[OptionsDefine.Language]:
1812
1972
  profile.language = g_param[OptionsDefine.Language]
1813
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +2007,10 @@ def doRecognizeKoreanDrivingLicenseOCR(args, parsed_globals):
1847
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
2009
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
2015
  else:
1853
2016
  cred = credential.Credential(
@@ -1859,7 +2022,7 @@ def doRecognizeKoreanDrivingLicenseOCR(args, parsed_globals):
1859
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1860
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
2024
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
2026
  if g_param[OptionsDefine.Language]:
1864
2027
  profile.language = g_param[OptionsDefine.Language]
1865
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1899,7 +2062,10 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1899
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
2064
  )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
2070
  else:
1905
2071
  cred = credential.Credential(
@@ -1911,7 +2077,7 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1911
2077
  endpoint=g_param[OptionsDefine.Endpoint],
1912
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
2079
  )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1915
2081
  if g_param[OptionsDefine.Language]:
1916
2082
  profile.language = g_param[OptionsDefine.Language]
1917
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1951,7 +2117,10 @@ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1951
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2119
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2125
  else:
1957
2126
  cred = credential.Credential(
@@ -1963,7 +2132,7 @@ def doRecognizeMainlandIDCardOCR(args, parsed_globals):
1963
2132
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2134
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2136
  if g_param[OptionsDefine.Language]:
1968
2137
  profile.language = g_param[OptionsDefine.Language]
1969
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2011,6 +2180,7 @@ ACTION_MAP = {
2011
2180
  "GeneralAccurateOCR": doGeneralAccurateOCR,
2012
2181
  "SmartStructuralOCRV2": doSmartStructuralOCRV2,
2013
2182
  "RecognizeTableAccurateOCR": doRecognizeTableAccurateOCR,
2183
+ "RecognizeDetectCardCoords": doRecognizeDetectCardCoords,
2014
2184
  "VinOCR": doVinOCR,
2015
2185
  "MLIDPassportOCR": doMLIDPassportOCR,
2016
2186
  "RecognizeBrazilRNEOCR": doRecognizeBrazilRNEOCR,