tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (446) hide show
  1. tccli/__init__.py +1 -1
  2. tccli/argument.py +13 -2
  3. tccli/main.py +0 -5
  4. tccli/services/__init__.py +9 -0
  5. tccli/services/aai/aai_client.py +20 -8
  6. tccli/services/aca/aca_client.py +40 -16
  7. tccli/services/acp/acp_client.py +40 -16
  8. tccli/services/advisor/advisor_client.py +10 -4
  9. tccli/services/af/af_client.py +15 -6
  10. tccli/services/afc/afc_client.py +15 -6
  11. tccli/services/ags/__init__.py +4 -0
  12. tccli/services/ags/ags_client.py +826 -0
  13. tccli/services/ags/v20250920/api.json +1076 -0
  14. tccli/services/ags/v20250920/examples.json +101 -0
  15. tccli/services/ai3d/ai3d_client.py +20 -114
  16. tccli/services/ai3d/v20250513/api.json +6 -169
  17. tccli/services/ai3d/v20250513/examples.json +0 -16
  18. tccli/services/aiart/aiart_client.py +284 -109
  19. tccli/services/aiart/v20221229/api.json +201 -8
  20. tccli/services/aiart/v20221229/examples.json +16 -0
  21. tccli/services/ame/ame_client.py +155 -62
  22. tccli/services/ams/ams_client.py +45 -18
  23. tccli/services/anicloud/anicloud_client.py +15 -6
  24. tccli/services/antiddos/antiddos_client.py +470 -188
  25. tccli/services/ape/ape_client.py +40 -16
  26. tccli/services/api/api_client.py +15 -6
  27. tccli/services/apigateway/apigateway_client.py +495 -198
  28. tccli/services/apm/apm_client.py +742 -81
  29. tccli/services/apm/v20210622/api.json +3239 -1322
  30. tccli/services/apm/v20210622/examples.json +95 -1
  31. tccli/services/asr/asr_client.py +160 -64
  32. tccli/services/asr/v20190614/api.json +2 -2
  33. tccli/services/asw/asw_client.py +45 -18
  34. tccli/services/autoscaling/autoscaling_client.py +290 -116
  35. tccli/services/autoscaling/v20180419/api.json +51 -7
  36. tccli/services/ba/ba_client.py +15 -6
  37. tccli/services/batch/batch_client.py +150 -60
  38. tccli/services/batch/v20170312/api.json +11 -0
  39. tccli/services/bda/bda_client.py +40 -714
  40. tccli/services/bda/v20200324/api.json +107 -1819
  41. tccli/services/bda/v20200324/examples.json +0 -176
  42. tccli/services/bh/bh_client.py +1934 -465
  43. tccli/services/bh/v20230418/api.json +1720 -107
  44. tccli/services/bh/v20230418/examples.json +188 -0
  45. tccli/services/bi/bi_client.py +145 -58
  46. tccli/services/billing/billing_client.py +310 -124
  47. tccli/services/billing/v20180709/api.json +18 -9
  48. tccli/services/billing/v20180709/examples.json +2 -2
  49. tccli/services/bizlive/bizlive_client.py +30 -12
  50. tccli/services/bm/bm_client.py +265 -106
  51. tccli/services/bma/bma_client.py +185 -74
  52. tccli/services/bmeip/bmeip_client.py +100 -40
  53. tccli/services/bmlb/bmlb_client.py +245 -98
  54. tccli/services/bmvpc/bmvpc_client.py +305 -122
  55. tccli/services/bpaas/bpaas_client.py +10 -4
  56. tccli/services/bri/bri_client.py +5 -2
  57. tccli/services/bsca/bsca_client.py +35 -14
  58. tccli/services/btoe/btoe_client.py +70 -28
  59. tccli/services/ca/ca_client.py +15 -6
  60. tccli/services/cam/cam_client.py +460 -184
  61. tccli/services/cam/v20190116/api.json +3 -3
  62. tccli/services/captcha/captcha_client.py +90 -36
  63. tccli/services/captcha/v20190722/api.json +4 -4
  64. tccli/services/captcha/v20190722/examples.json +1 -1
  65. tccli/services/car/car_client.py +30 -12
  66. tccli/services/cat/cat_client.py +70 -28
  67. tccli/services/cat/v20180409/api.json +7 -7
  68. tccli/services/cbs/cbs_client.py +230 -92
  69. tccli/services/ccc/ccc_client.py +613 -158
  70. tccli/services/ccc/v20200210/api.json +406 -8
  71. tccli/services/ccc/v20200210/examples.json +32 -0
  72. tccli/services/cdb/cdb_client.py +931 -350
  73. tccli/services/cdb/v20170320/api.json +131 -32
  74. tccli/services/cdb/v20170320/examples.json +18 -10
  75. tccli/services/cdc/cdc_client.py +115 -46
  76. tccli/services/cdn/cdn_client.py +275 -110
  77. tccli/services/cdn/v20180606/api.json +15 -4
  78. tccli/services/cdn/v20180606/examples.json +1 -1
  79. tccli/services/cds/cds_client.py +25 -10
  80. tccli/services/cdwch/cdwch_client.py +145 -58
  81. tccli/services/cdwch/v20200915/api.json +26 -11
  82. tccli/services/cdwdoris/cdwdoris_client.py +300 -120
  83. tccli/services/cdwdoris/v20211228/api.json +11 -1
  84. tccli/services/cdwpg/cdwpg_client.py +120 -48
  85. tccli/services/cdz/cdz_client.py +10 -4
  86. tccli/services/cfg/cfg_client.py +85 -34
  87. tccli/services/cfg/v20210820/api.json +11 -1
  88. tccli/services/cfs/cfs_client.py +326 -208
  89. tccli/services/cfs/v20190719/api.json +199 -64
  90. tccli/services/cfs/v20190719/examples.json +6 -14
  91. tccli/services/cfw/cfw_client.py +679 -287
  92. tccli/services/cfw/v20190904/api.json +420 -2
  93. tccli/services/cfw/v20190904/examples.json +8 -0
  94. tccli/services/chc/chc_client.py +190 -76
  95. tccli/services/chc/v20230418/api.json +77 -2
  96. tccli/services/chdfs/chdfs_client.py +145 -58
  97. tccli/services/ciam/ciam_client.py +115 -46
  98. tccli/services/cii/cii_client.py +65 -26
  99. tccli/services/cim/cim_client.py +5 -2
  100. tccli/services/ckafka/ckafka_client.py +837 -240
  101. tccli/services/ckafka/v20190819/api.json +561 -91
  102. tccli/services/ckafka/v20190819/examples.json +53 -5
  103. tccli/services/clb/clb_client.py +435 -439
  104. tccli/services/clb/v20180317/api.json +147 -312
  105. tccli/services/clb/v20180317/examples.json +12 -40
  106. tccli/services/cloudapp/cloudapp_client.py +10 -4
  107. tccli/services/cloudaudit/cloudaudit_client.py +95 -38
  108. tccli/services/cloudaudit/v20190319/api.json +11 -0
  109. tccli/services/cloudhsm/cloudhsm_client.py +70 -28
  110. tccli/services/cloudhsm/v20191112/api.json +37 -7
  111. tccli/services/cloudstudio/cloudstudio_client.py +45 -18
  112. tccli/services/cls/cls_client.py +843 -268
  113. tccli/services/cls/v20201016/api.json +1241 -68
  114. tccli/services/cls/v20201016/examples.json +36 -4
  115. tccli/services/cme/cme_client.py +250 -100
  116. tccli/services/cmq/cmq_client.py +10 -4
  117. tccli/services/cms/cms_client.py +30 -12
  118. tccli/services/config/config_client.py +35 -14
  119. tccli/services/controlcenter/controlcenter_client.py +25 -10
  120. tccli/services/cpdp/cpdp_client.py +1095 -438
  121. tccli/services/csip/csip_client.py +410 -164
  122. tccli/services/csip/v20221121/api.json +140 -20
  123. tccli/services/csip/v20221121/examples.json +10 -16
  124. tccli/services/csxg/csxg_client.py +25 -10
  125. tccli/services/ctem/ctem_client.py +1823 -156
  126. tccli/services/ctem/v20231128/api.json +2990 -206
  127. tccli/services/ctem/v20231128/examples.json +224 -0
  128. tccli/services/ctsdb/ctsdb_client.py +10 -4
  129. tccli/services/cvm/cvm_client.py +490 -196
  130. tccli/services/cvm/v20170312/api.json +41 -41
  131. tccli/services/cvm/v20170312/examples.json +92 -86
  132. tccli/services/cwp/cwp_client.py +2570 -1028
  133. tccli/services/cws/cws_client.py +95 -38
  134. tccli/services/cynosdb/cynosdb_client.py +1006 -340
  135. tccli/services/cynosdb/v20190107/api.json +1238 -212
  136. tccli/services/cynosdb/v20190107/examples.json +32 -8
  137. tccli/services/dasb/dasb_client.py +315 -126
  138. tccli/services/dataagent/__init__.py +4 -0
  139. tccli/services/dataagent/dataagent_client.py +770 -0
  140. tccli/services/dataagent/v20250513/api.json +1216 -0
  141. tccli/services/dataagent/v20250513/examples.json +93 -0
  142. tccli/services/dayu/dayu_client.py +560 -224
  143. tccli/services/dbbrain/dbbrain_client.py +471 -166
  144. tccli/services/dbbrain/v20210527/api.json +268 -19
  145. tccli/services/dbbrain/v20210527/examples.json +8 -0
  146. tccli/services/dbdc/dbdc_client.py +30 -12
  147. tccli/services/dc/dc_client.py +110 -44
  148. tccli/services/dcdb/dcdb_client.py +415 -166
  149. tccli/services/dcdb/v20180411/api.json +1 -1
  150. tccli/services/dlc/dlc_client.py +966 -364
  151. tccli/services/dlc/v20210125/api.json +1153 -150
  152. tccli/services/dlc/v20210125/examples.json +19 -11
  153. tccli/services/dnspod/dnspod_client.py +567 -182
  154. tccli/services/dnspod/v20210323/api.json +131 -25
  155. tccli/services/dnspod/v20210323/examples.json +17 -7
  156. tccli/services/domain/domain_client.py +275 -110
  157. tccli/services/domain/v20180808/api.json +21 -1
  158. tccli/services/drm/drm_client.py +55 -22
  159. tccli/services/ds/ds_client.py +60 -24
  160. tccli/services/dsgc/dsgc_client.py +665 -266
  161. tccli/services/dsgc/v20190723/api.json +18 -18
  162. tccli/services/dts/dts_client.py +1188 -488
  163. tccli/services/dts/v20211206/api.json +1068 -124
  164. tccli/services/dts/v20211206/examples.json +77 -7
  165. tccli/services/eb/eb_client.py +160 -64
  166. tccli/services/eb/v20210416/api.json +13 -0
  167. tccli/services/ecc/ecc_client.py +20 -8
  168. tccli/services/ecdn/ecdn_client.py +30 -12
  169. tccli/services/ecm/ecm_client.py +695 -278
  170. tccli/services/eiam/eiam_client.py +210 -84
  171. tccli/services/eis/eis_client.py +40 -16
  172. tccli/services/emr/emr_client.py +501 -178
  173. tccli/services/emr/v20190103/api.json +262 -0
  174. tccli/services/emr/v20190103/examples.json +13 -5
  175. tccli/services/es/es_client.py +536 -152
  176. tccli/services/es/v20180416/api.json +695 -65
  177. tccli/services/es/v20180416/examples.json +24 -0
  178. tccli/services/es/v20250101/api.json +10 -10
  179. tccli/services/ess/ess_client.py +747 -254
  180. tccli/services/ess/v20201111/api.json +720 -32
  181. tccli/services/ess/v20201111/examples.json +18 -2
  182. tccli/services/essbasic/essbasic_client.py +730 -292
  183. tccli/services/essbasic/v20210526/api.json +295 -32
  184. tccli/services/essbasic/v20210526/examples.json +12 -30
  185. tccli/services/evt/__init__.py +4 -0
  186. tccli/services/evt/evt_client.py +210 -0
  187. tccli/services/evt/v20250217/api.json +126 -0
  188. tccli/services/evt/v20250217/examples.json +13 -0
  189. tccli/services/facefusion/facefusion_client.py +20 -8
  190. tccli/services/facefusion/v20220927/api.json +1 -1
  191. tccli/services/faceid/faceid_client.py +180 -125
  192. tccli/services/faceid/v20180301/api.json +18 -105
  193. tccli/services/faceid/v20180301/examples.json +1 -9
  194. tccli/services/fmu/fmu_client.py +35 -14
  195. tccli/services/ft/ft_client.py +30 -12
  196. tccli/services/gaap/gaap_client.py +510 -204
  197. tccli/services/gaap/v20180529/api.json +18 -8
  198. tccli/services/gme/gme_client.py +241 -74
  199. tccli/services/gme/v20180711/api.json +241 -1
  200. tccli/services/gme/v20180711/examples.json +8 -0
  201. tccli/services/goosefs/goosefs_client.py +135 -54
  202. tccli/services/gs/gs_client.py +537 -182
  203. tccli/services/gs/v20191118/api.json +143 -1
  204. tccli/services/gs/v20191118/examples.json +16 -0
  205. tccli/services/gwlb/gwlb_client.py +95 -38
  206. tccli/services/habo/habo_client.py +10 -4
  207. tccli/services/hai/hai_client.py +80 -32
  208. tccli/services/hai/v20230812/api.json +3 -3
  209. tccli/services/hasim/hasim_client.py +110 -44
  210. tccli/services/hcm/hcm_client.py +5 -2
  211. tccli/services/hunyuan/hunyuan_client.py +105 -42
  212. tccli/services/hunyuan/v20230901/api.json +69 -2
  213. tccli/services/hunyuan/v20230901/examples.json +1 -1
  214. tccli/services/iai/iai_client.py +175 -123
  215. tccli/services/iai/v20180301/api.json +0 -82
  216. tccli/services/iai/v20180301/examples.json +0 -8
  217. tccli/services/iai/v20200303/api.json +1 -83
  218. tccli/services/iai/v20200303/examples.json +0 -8
  219. tccli/services/iap/iap_client.py +30 -12
  220. tccli/services/ic/ic_client.py +45 -18
  221. tccli/services/icr/icr_client.py +5 -2
  222. tccli/services/ie/ie_client.py +50 -20
  223. tccli/services/ig/ig_client.py +5 -2
  224. tccli/services/igtm/igtm_client.py +130 -52
  225. tccli/services/igtm/v20231024/api.json +60 -4
  226. tccli/services/igtm/v20231024/examples.json +3 -3
  227. tccli/services/ims/ims_client.py +10 -4
  228. tccli/services/ioa/ioa_client.py +194 -60
  229. tccli/services/ioa/v20220601/api.json +149 -1
  230. tccli/services/ioa/v20220601/examples.json +8 -0
  231. tccli/services/iot/iot_client.py +225 -90
  232. tccli/services/iotcloud/iotcloud_client.py +430 -172
  233. tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
  234. tccli/services/iotexplorer/v20190423/api.json +2681 -1016
  235. tccli/services/iotexplorer/v20190423/examples.json +160 -26
  236. tccli/services/iotvideo/iotvideo_client.py +835 -334
  237. tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
  238. tccli/services/irp/irp_client.py +55 -22
  239. tccli/services/iss/iss_client.py +460 -184
  240. tccli/services/iss/v20230517/api.json +2 -2
  241. tccli/services/iss/v20230517/examples.json +1 -1
  242. tccli/services/ivld/ivld_client.py +140 -56
  243. tccli/services/keewidb/keewidb_client.py +190 -76
  244. tccli/services/keewidb/v20220308/api.json +69 -17
  245. tccli/services/keewidb/v20220308/examples.json +5 -5
  246. tccli/services/kms/kms_client.py +340 -136
  247. tccli/services/lcic/lcic_client.py +355 -142
  248. tccli/services/lcic/v20220817/api.json +5 -5
  249. tccli/services/lighthouse/lighthouse_client.py +590 -236
  250. tccli/services/lighthouse/v20200324/api.json +81 -16
  251. tccli/services/lighthouse/v20200324/examples.json +7 -1
  252. tccli/services/live/live_client.py +1000 -453
  253. tccli/services/live/v20180801/api.json +6 -164
  254. tccli/services/live/v20180801/examples.json +6 -8
  255. tccli/services/lke/lke_client.py +525 -210
  256. tccli/services/lke/v20231130/api.json +254 -75
  257. tccli/services/lke/v20231130/examples.json +1 -1
  258. tccli/services/lkeap/lkeap_client.py +130 -52
  259. tccli/services/lkeap/v20240522/api.json +1 -1
  260. tccli/services/lkeap/v20240522/examples.json +1 -1
  261. tccli/services/lowcode/lowcode_client.py +85 -34
  262. tccli/services/mall/mall_client.py +5 -2
  263. tccli/services/mariadb/mariadb_client.py +405 -162
  264. tccli/services/mariadb/v20170312/api.json +1 -1
  265. tccli/services/market/market_client.py +10 -4
  266. tccli/services/memcached/memcached_client.py +5 -2
  267. tccli/services/mmps/mmps_client.py +75 -30
  268. tccli/services/mna/mna_client.py +205 -82
  269. tccli/services/mna/v20210119/api.json +1 -1
  270. tccli/services/mongodb/mongodb_client.py +1178 -273
  271. tccli/services/mongodb/v20190725/api.json +1860 -135
  272. tccli/services/mongodb/v20190725/examples.json +105 -1
  273. tccli/services/monitor/monitor_client.py +901 -338
  274. tccli/services/monitor/v20180724/api.json +189 -29
  275. tccli/services/monitor/v20180724/examples.json +9 -1
  276. tccli/services/mps/mps_client.py +1248 -280
  277. tccli/services/mps/v20190612/api.json +1796 -73
  278. tccli/services/mps/v20190612/examples.json +106 -32
  279. tccli/services/mqtt/mqtt_client.py +463 -118
  280. tccli/services/mqtt/v20240516/api.json +166 -0
  281. tccli/services/mqtt/v20240516/examples.json +24 -0
  282. tccli/services/mrs/mrs_client.py +55 -22
  283. tccli/services/ms/ms_client.py +115 -46
  284. tccli/services/msp/msp_client.py +35 -14
  285. tccli/services/nlp/nlp_client.py +30 -12
  286. tccli/services/npp/npp_client.py +40 -16
  287. tccli/services/oceanus/oceanus_client.py +225 -90
  288. tccli/services/oceanus/v20190422/api.json +10 -13
  289. tccli/services/oceanus/v20190422/examples.json +2 -2
  290. tccli/services/ocr/ocr_client.py +471 -425
  291. tccli/services/ocr/v20181119/api.json +241 -639
  292. tccli/services/ocr/v20181119/examples.json +8 -40
  293. tccli/services/omics/omics_client.py +100 -40
  294. tccli/services/omics/v20221128/api.json +90 -7
  295. tccli/services/organization/organization_client.py +705 -282
  296. tccli/services/organization/v20210331/api.json +40 -1
  297. tccli/services/partners/partners_client.py +115 -46
  298. tccli/services/postgres/postgres_client.py +724 -200
  299. tccli/services/postgres/v20170312/api.json +494 -58
  300. tccli/services/postgres/v20170312/examples.json +75 -31
  301. tccli/services/privatedns/privatedns_client.py +412 -80
  302. tccli/services/privatedns/v20201028/api.json +421 -13
  303. tccli/services/privatedns/v20201028/examples.json +36 -4
  304. tccli/services/pts/pts_client.py +240 -96
  305. tccli/services/pts/v20210728/api.json +2 -2
  306. tccli/services/rce/rce_client.py +55 -22
  307. tccli/services/redis/redis_client.py +550 -220
  308. tccli/services/redis/v20180412/api.json +197 -33
  309. tccli/services/redis/v20180412/examples.json +10 -10
  310. tccli/services/region/region_client.py +15 -6
  311. tccli/services/region/v20220627/api.json +1 -1
  312. tccli/services/rum/rum_client.py +270 -108
  313. tccli/services/rum/v20210622/api.json +18 -0
  314. tccli/services/scf/scf_client.py +260 -104
  315. tccli/services/scf/v20180416/api.json +167 -2
  316. tccli/services/scf/v20180416/examples.json +1 -1
  317. tccli/services/securitylake/securitylake_client.py +5 -2
  318. tccli/services/ses/ses_client.py +175 -70
  319. tccli/services/smh/smh_client.py +75 -30
  320. tccli/services/smop/smop_client.py +5 -2
  321. tccli/services/sms/sms_client.py +90 -36
  322. tccli/services/sms/v20190711/api.json +11 -11
  323. tccli/services/sms/v20190711/examples.json +9 -3
  324. tccli/services/sms/v20210111/api.json +12 -12
  325. tccli/services/sms/v20210111/examples.json +8 -2
  326. tccli/services/soe/soe_client.py +20 -8
  327. tccli/services/sqlserver/sqlserver_client.py +740 -296
  328. tccli/services/sqlserver/v20180328/api.json +31 -2
  329. tccli/services/sqlserver/v20180328/examples.json +1 -1
  330. tccli/services/ssa/ssa_client.py +115 -46
  331. tccli/services/ssl/ssl_client.py +340 -136
  332. tccli/services/ssl/v20191205/api.json +28 -0
  333. tccli/services/sslpod/sslpod_client.py +50 -20
  334. tccli/services/ssm/ssm_client.py +120 -48
  335. tccli/services/sts/sts_client.py +35 -14
  336. tccli/services/sts/v20180813/api.json +1 -1
  337. tccli/services/svp/svp_client.py +25 -10
  338. tccli/services/svp/v20240125/api.json +24 -4
  339. tccli/services/svp/v20240125/examples.json +1 -1
  340. tccli/services/taf/taf_client.py +5 -2
  341. tccli/services/tag/tag_client.py +155 -62
  342. tccli/services/tag/v20180813/api.json +3 -3
  343. tccli/services/tat/tat_client.py +145 -58
  344. tccli/services/tat/v20201028/api.json +10 -1
  345. tccli/services/tbaas/tbaas_client.py +120 -48
  346. tccli/services/tbp/tbp_client.py +20 -8
  347. tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
  348. tccli/services/tcb/tcb_client.py +445 -178
  349. tccli/services/tcbr/tcbr_client.py +50 -20
  350. tccli/services/tcbr/v20220217/api.json +11 -0
  351. tccli/services/tccatalog/tccatalog_client.py +20 -8
  352. tccli/services/tchd/tchd_client.py +10 -4
  353. tccli/services/tcm/tcm_client.py +60 -24
  354. tccli/services/tcr/tcr_client.py +550 -220
  355. tccli/services/tcss/tcss_client.py +1756 -680
  356. tccli/services/tcss/v20201101/api.json +144 -11
  357. tccli/services/tcss/v20201101/examples.json +9 -1
  358. tccli/services/tdai/tdai_client.py +90 -36
  359. tccli/services/tdai/v20250717/api.json +30 -3
  360. tccli/services/tdcpg/tdcpg_client.py +125 -50
  361. tccli/services/tdid/tdid_client.py +90 -36
  362. tccli/services/tdmq/tdmq_client.py +846 -452
  363. tccli/services/tdmq/v20200217/api.json +372 -488
  364. tccli/services/tdmq/v20200217/examples.json +21 -41
  365. tccli/services/tds/tds_client.py +25 -10
  366. tccli/services/tem/tem_client.py +305 -122
  367. tccli/services/teo/teo_client.py +1122 -431
  368. tccli/services/teo/v20220901/api.json +1393 -132
  369. tccli/services/teo/v20220901/examples.json +59 -13
  370. tccli/services/thpc/thpc_client.py +215 -66
  371. tccli/services/thpc/v20230321/api.json +185 -27
  372. tccli/services/thpc/v20230321/examples.json +15 -7
  373. tccli/services/tia/tia_client.py +50 -20
  374. tccli/services/tiia/tiia_client.py +105 -42
  375. tccli/services/tione/tione_client.py +537 -150
  376. tccli/services/tione/v20211111/api.json +280 -16
  377. tccli/services/tione/v20211111/examples.json +25 -1
  378. tccli/services/tiw/tiw_client.py +175 -70
  379. tccli/services/tke/tke_client.py +2702 -735
  380. tccli/services/tke/v20180525/api.json +2279 -232
  381. tccli/services/tke/v20180525/examples.json +194 -18
  382. tccli/services/tke/v20220501/api.json +215 -3
  383. tccli/services/tke/v20220501/examples.json +8 -0
  384. tccli/services/tkgdq/tkgdq_client.py +15 -6
  385. tccli/services/tms/tms_client.py +132 -8
  386. tccli/services/tms/v20201229/api.json +247 -1
  387. tccli/services/tms/v20201229/examples.json +16 -0
  388. tccli/services/tmt/tmt_client.py +40 -16
  389. tccli/services/tmt/v20180321/api.json +78 -1
  390. tccli/services/tourism/tourism_client.py +5 -2
  391. tccli/services/trabbit/trabbit_client.py +145 -58
  392. tccli/services/trabbit/v20230418/api.json +271 -4
  393. tccli/services/trabbit/v20230418/examples.json +9 -3
  394. tccli/services/trocket/trocket_client.py +350 -140
  395. tccli/services/trocket/v20230308/api.json +113 -5
  396. tccli/services/trp/trp_client.py +270 -108
  397. tccli/services/trro/trro_client.py +257 -58
  398. tccli/services/trro/v20220325/api.json +456 -0
  399. tccli/services/trro/v20220325/examples.json +16 -0
  400. tccli/services/trtc/trtc_client.py +360 -144
  401. tccli/services/trtc/v20190722/api.json +167 -27
  402. tccli/services/trtc/v20190722/examples.json +3 -3
  403. tccli/services/tse/tse_client.py +776 -248
  404. tccli/services/tse/v20201207/api.json +260 -1
  405. tccli/services/tse/v20201207/examples.json +24 -0
  406. tccli/services/tsf/tsf_client.py +1195 -458
  407. tccli/services/tsf/v20180326/api.json +121 -5
  408. tccli/services/tsf/v20180326/examples.json +10 -2
  409. tccli/services/tsi/tsi_client.py +15 -6
  410. tccli/services/tsw/tsw_client.py +20 -8
  411. tccli/services/tts/tts_client.py +15 -6
  412. tccli/services/vcg/vcg_client.py +10 -4
  413. tccli/services/vclm/v20240523/api.json +354 -4
  414. tccli/services/vclm/v20240523/examples.json +32 -0
  415. tccli/services/vclm/vclm_client.py +269 -18
  416. tccli/services/vcube/v20220410/api.json +89 -2
  417. tccli/services/vcube/v20220410/examples.json +18 -2
  418. tccli/services/vcube/vcube_client.py +290 -76
  419. tccli/services/vdb/vdb_client.py +70 -28
  420. tccli/services/vm/v20210922/api.json +3 -3
  421. tccli/services/vm/vm_client.py +30 -12
  422. tccli/services/vms/vms_client.py +10 -4
  423. tccli/services/vod/v20180717/api.json +2 -2
  424. tccli/services/vod/vod_client.py +965 -386
  425. tccli/services/vpc/v20170312/api.json +1239 -128
  426. tccli/services/vpc/v20170312/examples.json +127 -15
  427. tccli/services/vpc/vpc_client.py +2963 -928
  428. tccli/services/vrs/vrs_client.py +40 -16
  429. tccli/services/vtc/vtc_client.py +15 -6
  430. tccli/services/waf/v20180125/api.json +11219 -8659
  431. tccli/services/waf/v20180125/examples.json +89 -9
  432. tccli/services/waf/waf_client.py +1530 -415
  433. tccli/services/wav/wav_client.py +130 -52
  434. tccli/services/wedata/v20250806/api.json +55 -16
  435. tccli/services/wedata/wedata_client.py +2045 -818
  436. tccli/services/weilingwith/weilingwith_client.py +320 -128
  437. tccli/services/wsa/wsa_client.py +5 -2
  438. tccli/services/wss/wss_client.py +15 -6
  439. tccli/services/yinsuda/yinsuda_client.py +100 -40
  440. tccli/services/yunjing/yunjing_client.py +500 -200
  441. tccli/services/yunsou/yunsou_client.py +10 -4
  442. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
  443. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
  444. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
  445. {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
  446. {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
@@ -27,7 +27,10 @@ def doQuestionOCR(args, parsed_globals):
27
27
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
28
28
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
29
29
  )
30
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
30
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
31
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
32
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
33
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
31
34
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
32
35
  else:
33
36
  cred = credential.Credential(
@@ -39,7 +42,7 @@ def doQuestionOCR(args, parsed_globals):
39
42
  endpoint=g_param[OptionsDefine.Endpoint],
40
43
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
41
44
  )
42
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
45
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
43
46
  if g_param[OptionsDefine.Language]:
44
47
  profile.language = g_param[OptionsDefine.Language]
45
48
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -79,7 +82,10 @@ def doTextDetect(args, parsed_globals):
79
82
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
80
83
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
81
84
  )
82
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
85
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
86
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
87
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
88
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
83
89
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
84
90
  else:
85
91
  cred = credential.Credential(
@@ -91,7 +97,7 @@ def doTextDetect(args, parsed_globals):
91
97
  endpoint=g_param[OptionsDefine.Endpoint],
92
98
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
93
99
  )
94
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
100
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
95
101
  if g_param[OptionsDefine.Language]:
96
102
  profile.language = g_param[OptionsDefine.Language]
97
103
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -131,7 +137,10 @@ def doQrcodeOCR(args, parsed_globals):
131
137
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
132
138
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
133
139
  )
134
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
140
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
141
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
142
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
143
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
135
144
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
136
145
  else:
137
146
  cred = credential.Credential(
@@ -143,7 +152,7 @@ def doQrcodeOCR(args, parsed_globals):
143
152
  endpoint=g_param[OptionsDefine.Endpoint],
144
153
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
145
154
  )
146
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
155
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
147
156
  if g_param[OptionsDefine.Language]:
148
157
  profile.language = g_param[OptionsDefine.Language]
149
158
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -183,7 +192,10 @@ def doGeneralAccurateOCR(args, parsed_globals):
183
192
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
184
193
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
185
194
  )
186
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
195
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
196
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
197
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
198
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
187
199
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
188
200
  else:
189
201
  cred = credential.Credential(
@@ -195,7 +207,7 @@ def doGeneralAccurateOCR(args, parsed_globals):
195
207
  endpoint=g_param[OptionsDefine.Endpoint],
196
208
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
197
209
  )
198
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
210
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
199
211
  if g_param[OptionsDefine.Language]:
200
212
  profile.language = g_param[OptionsDefine.Language]
201
213
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -235,7 +247,10 @@ def doRecognizeContainerOCR(args, parsed_globals):
235
247
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
236
248
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
237
249
  )
238
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
250
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
251
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
252
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
253
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
239
254
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
240
255
  else:
241
256
  cred = credential.Credential(
@@ -247,7 +262,7 @@ def doRecognizeContainerOCR(args, parsed_globals):
247
262
  endpoint=g_param[OptionsDefine.Endpoint],
248
263
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
249
264
  )
250
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
265
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
251
266
  if g_param[OptionsDefine.Language]:
252
267
  profile.language = g_param[OptionsDefine.Language]
253
268
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -287,7 +302,10 @@ def doRecognizeEncryptedIDCardOCR(args, parsed_globals):
287
302
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
288
303
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
289
304
  )
290
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
305
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
306
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
307
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
308
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
291
309
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
292
310
  else:
293
311
  cred = credential.Credential(
@@ -299,7 +317,7 @@ def doRecognizeEncryptedIDCardOCR(args, parsed_globals):
299
317
  endpoint=g_param[OptionsDefine.Endpoint],
300
318
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
301
319
  )
302
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
320
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
303
321
  if g_param[OptionsDefine.Language]:
304
322
  profile.language = g_param[OptionsDefine.Language]
305
323
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -339,7 +357,10 @@ def doRecognizeStoreName(args, parsed_globals):
339
357
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
340
358
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
341
359
  )
342
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
360
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
361
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
362
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
363
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
343
364
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
344
365
  else:
345
366
  cred = credential.Credential(
@@ -351,7 +372,7 @@ def doRecognizeStoreName(args, parsed_globals):
351
372
  endpoint=g_param[OptionsDefine.Endpoint],
352
373
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
353
374
  )
354
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
375
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
355
376
  if g_param[OptionsDefine.Language]:
356
377
  profile.language = g_param[OptionsDefine.Language]
357
378
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -391,7 +412,10 @@ def doMLIDPassportOCR(args, parsed_globals):
391
412
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
392
413
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
393
414
  )
394
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
415
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
416
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
417
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
418
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
395
419
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
396
420
  else:
397
421
  cred = credential.Credential(
@@ -403,7 +427,7 @@ def doMLIDPassportOCR(args, parsed_globals):
403
427
  endpoint=g_param[OptionsDefine.Endpoint],
404
428
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
405
429
  )
406
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
430
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
407
431
  if g_param[OptionsDefine.Language]:
408
432
  profile.language = g_param[OptionsDefine.Language]
409
433
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -443,7 +467,10 @@ def doTrainTicketOCR(args, parsed_globals):
443
467
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
444
468
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
445
469
  )
446
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
470
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
471
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
472
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
473
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
447
474
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
448
475
  else:
449
476
  cred = credential.Credential(
@@ -455,7 +482,7 @@ def doTrainTicketOCR(args, parsed_globals):
455
482
  endpoint=g_param[OptionsDefine.Endpoint],
456
483
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
457
484
  )
458
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
485
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
459
486
  if g_param[OptionsDefine.Language]:
460
487
  profile.language = g_param[OptionsDefine.Language]
461
488
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -485,7 +512,7 @@ def doTrainTicketOCR(args, parsed_globals):
485
512
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
486
513
 
487
514
 
488
- def doPropOwnerCertOCR(args, parsed_globals):
515
+ def doRecognizeValidIDCardOCR(args, parsed_globals):
489
516
  g_param = parse_global_arg(parsed_globals)
490
517
 
491
518
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -495,7 +522,10 @@ def doPropOwnerCertOCR(args, parsed_globals):
495
522
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
496
523
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
497
524
  )
498
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
525
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
526
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
527
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
528
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
499
529
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
500
530
  else:
501
531
  cred = credential.Credential(
@@ -507,18 +537,18 @@ def doPropOwnerCertOCR(args, parsed_globals):
507
537
  endpoint=g_param[OptionsDefine.Endpoint],
508
538
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
509
539
  )
510
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
540
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
511
541
  if g_param[OptionsDefine.Language]:
512
542
  profile.language = g_param[OptionsDefine.Language]
513
543
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
514
544
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
515
545
  client._sdkVersion += ("_CLI_" + __version__)
516
546
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
517
- model = models.PropOwnerCertOCRRequest()
547
+ model = models.RecognizeValidIDCardOCRRequest()
518
548
  model.from_json_string(json.dumps(args))
519
549
  start_time = time.time()
520
550
  while True:
521
- rsp = client.PropOwnerCertOCR(model)
551
+ rsp = client.RecognizeValidIDCardOCR(model)
522
552
  result = rsp.to_json_string()
523
553
  try:
524
554
  json_obj = json.loads(result)
@@ -547,7 +577,10 @@ def doInvoiceGeneralOCR(args, parsed_globals):
547
577
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
548
578
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
549
579
  )
550
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
580
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
581
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
582
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
583
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
551
584
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
552
585
  else:
553
586
  cred = credential.Credential(
@@ -559,7 +592,7 @@ def doInvoiceGeneralOCR(args, parsed_globals):
559
592
  endpoint=g_param[OptionsDefine.Endpoint],
560
593
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
561
594
  )
562
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
595
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
563
596
  if g_param[OptionsDefine.Language]:
564
597
  profile.language = g_param[OptionsDefine.Language]
565
598
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -599,7 +632,10 @@ def doHKIDCardOCR(args, parsed_globals):
599
632
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
600
633
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
601
634
  )
602
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
635
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
636
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
637
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
638
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
603
639
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
604
640
  else:
605
641
  cred = credential.Credential(
@@ -611,7 +647,7 @@ def doHKIDCardOCR(args, parsed_globals):
611
647
  endpoint=g_param[OptionsDefine.Endpoint],
612
648
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
613
649
  )
614
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
650
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
615
651
  if g_param[OptionsDefine.Language]:
616
652
  profile.language = g_param[OptionsDefine.Language]
617
653
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -651,7 +687,10 @@ def doPermitOCR(args, parsed_globals):
651
687
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
652
688
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
653
689
  )
654
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
690
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
691
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
692
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
693
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
655
694
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
656
695
  else:
657
696
  cred = credential.Credential(
@@ -663,7 +702,7 @@ def doPermitOCR(args, parsed_globals):
663
702
  endpoint=g_param[OptionsDefine.Endpoint],
664
703
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
665
704
  )
666
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
705
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
667
706
  if g_param[OptionsDefine.Language]:
668
707
  profile.language = g_param[OptionsDefine.Language]
669
708
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -693,7 +732,7 @@ def doPermitOCR(args, parsed_globals):
693
732
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
694
733
 
695
734
 
696
- def doBusInvoiceOCR(args, parsed_globals):
735
+ def doQuestionSplitLayoutOCR(args, parsed_globals):
697
736
  g_param = parse_global_arg(parsed_globals)
698
737
 
699
738
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -703,7 +742,10 @@ def doBusInvoiceOCR(args, parsed_globals):
703
742
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
704
743
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
705
744
  )
706
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
745
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
746
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
747
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
748
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
707
749
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
708
750
  else:
709
751
  cred = credential.Credential(
@@ -715,18 +757,18 @@ def doBusInvoiceOCR(args, parsed_globals):
715
757
  endpoint=g_param[OptionsDefine.Endpoint],
716
758
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
717
759
  )
718
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
760
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
719
761
  if g_param[OptionsDefine.Language]:
720
762
  profile.language = g_param[OptionsDefine.Language]
721
763
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
722
764
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
723
765
  client._sdkVersion += ("_CLI_" + __version__)
724
766
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
725
- model = models.BusInvoiceOCRRequest()
767
+ model = models.QuestionSplitLayoutOCRRequest()
726
768
  model.from_json_string(json.dumps(args))
727
769
  start_time = time.time()
728
770
  while True:
729
- rsp = client.BusInvoiceOCR(model)
771
+ rsp = client.QuestionSplitLayoutOCR(model)
730
772
  result = rsp.to_json_string()
731
773
  try:
732
774
  json_obj = json.loads(result)
@@ -745,7 +787,7 @@ def doBusInvoiceOCR(args, parsed_globals):
745
787
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
746
788
 
747
789
 
748
- def doEnglishOCR(args, parsed_globals):
790
+ def doBusInvoiceOCR(args, parsed_globals):
749
791
  g_param = parse_global_arg(parsed_globals)
750
792
 
751
793
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -755,7 +797,10 @@ def doEnglishOCR(args, parsed_globals):
755
797
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
756
798
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
757
799
  )
758
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
800
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
801
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
802
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
803
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
759
804
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
760
805
  else:
761
806
  cred = credential.Credential(
@@ -767,18 +812,18 @@ def doEnglishOCR(args, parsed_globals):
767
812
  endpoint=g_param[OptionsDefine.Endpoint],
768
813
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
769
814
  )
770
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
815
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
771
816
  if g_param[OptionsDefine.Language]:
772
817
  profile.language = g_param[OptionsDefine.Language]
773
818
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
774
819
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
775
820
  client._sdkVersion += ("_CLI_" + __version__)
776
821
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
777
- model = models.EnglishOCRRequest()
822
+ model = models.BusInvoiceOCRRequest()
778
823
  model.from_json_string(json.dumps(args))
779
824
  start_time = time.time()
780
825
  while True:
781
- rsp = client.EnglishOCR(model)
826
+ rsp = client.BusInvoiceOCR(model)
782
827
  result = rsp.to_json_string()
783
828
  try:
784
829
  json_obj = json.loads(result)
@@ -797,7 +842,7 @@ def doEnglishOCR(args, parsed_globals):
797
842
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
798
843
 
799
844
 
800
- def doSmartStructuralOCR(args, parsed_globals):
845
+ def doEnglishOCR(args, parsed_globals):
801
846
  g_param = parse_global_arg(parsed_globals)
802
847
 
803
848
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -807,7 +852,10 @@ def doSmartStructuralOCR(args, parsed_globals):
807
852
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
808
853
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
809
854
  )
810
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
855
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
856
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
857
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
858
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
811
859
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
812
860
  else:
813
861
  cred = credential.Credential(
@@ -819,18 +867,18 @@ def doSmartStructuralOCR(args, parsed_globals):
819
867
  endpoint=g_param[OptionsDefine.Endpoint],
820
868
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
821
869
  )
822
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
870
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
823
871
  if g_param[OptionsDefine.Language]:
824
872
  profile.language = g_param[OptionsDefine.Language]
825
873
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
826
874
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
827
875
  client._sdkVersion += ("_CLI_" + __version__)
828
876
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
829
- model = models.SmartStructuralOCRRequest()
877
+ model = models.EnglishOCRRequest()
830
878
  model.from_json_string(json.dumps(args))
831
879
  start_time = time.time()
832
880
  while True:
833
- rsp = client.SmartStructuralOCR(model)
881
+ rsp = client.EnglishOCR(model)
834
882
  result = rsp.to_json_string()
835
883
  try:
836
884
  json_obj = json.loads(result)
@@ -849,7 +897,7 @@ def doSmartStructuralOCR(args, parsed_globals):
849
897
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
850
898
 
851
899
 
852
- def doClassifyStoreName(args, parsed_globals):
900
+ def doSmartStructuralOCR(args, parsed_globals):
853
901
  g_param = parse_global_arg(parsed_globals)
854
902
 
855
903
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -859,7 +907,10 @@ def doClassifyStoreName(args, parsed_globals):
859
907
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
860
908
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
861
909
  )
862
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
910
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
911
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
912
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
913
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
863
914
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
864
915
  else:
865
916
  cred = credential.Credential(
@@ -871,18 +922,18 @@ def doClassifyStoreName(args, parsed_globals):
871
922
  endpoint=g_param[OptionsDefine.Endpoint],
872
923
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
873
924
  )
874
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
925
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
875
926
  if g_param[OptionsDefine.Language]:
876
927
  profile.language = g_param[OptionsDefine.Language]
877
928
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
878
929
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
879
930
  client._sdkVersion += ("_CLI_" + __version__)
880
931
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
881
- model = models.ClassifyStoreNameRequest()
932
+ model = models.SmartStructuralOCRRequest()
882
933
  model.from_json_string(json.dumps(args))
883
934
  start_time = time.time()
884
935
  while True:
885
- rsp = client.ClassifyStoreName(model)
936
+ rsp = client.SmartStructuralOCR(model)
886
937
  result = rsp.to_json_string()
887
938
  try:
888
939
  json_obj = json.loads(result)
@@ -901,7 +952,7 @@ def doClassifyStoreName(args, parsed_globals):
901
952
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
902
953
 
903
954
 
904
- def doTaxiInvoiceOCR(args, parsed_globals):
955
+ def doClassifyStoreName(args, parsed_globals):
905
956
  g_param = parse_global_arg(parsed_globals)
906
957
 
907
958
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -911,7 +962,10 @@ def doTaxiInvoiceOCR(args, parsed_globals):
911
962
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
912
963
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
913
964
  )
914
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
965
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
966
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
967
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
968
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
915
969
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
916
970
  else:
917
971
  cred = credential.Credential(
@@ -923,18 +977,18 @@ def doTaxiInvoiceOCR(args, parsed_globals):
923
977
  endpoint=g_param[OptionsDefine.Endpoint],
924
978
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
925
979
  )
926
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
980
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
927
981
  if g_param[OptionsDefine.Language]:
928
982
  profile.language = g_param[OptionsDefine.Language]
929
983
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
930
984
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
931
985
  client._sdkVersion += ("_CLI_" + __version__)
932
986
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
933
- model = models.TaxiInvoiceOCRRequest()
987
+ model = models.ClassifyStoreNameRequest()
934
988
  model.from_json_string(json.dumps(args))
935
989
  start_time = time.time()
936
990
  while True:
937
- rsp = client.TaxiInvoiceOCR(model)
991
+ rsp = client.ClassifyStoreName(model)
938
992
  result = rsp.to_json_string()
939
993
  try:
940
994
  json_obj = json.loads(result)
@@ -953,7 +1007,7 @@ def doTaxiInvoiceOCR(args, parsed_globals):
953
1007
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
954
1008
 
955
1009
 
956
- def doDescribeExtractDocAgentJob(args, parsed_globals):
1010
+ def doTaxiInvoiceOCR(args, parsed_globals):
957
1011
  g_param = parse_global_arg(parsed_globals)
958
1012
 
959
1013
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -963,7 +1017,10 @@ def doDescribeExtractDocAgentJob(args, parsed_globals):
963
1017
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
964
1018
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
965
1019
  )
966
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1020
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1021
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1022
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1023
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
967
1024
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
968
1025
  else:
969
1026
  cred = credential.Credential(
@@ -975,18 +1032,18 @@ def doDescribeExtractDocAgentJob(args, parsed_globals):
975
1032
  endpoint=g_param[OptionsDefine.Endpoint],
976
1033
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
977
1034
  )
978
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1035
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
979
1036
  if g_param[OptionsDefine.Language]:
980
1037
  profile.language = g_param[OptionsDefine.Language]
981
1038
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
982
1039
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
983
1040
  client._sdkVersion += ("_CLI_" + __version__)
984
1041
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
985
- model = models.DescribeExtractDocAgentJobRequest()
1042
+ model = models.TaxiInvoiceOCRRequest()
986
1043
  model.from_json_string(json.dumps(args))
987
1044
  start_time = time.time()
988
1045
  while True:
989
- rsp = client.DescribeExtractDocAgentJob(model)
1046
+ rsp = client.TaxiInvoiceOCR(model)
990
1047
  result = rsp.to_json_string()
991
1048
  try:
992
1049
  json_obj = json.loads(result)
@@ -1005,7 +1062,7 @@ def doDescribeExtractDocAgentJob(args, parsed_globals):
1005
1062
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1006
1063
 
1007
1064
 
1008
- def doRideHailingDriverLicenseOCR(args, parsed_globals):
1065
+ def doDescribeExtractDocAgentJob(args, parsed_globals):
1009
1066
  g_param = parse_global_arg(parsed_globals)
1010
1067
 
1011
1068
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1015,7 +1072,10 @@ def doRideHailingDriverLicenseOCR(args, parsed_globals):
1015
1072
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1016
1073
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1017
1074
  )
1018
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1075
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1076
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1077
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1078
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1019
1079
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1020
1080
  else:
1021
1081
  cred = credential.Credential(
@@ -1027,18 +1087,18 @@ def doRideHailingDriverLicenseOCR(args, parsed_globals):
1027
1087
  endpoint=g_param[OptionsDefine.Endpoint],
1028
1088
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1029
1089
  )
1030
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1090
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1031
1091
  if g_param[OptionsDefine.Language]:
1032
1092
  profile.language = g_param[OptionsDefine.Language]
1033
1093
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1034
1094
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1035
1095
  client._sdkVersion += ("_CLI_" + __version__)
1036
1096
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1037
- model = models.RideHailingDriverLicenseOCRRequest()
1097
+ model = models.DescribeExtractDocAgentJobRequest()
1038
1098
  model.from_json_string(json.dumps(args))
1039
1099
  start_time = time.time()
1040
1100
  while True:
1041
- rsp = client.RideHailingDriverLicenseOCR(model)
1101
+ rsp = client.DescribeExtractDocAgentJob(model)
1042
1102
  result = rsp.to_json_string()
1043
1103
  try:
1044
1104
  json_obj = json.loads(result)
@@ -1057,7 +1117,7 @@ def doRideHailingDriverLicenseOCR(args, parsed_globals):
1057
1117
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1058
1118
 
1059
1119
 
1060
- def doDutyPaidProofOCR(args, parsed_globals):
1120
+ def doRideHailingDriverLicenseOCR(args, parsed_globals):
1061
1121
  g_param = parse_global_arg(parsed_globals)
1062
1122
 
1063
1123
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -1067,7 +1127,10 @@ def doDutyPaidProofOCR(args, parsed_globals):
1067
1127
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1068
1128
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1069
1129
  )
1070
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1130
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1131
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1132
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1133
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1071
1134
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1072
1135
  else:
1073
1136
  cred = credential.Credential(
@@ -1079,18 +1142,18 @@ def doDutyPaidProofOCR(args, parsed_globals):
1079
1142
  endpoint=g_param[OptionsDefine.Endpoint],
1080
1143
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1081
1144
  )
1082
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1145
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1083
1146
  if g_param[OptionsDefine.Language]:
1084
1147
  profile.language = g_param[OptionsDefine.Language]
1085
1148
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1086
1149
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1087
1150
  client._sdkVersion += ("_CLI_" + __version__)
1088
1151
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
1089
- model = models.DutyPaidProofOCRRequest()
1152
+ model = models.RideHailingDriverLicenseOCRRequest()
1090
1153
  model.from_json_string(json.dumps(args))
1091
1154
  start_time = time.time()
1092
1155
  while True:
1093
- rsp = client.DutyPaidProofOCR(model)
1156
+ rsp = client.RideHailingDriverLicenseOCR(model)
1094
1157
  result = rsp.to_json_string()
1095
1158
  try:
1096
1159
  json_obj = json.loads(result)
@@ -1119,7 +1182,10 @@ def doMainlandPermitOCR(args, parsed_globals):
1119
1182
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1120
1183
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1121
1184
  )
1122
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1185
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1186
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1187
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1188
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1123
1189
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1124
1190
  else:
1125
1191
  cred = credential.Credential(
@@ -1131,7 +1197,7 @@ def doMainlandPermitOCR(args, parsed_globals):
1131
1197
  endpoint=g_param[OptionsDefine.Endpoint],
1132
1198
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1133
1199
  )
1134
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1200
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1135
1201
  if g_param[OptionsDefine.Language]:
1136
1202
  profile.language = g_param[OptionsDefine.Language]
1137
1203
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1171,7 +1237,10 @@ def doGeneralBasicOCR(args, parsed_globals):
1171
1237
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1172
1238
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1173
1239
  )
1174
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1240
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1241
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1242
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1243
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1175
1244
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1176
1245
  else:
1177
1246
  cred = credential.Credential(
@@ -1183,7 +1252,7 @@ def doGeneralBasicOCR(args, parsed_globals):
1183
1252
  endpoint=g_param[OptionsDefine.Endpoint],
1184
1253
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1185
1254
  )
1186
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1255
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1187
1256
  if g_param[OptionsDefine.Language]:
1188
1257
  profile.language = g_param[OptionsDefine.Language]
1189
1258
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1223,7 +1292,10 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1223
1292
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1224
1293
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1225
1294
  )
1226
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1295
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1296
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1297
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1298
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1227
1299
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1228
1300
  else:
1229
1301
  cred = credential.Credential(
@@ -1235,7 +1307,7 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
1235
1307
  endpoint=g_param[OptionsDefine.Endpoint],
1236
1308
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1237
1309
  )
1238
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1310
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1239
1311
  if g_param[OptionsDefine.Language]:
1240
1312
  profile.language = g_param[OptionsDefine.Language]
1241
1313
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1275,7 +1347,10 @@ def doInsuranceBillOCR(args, parsed_globals):
1275
1347
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1276
1348
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1277
1349
  )
1278
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1350
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1351
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1352
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1353
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1279
1354
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1280
1355
  else:
1281
1356
  cred = credential.Credential(
@@ -1287,7 +1362,7 @@ def doInsuranceBillOCR(args, parsed_globals):
1287
1362
  endpoint=g_param[OptionsDefine.Endpoint],
1288
1363
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1289
1364
  )
1290
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1365
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1291
1366
  if g_param[OptionsDefine.Language]:
1292
1367
  profile.language = g_param[OptionsDefine.Language]
1293
1368
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1327,7 +1402,10 @@ def doVatInvoiceVerifyNew(args, parsed_globals):
1327
1402
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1328
1403
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1329
1404
  )
1330
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1405
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1406
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1407
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1408
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1331
1409
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1332
1410
  else:
1333
1411
  cred = credential.Credential(
@@ -1339,7 +1417,7 @@ def doVatInvoiceVerifyNew(args, parsed_globals):
1339
1417
  endpoint=g_param[OptionsDefine.Endpoint],
1340
1418
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1341
1419
  )
1342
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1420
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1343
1421
  if g_param[OptionsDefine.Language]:
1344
1422
  profile.language = g_param[OptionsDefine.Language]
1345
1423
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1379,7 +1457,10 @@ def doVinOCR(args, parsed_globals):
1379
1457
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1380
1458
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1381
1459
  )
1382
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1460
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1461
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1462
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1463
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1383
1464
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1384
1465
  else:
1385
1466
  cred = credential.Credential(
@@ -1391,7 +1472,7 @@ def doVinOCR(args, parsed_globals):
1391
1472
  endpoint=g_param[OptionsDefine.Endpoint],
1392
1473
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1393
1474
  )
1394
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1475
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1395
1476
  if g_param[OptionsDefine.Language]:
1396
1477
  profile.language = g_param[OptionsDefine.Language]
1397
1478
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1431,7 +1512,10 @@ def doVehicleLicenseOCR(args, parsed_globals):
1431
1512
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1432
1513
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1433
1514
  )
1434
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1515
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1516
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1517
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1518
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1435
1519
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1436
1520
  else:
1437
1521
  cred = credential.Credential(
@@ -1443,7 +1527,7 @@ def doVehicleLicenseOCR(args, parsed_globals):
1443
1527
  endpoint=g_param[OptionsDefine.Endpoint],
1444
1528
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1445
1529
  )
1446
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1530
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1447
1531
  if g_param[OptionsDefine.Language]:
1448
1532
  profile.language = g_param[OptionsDefine.Language]
1449
1533
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1483,7 +1567,10 @@ def doBizLicenseOCR(args, parsed_globals):
1483
1567
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1484
1568
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1485
1569
  )
1486
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1570
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1571
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1572
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1573
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1487
1574
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1488
1575
  else:
1489
1576
  cred = credential.Credential(
@@ -1495,7 +1582,7 @@ def doBizLicenseOCR(args, parsed_globals):
1495
1582
  endpoint=g_param[OptionsDefine.Endpoint],
1496
1583
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1497
1584
  )
1498
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1585
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1499
1586
  if g_param[OptionsDefine.Language]:
1500
1587
  profile.language = g_param[OptionsDefine.Language]
1501
1588
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1535,7 +1622,10 @@ def doRecognizeGeneralCardWarn(args, parsed_globals):
1535
1622
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1536
1623
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1537
1624
  )
1538
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1625
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1626
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1627
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1628
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1539
1629
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1540
1630
  else:
1541
1631
  cred = credential.Credential(
@@ -1547,7 +1637,7 @@ def doRecognizeGeneralCardWarn(args, parsed_globals):
1547
1637
  endpoint=g_param[OptionsDefine.Endpoint],
1548
1638
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1549
1639
  )
1550
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1640
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1551
1641
  if g_param[OptionsDefine.Language]:
1552
1642
  profile.language = g_param[OptionsDefine.Language]
1553
1643
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1587,7 +1677,10 @@ def doFlightInvoiceOCR(args, parsed_globals):
1587
1677
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1588
1678
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1589
1679
  )
1590
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1680
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1681
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1682
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1683
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1591
1684
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1592
1685
  else:
1593
1686
  cred = credential.Credential(
@@ -1599,7 +1692,7 @@ def doFlightInvoiceOCR(args, parsed_globals):
1599
1692
  endpoint=g_param[OptionsDefine.Endpoint],
1600
1693
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1601
1694
  )
1602
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1695
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1603
1696
  if g_param[OptionsDefine.Language]:
1604
1697
  profile.language = g_param[OptionsDefine.Language]
1605
1698
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1639,7 +1732,10 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
1639
1732
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1640
1733
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1641
1734
  )
1642
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1735
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1736
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1737
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1738
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1643
1739
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1644
1740
  else:
1645
1741
  cred = credential.Credential(
@@ -1651,7 +1747,7 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
1651
1747
  endpoint=g_param[OptionsDefine.Endpoint],
1652
1748
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1653
1749
  )
1654
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1750
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1655
1751
  if g_param[OptionsDefine.Language]:
1656
1752
  profile.language = g_param[OptionsDefine.Language]
1657
1753
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1691,7 +1787,10 @@ def doExtractDocMultiPro(args, parsed_globals):
1691
1787
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1692
1788
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1693
1789
  )
1694
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1790
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1791
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1792
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1793
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1695
1794
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1696
1795
  else:
1697
1796
  cred = credential.Credential(
@@ -1703,7 +1802,7 @@ def doExtractDocMultiPro(args, parsed_globals):
1703
1802
  endpoint=g_param[OptionsDefine.Endpoint],
1704
1803
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1705
1804
  )
1706
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1805
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1707
1806
  if g_param[OptionsDefine.Language]:
1708
1807
  profile.language = g_param[OptionsDefine.Language]
1709
1808
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1743,7 +1842,10 @@ def doTableOCR(args, parsed_globals):
1743
1842
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1744
1843
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1745
1844
  )
1746
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1845
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1846
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1847
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1848
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1747
1849
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1748
1850
  else:
1749
1851
  cred = credential.Credential(
@@ -1755,7 +1857,7 @@ def doTableOCR(args, parsed_globals):
1755
1857
  endpoint=g_param[OptionsDefine.Endpoint],
1756
1858
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1757
1859
  )
1758
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1860
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1759
1861
  if g_param[OptionsDefine.Language]:
1760
1862
  profile.language = g_param[OptionsDefine.Language]
1761
1863
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1795,7 +1897,10 @@ def doArithmeticOCR(args, parsed_globals):
1795
1897
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1796
1898
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1797
1899
  )
1798
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1900
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1901
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1902
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1903
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1799
1904
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1800
1905
  else:
1801
1906
  cred = credential.Credential(
@@ -1807,7 +1912,7 @@ def doArithmeticOCR(args, parsed_globals):
1807
1912
  endpoint=g_param[OptionsDefine.Endpoint],
1808
1913
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1809
1914
  )
1810
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1811
1916
  if g_param[OptionsDefine.Language]:
1812
1917
  profile.language = g_param[OptionsDefine.Language]
1813
1918
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1847,7 +1952,10 @@ def doEstateCertOCR(args, parsed_globals):
1847
1952
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1848
1953
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1849
1954
  )
1850
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
1956
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
1957
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
1958
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1851
1959
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1852
1960
  else:
1853
1961
  cred = credential.Credential(
@@ -1859,7 +1967,7 @@ def doEstateCertOCR(args, parsed_globals):
1859
1967
  endpoint=g_param[OptionsDefine.Endpoint],
1860
1968
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1861
1969
  )
1862
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1970
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1863
1971
  if g_param[OptionsDefine.Language]:
1864
1972
  profile.language = g_param[OptionsDefine.Language]
1865
1973
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -1889,58 +1997,6 @@ def doEstateCertOCR(args, parsed_globals):
1889
1997
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1890
1998
 
1891
1999
 
1892
- def doRecognizeValidIDCardOCR(args, parsed_globals):
1893
- g_param = parse_global_arg(parsed_globals)
1894
-
1895
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
1896
- cred = credential.CVMRoleCredential()
1897
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
1898
- cred = credential.STSAssumeRoleCredential(
1899
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1900
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1901
- )
1902
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1903
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1904
- else:
1905
- cred = credential.Credential(
1906
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
1907
- )
1908
- http_profile = HttpProfile(
1909
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
1910
- reqMethod="POST",
1911
- endpoint=g_param[OptionsDefine.Endpoint],
1912
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1913
- )
1914
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
1915
- if g_param[OptionsDefine.Language]:
1916
- profile.language = g_param[OptionsDefine.Language]
1917
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
1918
- client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
1919
- client._sdkVersion += ("_CLI_" + __version__)
1920
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
1921
- model = models.RecognizeValidIDCardOCRRequest()
1922
- model.from_json_string(json.dumps(args))
1923
- start_time = time.time()
1924
- while True:
1925
- rsp = client.RecognizeValidIDCardOCR(model)
1926
- result = rsp.to_json_string()
1927
- try:
1928
- json_obj = json.loads(result)
1929
- except TypeError as e:
1930
- json_obj = json.loads(result.decode('utf-8')) # python3.3
1931
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
1932
- break
1933
- cur_time = time.time()
1934
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
1935
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
1936
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
1937
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
1938
- else:
1939
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
1940
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
1941
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
1942
-
1943
-
1944
2000
  def doBankCardOCR(args, parsed_globals):
1945
2001
  g_param = parse_global_arg(parsed_globals)
1946
2002
 
@@ -1951,7 +2007,10 @@ def doBankCardOCR(args, parsed_globals):
1951
2007
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
1952
2008
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
1953
2009
  )
1954
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2010
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2011
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2012
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2013
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
1955
2014
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
1956
2015
  else:
1957
2016
  cred = credential.Credential(
@@ -1963,7 +2022,7 @@ def doBankCardOCR(args, parsed_globals):
1963
2022
  endpoint=g_param[OptionsDefine.Endpoint],
1964
2023
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
1965
2024
  )
1966
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2025
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
1967
2026
  if g_param[OptionsDefine.Language]:
1968
2027
  profile.language = g_param[OptionsDefine.Language]
1969
2028
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2003,7 +2062,10 @@ def doGetOCRToken(args, parsed_globals):
2003
2062
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2004
2063
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2005
2064
  )
2006
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2065
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2066
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2067
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2068
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2007
2069
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2008
2070
  else:
2009
2071
  cred = credential.Credential(
@@ -2015,7 +2077,7 @@ def doGetOCRToken(args, parsed_globals):
2015
2077
  endpoint=g_param[OptionsDefine.Endpoint],
2016
2078
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2017
2079
  )
2018
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2080
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2019
2081
  if g_param[OptionsDefine.Language]:
2020
2082
  profile.language = g_param[OptionsDefine.Language]
2021
2083
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2055,7 +2117,10 @@ def doEduPaperOCR(args, parsed_globals):
2055
2117
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2056
2118
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2057
2119
  )
2058
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2120
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2121
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2122
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2123
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2059
2124
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2060
2125
  else:
2061
2126
  cred = credential.Credential(
@@ -2067,7 +2132,7 @@ def doEduPaperOCR(args, parsed_globals):
2067
2132
  endpoint=g_param[OptionsDefine.Endpoint],
2068
2133
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2069
2134
  )
2070
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2135
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2071
2136
  if g_param[OptionsDefine.Language]:
2072
2137
  profile.language = g_param[OptionsDefine.Language]
2073
2138
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2107,7 +2172,10 @@ def doEnterpriseLicenseOCR(args, parsed_globals):
2107
2172
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2108
2173
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2109
2174
  )
2110
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2175
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2176
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2177
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2178
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2111
2179
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2112
2180
  else:
2113
2181
  cred = credential.Credential(
@@ -2119,7 +2187,7 @@ def doEnterpriseLicenseOCR(args, parsed_globals):
2119
2187
  endpoint=g_param[OptionsDefine.Endpoint],
2120
2188
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2121
2189
  )
2122
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2190
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2123
2191
  if g_param[OptionsDefine.Language]:
2124
2192
  profile.language = g_param[OptionsDefine.Language]
2125
2193
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2159,7 +2227,10 @@ def doBusinessCardOCR(args, parsed_globals):
2159
2227
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2160
2228
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2161
2229
  )
2162
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2230
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2231
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2232
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2233
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2163
2234
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2164
2235
  else:
2165
2236
  cred = credential.Credential(
@@ -2171,7 +2242,7 @@ def doBusinessCardOCR(args, parsed_globals):
2171
2242
  endpoint=g_param[OptionsDefine.Endpoint],
2172
2243
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2173
2244
  )
2174
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2245
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2175
2246
  if g_param[OptionsDefine.Language]:
2176
2247
  profile.language = g_param[OptionsDefine.Language]
2177
2248
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2211,7 +2282,10 @@ def doIDCardOCR(args, parsed_globals):
2211
2282
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2212
2283
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2213
2284
  )
2214
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2285
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2286
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2287
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2288
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2215
2289
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2216
2290
  else:
2217
2291
  cred = credential.Credential(
@@ -2223,7 +2297,7 @@ def doIDCardOCR(args, parsed_globals):
2223
2297
  endpoint=g_param[OptionsDefine.Endpoint],
2224
2298
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2225
2299
  )
2226
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2300
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2227
2301
  if g_param[OptionsDefine.Language]:
2228
2302
  profile.language = g_param[OptionsDefine.Language]
2229
2303
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2253,110 +2327,6 @@ def doIDCardOCR(args, parsed_globals):
2253
2327
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2254
2328
 
2255
2329
 
2256
- def doRecognizeGeneralTextImageWarn(args, parsed_globals):
2257
- g_param = parse_global_arg(parsed_globals)
2258
-
2259
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2260
- cred = credential.CVMRoleCredential()
2261
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2262
- cred = credential.STSAssumeRoleCredential(
2263
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2264
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2265
- )
2266
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2267
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2268
- else:
2269
- cred = credential.Credential(
2270
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2271
- )
2272
- http_profile = HttpProfile(
2273
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2274
- reqMethod="POST",
2275
- endpoint=g_param[OptionsDefine.Endpoint],
2276
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2277
- )
2278
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2279
- if g_param[OptionsDefine.Language]:
2280
- profile.language = g_param[OptionsDefine.Language]
2281
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2282
- client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
2283
- client._sdkVersion += ("_CLI_" + __version__)
2284
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
2285
- model = models.RecognizeGeneralTextImageWarnRequest()
2286
- model.from_json_string(json.dumps(args))
2287
- start_time = time.time()
2288
- while True:
2289
- rsp = client.RecognizeGeneralTextImageWarn(model)
2290
- result = rsp.to_json_string()
2291
- try:
2292
- json_obj = json.loads(result)
2293
- except TypeError as e:
2294
- json_obj = json.loads(result.decode('utf-8')) # python3.3
2295
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2296
- break
2297
- cur_time = time.time()
2298
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2299
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2300
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2301
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2302
- else:
2303
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2304
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2305
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2306
-
2307
-
2308
- def doInstitutionOCR(args, parsed_globals):
2309
- g_param = parse_global_arg(parsed_globals)
2310
-
2311
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
2312
- cred = credential.CVMRoleCredential()
2313
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
2314
- cred = credential.STSAssumeRoleCredential(
2315
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2316
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2317
- )
2318
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2319
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2320
- else:
2321
- cred = credential.Credential(
2322
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
2323
- )
2324
- http_profile = HttpProfile(
2325
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
2326
- reqMethod="POST",
2327
- endpoint=g_param[OptionsDefine.Endpoint],
2328
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2329
- )
2330
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2331
- if g_param[OptionsDefine.Language]:
2332
- profile.language = g_param[OptionsDefine.Language]
2333
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
2334
- client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
2335
- client._sdkVersion += ("_CLI_" + __version__)
2336
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
2337
- model = models.InstitutionOCRRequest()
2338
- model.from_json_string(json.dumps(args))
2339
- start_time = time.time()
2340
- while True:
2341
- rsp = client.InstitutionOCR(model)
2342
- result = rsp.to_json_string()
2343
- try:
2344
- json_obj = json.loads(result)
2345
- except TypeError as e:
2346
- json_obj = json.loads(result.decode('utf-8')) # python3.3
2347
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
2348
- break
2349
- cur_time = time.time()
2350
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
2351
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
2352
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
2353
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
2354
- else:
2355
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
2356
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
2357
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
2358
-
2359
-
2360
2330
  def doRecognizeTableAccurateOCR(args, parsed_globals):
2361
2331
  g_param = parse_global_arg(parsed_globals)
2362
2332
 
@@ -2367,7 +2337,10 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
2367
2337
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2368
2338
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2369
2339
  )
2370
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2340
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2341
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2342
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2343
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2371
2344
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2372
2345
  else:
2373
2346
  cred = credential.Credential(
@@ -2379,7 +2352,7 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
2379
2352
  endpoint=g_param[OptionsDefine.Endpoint],
2380
2353
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2381
2354
  )
2382
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2355
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2383
2356
  if g_param[OptionsDefine.Language]:
2384
2357
  profile.language = g_param[OptionsDefine.Language]
2385
2358
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2419,7 +2392,10 @@ def doMixedInvoiceDetect(args, parsed_globals):
2419
2392
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2420
2393
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2421
2394
  )
2422
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2395
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2396
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2397
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2398
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2423
2399
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2424
2400
  else:
2425
2401
  cred = credential.Credential(
@@ -2431,7 +2407,7 @@ def doMixedInvoiceDetect(args, parsed_globals):
2431
2407
  endpoint=g_param[OptionsDefine.Endpoint],
2432
2408
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2433
2409
  )
2434
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2410
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2435
2411
  if g_param[OptionsDefine.Language]:
2436
2412
  profile.language = g_param[OptionsDefine.Language]
2437
2413
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2471,7 +2447,10 @@ def doVatRollInvoiceOCR(args, parsed_globals):
2471
2447
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2472
2448
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2473
2449
  )
2474
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2450
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2451
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2452
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2453
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2475
2454
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2476
2455
  else:
2477
2456
  cred = credential.Credential(
@@ -2483,7 +2462,7 @@ def doVatRollInvoiceOCR(args, parsed_globals):
2483
2462
  endpoint=g_param[OptionsDefine.Endpoint],
2484
2463
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2485
2464
  )
2486
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2465
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2487
2466
  if g_param[OptionsDefine.Language]:
2488
2467
  profile.language = g_param[OptionsDefine.Language]
2489
2468
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2523,7 +2502,10 @@ def doQuotaInvoiceOCR(args, parsed_globals):
2523
2502
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2524
2503
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2525
2504
  )
2526
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2505
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2506
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2507
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2508
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2527
2509
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2528
2510
  else:
2529
2511
  cred = credential.Credential(
@@ -2535,7 +2517,7 @@ def doQuotaInvoiceOCR(args, parsed_globals):
2535
2517
  endpoint=g_param[OptionsDefine.Endpoint],
2536
2518
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2537
2519
  )
2538
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2520
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2539
2521
  if g_param[OptionsDefine.Language]:
2540
2522
  profile.language = g_param[OptionsDefine.Language]
2541
2523
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2575,7 +2557,10 @@ def doGeneralHandwritingOCR(args, parsed_globals):
2575
2557
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2576
2558
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2577
2559
  )
2578
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2560
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2561
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2562
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2563
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2579
2564
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2580
2565
  else:
2581
2566
  cred = credential.Credential(
@@ -2587,7 +2572,7 @@ def doGeneralHandwritingOCR(args, parsed_globals):
2587
2572
  endpoint=g_param[OptionsDefine.Endpoint],
2588
2573
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2589
2574
  )
2590
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2575
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2591
2576
  if g_param[OptionsDefine.Language]:
2592
2577
  profile.language = g_param[OptionsDefine.Language]
2593
2578
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2627,7 +2612,10 @@ def doExtractDocBasic(args, parsed_globals):
2627
2612
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2628
2613
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2629
2614
  )
2630
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2615
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2616
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2617
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2618
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2631
2619
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2632
2620
  else:
2633
2621
  cred = credential.Credential(
@@ -2639,7 +2627,7 @@ def doExtractDocBasic(args, parsed_globals):
2639
2627
  endpoint=g_param[OptionsDefine.Endpoint],
2640
2628
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2641
2629
  )
2642
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2630
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2643
2631
  if g_param[OptionsDefine.Language]:
2644
2632
  profile.language = g_param[OptionsDefine.Language]
2645
2633
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2679,7 +2667,10 @@ def doRecognizeOnlineTaxiItineraryOCR(args, parsed_globals):
2679
2667
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2680
2668
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2681
2669
  )
2682
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2670
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2671
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2672
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2673
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2683
2674
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2684
2675
  else:
2685
2676
  cred = credential.Credential(
@@ -2691,7 +2682,7 @@ def doRecognizeOnlineTaxiItineraryOCR(args, parsed_globals):
2691
2682
  endpoint=g_param[OptionsDefine.Endpoint],
2692
2683
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2693
2684
  )
2694
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2685
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2695
2686
  if g_param[OptionsDefine.Language]:
2696
2687
  profile.language = g_param[OptionsDefine.Language]
2697
2688
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2731,7 +2722,10 @@ def doRecognizeTableOCR(args, parsed_globals):
2731
2722
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2732
2723
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2733
2724
  )
2734
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2725
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2726
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2727
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2728
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2735
2729
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2736
2730
  else:
2737
2731
  cred = credential.Credential(
@@ -2743,7 +2737,7 @@ def doRecognizeTableOCR(args, parsed_globals):
2743
2737
  endpoint=g_param[OptionsDefine.Endpoint],
2744
2738
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2745
2739
  )
2746
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2740
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2747
2741
  if g_param[OptionsDefine.Language]:
2748
2742
  profile.language = g_param[OptionsDefine.Language]
2749
2743
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2783,7 +2777,10 @@ def doWaybillOCR(args, parsed_globals):
2783
2777
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2784
2778
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2785
2779
  )
2786
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2780
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2781
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2782
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2783
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2787
2784
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2788
2785
  else:
2789
2786
  cred = credential.Credential(
@@ -2795,7 +2792,7 @@ def doWaybillOCR(args, parsed_globals):
2795
2792
  endpoint=g_param[OptionsDefine.Endpoint],
2796
2793
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2797
2794
  )
2798
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2795
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2799
2796
  if g_param[OptionsDefine.Language]:
2800
2797
  profile.language = g_param[OptionsDefine.Language]
2801
2798
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2835,7 +2832,10 @@ def doHandwritingEssayOCR(args, parsed_globals):
2835
2832
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2836
2833
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2837
2834
  )
2838
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2835
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2836
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2837
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2838
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2839
2839
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2840
2840
  else:
2841
2841
  cred = credential.Credential(
@@ -2847,7 +2847,7 @@ def doHandwritingEssayOCR(args, parsed_globals):
2847
2847
  endpoint=g_param[OptionsDefine.Endpoint],
2848
2848
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2849
2849
  )
2850
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2850
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2851
2851
  if g_param[OptionsDefine.Language]:
2852
2852
  profile.language = g_param[OptionsDefine.Language]
2853
2853
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2887,7 +2887,10 @@ def doHmtResidentPermitOCR(args, parsed_globals):
2887
2887
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2888
2888
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2889
2889
  )
2890
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2890
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2891
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2892
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2893
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2891
2894
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2892
2895
  else:
2893
2896
  cred = credential.Credential(
@@ -2899,7 +2902,7 @@ def doHmtResidentPermitOCR(args, parsed_globals):
2899
2902
  endpoint=g_param[OptionsDefine.Endpoint],
2900
2903
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2901
2904
  )
2902
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2905
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2903
2906
  if g_param[OptionsDefine.Language]:
2904
2907
  profile.language = g_param[OptionsDefine.Language]
2905
2908
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2939,7 +2942,10 @@ def doTollInvoiceOCR(args, parsed_globals):
2939
2942
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2940
2943
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2941
2944
  )
2942
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2945
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
2946
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
2947
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
2948
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2943
2949
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2944
2950
  else:
2945
2951
  cred = credential.Credential(
@@ -2951,7 +2957,7 @@ def doTollInvoiceOCR(args, parsed_globals):
2951
2957
  endpoint=g_param[OptionsDefine.Endpoint],
2952
2958
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
2953
2959
  )
2954
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
2960
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
2955
2961
  if g_param[OptionsDefine.Language]:
2956
2962
  profile.language = g_param[OptionsDefine.Language]
2957
2963
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -2991,7 +2997,10 @@ def doClassifyDetectOCR(args, parsed_globals):
2991
2997
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
2992
2998
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
2993
2999
  )
2994
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3000
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3001
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3002
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3003
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
2995
3004
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
2996
3005
  else:
2997
3006
  cred = credential.Credential(
@@ -3003,7 +3012,7 @@ def doClassifyDetectOCR(args, parsed_globals):
3003
3012
  endpoint=g_param[OptionsDefine.Endpoint],
3004
3013
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3005
3014
  )
3006
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3015
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3007
3016
  if g_param[OptionsDefine.Language]:
3008
3017
  profile.language = g_param[OptionsDefine.Language]
3009
3018
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3043,7 +3052,10 @@ def doRecognizeFormulaOCR(args, parsed_globals):
3043
3052
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3044
3053
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3045
3054
  )
3046
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3055
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3056
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3057
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3058
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3047
3059
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3048
3060
  else:
3049
3061
  cred = credential.Credential(
@@ -3055,7 +3067,7 @@ def doRecognizeFormulaOCR(args, parsed_globals):
3055
3067
  endpoint=g_param[OptionsDefine.Endpoint],
3056
3068
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3057
3069
  )
3058
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3070
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3059
3071
  if g_param[OptionsDefine.Language]:
3060
3072
  profile.language = g_param[OptionsDefine.Language]
3061
3073
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3095,7 +3107,10 @@ def doSealOCR(args, parsed_globals):
3095
3107
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3096
3108
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3097
3109
  )
3098
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3110
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3111
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3112
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3113
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3099
3114
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3100
3115
  else:
3101
3116
  cred = credential.Credential(
@@ -3107,7 +3122,7 @@ def doSealOCR(args, parsed_globals):
3107
3122
  endpoint=g_param[OptionsDefine.Endpoint],
3108
3123
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3109
3124
  )
3110
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3125
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3111
3126
  if g_param[OptionsDefine.Language]:
3112
3127
  profile.language = g_param[OptionsDefine.Language]
3113
3128
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3147,7 +3162,10 @@ def doBankSlipOCR(args, parsed_globals):
3147
3162
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3148
3163
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3149
3164
  )
3150
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3165
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3166
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3167
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3168
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3151
3169
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3152
3170
  else:
3153
3171
  cred = credential.Credential(
@@ -3159,7 +3177,7 @@ def doBankSlipOCR(args, parsed_globals):
3159
3177
  endpoint=g_param[OptionsDefine.Endpoint],
3160
3178
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3161
3179
  )
3162
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3180
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3163
3181
  if g_param[OptionsDefine.Language]:
3164
3182
  profile.language = g_param[OptionsDefine.Language]
3165
3183
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3189,7 +3207,7 @@ def doBankSlipOCR(args, parsed_globals):
3189
3207
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3190
3208
 
3191
3209
 
3192
- def doVehicleRegCertOCR(args, parsed_globals):
3210
+ def doResidenceBookletOCR(args, parsed_globals):
3193
3211
  g_param = parse_global_arg(parsed_globals)
3194
3212
 
3195
3213
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -3199,7 +3217,10 @@ def doVehicleRegCertOCR(args, parsed_globals):
3199
3217
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3200
3218
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3201
3219
  )
3202
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3220
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3221
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3222
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3223
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3203
3224
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3204
3225
  else:
3205
3226
  cred = credential.Credential(
@@ -3211,18 +3232,18 @@ def doVehicleRegCertOCR(args, parsed_globals):
3211
3232
  endpoint=g_param[OptionsDefine.Endpoint],
3212
3233
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3213
3234
  )
3214
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3235
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3215
3236
  if g_param[OptionsDefine.Language]:
3216
3237
  profile.language = g_param[OptionsDefine.Language]
3217
3238
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3218
3239
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
3219
3240
  client._sdkVersion += ("_CLI_" + __version__)
3220
3241
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
3221
- model = models.VehicleRegCertOCRRequest()
3242
+ model = models.ResidenceBookletOCRRequest()
3222
3243
  model.from_json_string(json.dumps(args))
3223
3244
  start_time = time.time()
3224
3245
  while True:
3225
- rsp = client.VehicleRegCertOCR(model)
3246
+ rsp = client.ResidenceBookletOCR(model)
3226
3247
  result = rsp.to_json_string()
3227
3248
  try:
3228
3249
  json_obj = json.loads(result)
@@ -3251,7 +3272,10 @@ def doRecognizeTravelCardOCR(args, parsed_globals):
3251
3272
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3252
3273
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3253
3274
  )
3254
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3275
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3276
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3277
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3278
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3255
3279
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3256
3280
  else:
3257
3281
  cred = credential.Credential(
@@ -3263,7 +3287,7 @@ def doRecognizeTravelCardOCR(args, parsed_globals):
3263
3287
  endpoint=g_param[OptionsDefine.Endpoint],
3264
3288
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3265
3289
  )
3266
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3290
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3267
3291
  if g_param[OptionsDefine.Language]:
3268
3292
  profile.language = g_param[OptionsDefine.Language]
3269
3293
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3303,7 +3327,10 @@ def doSubmitExtractDocAgentJob(args, parsed_globals):
3303
3327
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3304
3328
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3305
3329
  )
3306
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3330
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3331
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3332
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3333
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3307
3334
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3308
3335
  else:
3309
3336
  cred = credential.Credential(
@@ -3315,7 +3342,7 @@ def doSubmitExtractDocAgentJob(args, parsed_globals):
3315
3342
  endpoint=g_param[OptionsDefine.Endpoint],
3316
3343
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3317
3344
  )
3318
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3345
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3319
3346
  if g_param[OptionsDefine.Language]:
3320
3347
  profile.language = g_param[OptionsDefine.Language]
3321
3348
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3355,7 +3382,10 @@ def doVerifyOfdVatInvoiceOCR(args, parsed_globals):
3355
3382
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3356
3383
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3357
3384
  )
3358
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3385
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3386
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3387
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3388
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3359
3389
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3360
3390
  else:
3361
3391
  cred = credential.Credential(
@@ -3367,7 +3397,7 @@ def doVerifyOfdVatInvoiceOCR(args, parsed_globals):
3367
3397
  endpoint=g_param[OptionsDefine.Endpoint],
3368
3398
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3369
3399
  )
3370
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3400
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3371
3401
  if g_param[OptionsDefine.Language]:
3372
3402
  profile.language = g_param[OptionsDefine.Language]
3373
3403
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3407,7 +3437,10 @@ def doDriverLicenseOCR(args, parsed_globals):
3407
3437
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3408
3438
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3409
3439
  )
3410
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3440
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3441
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3442
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3443
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3411
3444
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3412
3445
  else:
3413
3446
  cred = credential.Credential(
@@ -3419,7 +3452,7 @@ def doDriverLicenseOCR(args, parsed_globals):
3419
3452
  endpoint=g_param[OptionsDefine.Endpoint],
3420
3453
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3421
3454
  )
3422
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3455
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3423
3456
  if g_param[OptionsDefine.Language]:
3424
3457
  profile.language = g_param[OptionsDefine.Language]
3425
3458
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3459,7 +3492,10 @@ def doFinanBillOCR(args, parsed_globals):
3459
3492
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3460
3493
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3461
3494
  )
3462
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3495
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3496
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3497
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3498
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3463
3499
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3464
3500
  else:
3465
3501
  cred = credential.Credential(
@@ -3471,7 +3507,7 @@ def doFinanBillOCR(args, parsed_globals):
3471
3507
  endpoint=g_param[OptionsDefine.Endpoint],
3472
3508
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3473
3509
  )
3474
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3510
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3475
3511
  if g_param[OptionsDefine.Language]:
3476
3512
  profile.language = g_param[OptionsDefine.Language]
3477
3513
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3511,7 +3547,10 @@ def doMixedInvoiceOCR(args, parsed_globals):
3511
3547
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3512
3548
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3513
3549
  )
3514
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3550
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3551
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3552
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3553
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3515
3554
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3516
3555
  else:
3517
3556
  cred = credential.Credential(
@@ -3523,7 +3562,7 @@ def doMixedInvoiceOCR(args, parsed_globals):
3523
3562
  endpoint=g_param[OptionsDefine.Endpoint],
3524
3563
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3525
3564
  )
3526
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3565
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3527
3566
  if g_param[OptionsDefine.Language]:
3528
3567
  profile.language = g_param[OptionsDefine.Language]
3529
3568
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3563,7 +3602,10 @@ def doRecognizeHealthCodeOCR(args, parsed_globals):
3563
3602
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3564
3603
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3565
3604
  )
3566
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3605
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3606
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3607
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3608
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3567
3609
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3568
3610
  else:
3569
3611
  cred = credential.Credential(
@@ -3575,7 +3617,7 @@ def doRecognizeHealthCodeOCR(args, parsed_globals):
3575
3617
  endpoint=g_param[OptionsDefine.Endpoint],
3576
3618
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3577
3619
  )
3578
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3620
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3579
3621
  if g_param[OptionsDefine.Language]:
3580
3622
  profile.language = g_param[OptionsDefine.Language]
3581
3623
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3615,7 +3657,10 @@ def doImageEnhancement(args, parsed_globals):
3615
3657
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3616
3658
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3617
3659
  )
3618
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3660
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3661
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3662
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3663
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3619
3664
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3620
3665
  else:
3621
3666
  cred = credential.Credential(
@@ -3627,7 +3672,7 @@ def doImageEnhancement(args, parsed_globals):
3627
3672
  endpoint=g_param[OptionsDefine.Endpoint],
3628
3673
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3629
3674
  )
3630
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3675
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3631
3676
  if g_param[OptionsDefine.Language]:
3632
3677
  profile.language = g_param[OptionsDefine.Language]
3633
3678
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3667,7 +3712,10 @@ def doQuestionSplitOCR(args, parsed_globals):
3667
3712
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3668
3713
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3669
3714
  )
3670
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3715
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3716
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3717
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3718
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3671
3719
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3672
3720
  else:
3673
3721
  cred = credential.Credential(
@@ -3679,7 +3727,7 @@ def doQuestionSplitOCR(args, parsed_globals):
3679
3727
  endpoint=g_param[OptionsDefine.Endpoint],
3680
3728
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3681
3729
  )
3682
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3730
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3683
3731
  if g_param[OptionsDefine.Language]:
3684
3732
  profile.language = g_param[OptionsDefine.Language]
3685
3733
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3719,7 +3767,10 @@ def doMLIDCardOCR(args, parsed_globals):
3719
3767
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3720
3768
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3721
3769
  )
3722
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3770
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3771
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3772
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3773
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3723
3774
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3724
3775
  else:
3725
3776
  cred = credential.Credential(
@@ -3731,7 +3782,7 @@ def doMLIDCardOCR(args, parsed_globals):
3731
3782
  endpoint=g_param[OptionsDefine.Endpoint],
3732
3783
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3733
3784
  )
3734
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3785
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3735
3786
  if g_param[OptionsDefine.Language]:
3736
3787
  profile.language = g_param[OptionsDefine.Language]
3737
3788
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3771,7 +3822,10 @@ def doRecognizeMedicalInvoiceOCR(args, parsed_globals):
3771
3822
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3772
3823
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3773
3824
  )
3774
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3825
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3826
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3827
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3828
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3775
3829
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3776
3830
  else:
3777
3831
  cred = credential.Credential(
@@ -3783,7 +3837,7 @@ def doRecognizeMedicalInvoiceOCR(args, parsed_globals):
3783
3837
  endpoint=g_param[OptionsDefine.Endpoint],
3784
3838
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3785
3839
  )
3786
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3840
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3787
3841
  if g_param[OptionsDefine.Language]:
3788
3842
  profile.language = g_param[OptionsDefine.Language]
3789
3843
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3823,7 +3877,10 @@ def doRecognizeTableMultiOCR(args, parsed_globals):
3823
3877
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3824
3878
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3825
3879
  )
3826
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3880
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3881
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3882
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3883
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3827
3884
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3828
3885
  else:
3829
3886
  cred = credential.Credential(
@@ -3835,7 +3892,7 @@ def doRecognizeTableMultiOCR(args, parsed_globals):
3835
3892
  endpoint=g_param[OptionsDefine.Endpoint],
3836
3893
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3837
3894
  )
3838
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3895
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3839
3896
  if g_param[OptionsDefine.Language]:
3840
3897
  profile.language = g_param[OptionsDefine.Language]
3841
3898
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3875,7 +3932,10 @@ def doGeneralFastOCR(args, parsed_globals):
3875
3932
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3876
3933
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3877
3934
  )
3878
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3935
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3936
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3937
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3938
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3879
3939
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3880
3940
  else:
3881
3941
  cred = credential.Credential(
@@ -3887,7 +3947,7 @@ def doGeneralFastOCR(args, parsed_globals):
3887
3947
  endpoint=g_param[OptionsDefine.Endpoint],
3888
3948
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3889
3949
  )
3890
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3950
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3891
3951
  if g_param[OptionsDefine.Language]:
3892
3952
  profile.language = g_param[OptionsDefine.Language]
3893
3953
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3927,7 +3987,10 @@ def doVatInvoiceOCR(args, parsed_globals):
3927
3987
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3928
3988
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3929
3989
  )
3930
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3990
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
3991
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
3992
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
3993
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3931
3994
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3932
3995
  else:
3933
3996
  cred = credential.Credential(
@@ -3939,7 +4002,7 @@ def doVatInvoiceOCR(args, parsed_globals):
3939
4002
  endpoint=g_param[OptionsDefine.Endpoint],
3940
4003
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3941
4004
  )
3942
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4005
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
3943
4006
  if g_param[OptionsDefine.Language]:
3944
4007
  profile.language = g_param[OptionsDefine.Language]
3945
4008
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -3969,59 +4032,7 @@ def doVatInvoiceOCR(args, parsed_globals):
3969
4032
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
3970
4033
 
3971
4034
 
3972
- def doRecognizeForeignPermanentResidentIdCard(args, parsed_globals):
3973
- g_param = parse_global_arg(parsed_globals)
3974
-
3975
- if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
3976
- cred = credential.CVMRoleCredential()
3977
- elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
3978
- cred = credential.STSAssumeRoleCredential(
3979
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
3980
- g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
3981
- )
3982
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
3983
- cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
3984
- else:
3985
- cred = credential.Credential(
3986
- g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
3987
- )
3988
- http_profile = HttpProfile(
3989
- reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
3990
- reqMethod="POST",
3991
- endpoint=g_param[OptionsDefine.Endpoint],
3992
- proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
3993
- )
3994
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
3995
- if g_param[OptionsDefine.Language]:
3996
- profile.language = g_param[OptionsDefine.Language]
3997
- mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
3998
- client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
3999
- client._sdkVersion += ("_CLI_" + __version__)
4000
- models = MODELS_MAP[g_param[OptionsDefine.Version]]
4001
- model = models.RecognizeForeignPermanentResidentIdCardRequest()
4002
- model.from_json_string(json.dumps(args))
4003
- start_time = time.time()
4004
- while True:
4005
- rsp = client.RecognizeForeignPermanentResidentIdCard(model)
4006
- result = rsp.to_json_string()
4007
- try:
4008
- json_obj = json.loads(result)
4009
- except TypeError as e:
4010
- json_obj = json.loads(result.decode('utf-8')) # python3.3
4011
- if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
4012
- break
4013
- cur_time = time.time()
4014
- if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
4015
- raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
4016
- (g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
4017
- search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
4018
- else:
4019
- print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
4020
- time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
4021
- FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4022
-
4023
-
4024
- def doOrgCodeCertOCR(args, parsed_globals):
4035
+ def doDutyPaidProofOCR(args, parsed_globals):
4025
4036
  g_param = parse_global_arg(parsed_globals)
4026
4037
 
4027
4038
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4031,7 +4042,10 @@ def doOrgCodeCertOCR(args, parsed_globals):
4031
4042
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4032
4043
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4033
4044
  )
4034
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4045
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4046
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4047
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4048
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4035
4049
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4036
4050
  else:
4037
4051
  cred = credential.Credential(
@@ -4043,18 +4057,18 @@ def doOrgCodeCertOCR(args, parsed_globals):
4043
4057
  endpoint=g_param[OptionsDefine.Endpoint],
4044
4058
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4045
4059
  )
4046
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4060
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4047
4061
  if g_param[OptionsDefine.Language]:
4048
4062
  profile.language = g_param[OptionsDefine.Language]
4049
4063
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4050
4064
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
4051
4065
  client._sdkVersion += ("_CLI_" + __version__)
4052
4066
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4053
- model = models.OrgCodeCertOCRRequest()
4067
+ model = models.DutyPaidProofOCRRequest()
4054
4068
  model.from_json_string(json.dumps(args))
4055
4069
  start_time = time.time()
4056
4070
  while True:
4057
- rsp = client.OrgCodeCertOCR(model)
4071
+ rsp = client.DutyPaidProofOCR(model)
4058
4072
  result = rsp.to_json_string()
4059
4073
  try:
4060
4074
  json_obj = json.loads(result)
@@ -4083,7 +4097,10 @@ def doFinanBillSliceOCR(args, parsed_globals):
4083
4097
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4084
4098
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4085
4099
  )
4086
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4100
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4101
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4102
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4103
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4087
4104
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4088
4105
  else:
4089
4106
  cred = credential.Credential(
@@ -4095,7 +4112,7 @@ def doFinanBillSliceOCR(args, parsed_globals):
4095
4112
  endpoint=g_param[OptionsDefine.Endpoint],
4096
4113
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4097
4114
  )
4098
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4115
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4099
4116
  if g_param[OptionsDefine.Language]:
4100
4117
  profile.language = g_param[OptionsDefine.Language]
4101
4118
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4135,7 +4152,10 @@ def doLicensePlateOCR(args, parsed_globals):
4135
4152
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4136
4153
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4137
4154
  )
4138
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4155
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4156
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4157
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4158
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4139
4159
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4140
4160
  else:
4141
4161
  cred = credential.Credential(
@@ -4147,7 +4167,7 @@ def doLicensePlateOCR(args, parsed_globals):
4147
4167
  endpoint=g_param[OptionsDefine.Endpoint],
4148
4168
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4149
4169
  )
4150
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4170
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4151
4171
  if g_param[OptionsDefine.Language]:
4152
4172
  profile.language = g_param[OptionsDefine.Language]
4153
4173
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4187,7 +4207,10 @@ def doExtractDocMulti(args, parsed_globals):
4187
4207
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4188
4208
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4189
4209
  )
4190
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4210
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4211
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4212
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4213
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4191
4214
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4192
4215
  else:
4193
4216
  cred = credential.Credential(
@@ -4199,7 +4222,7 @@ def doExtractDocMulti(args, parsed_globals):
4199
4222
  endpoint=g_param[OptionsDefine.Endpoint],
4200
4223
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4201
4224
  )
4202
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4225
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4203
4226
  if g_param[OptionsDefine.Language]:
4204
4227
  profile.language = g_param[OptionsDefine.Language]
4205
4228
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4239,7 +4262,10 @@ def doGeneralEfficientOCR(args, parsed_globals):
4239
4262
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4240
4263
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4241
4264
  )
4242
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4265
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4266
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4267
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4268
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4243
4269
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4244
4270
  else:
4245
4271
  cred = credential.Credential(
@@ -4251,7 +4277,7 @@ def doGeneralEfficientOCR(args, parsed_globals):
4251
4277
  endpoint=g_param[OptionsDefine.Endpoint],
4252
4278
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4253
4279
  )
4254
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4280
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4255
4281
  if g_param[OptionsDefine.Language]:
4256
4282
  profile.language = g_param[OptionsDefine.Language]
4257
4283
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4291,7 +4317,10 @@ def doAdvertiseOCR(args, parsed_globals):
4291
4317
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4292
4318
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4293
4319
  )
4294
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4320
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4321
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4322
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4323
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4295
4324
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4296
4325
  else:
4297
4326
  cred = credential.Credential(
@@ -4303,7 +4332,7 @@ def doAdvertiseOCR(args, parsed_globals):
4303
4332
  endpoint=g_param[OptionsDefine.Endpoint],
4304
4333
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4305
4334
  )
4306
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4335
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4307
4336
  if g_param[OptionsDefine.Language]:
4308
4337
  profile.language = g_param[OptionsDefine.Language]
4309
4338
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4333,7 +4362,7 @@ def doAdvertiseOCR(args, parsed_globals):
4333
4362
  FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
4334
4363
 
4335
4364
 
4336
- def doResidenceBookletOCR(args, parsed_globals):
4365
+ def doVehicleRegCertOCR(args, parsed_globals):
4337
4366
  g_param = parse_global_arg(parsed_globals)
4338
4367
 
4339
4368
  if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
@@ -4343,7 +4372,10 @@ def doResidenceBookletOCR(args, parsed_globals):
4343
4372
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4344
4373
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4345
4374
  )
4346
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4375
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4376
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4377
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4378
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4347
4379
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4348
4380
  else:
4349
4381
  cred = credential.Credential(
@@ -4355,18 +4387,18 @@ def doResidenceBookletOCR(args, parsed_globals):
4355
4387
  endpoint=g_param[OptionsDefine.Endpoint],
4356
4388
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4357
4389
  )
4358
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4390
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4359
4391
  if g_param[OptionsDefine.Language]:
4360
4392
  profile.language = g_param[OptionsDefine.Language]
4361
4393
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
4362
4394
  client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
4363
4395
  client._sdkVersion += ("_CLI_" + __version__)
4364
4396
  models = MODELS_MAP[g_param[OptionsDefine.Version]]
4365
- model = models.ResidenceBookletOCRRequest()
4397
+ model = models.VehicleRegCertOCRRequest()
4366
4398
  model.from_json_string(json.dumps(args))
4367
4399
  start_time = time.time()
4368
4400
  while True:
4369
- rsp = client.ResidenceBookletOCR(model)
4401
+ rsp = client.VehicleRegCertOCR(model)
4370
4402
  result = rsp.to_json_string()
4371
4403
  try:
4372
4404
  json_obj = json.loads(result)
@@ -4395,7 +4427,10 @@ def doCarInvoiceOCR(args, parsed_globals):
4395
4427
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4396
4428
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4397
4429
  )
4398
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4430
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4431
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4432
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4433
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4399
4434
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4400
4435
  else:
4401
4436
  cred = credential.Credential(
@@ -4407,7 +4442,7 @@ def doCarInvoiceOCR(args, parsed_globals):
4407
4442
  endpoint=g_param[OptionsDefine.Endpoint],
4408
4443
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4409
4444
  )
4410
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4445
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4411
4446
  if g_param[OptionsDefine.Language]:
4412
4447
  profile.language = g_param[OptionsDefine.Language]
4413
4448
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4447,7 +4482,10 @@ def doGetOCRResult(args, parsed_globals):
4447
4482
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4448
4483
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4449
4484
  )
4450
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4485
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4486
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4487
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4488
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4451
4489
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4452
4490
  else:
4453
4491
  cred = credential.Credential(
@@ -4459,7 +4497,7 @@ def doGetOCRResult(args, parsed_globals):
4459
4497
  endpoint=g_param[OptionsDefine.Endpoint],
4460
4498
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4461
4499
  )
4462
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4500
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4463
4501
  if g_param[OptionsDefine.Language]:
4464
4502
  profile.language = g_param[OptionsDefine.Language]
4465
4503
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4499,7 +4537,10 @@ def doFormulaOCR(args, parsed_globals):
4499
4537
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4500
4538
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4501
4539
  )
4502
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4540
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4541
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4542
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4543
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4503
4544
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4504
4545
  else:
4505
4546
  cred = credential.Credential(
@@ -4511,7 +4552,7 @@ def doFormulaOCR(args, parsed_globals):
4511
4552
  endpoint=g_param[OptionsDefine.Endpoint],
4512
4553
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4513
4554
  )
4514
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4555
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4515
4556
  if g_param[OptionsDefine.Language]:
4516
4557
  profile.language = g_param[OptionsDefine.Language]
4517
4558
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4551,7 +4592,10 @@ def doPassportOCR(args, parsed_globals):
4551
4592
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4552
4593
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4553
4594
  )
4554
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4595
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4596
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4597
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4598
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4555
4599
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4556
4600
  else:
4557
4601
  cred = credential.Credential(
@@ -4563,7 +4607,7 @@ def doPassportOCR(args, parsed_globals):
4563
4607
  endpoint=g_param[OptionsDefine.Endpoint],
4564
4608
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4565
4609
  )
4566
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4610
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4567
4611
  if g_param[OptionsDefine.Language]:
4568
4612
  profile.language = g_param[OptionsDefine.Language]
4569
4613
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4603,7 +4647,10 @@ def doShipInvoiceOCR(args, parsed_globals):
4603
4647
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4604
4648
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4605
4649
  )
4606
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4650
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4651
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4652
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4653
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4607
4654
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4608
4655
  else:
4609
4656
  cred = credential.Credential(
@@ -4615,7 +4662,7 @@ def doShipInvoiceOCR(args, parsed_globals):
4615
4662
  endpoint=g_param[OptionsDefine.Endpoint],
4616
4663
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4617
4664
  )
4618
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4665
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4619
4666
  if g_param[OptionsDefine.Language]:
4620
4667
  profile.language = g_param[OptionsDefine.Language]
4621
4668
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4655,7 +4702,10 @@ def doRideHailingTransportLicenseOCR(args, parsed_globals):
4655
4702
  g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
4656
4703
  g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
4657
4704
  )
4658
- elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4705
+ elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
4706
+ and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
4707
+ and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
4708
+ and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
4659
4709
  cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
4660
4710
  else:
4661
4711
  cred = credential.Credential(
@@ -4667,7 +4717,7 @@ def doRideHailingTransportLicenseOCR(args, parsed_globals):
4667
4717
  endpoint=g_param[OptionsDefine.Endpoint],
4668
4718
  proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
4669
4719
  )
4670
- profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
4720
+ profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
4671
4721
  if g_param[OptionsDefine.Language]:
4672
4722
  profile.language = g_param[OptionsDefine.Language]
4673
4723
  mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
@@ -4717,10 +4767,11 @@ ACTION_MAP = {
4717
4767
  "RecognizeStoreName": doRecognizeStoreName,
4718
4768
  "MLIDPassportOCR": doMLIDPassportOCR,
4719
4769
  "TrainTicketOCR": doTrainTicketOCR,
4720
- "PropOwnerCertOCR": doPropOwnerCertOCR,
4770
+ "RecognizeValidIDCardOCR": doRecognizeValidIDCardOCR,
4721
4771
  "InvoiceGeneralOCR": doInvoiceGeneralOCR,
4722
4772
  "HKIDCardOCR": doHKIDCardOCR,
4723
4773
  "PermitOCR": doPermitOCR,
4774
+ "QuestionSplitLayoutOCR": doQuestionSplitLayoutOCR,
4724
4775
  "BusInvoiceOCR": doBusInvoiceOCR,
4725
4776
  "EnglishOCR": doEnglishOCR,
4726
4777
  "SmartStructuralOCR": doSmartStructuralOCR,
@@ -4728,7 +4779,6 @@ ACTION_MAP = {
4728
4779
  "TaxiInvoiceOCR": doTaxiInvoiceOCR,
4729
4780
  "DescribeExtractDocAgentJob": doDescribeExtractDocAgentJob,
4730
4781
  "RideHailingDriverLicenseOCR": doRideHailingDriverLicenseOCR,
4731
- "DutyPaidProofOCR": doDutyPaidProofOCR,
4732
4782
  "MainlandPermitOCR": doMainlandPermitOCR,
4733
4783
  "GeneralBasicOCR": doGeneralBasicOCR,
4734
4784
  "RecognizeGeneralInvoice": doRecognizeGeneralInvoice,
@@ -4744,15 +4794,12 @@ ACTION_MAP = {
4744
4794
  "TableOCR": doTableOCR,
4745
4795
  "ArithmeticOCR": doArithmeticOCR,
4746
4796
  "EstateCertOCR": doEstateCertOCR,
4747
- "RecognizeValidIDCardOCR": doRecognizeValidIDCardOCR,
4748
4797
  "BankCardOCR": doBankCardOCR,
4749
4798
  "GetOCRToken": doGetOCRToken,
4750
4799
  "EduPaperOCR": doEduPaperOCR,
4751
4800
  "EnterpriseLicenseOCR": doEnterpriseLicenseOCR,
4752
4801
  "BusinessCardOCR": doBusinessCardOCR,
4753
4802
  "IDCardOCR": doIDCardOCR,
4754
- "RecognizeGeneralTextImageWarn": doRecognizeGeneralTextImageWarn,
4755
- "InstitutionOCR": doInstitutionOCR,
4756
4803
  "RecognizeTableAccurateOCR": doRecognizeTableAccurateOCR,
4757
4804
  "MixedInvoiceDetect": doMixedInvoiceDetect,
4758
4805
  "VatRollInvoiceOCR": doVatRollInvoiceOCR,
@@ -4769,7 +4816,7 @@ ACTION_MAP = {
4769
4816
  "RecognizeFormulaOCR": doRecognizeFormulaOCR,
4770
4817
  "SealOCR": doSealOCR,
4771
4818
  "BankSlipOCR": doBankSlipOCR,
4772
- "VehicleRegCertOCR": doVehicleRegCertOCR,
4819
+ "ResidenceBookletOCR": doResidenceBookletOCR,
4773
4820
  "RecognizeTravelCardOCR": doRecognizeTravelCardOCR,
4774
4821
  "SubmitExtractDocAgentJob": doSubmitExtractDocAgentJob,
4775
4822
  "VerifyOfdVatInvoiceOCR": doVerifyOfdVatInvoiceOCR,
@@ -4784,14 +4831,13 @@ ACTION_MAP = {
4784
4831
  "RecognizeTableMultiOCR": doRecognizeTableMultiOCR,
4785
4832
  "GeneralFastOCR": doGeneralFastOCR,
4786
4833
  "VatInvoiceOCR": doVatInvoiceOCR,
4787
- "RecognizeForeignPermanentResidentIdCard": doRecognizeForeignPermanentResidentIdCard,
4788
- "OrgCodeCertOCR": doOrgCodeCertOCR,
4834
+ "DutyPaidProofOCR": doDutyPaidProofOCR,
4789
4835
  "FinanBillSliceOCR": doFinanBillSliceOCR,
4790
4836
  "LicensePlateOCR": doLicensePlateOCR,
4791
4837
  "ExtractDocMulti": doExtractDocMulti,
4792
4838
  "GeneralEfficientOCR": doGeneralEfficientOCR,
4793
4839
  "AdvertiseOCR": doAdvertiseOCR,
4794
- "ResidenceBookletOCR": doResidenceBookletOCR,
4840
+ "VehicleRegCertOCR": doVehicleRegCertOCR,
4795
4841
  "CarInvoiceOCR": doCarInvoiceOCR,
4796
4842
  "GetOCRResult": doGetOCRResult,
4797
4843
  "FormulaOCR": doFormulaOCR,