tccli 3.0.1083.1__py2.py3-none-any.whl → 3.0.1084.1__py2.py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
Files changed (37) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/examples/cdb/v20170320/CreateCloneInstance.md +5 -5
  3. tccli/examples/ckafka/v20190819/DescribeGroupInfo.md +2 -2
  4. tccli/examples/ckafka/v20190819/ModifyAclRule.md +1 -1
  5. tccli/examples/ess/v20201111/CreateFlowApprovers.md +34 -0
  6. tccli/examples/ess/v20201111/CreateFlowGroupByFiles.md +168 -0
  7. tccli/examples/ess/v20201111/CreateFlowGroupByTemplates.md +98 -0
  8. tccli/examples/ess/v20201111/CreateSchemeUrl.md +31 -3
  9. tccli/examples/essbasic/v20210526/ChannelCreateFlowApprovers.md +41 -0
  10. tccli/examples/essbasic/v20210526/ChannelCreateFlowGroupByFiles.md +171 -0
  11. tccli/examples/essbasic/v20210526/ChannelCreateFlowGroupByTemplates.md +92 -0
  12. tccli/examples/essbasic/v20210526/CreateSignUrls.md +52 -0
  13. tccli/examples/faceid/v20180301/GetFaceIdRiskInfo.md +26 -0
  14. tccli/examples/faceid/v20180301/GetFaceidRiskInfoToken.md +22 -0
  15. tccli/examples/live/v20180801/CreateLiveTimeShiftTemplate.md +8 -8
  16. tccli/examples/wedata/v20210820/ModifyTaskInfo.md +79 -29
  17. tccli/services/cdb/v20170320/api.json +75 -21
  18. tccli/services/cdb/v20170320/examples.json +2 -2
  19. tccli/services/ckafka/v20190819/api.json +21 -20
  20. tccli/services/ckafka/v20190819/examples.json +2 -2
  21. tccli/services/ess/v20201111/api.json +124 -12
  22. tccli/services/ess/v20201111/examples.json +26 -2
  23. tccli/services/essbasic/v20210526/api.json +121 -9
  24. tccli/services/essbasic/v20210526/examples.json +24 -0
  25. tccli/services/faceid/faceid_client.py +136 -30
  26. tccli/services/faceid/v20180301/api.json +147 -0
  27. tccli/services/faceid/v20180301/examples.json +16 -0
  28. tccli/services/live/v20180801/api.json +1 -1
  29. tccli/services/live/v20180801/examples.json +2 -2
  30. tccli/services/oceanus/v20190422/api.json +1 -1
  31. tccli/services/wedata/v20210820/api.json +29 -2
  32. tccli/services/wedata/v20210820/examples.json +8 -2
  33. {tccli-3.0.1083.1.dist-info → tccli-3.0.1084.1.dist-info}/METADATA +2 -2
  34. {tccli-3.0.1083.1.dist-info → tccli-3.0.1084.1.dist-info}/RECORD +37 -35
  35. {tccli-3.0.1083.1.dist-info → tccli-3.0.1084.1.dist-info}/WHEEL +0 -0
  36. {tccli-3.0.1083.1.dist-info → tccli-3.0.1084.1.dist-info}/entry_points.txt +0 -0
  37. {tccli-3.0.1083.1.dist-info → tccli-3.0.1084.1.dist-info}/license_files/LICENSE +0 -0
@@ -69,7 +69,7 @@ def doGetLiveCode(args, parsed_globals):
69
69
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
70
70
 
71
71
 
72
- def doGetActionSequence(args, parsed_globals):
72
+ def doGetFaceIdRiskInfo(args, parsed_globals):
73
73
  g_param = parse_global_arg(parsed_globals)
74
74
 
75
75
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -98,11 +98,11 @@ def doGetActionSequence(args, parsed_globals):
98
98
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
99
99
  client._sdkVersion += ("_CLI_" + __version__)
100
100
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
101
- model = models.GetActionSequenceRequest()
101
+ model = models.GetFaceIdRiskInfoRequest()
102
102
  model.from_json_string(json.dumps(args))
103
103
  start_time = time.time()
104
104
  while True:
105
- rsp = client.GetActionSequence(model)
105
+ rsp = client.GetFaceIdRiskInfo(model)
106
106
  result = rsp.to_json_string()
107
107
  try:
108
108
  json_obj = json.loads(result)
@@ -329,7 +329,7 @@ def doGetEidResult(args, parsed_globals):
329
329
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
330
330
 
331
331
 
332
- def doPhoneVerificationCMCC(args, parsed_globals):
332
+ def doBankCard4EVerification(args, parsed_globals):
333
333
  g_param = parse_global_arg(parsed_globals)
334
334
 
335
335
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -358,11 +358,11 @@ def doPhoneVerificationCMCC(args, parsed_globals):
358
358
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
359
359
  client._sdkVersion += ("_CLI_" + __version__)
360
360
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
361
- model = models.PhoneVerificationCMCCRequest()
361
+ model = models.BankCard4EVerificationRequest()
362
362
  model.from_json_string(json.dumps(args))
363
363
  start_time = time.time()
364
364
  while True:
365
- rsp = client.PhoneVerificationCMCC(model)
365
+ rsp = client.BankCard4EVerification(model)
366
366
  result = rsp.to_json_string()
367
367
  try:
368
368
  json_obj = json.loads(result)
@@ -433,7 +433,7 @@ def doEncryptedPhoneVerification(args, parsed_globals):
433
433
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
434
434
 
435
435
 
436
- def doGetFaceIdToken(args, parsed_globals):
436
+ def doGetActionSequence(args, parsed_globals):
437
437
  g_param = parse_global_arg(parsed_globals)
438
438
 
439
439
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -462,11 +462,11 @@ def doGetFaceIdToken(args, parsed_globals):
462
462
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
463
463
  client._sdkVersion += ("_CLI_" + __version__)
464
464
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
465
- model = models.GetFaceIdTokenRequest()
465
+ model = models.GetActionSequenceRequest()
466
466
  model.from_json_string(json.dumps(args))
467
467
  start_time = time.time()
468
468
  while True:
469
- rsp = client.GetFaceIdToken(model)
469
+ rsp = client.GetActionSequence(model)
470
470
  result = rsp.to_json_string()
471
471
  try:
472
472
  json_obj = json.loads(result)
@@ -485,7 +485,7 @@ def doGetFaceIdToken(args, parsed_globals):
485
485
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
486
 
487
487
 
488
- def doCheckPhoneAndName(args, parsed_globals):
488
+ def doGetFaceIdToken(args, parsed_globals):
489
489
  g_param = parse_global_arg(parsed_globals)
490
490
 
491
491
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -514,11 +514,11 @@ def doCheckPhoneAndName(args, parsed_globals):
514
514
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
515
515
  client._sdkVersion += ("_CLI_" + __version__)
516
516
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.CheckPhoneAndNameRequest()
517
+ model = models.GetFaceIdTokenRequest()
518
518
  model.from_json_string(json.dumps(args))
519
519
  start_time = time.time()
520
520
  while True:
521
- rsp = client.CheckPhoneAndName(model)
521
+ rsp = client.GetFaceIdToken(model)
522
522
  result = rsp.to_json_string()
523
523
  try:
524
524
  json_obj = json.loads(result)
@@ -537,7 +537,7 @@ def doCheckPhoneAndName(args, parsed_globals):
537
537
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
538
538
 
539
539
 
540
- def doBankCardVerification(args, parsed_globals):
540
+ def doCheckPhoneAndName(args, parsed_globals):
541
541
  g_param = parse_global_arg(parsed_globals)
542
542
 
543
543
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -566,11 +566,11 @@ def doBankCardVerification(args, parsed_globals):
566
566
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
567
567
  client._sdkVersion += ("_CLI_" + __version__)
568
568
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
569
- model = models.BankCardVerificationRequest()
569
+ model = models.CheckPhoneAndNameRequest()
570
570
  model.from_json_string(json.dumps(args))
571
571
  start_time = time.time()
572
572
  while True:
573
- rsp = client.BankCardVerification(model)
573
+ rsp = client.CheckPhoneAndName(model)
574
574
  result = rsp.to_json_string()
575
575
  try:
576
576
  json_obj = json.loads(result)
@@ -589,7 +589,7 @@ def doBankCardVerification(args, parsed_globals):
589
589
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
590
590
 
591
591
 
592
- def doImageRecognitionV2(args, parsed_globals):
592
+ def doBankCardVerification(args, parsed_globals):
593
593
  g_param = parse_global_arg(parsed_globals)
594
594
 
595
595
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -618,11 +618,11 @@ def doImageRecognitionV2(args, parsed_globals):
618
618
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
619
619
  client._sdkVersion += ("_CLI_" + __version__)
620
620
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
621
- model = models.ImageRecognitionV2Request()
621
+ model = models.BankCardVerificationRequest()
622
622
  model.from_json_string(json.dumps(args))
623
623
  start_time = time.time()
624
624
  while True:
625
- rsp = client.ImageRecognitionV2(model)
625
+ rsp = client.BankCardVerification(model)
626
626
  result = rsp.to_json_string()
627
627
  try:
628
628
  json_obj = json.loads(result)
@@ -641,7 +641,7 @@ def doImageRecognitionV2(args, parsed_globals):
641
641
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
642
642
 
643
643
 
644
- def doLivenessCompare(args, parsed_globals):
644
+ def doImageRecognitionV2(args, parsed_globals):
645
645
  g_param = parse_global_arg(parsed_globals)
646
646
 
647
647
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -670,11 +670,11 @@ def doLivenessCompare(args, parsed_globals):
670
670
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
671
671
  client._sdkVersion += ("_CLI_" + __version__)
672
672
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
673
- model = models.LivenessCompareRequest()
673
+ model = models.ImageRecognitionV2Request()
674
674
  model.from_json_string(json.dumps(args))
675
675
  start_time = time.time()
676
676
  while True:
677
- rsp = client.LivenessCompare(model)
677
+ rsp = client.ImageRecognitionV2(model)
678
678
  result = rsp.to_json_string()
679
679
  try:
680
680
  json_obj = json.loads(result)
@@ -693,7 +693,7 @@ def doLivenessCompare(args, parsed_globals):
693
693
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
694
 
695
695
 
696
- def doDetectAuth(args, parsed_globals):
696
+ def doLivenessCompare(args, parsed_globals):
697
697
  g_param = parse_global_arg(parsed_globals)
698
698
 
699
699
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -722,11 +722,11 @@ def doDetectAuth(args, parsed_globals):
722
722
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
723
723
  client._sdkVersion += ("_CLI_" + __version__)
724
724
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.DetectAuthRequest()
725
+ model = models.LivenessCompareRequest()
726
726
  model.from_json_string(json.dumps(args))
727
727
  start_time = time.time()
728
728
  while True:
729
- rsp = client.DetectAuth(model)
729
+ rsp = client.LivenessCompare(model)
730
730
  result = rsp.to_json_string()
731
731
  try:
732
732
  json_obj = json.loads(result)
@@ -745,7 +745,7 @@ def doDetectAuth(args, parsed_globals):
745
745
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
746
 
747
747
 
748
- def doBankCard4EVerification(args, parsed_globals):
748
+ def doDetectAuth(args, parsed_globals):
749
749
  g_param = parse_global_arg(parsed_globals)
750
750
 
751
751
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -774,11 +774,11 @@ def doBankCard4EVerification(args, parsed_globals):
774
774
  client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
775
775
  client._sdkVersion += ("_CLI_" + __version__)
776
776
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.BankCard4EVerificationRequest()
777
+ model = models.DetectAuthRequest()
778
778
  model.from_json_string(json.dumps(args))
779
779
  start_time = time.time()
780
780
  while True:
781
- rsp = client.BankCard4EVerification(model)
781
+ rsp = client.DetectAuth(model)
782
782
  result = rsp.to_json_string()
783
783
  try:
784
784
  json_obj = json.loads(result)
@@ -1161,6 +1161,58 @@ def doGetDetectInfo(args, parsed_globals):
1161
1161
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1162
1162
 
1163
1163
 
1164
+ def doPhoneVerificationCMCC(args, parsed_globals):
1165
+ g_param = parse_global_arg(parsed_globals)
1166
+
1167
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1168
+ cred = credential.CVMRoleCredential()
1169
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1170
+ cred = credential.STSAssumeRoleCredential(
1171
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
+ )
1174
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
+ else:
1177
+ cred = credential.Credential(
1178
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1179
+ )
1180
+ http_profile = HttpProfile(
1181
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1182
+ reqMethod="POST",
1183
+ endpoint=g_param[OptionsDefine.Endpoint],
1184
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
+ )
1186
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1187
+ if g_param[OptionsDefine.Language]:
1188
+ profile.language = g_param[OptionsDefine.Language]
1189
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1190
+ client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
1191
+ client._sdkVersion += ("_CLI_" + __version__)
1192
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1193
+ model = models.PhoneVerificationCMCCRequest()
1194
+ model.from_json_string(json.dumps(args))
1195
+ start_time = time.time()
1196
+ while True:
1197
+ rsp = client.PhoneVerificationCMCC(model)
1198
+ result = rsp.to_json_string()
1199
+ try:
1200
+ json_obj = json.loads(result)
1201
+ except TypeError as e:
1202
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1203
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1204
+ break
1205
+ cur_time = time.time()
1206
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1207
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1208
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1209
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1210
+ else:
1211
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1212
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1213
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
+
1215
+
1164
1216
  def doMinorsVerification(args, parsed_globals):
1165
1217
  g_param = parse_global_arg(parsed_globals)
1166
1218
 
@@ -1213,6 +1265,58 @@ def doMinorsVerification(args, parsed_globals):
1213
1265
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1214
1266
 
1215
1267
 
1268
+ def doGetFaceidRiskInfoToken(args, parsed_globals):
1269
+ g_param = parse_global_arg(parsed_globals)
1270
+
1271
+ if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1272
+ cred = credential.CVMRoleCredential()
1273
+ elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1274
+ cred = credential.STSAssumeRoleCredential(
1275
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
+ g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
+ )
1278
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
+ cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
+ else:
1281
+ cred = credential.Credential(
1282
+ g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1283
+ )
1284
+ http_profile = HttpProfile(
1285
+ reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1286
+ reqMethod="POST",
1287
+ endpoint=g_param[OptionsDefine.Endpoint],
1288
+ proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
+ )
1290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1291
+ if g_param[OptionsDefine.Language]:
1292
+ profile.language = g_param[OptionsDefine.Language]
1293
+ mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1294
+ client = mod.FaceidClient(cred, g_param[OptionsDefine.Region], profile)
1295
+ client._sdkVersion += ("_CLI_" + __version__)
1296
+ models = MODELS_MAP[g_param[OptionsDefine.Version]]
1297
+ model = models.GetFaceidRiskInfoTokenRequest()
1298
+ model.from_json_string(json.dumps(args))
1299
+ start_time = time.time()
1300
+ while True:
1301
+ rsp = client.GetFaceidRiskInfoToken(model)
1302
+ result = rsp.to_json_string()
1303
+ try:
1304
+ json_obj = json.loads(result)
1305
+ except TypeError as e:
1306
+ json_obj = json.loads(result.decode('utf-8')) # python3.3
1307
+ if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1308
+ break
1309
+ cur_time = time.time()
1310
+ if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1311
+ raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1312
+ (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1313
+ search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1314
+ else:
1315
+ print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1316
+ time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1317
+ FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1318
+
1319
+
1216
1320
  def doLiveness(args, parsed_globals):
1217
1321
  g_param = parse_global_arg(parsed_globals)
1218
1322
 
@@ -1849,20 +1953,20 @@ MODELS_MAP = {
1849
1953
 
1850
1954
  ACTION_MAP = {
1851
1955
  "GetLiveCode": doGetLiveCode,
1852
- "GetActionSequence": doGetActionSequence,
1956
+ "GetFaceIdRiskInfo": doGetFaceIdRiskInfo,
1853
1957
  "GetWeChatBillDetails": doGetWeChatBillDetails,
1854
1958
  "CheckIdCardInformation": doCheckIdCardInformation,
1855
1959
  "CheckEidTokenStatus": doCheckEidTokenStatus,
1856
1960
  "GetEidResult": doGetEidResult,
1857
- "PhoneVerificationCMCC": doPhoneVerificationCMCC,
1961
+ "BankCard4EVerification": doBankCard4EVerification,
1858
1962
  "EncryptedPhoneVerification": doEncryptedPhoneVerification,
1963
+ "GetActionSequence": doGetActionSequence,
1859
1964
  "GetFaceIdToken": doGetFaceIdToken,
1860
1965
  "CheckPhoneAndName": doCheckPhoneAndName,
1861
1966
  "BankCardVerification": doBankCardVerification,
1862
1967
  "ImageRecognitionV2": doImageRecognitionV2,
1863
1968
  "LivenessCompare": doLivenessCompare,
1864
1969
  "DetectAuth": doDetectAuth,
1865
- "BankCard4EVerification": doBankCard4EVerification,
1866
1970
  "IdCardOCRVerification": doIdCardOCRVerification,
1867
1971
  "GetFaceIdResult": doGetFaceIdResult,
1868
1972
  "ImageRecognition": doImageRecognition,
@@ -1870,7 +1974,9 @@ ACTION_MAP = {
1870
1974
  "DetectAIFakeFaces": doDetectAIFakeFaces,
1871
1975
  "PhoneVerification": doPhoneVerification,
1872
1976
  "GetDetectInfo": doGetDetectInfo,
1977
+ "PhoneVerificationCMCC": doPhoneVerificationCMCC,
1873
1978
  "MinorsVerification": doMinorsVerification,
1979
+ "GetFaceidRiskInfoToken": doGetFaceidRiskInfoToken,
1874
1980
  "Liveness": doLiveness,
1875
1981
  "PhoneVerificationCUCC": doPhoneVerificationCUCC,
1876
1982
  "LivenessRecognition": doLivenessRecognition,
@@ -119,6 +119,13 @@
119
119
  "output": "GetFaceIdResultResponse",
120
120
  "status": "online"
121
121
  },
122
+ "GetFaceIdRiskInfo": {
123
+ "document": "完成验证后,用FaceIdToken调用本接口获取设备风险相关信息,FaceIdToken生成后三天内(3\\*24\\*3,600秒)可多次拉取。",
124
+ "input": "GetFaceIdRiskInfoRequest",
125
+ "name": "获取SDK设备风险信息",
126
+ "output": "GetFaceIdRiskInfoResponse",
127
+ "status": "online"
128
+ },
122
129
  "GetFaceIdToken": {
123
130
  "document": "每次调用人脸核身SDK服务前,需先调用本接口获取SDKToken,用来串联核身流程,在验证完成后,用于获取验证结果信息,该token仅能核身一次。",
124
131
  "input": "GetFaceIdTokenRequest",
@@ -126,6 +133,13 @@
126
133
  "output": "GetFaceIdTokenResponse",
127
134
  "status": "online"
128
135
  },
136
+ "GetFaceidRiskInfoToken": {
137
+ "document": "每次调用人脸核身SDK服务前,需先调用本接口获取SDKToken,用来串联核身流程,在验证完成后,用于获取风险结果信息,该Token仅能核身一次。",
138
+ "input": "GetFaceidRiskInfoTokenRequest",
139
+ "name": "获取风险信息Token",
140
+ "output": "GetFaceidRiskInfoTokenResponse",
141
+ "status": "online"
142
+ },
129
143
  "GetLiveCode": {
130
144
  "document": "使用数字活体检测模式前,需调用本接口获取数字验证码。",
131
145
  "input": "GetLiveCodeRequest",
@@ -2781,6 +2795,93 @@
2781
2795
  ],
2782
2796
  "type": "object"
2783
2797
  },
2798
+ "GetFaceIdRiskInfoRequest": {
2799
+ "document": "GetFaceIdRiskInfo请求参数结构体",
2800
+ "members": [
2801
+ {
2802
+ "disabled": false,
2803
+ "document": "SDK人脸核身流程的标识,调用GetFaceidRiskInfoToken接口时生成。",
2804
+ "example": "CE661F1A-0F1E-45BD-BE13-34C05CEA7681",
2805
+ "member": "string",
2806
+ "name": "FaceIdToken",
2807
+ "required": true,
2808
+ "type": "string"
2809
+ }
2810
+ ],
2811
+ "type": "object"
2812
+ },
2813
+ "GetFaceIdRiskInfoResponse": {
2814
+ "document": "GetFaceIdRiskInfo返回参数结构体",
2815
+ "members": [
2816
+ {
2817
+ "disabled": false,
2818
+ "document": "描述当前请求所在设备的风险标签,详情如下: 01-设备疑似被Root/设备疑似越狱 02-设备疑似被注入 03-设备疑似为模拟器 04-设备疑似存在风险操作 05-摄像头疑似被劫持 06-疑似黑产设备\n注意:此字段可能返回 null,表示取不到有效值。",
2819
+ "example": "01_03",
2820
+ "member": "string",
2821
+ "name": "DeviceInfoTag",
2822
+ "output_required": true,
2823
+ "type": "string",
2824
+ "value_allowed_null": true
2825
+ },
2826
+ {
2827
+ "disabled": false,
2828
+ "document": "描述当前请求所在设备的风险等级,共4级,详情如下: 1 - 安全 2 - 低风险 3 - 中风险 4 - 高危 ,-1表示未获取到风险等级\n注意:此字段可能返回 null,表示取不到有效值。",
2829
+ "example": "1",
2830
+ "member": "int64",
2831
+ "name": "DeviceInfoLevel",
2832
+ "output_required": true,
2833
+ "type": "int",
2834
+ "value_allowed_null": true
2835
+ },
2836
+ {
2837
+ "disabled": false,
2838
+ "document": "设备id标识\n注意:此字段可能返回 null,表示取不到有效值。",
2839
+ "example": "无",
2840
+ "member": "string",
2841
+ "name": "OpenId",
2842
+ "output_required": true,
2843
+ "type": "string",
2844
+ "value_allowed_null": true
2845
+ },
2846
+ {
2847
+ "disabled": false,
2848
+ "document": "描述当前请求所在设备的相机指纹风险等级,共4级,详情如下: 1 - 安全 2 - 低风险 3 - 中风险 4 - 高危 ,-1表示未获取到风险等级\n注意:此字段可能返回 null,表示取不到有效值。",
2849
+ "example": "1",
2850
+ "member": "int64",
2851
+ "name": "CameraInfoLevel",
2852
+ "output_required": true,
2853
+ "type": "int",
2854
+ "value_allowed_null": true
2855
+ },
2856
+ {
2857
+ "disabled": false,
2858
+ "document": "描述当前请求所在设备的相机指纹风险标签,详情如下: 01-设备疑似被Root/设备疑似越狱 02-设备疑似被注入 03-设备疑似为模拟器 04-设备疑似存在风险操作 05-摄像头疑似被劫持 06-疑似黑产设备,空表示没有相机指纹风险\n注意:此字段可能返回 null,表示取不到有效值。",
2859
+ "example": "01_03",
2860
+ "member": "string",
2861
+ "name": "CameraInfoTag",
2862
+ "output_required": true,
2863
+ "type": "string",
2864
+ "value_allowed_null": true
2865
+ },
2866
+ {
2867
+ "disabled": false,
2868
+ "document": "获取token时透传的信息\t\n注意:此字段可能返回 null,表示取不到有效值。",
2869
+ "example": "无",
2870
+ "member": "string",
2871
+ "name": "Extra",
2872
+ "output_required": true,
2873
+ "type": "string",
2874
+ "value_allowed_null": true
2875
+ },
2876
+ {
2877
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
2878
+ "member": "string",
2879
+ "name": "RequestId",
2880
+ "type": "string"
2881
+ }
2882
+ ],
2883
+ "type": "object"
2884
+ },
2784
2885
  "GetFaceIdTokenRequest": {
2785
2886
  "document": "GetFaceIdToken请求参数结构体",
2786
2887
  "members": [
@@ -2880,6 +2981,52 @@
2880
2981
  ],
2881
2982
  "type": "object"
2882
2983
  },
2984
+ "GetFaceidRiskInfoTokenRequest": {
2985
+ "document": "GetFaceidRiskInfoToken请求参数结构体",
2986
+ "members": [
2987
+ {
2988
+ "disabled": false,
2989
+ "document": "SDK中生成的Meta字符串",
2990
+ "example": "1",
2991
+ "member": "string",
2992
+ "name": "Meta",
2993
+ "required": false,
2994
+ "type": "string"
2995
+ },
2996
+ {
2997
+ "disabled": false,
2998
+ "document": "透传参数 1000长度字符串",
2999
+ "example": "1",
3000
+ "member": "string",
3001
+ "name": "Extra",
3002
+ "required": false,
3003
+ "type": "string"
3004
+ }
3005
+ ],
3006
+ "type": "object"
3007
+ },
3008
+ "GetFaceidRiskInfoTokenResponse": {
3009
+ "document": "GetFaceidRiskInfoToken返回参数结构体",
3010
+ "members": [
3011
+ {
3012
+ "disabled": false,
3013
+ "document": "有效期 10分钟。只能完成1次核身。",
3014
+ "example": "9C6677E5-053C-425C-B5C3-D378427DFE28",
3015
+ "member": "string",
3016
+ "name": "FaceIdToken",
3017
+ "output_required": true,
3018
+ "type": "string",
3019
+ "value_allowed_null": false
3020
+ },
3021
+ {
3022
+ "document": "唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。",
3023
+ "member": "string",
3024
+ "name": "RequestId",
3025
+ "type": "string"
3026
+ }
3027
+ ],
3028
+ "type": "object"
3029
+ },
2883
3030
  "GetLiveCodeRequest": {
2884
3031
  "document": "GetLiveCode请求参数结构体",
2885
3032
  "members": [],
@@ -166,6 +166,14 @@
166
166
  "title": "获取结果成功时"
167
167
  }
168
168
  ],
169
+ "GetFaceIdRiskInfo": [
170
+ {
171
+ "document": "获取结果成功",
172
+ "input": "POST / HTTP/1.1\nHost: faceid.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: GetFaceIdRiskInfo\n<公共请求参数>\n\n{\n \"FaceIdToken\": \"CE661F1A-0F1E-45BD-BE13-34C05CEA7681\"\n}",
173
+ "output": "{\n \"Response\": {\n \"CameraInfoLevel\": null,\n \"CameraInfoTag\": null,\n \"DeviceInfoLevel\": 1,\n \"DeviceInfoTag\": null,\n \"Extra\": null,\n \"OpenId\": \"9B0104204DAB86054F6C9E38\",\n \"RequestId\": \"dbabb231-4adc-4e88-b763-b3dfd9476923\"\n }\n}",
174
+ "title": "获取结果成功"
175
+ }
176
+ ],
169
177
  "GetFaceIdToken": [
170
178
  {
171
179
  "document": "获取 SDK 核验 token",
@@ -174,6 +182,14 @@
174
182
  "title": "获取token成功"
175
183
  }
176
184
  ],
185
+ "GetFaceidRiskInfoToken": [
186
+ {
187
+ "document": "获取 SDK 核验 token",
188
+ "input": "POST / HTTP/1.1\nHost: faceid.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: GetFaceidRiskInfoToken\n<公共请求参数>\n\n{\n \"Meta\": \"\",\n \"Extra\": \"\"\n}",
189
+ "output": "{\n \"Response\": {\n \"FaceIdToken\": \"224C8901-0D1B-4350-914A-CFD74E54D940\",\n \"RequestId\": \"63013220-4d82-4e2f-b508-a34286baac26\"\n }\n}",
190
+ "title": "获取 SDK 核验 token"
191
+ }
192
+ ],
177
193
  "GetLiveCode": [
178
194
  {
179
195
  "document": "",
@@ -3836,7 +3836,7 @@
3836
3836
  "example": "1000",
3837
3837
  "member": "int64",
3838
3838
  "name": "TemplateId",
3839
- "required": true,
3839
+ "output_required": true,
3840
3840
  "type": "int",
3841
3841
  "value_allowed_null": false
3842
3842
  },
@@ -171,8 +171,8 @@
171
171
  "CreateLiveTimeShiftTemplate": [
172
172
  {
173
173
  "document": "",
174
- "input": "POST / HTTP/1.1\nHost: live.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateLiveTimeShiftTemplate\n<公共请求参数>\n\n{\n \"Description\": \"xx\",\n \"TranscodeTemplateIds\": [\n 0\n ],\n \"RemoveWatermark\": true,\n \"TemplateName\": \"xx\",\n \"ItemDuration\": 1,\n \"Duration\": 1,\n \"Area\": \"xx\"\n}",
175
- "output": "{\n \"Response\": {\n \"TemplateId\": 1000,\n \"RequestId\": \"3c140219-cfe9-470e-b241-907877d6fb03\"\n }\n}",
174
+ "input": "POST / HTTP/1.1\nHost: live.tencentcloudapi.com\nContent-Type: application/json\nX-TC-Action: CreateLiveTimeShiftTemplate\n<公共请求参数>\n\n{\n \"TemplateName\": \"abc\",\n \"Description\": \"abc\",\n \"Area\": \"abc\",\n \"Duration\": 1,\n \"ItemDuration\": 1,\n \"RemoveWatermark\": true,\n \"TranscodeTemplateIds\": [\n 0\n ]\n}",
175
+ "output": "{\n \"Response\": {\n \"TemplateId\": 0,\n \"RequestId\": \"abc\"\n }\n}",
176
176
  "title": "请求示例"
177
177
  }
178
178
  ],
@@ -1474,7 +1474,7 @@
1474
1474
  },
1475
1475
  {
1476
1476
  "disabled": false,
1477
- "document": "新建文件夹的父目录ID",
1477
+ "document": "新建文件夹的父目录ID(根目录为\"root\")",
1478
1478
  "example": "folder-xxxxxxxx",
1479
1479
  "member": "string",
1480
1480
  "name": "ParentId",
@@ -36623,7 +36623,7 @@
36623
36623
  "type": "string"
36624
36624
  },
36625
36625
  {
36626
- "disabled": false,
36626
+ "disabled": true,
36627
36627
  "document": "责任人",
36628
36628
  "example": "无",
36629
36629
  "member": "string",
@@ -36684,6 +36684,33 @@
36684
36684
  "name": "DependencyConfigDTOs",
36685
36685
  "required": false,
36686
36686
  "type": "list"
36687
+ },
36688
+ {
36689
+ "disabled": false,
36690
+ "document": "执行耗时",
36691
+ "example": "无",
36692
+ "member": "int64",
36693
+ "name": "ExecutionTTL",
36694
+ "required": false,
36695
+ "type": "int"
36696
+ },
36697
+ {
36698
+ "disabled": false,
36699
+ "document": "脚本是否改变",
36700
+ "example": "无",
36701
+ "member": "bool",
36702
+ "name": "ScriptChange",
36703
+ "required": false,
36704
+ "type": "bool"
36705
+ },
36706
+ {
36707
+ "disabled": false,
36708
+ "document": "责任人id",
36709
+ "example": "102341324 ",
36710
+ "member": "string",
36711
+ "name": "InChargeIds",
36712
+ "required": false,
36713
+ "type": "list"
36687
36714
  }
36688
36715
  ],
36689
36716
  "type": "object"
@@ -36697,7 +36724,7 @@
36697
36724
  "example": "无",
36698
36725
  "member": "bool",
36699
36726
  "name": "Data",
36700
- "required": true,
36727
+ "output_required": true,
36701
36728
  "type": "bool",
36702
36729
  "value_allowed_null": false
36703
36730
  },