tccli 3.0.1407.1__py2.py3-none-any.whl → 3.1.6.1__py2.py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- tccli/__init__.py +1 -1
- tccli/argument.py +13 -2
- tccli/main.py +0 -5
- tccli/services/__init__.py +9 -0
- tccli/services/aai/aai_client.py +20 -8
- tccli/services/aca/aca_client.py +40 -16
- tccli/services/acp/acp_client.py +40 -16
- tccli/services/advisor/advisor_client.py +10 -4
- tccli/services/af/af_client.py +15 -6
- tccli/services/afc/afc_client.py +15 -6
- tccli/services/ags/__init__.py +4 -0
- tccli/services/ags/ags_client.py +826 -0
- tccli/services/ags/v20250920/api.json +1076 -0
- tccli/services/ags/v20250920/examples.json +101 -0
- tccli/services/ai3d/ai3d_client.py +20 -114
- tccli/services/ai3d/v20250513/api.json +6 -169
- tccli/services/ai3d/v20250513/examples.json +0 -16
- tccli/services/aiart/aiart_client.py +284 -109
- tccli/services/aiart/v20221229/api.json +201 -8
- tccli/services/aiart/v20221229/examples.json +16 -0
- tccli/services/ame/ame_client.py +155 -62
- tccli/services/ams/ams_client.py +45 -18
- tccli/services/anicloud/anicloud_client.py +15 -6
- tccli/services/antiddos/antiddos_client.py +470 -188
- tccli/services/ape/ape_client.py +40 -16
- tccli/services/api/api_client.py +15 -6
- tccli/services/apigateway/apigateway_client.py +495 -198
- tccli/services/apm/apm_client.py +742 -81
- tccli/services/apm/v20210622/api.json +3239 -1322
- tccli/services/apm/v20210622/examples.json +95 -1
- tccli/services/asr/asr_client.py +160 -64
- tccli/services/asr/v20190614/api.json +2 -2
- tccli/services/asw/asw_client.py +45 -18
- tccli/services/autoscaling/autoscaling_client.py +290 -116
- tccli/services/autoscaling/v20180419/api.json +51 -7
- tccli/services/ba/ba_client.py +15 -6
- tccli/services/batch/batch_client.py +150 -60
- tccli/services/batch/v20170312/api.json +11 -0
- tccli/services/bda/bda_client.py +40 -714
- tccli/services/bda/v20200324/api.json +107 -1819
- tccli/services/bda/v20200324/examples.json +0 -176
- tccli/services/bh/bh_client.py +1934 -465
- tccli/services/bh/v20230418/api.json +1720 -107
- tccli/services/bh/v20230418/examples.json +188 -0
- tccli/services/bi/bi_client.py +145 -58
- tccli/services/billing/billing_client.py +310 -124
- tccli/services/billing/v20180709/api.json +18 -9
- tccli/services/billing/v20180709/examples.json +2 -2
- tccli/services/bizlive/bizlive_client.py +30 -12
- tccli/services/bm/bm_client.py +265 -106
- tccli/services/bma/bma_client.py +185 -74
- tccli/services/bmeip/bmeip_client.py +100 -40
- tccli/services/bmlb/bmlb_client.py +245 -98
- tccli/services/bmvpc/bmvpc_client.py +305 -122
- tccli/services/bpaas/bpaas_client.py +10 -4
- tccli/services/bri/bri_client.py +5 -2
- tccli/services/bsca/bsca_client.py +35 -14
- tccli/services/btoe/btoe_client.py +70 -28
- tccli/services/ca/ca_client.py +15 -6
- tccli/services/cam/cam_client.py +460 -184
- tccli/services/cam/v20190116/api.json +3 -3
- tccli/services/captcha/captcha_client.py +90 -36
- tccli/services/captcha/v20190722/api.json +4 -4
- tccli/services/captcha/v20190722/examples.json +1 -1
- tccli/services/car/car_client.py +30 -12
- tccli/services/cat/cat_client.py +70 -28
- tccli/services/cat/v20180409/api.json +7 -7
- tccli/services/cbs/cbs_client.py +230 -92
- tccli/services/ccc/ccc_client.py +613 -158
- tccli/services/ccc/v20200210/api.json +406 -8
- tccli/services/ccc/v20200210/examples.json +32 -0
- tccli/services/cdb/cdb_client.py +931 -350
- tccli/services/cdb/v20170320/api.json +131 -32
- tccli/services/cdb/v20170320/examples.json +18 -10
- tccli/services/cdc/cdc_client.py +115 -46
- tccli/services/cdn/cdn_client.py +275 -110
- tccli/services/cdn/v20180606/api.json +15 -4
- tccli/services/cdn/v20180606/examples.json +1 -1
- tccli/services/cds/cds_client.py +25 -10
- tccli/services/cdwch/cdwch_client.py +145 -58
- tccli/services/cdwch/v20200915/api.json +26 -11
- tccli/services/cdwdoris/cdwdoris_client.py +300 -120
- tccli/services/cdwdoris/v20211228/api.json +11 -1
- tccli/services/cdwpg/cdwpg_client.py +120 -48
- tccli/services/cdz/cdz_client.py +10 -4
- tccli/services/cfg/cfg_client.py +85 -34
- tccli/services/cfg/v20210820/api.json +11 -1
- tccli/services/cfs/cfs_client.py +326 -208
- tccli/services/cfs/v20190719/api.json +199 -64
- tccli/services/cfs/v20190719/examples.json +6 -14
- tccli/services/cfw/cfw_client.py +679 -287
- tccli/services/cfw/v20190904/api.json +420 -2
- tccli/services/cfw/v20190904/examples.json +8 -0
- tccli/services/chc/chc_client.py +190 -76
- tccli/services/chc/v20230418/api.json +77 -2
- tccli/services/chdfs/chdfs_client.py +145 -58
- tccli/services/ciam/ciam_client.py +115 -46
- tccli/services/cii/cii_client.py +65 -26
- tccli/services/cim/cim_client.py +5 -2
- tccli/services/ckafka/ckafka_client.py +837 -240
- tccli/services/ckafka/v20190819/api.json +561 -91
- tccli/services/ckafka/v20190819/examples.json +53 -5
- tccli/services/clb/clb_client.py +435 -439
- tccli/services/clb/v20180317/api.json +147 -312
- tccli/services/clb/v20180317/examples.json +12 -40
- tccli/services/cloudapp/cloudapp_client.py +10 -4
- tccli/services/cloudaudit/cloudaudit_client.py +95 -38
- tccli/services/cloudaudit/v20190319/api.json +11 -0
- tccli/services/cloudhsm/cloudhsm_client.py +70 -28
- tccli/services/cloudhsm/v20191112/api.json +37 -7
- tccli/services/cloudstudio/cloudstudio_client.py +45 -18
- tccli/services/cls/cls_client.py +843 -268
- tccli/services/cls/v20201016/api.json +1241 -68
- tccli/services/cls/v20201016/examples.json +36 -4
- tccli/services/cme/cme_client.py +250 -100
- tccli/services/cmq/cmq_client.py +10 -4
- tccli/services/cms/cms_client.py +30 -12
- tccli/services/config/config_client.py +35 -14
- tccli/services/controlcenter/controlcenter_client.py +25 -10
- tccli/services/cpdp/cpdp_client.py +1095 -438
- tccli/services/csip/csip_client.py +410 -164
- tccli/services/csip/v20221121/api.json +140 -20
- tccli/services/csip/v20221121/examples.json +10 -16
- tccli/services/csxg/csxg_client.py +25 -10
- tccli/services/ctem/ctem_client.py +1823 -156
- tccli/services/ctem/v20231128/api.json +2990 -206
- tccli/services/ctem/v20231128/examples.json +224 -0
- tccli/services/ctsdb/ctsdb_client.py +10 -4
- tccli/services/cvm/cvm_client.py +490 -196
- tccli/services/cvm/v20170312/api.json +41 -41
- tccli/services/cvm/v20170312/examples.json +92 -86
- tccli/services/cwp/cwp_client.py +2570 -1028
- tccli/services/cws/cws_client.py +95 -38
- tccli/services/cynosdb/cynosdb_client.py +1006 -340
- tccli/services/cynosdb/v20190107/api.json +1238 -212
- tccli/services/cynosdb/v20190107/examples.json +32 -8
- tccli/services/dasb/dasb_client.py +315 -126
- tccli/services/dataagent/__init__.py +4 -0
- tccli/services/dataagent/dataagent_client.py +770 -0
- tccli/services/dataagent/v20250513/api.json +1216 -0
- tccli/services/dataagent/v20250513/examples.json +93 -0
- tccli/services/dayu/dayu_client.py +560 -224
- tccli/services/dbbrain/dbbrain_client.py +471 -166
- tccli/services/dbbrain/v20210527/api.json +268 -19
- tccli/services/dbbrain/v20210527/examples.json +8 -0
- tccli/services/dbdc/dbdc_client.py +30 -12
- tccli/services/dc/dc_client.py +110 -44
- tccli/services/dcdb/dcdb_client.py +415 -166
- tccli/services/dcdb/v20180411/api.json +1 -1
- tccli/services/dlc/dlc_client.py +966 -364
- tccli/services/dlc/v20210125/api.json +1153 -150
- tccli/services/dlc/v20210125/examples.json +19 -11
- tccli/services/dnspod/dnspod_client.py +567 -182
- tccli/services/dnspod/v20210323/api.json +131 -25
- tccli/services/dnspod/v20210323/examples.json +17 -7
- tccli/services/domain/domain_client.py +275 -110
- tccli/services/domain/v20180808/api.json +21 -1
- tccli/services/drm/drm_client.py +55 -22
- tccli/services/ds/ds_client.py +60 -24
- tccli/services/dsgc/dsgc_client.py +665 -266
- tccli/services/dsgc/v20190723/api.json +18 -18
- tccli/services/dts/dts_client.py +1188 -488
- tccli/services/dts/v20211206/api.json +1068 -124
- tccli/services/dts/v20211206/examples.json +77 -7
- tccli/services/eb/eb_client.py +160 -64
- tccli/services/eb/v20210416/api.json +13 -0
- tccli/services/ecc/ecc_client.py +20 -8
- tccli/services/ecdn/ecdn_client.py +30 -12
- tccli/services/ecm/ecm_client.py +695 -278
- tccli/services/eiam/eiam_client.py +210 -84
- tccli/services/eis/eis_client.py +40 -16
- tccli/services/emr/emr_client.py +501 -178
- tccli/services/emr/v20190103/api.json +262 -0
- tccli/services/emr/v20190103/examples.json +13 -5
- tccli/services/es/es_client.py +536 -152
- tccli/services/es/v20180416/api.json +695 -65
- tccli/services/es/v20180416/examples.json +24 -0
- tccli/services/es/v20250101/api.json +10 -10
- tccli/services/ess/ess_client.py +747 -254
- tccli/services/ess/v20201111/api.json +720 -32
- tccli/services/ess/v20201111/examples.json +18 -2
- tccli/services/essbasic/essbasic_client.py +730 -292
- tccli/services/essbasic/v20210526/api.json +295 -32
- tccli/services/essbasic/v20210526/examples.json +12 -30
- tccli/services/evt/__init__.py +4 -0
- tccli/services/evt/evt_client.py +210 -0
- tccli/services/evt/v20250217/api.json +126 -0
- tccli/services/evt/v20250217/examples.json +13 -0
- tccli/services/facefusion/facefusion_client.py +20 -8
- tccli/services/facefusion/v20220927/api.json +1 -1
- tccli/services/faceid/faceid_client.py +180 -125
- tccli/services/faceid/v20180301/api.json +18 -105
- tccli/services/faceid/v20180301/examples.json +1 -9
- tccli/services/fmu/fmu_client.py +35 -14
- tccli/services/ft/ft_client.py +30 -12
- tccli/services/gaap/gaap_client.py +510 -204
- tccli/services/gaap/v20180529/api.json +18 -8
- tccli/services/gme/gme_client.py +241 -74
- tccli/services/gme/v20180711/api.json +241 -1
- tccli/services/gme/v20180711/examples.json +8 -0
- tccli/services/goosefs/goosefs_client.py +135 -54
- tccli/services/gs/gs_client.py +537 -182
- tccli/services/gs/v20191118/api.json +143 -1
- tccli/services/gs/v20191118/examples.json +16 -0
- tccli/services/gwlb/gwlb_client.py +95 -38
- tccli/services/habo/habo_client.py +10 -4
- tccli/services/hai/hai_client.py +80 -32
- tccli/services/hai/v20230812/api.json +3 -3
- tccli/services/hasim/hasim_client.py +110 -44
- tccli/services/hcm/hcm_client.py +5 -2
- tccli/services/hunyuan/hunyuan_client.py +105 -42
- tccli/services/hunyuan/v20230901/api.json +69 -2
- tccli/services/hunyuan/v20230901/examples.json +1 -1
- tccli/services/iai/iai_client.py +175 -123
- tccli/services/iai/v20180301/api.json +0 -82
- tccli/services/iai/v20180301/examples.json +0 -8
- tccli/services/iai/v20200303/api.json +1 -83
- tccli/services/iai/v20200303/examples.json +0 -8
- tccli/services/iap/iap_client.py +30 -12
- tccli/services/ic/ic_client.py +45 -18
- tccli/services/icr/icr_client.py +5 -2
- tccli/services/ie/ie_client.py +50 -20
- tccli/services/ig/ig_client.py +5 -2
- tccli/services/igtm/igtm_client.py +130 -52
- tccli/services/igtm/v20231024/api.json +60 -4
- tccli/services/igtm/v20231024/examples.json +3 -3
- tccli/services/ims/ims_client.py +10 -4
- tccli/services/ioa/ioa_client.py +194 -60
- tccli/services/ioa/v20220601/api.json +149 -1
- tccli/services/ioa/v20220601/examples.json +8 -0
- tccli/services/iot/iot_client.py +225 -90
- tccli/services/iotcloud/iotcloud_client.py +430 -172
- tccli/services/iotexplorer/iotexplorer_client.py +1801 -512
- tccli/services/iotexplorer/v20190423/api.json +2681 -1016
- tccli/services/iotexplorer/v20190423/examples.json +160 -26
- tccli/services/iotvideo/iotvideo_client.py +835 -334
- tccli/services/iotvideoindustry/iotvideoindustry_client.py +520 -208
- tccli/services/irp/irp_client.py +55 -22
- tccli/services/iss/iss_client.py +460 -184
- tccli/services/iss/v20230517/api.json +2 -2
- tccli/services/iss/v20230517/examples.json +1 -1
- tccli/services/ivld/ivld_client.py +140 -56
- tccli/services/keewidb/keewidb_client.py +190 -76
- tccli/services/keewidb/v20220308/api.json +69 -17
- tccli/services/keewidb/v20220308/examples.json +5 -5
- tccli/services/kms/kms_client.py +340 -136
- tccli/services/lcic/lcic_client.py +355 -142
- tccli/services/lcic/v20220817/api.json +5 -5
- tccli/services/lighthouse/lighthouse_client.py +590 -236
- tccli/services/lighthouse/v20200324/api.json +81 -16
- tccli/services/lighthouse/v20200324/examples.json +7 -1
- tccli/services/live/live_client.py +1000 -453
- tccli/services/live/v20180801/api.json +6 -164
- tccli/services/live/v20180801/examples.json +6 -8
- tccli/services/lke/lke_client.py +525 -210
- tccli/services/lke/v20231130/api.json +254 -75
- tccli/services/lke/v20231130/examples.json +1 -1
- tccli/services/lkeap/lkeap_client.py +130 -52
- tccli/services/lkeap/v20240522/api.json +1 -1
- tccli/services/lkeap/v20240522/examples.json +1 -1
- tccli/services/lowcode/lowcode_client.py +85 -34
- tccli/services/mall/mall_client.py +5 -2
- tccli/services/mariadb/mariadb_client.py +405 -162
- tccli/services/mariadb/v20170312/api.json +1 -1
- tccli/services/market/market_client.py +10 -4
- tccli/services/memcached/memcached_client.py +5 -2
- tccli/services/mmps/mmps_client.py +75 -30
- tccli/services/mna/mna_client.py +205 -82
- tccli/services/mna/v20210119/api.json +1 -1
- tccli/services/mongodb/mongodb_client.py +1178 -273
- tccli/services/mongodb/v20190725/api.json +1860 -135
- tccli/services/mongodb/v20190725/examples.json +105 -1
- tccli/services/monitor/monitor_client.py +901 -338
- tccli/services/monitor/v20180724/api.json +189 -29
- tccli/services/monitor/v20180724/examples.json +9 -1
- tccli/services/mps/mps_client.py +1248 -280
- tccli/services/mps/v20190612/api.json +1796 -73
- tccli/services/mps/v20190612/examples.json +106 -32
- tccli/services/mqtt/mqtt_client.py +463 -118
- tccli/services/mqtt/v20240516/api.json +166 -0
- tccli/services/mqtt/v20240516/examples.json +24 -0
- tccli/services/mrs/mrs_client.py +55 -22
- tccli/services/ms/ms_client.py +115 -46
- tccli/services/msp/msp_client.py +35 -14
- tccli/services/nlp/nlp_client.py +30 -12
- tccli/services/npp/npp_client.py +40 -16
- tccli/services/oceanus/oceanus_client.py +225 -90
- tccli/services/oceanus/v20190422/api.json +10 -13
- tccli/services/oceanus/v20190422/examples.json +2 -2
- tccli/services/ocr/ocr_client.py +471 -425
- tccli/services/ocr/v20181119/api.json +241 -639
- tccli/services/ocr/v20181119/examples.json +8 -40
- tccli/services/omics/omics_client.py +100 -40
- tccli/services/omics/v20221128/api.json +90 -7
- tccli/services/organization/organization_client.py +705 -282
- tccli/services/organization/v20210331/api.json +40 -1
- tccli/services/partners/partners_client.py +115 -46
- tccli/services/postgres/postgres_client.py +724 -200
- tccli/services/postgres/v20170312/api.json +494 -58
- tccli/services/postgres/v20170312/examples.json +75 -31
- tccli/services/privatedns/privatedns_client.py +412 -80
- tccli/services/privatedns/v20201028/api.json +421 -13
- tccli/services/privatedns/v20201028/examples.json +36 -4
- tccli/services/pts/pts_client.py +240 -96
- tccli/services/pts/v20210728/api.json +2 -2
- tccli/services/rce/rce_client.py +55 -22
- tccli/services/redis/redis_client.py +550 -220
- tccli/services/redis/v20180412/api.json +197 -33
- tccli/services/redis/v20180412/examples.json +10 -10
- tccli/services/region/region_client.py +15 -6
- tccli/services/region/v20220627/api.json +1 -1
- tccli/services/rum/rum_client.py +270 -108
- tccli/services/rum/v20210622/api.json +18 -0
- tccli/services/scf/scf_client.py +260 -104
- tccli/services/scf/v20180416/api.json +167 -2
- tccli/services/scf/v20180416/examples.json +1 -1
- tccli/services/securitylake/securitylake_client.py +5 -2
- tccli/services/ses/ses_client.py +175 -70
- tccli/services/smh/smh_client.py +75 -30
- tccli/services/smop/smop_client.py +5 -2
- tccli/services/sms/sms_client.py +90 -36
- tccli/services/sms/v20190711/api.json +11 -11
- tccli/services/sms/v20190711/examples.json +9 -3
- tccli/services/sms/v20210111/api.json +12 -12
- tccli/services/sms/v20210111/examples.json +8 -2
- tccli/services/soe/soe_client.py +20 -8
- tccli/services/sqlserver/sqlserver_client.py +740 -296
- tccli/services/sqlserver/v20180328/api.json +31 -2
- tccli/services/sqlserver/v20180328/examples.json +1 -1
- tccli/services/ssa/ssa_client.py +115 -46
- tccli/services/ssl/ssl_client.py +340 -136
- tccli/services/ssl/v20191205/api.json +28 -0
- tccli/services/sslpod/sslpod_client.py +50 -20
- tccli/services/ssm/ssm_client.py +120 -48
- tccli/services/sts/sts_client.py +35 -14
- tccli/services/sts/v20180813/api.json +1 -1
- tccli/services/svp/svp_client.py +25 -10
- tccli/services/svp/v20240125/api.json +24 -4
- tccli/services/svp/v20240125/examples.json +1 -1
- tccli/services/taf/taf_client.py +5 -2
- tccli/services/tag/tag_client.py +155 -62
- tccli/services/tag/v20180813/api.json +3 -3
- tccli/services/tat/tat_client.py +145 -58
- tccli/services/tat/v20201028/api.json +10 -1
- tccli/services/tbaas/tbaas_client.py +120 -48
- tccli/services/tbp/tbp_client.py +20 -8
- tccli/services/tcaplusdb/tcaplusdb_client.py +265 -106
- tccli/services/tcb/tcb_client.py +445 -178
- tccli/services/tcbr/tcbr_client.py +50 -20
- tccli/services/tcbr/v20220217/api.json +11 -0
- tccli/services/tccatalog/tccatalog_client.py +20 -8
- tccli/services/tchd/tchd_client.py +10 -4
- tccli/services/tcm/tcm_client.py +60 -24
- tccli/services/tcr/tcr_client.py +550 -220
- tccli/services/tcss/tcss_client.py +1756 -680
- tccli/services/tcss/v20201101/api.json +144 -11
- tccli/services/tcss/v20201101/examples.json +9 -1
- tccli/services/tdai/tdai_client.py +90 -36
- tccli/services/tdai/v20250717/api.json +30 -3
- tccli/services/tdcpg/tdcpg_client.py +125 -50
- tccli/services/tdid/tdid_client.py +90 -36
- tccli/services/tdmq/tdmq_client.py +846 -452
- tccli/services/tdmq/v20200217/api.json +372 -488
- tccli/services/tdmq/v20200217/examples.json +21 -41
- tccli/services/tds/tds_client.py +25 -10
- tccli/services/tem/tem_client.py +305 -122
- tccli/services/teo/teo_client.py +1122 -431
- tccli/services/teo/v20220901/api.json +1393 -132
- tccli/services/teo/v20220901/examples.json +59 -13
- tccli/services/thpc/thpc_client.py +215 -66
- tccli/services/thpc/v20230321/api.json +185 -27
- tccli/services/thpc/v20230321/examples.json +15 -7
- tccli/services/tia/tia_client.py +50 -20
- tccli/services/tiia/tiia_client.py +105 -42
- tccli/services/tione/tione_client.py +537 -150
- tccli/services/tione/v20211111/api.json +280 -16
- tccli/services/tione/v20211111/examples.json +25 -1
- tccli/services/tiw/tiw_client.py +175 -70
- tccli/services/tke/tke_client.py +2702 -735
- tccli/services/tke/v20180525/api.json +2279 -232
- tccli/services/tke/v20180525/examples.json +194 -18
- tccli/services/tke/v20220501/api.json +215 -3
- tccli/services/tke/v20220501/examples.json +8 -0
- tccli/services/tkgdq/tkgdq_client.py +15 -6
- tccli/services/tms/tms_client.py +132 -8
- tccli/services/tms/v20201229/api.json +247 -1
- tccli/services/tms/v20201229/examples.json +16 -0
- tccli/services/tmt/tmt_client.py +40 -16
- tccli/services/tmt/v20180321/api.json +78 -1
- tccli/services/tourism/tourism_client.py +5 -2
- tccli/services/trabbit/trabbit_client.py +145 -58
- tccli/services/trabbit/v20230418/api.json +271 -4
- tccli/services/trabbit/v20230418/examples.json +9 -3
- tccli/services/trocket/trocket_client.py +350 -140
- tccli/services/trocket/v20230308/api.json +113 -5
- tccli/services/trp/trp_client.py +270 -108
- tccli/services/trro/trro_client.py +257 -58
- tccli/services/trro/v20220325/api.json +456 -0
- tccli/services/trro/v20220325/examples.json +16 -0
- tccli/services/trtc/trtc_client.py +360 -144
- tccli/services/trtc/v20190722/api.json +167 -27
- tccli/services/trtc/v20190722/examples.json +3 -3
- tccli/services/tse/tse_client.py +776 -248
- tccli/services/tse/v20201207/api.json +260 -1
- tccli/services/tse/v20201207/examples.json +24 -0
- tccli/services/tsf/tsf_client.py +1195 -458
- tccli/services/tsf/v20180326/api.json +121 -5
- tccli/services/tsf/v20180326/examples.json +10 -2
- tccli/services/tsi/tsi_client.py +15 -6
- tccli/services/tsw/tsw_client.py +20 -8
- tccli/services/tts/tts_client.py +15 -6
- tccli/services/vcg/vcg_client.py +10 -4
- tccli/services/vclm/v20240523/api.json +354 -4
- tccli/services/vclm/v20240523/examples.json +32 -0
- tccli/services/vclm/vclm_client.py +269 -18
- tccli/services/vcube/v20220410/api.json +89 -2
- tccli/services/vcube/v20220410/examples.json +18 -2
- tccli/services/vcube/vcube_client.py +290 -76
- tccli/services/vdb/vdb_client.py +70 -28
- tccli/services/vm/v20210922/api.json +3 -3
- tccli/services/vm/vm_client.py +30 -12
- tccli/services/vms/vms_client.py +10 -4
- tccli/services/vod/v20180717/api.json +2 -2
- tccli/services/vod/vod_client.py +965 -386
- tccli/services/vpc/v20170312/api.json +1239 -128
- tccli/services/vpc/v20170312/examples.json +127 -15
- tccli/services/vpc/vpc_client.py +2963 -928
- tccli/services/vrs/vrs_client.py +40 -16
- tccli/services/vtc/vtc_client.py +15 -6
- tccli/services/waf/v20180125/api.json +11219 -8659
- tccli/services/waf/v20180125/examples.json +89 -9
- tccli/services/waf/waf_client.py +1530 -415
- tccli/services/wav/wav_client.py +130 -52
- tccli/services/wedata/v20250806/api.json +55 -16
- tccli/services/wedata/wedata_client.py +2045 -818
- tccli/services/weilingwith/weilingwith_client.py +320 -128
- tccli/services/wsa/wsa_client.py +5 -2
- tccli/services/wss/wss_client.py +15 -6
- tccli/services/yinsuda/yinsuda_client.py +100 -40
- tccli/services/yunjing/yunjing_client.py +500 -200
- tccli/services/yunsou/yunsou_client.py +10 -4
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/METADATA +13 -11
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/RECORD +446 -434
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/WHEEL +1 -1
- {tccli-3.0.1407.1.dist-info → tccli-3.1.6.1.dist-info}/entry_points.txt +0 -0
- {tccli-3.0.1407.1.dist-info/license_files → tccli-3.1.6.1.dist-info/licenses}/LICENSE +0 -0
tccli/services/ocr/ocr_client.py
CHANGED
|
@@ -27,7 +27,10 @@ def doQuestionOCR(args, parsed_globals):
|
|
|
27
27
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
28
28
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
29
29
|
)
|
|
30
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
30
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
31
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
32
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
33
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
31
34
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
32
35
|
else:
|
|
33
36
|
cred = credential.Credential(
|
|
@@ -39,7 +42,7 @@ def doQuestionOCR(args, parsed_globals):
|
|
|
39
42
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
40
43
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
41
44
|
)
|
|
42
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
45
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
43
46
|
if g_param[OptionsDefine.Language]:
|
|
44
47
|
profile.language = g_param[OptionsDefine.Language]
|
|
45
48
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -79,7 +82,10 @@ def doTextDetect(args, parsed_globals):
|
|
|
79
82
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
80
83
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
81
84
|
)
|
|
82
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
85
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
86
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
87
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
88
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
83
89
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
84
90
|
else:
|
|
85
91
|
cred = credential.Credential(
|
|
@@ -91,7 +97,7 @@ def doTextDetect(args, parsed_globals):
|
|
|
91
97
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
92
98
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
93
99
|
)
|
|
94
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
100
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
95
101
|
if g_param[OptionsDefine.Language]:
|
|
96
102
|
profile.language = g_param[OptionsDefine.Language]
|
|
97
103
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -131,7 +137,10 @@ def doQrcodeOCR(args, parsed_globals):
|
|
|
131
137
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
132
138
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
133
139
|
)
|
|
134
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
140
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
141
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
142
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
143
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
135
144
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
136
145
|
else:
|
|
137
146
|
cred = credential.Credential(
|
|
@@ -143,7 +152,7 @@ def doQrcodeOCR(args, parsed_globals):
|
|
|
143
152
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
144
153
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
145
154
|
)
|
|
146
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
155
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
147
156
|
if g_param[OptionsDefine.Language]:
|
|
148
157
|
profile.language = g_param[OptionsDefine.Language]
|
|
149
158
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -183,7 +192,10 @@ def doGeneralAccurateOCR(args, parsed_globals):
|
|
|
183
192
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
184
193
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
185
194
|
)
|
|
186
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
195
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
196
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
197
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
198
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
187
199
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
188
200
|
else:
|
|
189
201
|
cred = credential.Credential(
|
|
@@ -195,7 +207,7 @@ def doGeneralAccurateOCR(args, parsed_globals):
|
|
|
195
207
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
196
208
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
197
209
|
)
|
|
198
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
210
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
199
211
|
if g_param[OptionsDefine.Language]:
|
|
200
212
|
profile.language = g_param[OptionsDefine.Language]
|
|
201
213
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -235,7 +247,10 @@ def doRecognizeContainerOCR(args, parsed_globals):
|
|
|
235
247
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
236
248
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
237
249
|
)
|
|
238
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
250
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
251
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
252
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
253
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
239
254
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
240
255
|
else:
|
|
241
256
|
cred = credential.Credential(
|
|
@@ -247,7 +262,7 @@ def doRecognizeContainerOCR(args, parsed_globals):
|
|
|
247
262
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
248
263
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
249
264
|
)
|
|
250
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
265
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
251
266
|
if g_param[OptionsDefine.Language]:
|
|
252
267
|
profile.language = g_param[OptionsDefine.Language]
|
|
253
268
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -287,7 +302,10 @@ def doRecognizeEncryptedIDCardOCR(args, parsed_globals):
|
|
|
287
302
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
288
303
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
289
304
|
)
|
|
290
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
305
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
306
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
307
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
308
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
291
309
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
292
310
|
else:
|
|
293
311
|
cred = credential.Credential(
|
|
@@ -299,7 +317,7 @@ def doRecognizeEncryptedIDCardOCR(args, parsed_globals):
|
|
|
299
317
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
300
318
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
301
319
|
)
|
|
302
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
320
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
303
321
|
if g_param[OptionsDefine.Language]:
|
|
304
322
|
profile.language = g_param[OptionsDefine.Language]
|
|
305
323
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -339,7 +357,10 @@ def doRecognizeStoreName(args, parsed_globals):
|
|
|
339
357
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
340
358
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
341
359
|
)
|
|
342
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
360
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
361
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
362
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
363
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
343
364
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
344
365
|
else:
|
|
345
366
|
cred = credential.Credential(
|
|
@@ -351,7 +372,7 @@ def doRecognizeStoreName(args, parsed_globals):
|
|
|
351
372
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
352
373
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
353
374
|
)
|
|
354
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
375
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
355
376
|
if g_param[OptionsDefine.Language]:
|
|
356
377
|
profile.language = g_param[OptionsDefine.Language]
|
|
357
378
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -391,7 +412,10 @@ def doMLIDPassportOCR(args, parsed_globals):
|
|
|
391
412
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
392
413
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
393
414
|
)
|
|
394
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
415
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
416
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
417
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
418
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
395
419
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
396
420
|
else:
|
|
397
421
|
cred = credential.Credential(
|
|
@@ -403,7 +427,7 @@ def doMLIDPassportOCR(args, parsed_globals):
|
|
|
403
427
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
404
428
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
405
429
|
)
|
|
406
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
430
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
407
431
|
if g_param[OptionsDefine.Language]:
|
|
408
432
|
profile.language = g_param[OptionsDefine.Language]
|
|
409
433
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -443,7 +467,10 @@ def doTrainTicketOCR(args, parsed_globals):
|
|
|
443
467
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
444
468
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
445
469
|
)
|
|
446
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
470
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
471
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
472
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
473
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
447
474
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
448
475
|
else:
|
|
449
476
|
cred = credential.Credential(
|
|
@@ -455,7 +482,7 @@ def doTrainTicketOCR(args, parsed_globals):
|
|
|
455
482
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
456
483
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
457
484
|
)
|
|
458
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
485
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
459
486
|
if g_param[OptionsDefine.Language]:
|
|
460
487
|
profile.language = g_param[OptionsDefine.Language]
|
|
461
488
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -485,7 +512,7 @@ def doTrainTicketOCR(args, parsed_globals):
|
|
|
485
512
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
486
513
|
|
|
487
514
|
|
|
488
|
-
def
|
|
515
|
+
def doRecognizeValidIDCardOCR(args, parsed_globals):
|
|
489
516
|
g_param = parse_global_arg(parsed_globals)
|
|
490
517
|
|
|
491
518
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -495,7 +522,10 @@ def doPropOwnerCertOCR(args, parsed_globals):
|
|
|
495
522
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
496
523
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
497
524
|
)
|
|
498
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
525
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
526
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
527
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
528
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
499
529
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
500
530
|
else:
|
|
501
531
|
cred = credential.Credential(
|
|
@@ -507,18 +537,18 @@ def doPropOwnerCertOCR(args, parsed_globals):
|
|
|
507
537
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
508
538
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
509
539
|
)
|
|
510
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
540
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
511
541
|
if g_param[OptionsDefine.Language]:
|
|
512
542
|
profile.language = g_param[OptionsDefine.Language]
|
|
513
543
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
514
544
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
515
545
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
516
546
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
517
|
-
model = models.
|
|
547
|
+
model = models.RecognizeValidIDCardOCRRequest()
|
|
518
548
|
model.from_json_string(json.dumps(args))
|
|
519
549
|
start_time = time.time()
|
|
520
550
|
while True:
|
|
521
|
-
rsp = client.
|
|
551
|
+
rsp = client.RecognizeValidIDCardOCR(model)
|
|
522
552
|
result = rsp.to_json_string()
|
|
523
553
|
try:
|
|
524
554
|
json_obj = json.loads(result)
|
|
@@ -547,7 +577,10 @@ def doInvoiceGeneralOCR(args, parsed_globals):
|
|
|
547
577
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
548
578
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
549
579
|
)
|
|
550
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
580
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
581
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
582
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
583
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
551
584
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
552
585
|
else:
|
|
553
586
|
cred = credential.Credential(
|
|
@@ -559,7 +592,7 @@ def doInvoiceGeneralOCR(args, parsed_globals):
|
|
|
559
592
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
560
593
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
561
594
|
)
|
|
562
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
595
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
563
596
|
if g_param[OptionsDefine.Language]:
|
|
564
597
|
profile.language = g_param[OptionsDefine.Language]
|
|
565
598
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -599,7 +632,10 @@ def doHKIDCardOCR(args, parsed_globals):
|
|
|
599
632
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
600
633
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
601
634
|
)
|
|
602
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
635
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
636
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
637
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
638
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
603
639
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
604
640
|
else:
|
|
605
641
|
cred = credential.Credential(
|
|
@@ -611,7 +647,7 @@ def doHKIDCardOCR(args, parsed_globals):
|
|
|
611
647
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
612
648
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
613
649
|
)
|
|
614
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
650
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
615
651
|
if g_param[OptionsDefine.Language]:
|
|
616
652
|
profile.language = g_param[OptionsDefine.Language]
|
|
617
653
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -651,7 +687,10 @@ def doPermitOCR(args, parsed_globals):
|
|
|
651
687
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
652
688
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
653
689
|
)
|
|
654
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
690
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
691
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
692
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
693
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
655
694
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
656
695
|
else:
|
|
657
696
|
cred = credential.Credential(
|
|
@@ -663,7 +702,7 @@ def doPermitOCR(args, parsed_globals):
|
|
|
663
702
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
664
703
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
665
704
|
)
|
|
666
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
705
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
667
706
|
if g_param[OptionsDefine.Language]:
|
|
668
707
|
profile.language = g_param[OptionsDefine.Language]
|
|
669
708
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -693,7 +732,7 @@ def doPermitOCR(args, parsed_globals):
|
|
|
693
732
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
694
733
|
|
|
695
734
|
|
|
696
|
-
def
|
|
735
|
+
def doQuestionSplitLayoutOCR(args, parsed_globals):
|
|
697
736
|
g_param = parse_global_arg(parsed_globals)
|
|
698
737
|
|
|
699
738
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -703,7 +742,10 @@ def doBusInvoiceOCR(args, parsed_globals):
|
|
|
703
742
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
704
743
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
705
744
|
)
|
|
706
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
745
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
746
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
747
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
748
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
707
749
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
708
750
|
else:
|
|
709
751
|
cred = credential.Credential(
|
|
@@ -715,18 +757,18 @@ def doBusInvoiceOCR(args, parsed_globals):
|
|
|
715
757
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
716
758
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
717
759
|
)
|
|
718
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
760
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
719
761
|
if g_param[OptionsDefine.Language]:
|
|
720
762
|
profile.language = g_param[OptionsDefine.Language]
|
|
721
763
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
722
764
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
723
765
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
724
766
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
725
|
-
model = models.
|
|
767
|
+
model = models.QuestionSplitLayoutOCRRequest()
|
|
726
768
|
model.from_json_string(json.dumps(args))
|
|
727
769
|
start_time = time.time()
|
|
728
770
|
while True:
|
|
729
|
-
rsp = client.
|
|
771
|
+
rsp = client.QuestionSplitLayoutOCR(model)
|
|
730
772
|
result = rsp.to_json_string()
|
|
731
773
|
try:
|
|
732
774
|
json_obj = json.loads(result)
|
|
@@ -745,7 +787,7 @@ def doBusInvoiceOCR(args, parsed_globals):
|
|
|
745
787
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
746
788
|
|
|
747
789
|
|
|
748
|
-
def
|
|
790
|
+
def doBusInvoiceOCR(args, parsed_globals):
|
|
749
791
|
g_param = parse_global_arg(parsed_globals)
|
|
750
792
|
|
|
751
793
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -755,7 +797,10 @@ def doEnglishOCR(args, parsed_globals):
|
|
|
755
797
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
756
798
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
757
799
|
)
|
|
758
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
800
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
801
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
802
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
803
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
759
804
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
760
805
|
else:
|
|
761
806
|
cred = credential.Credential(
|
|
@@ -767,18 +812,18 @@ def doEnglishOCR(args, parsed_globals):
|
|
|
767
812
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
768
813
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
769
814
|
)
|
|
770
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
815
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
771
816
|
if g_param[OptionsDefine.Language]:
|
|
772
817
|
profile.language = g_param[OptionsDefine.Language]
|
|
773
818
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
774
819
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
775
820
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
776
821
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
777
|
-
model = models.
|
|
822
|
+
model = models.BusInvoiceOCRRequest()
|
|
778
823
|
model.from_json_string(json.dumps(args))
|
|
779
824
|
start_time = time.time()
|
|
780
825
|
while True:
|
|
781
|
-
rsp = client.
|
|
826
|
+
rsp = client.BusInvoiceOCR(model)
|
|
782
827
|
result = rsp.to_json_string()
|
|
783
828
|
try:
|
|
784
829
|
json_obj = json.loads(result)
|
|
@@ -797,7 +842,7 @@ def doEnglishOCR(args, parsed_globals):
|
|
|
797
842
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
798
843
|
|
|
799
844
|
|
|
800
|
-
def
|
|
845
|
+
def doEnglishOCR(args, parsed_globals):
|
|
801
846
|
g_param = parse_global_arg(parsed_globals)
|
|
802
847
|
|
|
803
848
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -807,7 +852,10 @@ def doSmartStructuralOCR(args, parsed_globals):
|
|
|
807
852
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
808
853
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
809
854
|
)
|
|
810
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
855
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
856
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
857
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
858
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
811
859
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
812
860
|
else:
|
|
813
861
|
cred = credential.Credential(
|
|
@@ -819,18 +867,18 @@ def doSmartStructuralOCR(args, parsed_globals):
|
|
|
819
867
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
820
868
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
821
869
|
)
|
|
822
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
870
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
823
871
|
if g_param[OptionsDefine.Language]:
|
|
824
872
|
profile.language = g_param[OptionsDefine.Language]
|
|
825
873
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
826
874
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
827
875
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
828
876
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
829
|
-
model = models.
|
|
877
|
+
model = models.EnglishOCRRequest()
|
|
830
878
|
model.from_json_string(json.dumps(args))
|
|
831
879
|
start_time = time.time()
|
|
832
880
|
while True:
|
|
833
|
-
rsp = client.
|
|
881
|
+
rsp = client.EnglishOCR(model)
|
|
834
882
|
result = rsp.to_json_string()
|
|
835
883
|
try:
|
|
836
884
|
json_obj = json.loads(result)
|
|
@@ -849,7 +897,7 @@ def doSmartStructuralOCR(args, parsed_globals):
|
|
|
849
897
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
850
898
|
|
|
851
899
|
|
|
852
|
-
def
|
|
900
|
+
def doSmartStructuralOCR(args, parsed_globals):
|
|
853
901
|
g_param = parse_global_arg(parsed_globals)
|
|
854
902
|
|
|
855
903
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -859,7 +907,10 @@ def doClassifyStoreName(args, parsed_globals):
|
|
|
859
907
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
860
908
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
861
909
|
)
|
|
862
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
910
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
911
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
912
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
913
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
863
914
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
864
915
|
else:
|
|
865
916
|
cred = credential.Credential(
|
|
@@ -871,18 +922,18 @@ def doClassifyStoreName(args, parsed_globals):
|
|
|
871
922
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
872
923
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
873
924
|
)
|
|
874
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
925
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
875
926
|
if g_param[OptionsDefine.Language]:
|
|
876
927
|
profile.language = g_param[OptionsDefine.Language]
|
|
877
928
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
878
929
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
879
930
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
880
931
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
881
|
-
model = models.
|
|
932
|
+
model = models.SmartStructuralOCRRequest()
|
|
882
933
|
model.from_json_string(json.dumps(args))
|
|
883
934
|
start_time = time.time()
|
|
884
935
|
while True:
|
|
885
|
-
rsp = client.
|
|
936
|
+
rsp = client.SmartStructuralOCR(model)
|
|
886
937
|
result = rsp.to_json_string()
|
|
887
938
|
try:
|
|
888
939
|
json_obj = json.loads(result)
|
|
@@ -901,7 +952,7 @@ def doClassifyStoreName(args, parsed_globals):
|
|
|
901
952
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
902
953
|
|
|
903
954
|
|
|
904
|
-
def
|
|
955
|
+
def doClassifyStoreName(args, parsed_globals):
|
|
905
956
|
g_param = parse_global_arg(parsed_globals)
|
|
906
957
|
|
|
907
958
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -911,7 +962,10 @@ def doTaxiInvoiceOCR(args, parsed_globals):
|
|
|
911
962
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
912
963
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
913
964
|
)
|
|
914
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
965
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
966
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
967
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
968
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
915
969
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
916
970
|
else:
|
|
917
971
|
cred = credential.Credential(
|
|
@@ -923,18 +977,18 @@ def doTaxiInvoiceOCR(args, parsed_globals):
|
|
|
923
977
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
924
978
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
925
979
|
)
|
|
926
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
980
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
927
981
|
if g_param[OptionsDefine.Language]:
|
|
928
982
|
profile.language = g_param[OptionsDefine.Language]
|
|
929
983
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
930
984
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
931
985
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
932
986
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
933
|
-
model = models.
|
|
987
|
+
model = models.ClassifyStoreNameRequest()
|
|
934
988
|
model.from_json_string(json.dumps(args))
|
|
935
989
|
start_time = time.time()
|
|
936
990
|
while True:
|
|
937
|
-
rsp = client.
|
|
991
|
+
rsp = client.ClassifyStoreName(model)
|
|
938
992
|
result = rsp.to_json_string()
|
|
939
993
|
try:
|
|
940
994
|
json_obj = json.loads(result)
|
|
@@ -953,7 +1007,7 @@ def doTaxiInvoiceOCR(args, parsed_globals):
|
|
|
953
1007
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
954
1008
|
|
|
955
1009
|
|
|
956
|
-
def
|
|
1010
|
+
def doTaxiInvoiceOCR(args, parsed_globals):
|
|
957
1011
|
g_param = parse_global_arg(parsed_globals)
|
|
958
1012
|
|
|
959
1013
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -963,7 +1017,10 @@ def doDescribeExtractDocAgentJob(args, parsed_globals):
|
|
|
963
1017
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
964
1018
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
965
1019
|
)
|
|
966
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1020
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1021
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1022
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1023
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
967
1024
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
968
1025
|
else:
|
|
969
1026
|
cred = credential.Credential(
|
|
@@ -975,18 +1032,18 @@ def doDescribeExtractDocAgentJob(args, parsed_globals):
|
|
|
975
1032
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
976
1033
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
977
1034
|
)
|
|
978
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1035
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
979
1036
|
if g_param[OptionsDefine.Language]:
|
|
980
1037
|
profile.language = g_param[OptionsDefine.Language]
|
|
981
1038
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
982
1039
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
983
1040
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
984
1041
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
985
|
-
model = models.
|
|
1042
|
+
model = models.TaxiInvoiceOCRRequest()
|
|
986
1043
|
model.from_json_string(json.dumps(args))
|
|
987
1044
|
start_time = time.time()
|
|
988
1045
|
while True:
|
|
989
|
-
rsp = client.
|
|
1046
|
+
rsp = client.TaxiInvoiceOCR(model)
|
|
990
1047
|
result = rsp.to_json_string()
|
|
991
1048
|
try:
|
|
992
1049
|
json_obj = json.loads(result)
|
|
@@ -1005,7 +1062,7 @@ def doDescribeExtractDocAgentJob(args, parsed_globals):
|
|
|
1005
1062
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1006
1063
|
|
|
1007
1064
|
|
|
1008
|
-
def
|
|
1065
|
+
def doDescribeExtractDocAgentJob(args, parsed_globals):
|
|
1009
1066
|
g_param = parse_global_arg(parsed_globals)
|
|
1010
1067
|
|
|
1011
1068
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1015,7 +1072,10 @@ def doRideHailingDriverLicenseOCR(args, parsed_globals):
|
|
|
1015
1072
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1016
1073
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1017
1074
|
)
|
|
1018
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1075
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1076
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1077
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1078
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1019
1079
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1020
1080
|
else:
|
|
1021
1081
|
cred = credential.Credential(
|
|
@@ -1027,18 +1087,18 @@ def doRideHailingDriverLicenseOCR(args, parsed_globals):
|
|
|
1027
1087
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1028
1088
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1029
1089
|
)
|
|
1030
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1090
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1031
1091
|
if g_param[OptionsDefine.Language]:
|
|
1032
1092
|
profile.language = g_param[OptionsDefine.Language]
|
|
1033
1093
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1034
1094
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1035
1095
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1036
1096
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1037
|
-
model = models.
|
|
1097
|
+
model = models.DescribeExtractDocAgentJobRequest()
|
|
1038
1098
|
model.from_json_string(json.dumps(args))
|
|
1039
1099
|
start_time = time.time()
|
|
1040
1100
|
while True:
|
|
1041
|
-
rsp = client.
|
|
1101
|
+
rsp = client.DescribeExtractDocAgentJob(model)
|
|
1042
1102
|
result = rsp.to_json_string()
|
|
1043
1103
|
try:
|
|
1044
1104
|
json_obj = json.loads(result)
|
|
@@ -1057,7 +1117,7 @@ def doRideHailingDriverLicenseOCR(args, parsed_globals):
|
|
|
1057
1117
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1058
1118
|
|
|
1059
1119
|
|
|
1060
|
-
def
|
|
1120
|
+
def doRideHailingDriverLicenseOCR(args, parsed_globals):
|
|
1061
1121
|
g_param = parse_global_arg(parsed_globals)
|
|
1062
1122
|
|
|
1063
1123
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -1067,7 +1127,10 @@ def doDutyPaidProofOCR(args, parsed_globals):
|
|
|
1067
1127
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1068
1128
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1069
1129
|
)
|
|
1070
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1130
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1131
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1132
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1133
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1071
1134
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1072
1135
|
else:
|
|
1073
1136
|
cred = credential.Credential(
|
|
@@ -1079,18 +1142,18 @@ def doDutyPaidProofOCR(args, parsed_globals):
|
|
|
1079
1142
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1080
1143
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1081
1144
|
)
|
|
1082
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1145
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1083
1146
|
if g_param[OptionsDefine.Language]:
|
|
1084
1147
|
profile.language = g_param[OptionsDefine.Language]
|
|
1085
1148
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1086
1149
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1087
1150
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
1088
1151
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1089
|
-
model = models.
|
|
1152
|
+
model = models.RideHailingDriverLicenseOCRRequest()
|
|
1090
1153
|
model.from_json_string(json.dumps(args))
|
|
1091
1154
|
start_time = time.time()
|
|
1092
1155
|
while True:
|
|
1093
|
-
rsp = client.
|
|
1156
|
+
rsp = client.RideHailingDriverLicenseOCR(model)
|
|
1094
1157
|
result = rsp.to_json_string()
|
|
1095
1158
|
try:
|
|
1096
1159
|
json_obj = json.loads(result)
|
|
@@ -1119,7 +1182,10 @@ def doMainlandPermitOCR(args, parsed_globals):
|
|
|
1119
1182
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1120
1183
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1121
1184
|
)
|
|
1122
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1185
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1186
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1187
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1188
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1123
1189
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1124
1190
|
else:
|
|
1125
1191
|
cred = credential.Credential(
|
|
@@ -1131,7 +1197,7 @@ def doMainlandPermitOCR(args, parsed_globals):
|
|
|
1131
1197
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1132
1198
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1133
1199
|
)
|
|
1134
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1200
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1135
1201
|
if g_param[OptionsDefine.Language]:
|
|
1136
1202
|
profile.language = g_param[OptionsDefine.Language]
|
|
1137
1203
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1171,7 +1237,10 @@ def doGeneralBasicOCR(args, parsed_globals):
|
|
|
1171
1237
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1172
1238
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1173
1239
|
)
|
|
1174
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1240
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1241
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1242
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1243
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1175
1244
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1176
1245
|
else:
|
|
1177
1246
|
cred = credential.Credential(
|
|
@@ -1183,7 +1252,7 @@ def doGeneralBasicOCR(args, parsed_globals):
|
|
|
1183
1252
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1184
1253
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1185
1254
|
)
|
|
1186
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1255
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1187
1256
|
if g_param[OptionsDefine.Language]:
|
|
1188
1257
|
profile.language = g_param[OptionsDefine.Language]
|
|
1189
1258
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1223,7 +1292,10 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
|
|
|
1223
1292
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1224
1293
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1225
1294
|
)
|
|
1226
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1295
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1296
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1297
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1298
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1227
1299
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1228
1300
|
else:
|
|
1229
1301
|
cred = credential.Credential(
|
|
@@ -1235,7 +1307,7 @@ def doRecognizeGeneralInvoice(args, parsed_globals):
|
|
|
1235
1307
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1236
1308
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1237
1309
|
)
|
|
1238
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1310
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1239
1311
|
if g_param[OptionsDefine.Language]:
|
|
1240
1312
|
profile.language = g_param[OptionsDefine.Language]
|
|
1241
1313
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1275,7 +1347,10 @@ def doInsuranceBillOCR(args, parsed_globals):
|
|
|
1275
1347
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1276
1348
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1277
1349
|
)
|
|
1278
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1350
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1351
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1352
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1353
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1279
1354
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1280
1355
|
else:
|
|
1281
1356
|
cred = credential.Credential(
|
|
@@ -1287,7 +1362,7 @@ def doInsuranceBillOCR(args, parsed_globals):
|
|
|
1287
1362
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1288
1363
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1289
1364
|
)
|
|
1290
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1365
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1291
1366
|
if g_param[OptionsDefine.Language]:
|
|
1292
1367
|
profile.language = g_param[OptionsDefine.Language]
|
|
1293
1368
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1327,7 +1402,10 @@ def doVatInvoiceVerifyNew(args, parsed_globals):
|
|
|
1327
1402
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1328
1403
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1329
1404
|
)
|
|
1330
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1405
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1406
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1407
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1408
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1331
1409
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1332
1410
|
else:
|
|
1333
1411
|
cred = credential.Credential(
|
|
@@ -1339,7 +1417,7 @@ def doVatInvoiceVerifyNew(args, parsed_globals):
|
|
|
1339
1417
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1340
1418
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1341
1419
|
)
|
|
1342
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1420
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1343
1421
|
if g_param[OptionsDefine.Language]:
|
|
1344
1422
|
profile.language = g_param[OptionsDefine.Language]
|
|
1345
1423
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1379,7 +1457,10 @@ def doVinOCR(args, parsed_globals):
|
|
|
1379
1457
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1380
1458
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1381
1459
|
)
|
|
1382
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1460
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1461
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1462
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1463
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1383
1464
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1384
1465
|
else:
|
|
1385
1466
|
cred = credential.Credential(
|
|
@@ -1391,7 +1472,7 @@ def doVinOCR(args, parsed_globals):
|
|
|
1391
1472
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1392
1473
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1393
1474
|
)
|
|
1394
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1475
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1395
1476
|
if g_param[OptionsDefine.Language]:
|
|
1396
1477
|
profile.language = g_param[OptionsDefine.Language]
|
|
1397
1478
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1431,7 +1512,10 @@ def doVehicleLicenseOCR(args, parsed_globals):
|
|
|
1431
1512
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1432
1513
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1433
1514
|
)
|
|
1434
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1515
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1516
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1517
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1518
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1435
1519
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1436
1520
|
else:
|
|
1437
1521
|
cred = credential.Credential(
|
|
@@ -1443,7 +1527,7 @@ def doVehicleLicenseOCR(args, parsed_globals):
|
|
|
1443
1527
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1444
1528
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1445
1529
|
)
|
|
1446
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1530
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1447
1531
|
if g_param[OptionsDefine.Language]:
|
|
1448
1532
|
profile.language = g_param[OptionsDefine.Language]
|
|
1449
1533
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1483,7 +1567,10 @@ def doBizLicenseOCR(args, parsed_globals):
|
|
|
1483
1567
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1484
1568
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1485
1569
|
)
|
|
1486
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1570
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1571
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1572
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1573
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1487
1574
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1488
1575
|
else:
|
|
1489
1576
|
cred = credential.Credential(
|
|
@@ -1495,7 +1582,7 @@ def doBizLicenseOCR(args, parsed_globals):
|
|
|
1495
1582
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1496
1583
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1497
1584
|
)
|
|
1498
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1585
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1499
1586
|
if g_param[OptionsDefine.Language]:
|
|
1500
1587
|
profile.language = g_param[OptionsDefine.Language]
|
|
1501
1588
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1535,7 +1622,10 @@ def doRecognizeGeneralCardWarn(args, parsed_globals):
|
|
|
1535
1622
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1536
1623
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1537
1624
|
)
|
|
1538
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1625
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1626
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1627
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1628
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1539
1629
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1540
1630
|
else:
|
|
1541
1631
|
cred = credential.Credential(
|
|
@@ -1547,7 +1637,7 @@ def doRecognizeGeneralCardWarn(args, parsed_globals):
|
|
|
1547
1637
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1548
1638
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1549
1639
|
)
|
|
1550
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1640
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1551
1641
|
if g_param[OptionsDefine.Language]:
|
|
1552
1642
|
profile.language = g_param[OptionsDefine.Language]
|
|
1553
1643
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1587,7 +1677,10 @@ def doFlightInvoiceOCR(args, parsed_globals):
|
|
|
1587
1677
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1588
1678
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1589
1679
|
)
|
|
1590
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1680
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1681
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1682
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1683
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1591
1684
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1592
1685
|
else:
|
|
1593
1686
|
cred = credential.Credential(
|
|
@@ -1599,7 +1692,7 @@ def doFlightInvoiceOCR(args, parsed_globals):
|
|
|
1599
1692
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1600
1693
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1601
1694
|
)
|
|
1602
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1695
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1603
1696
|
if g_param[OptionsDefine.Language]:
|
|
1604
1697
|
profile.language = g_param[OptionsDefine.Language]
|
|
1605
1698
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1639,7 +1732,10 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
|
|
|
1639
1732
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1640
1733
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1641
1734
|
)
|
|
1642
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1735
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1736
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1737
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1738
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1643
1739
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1644
1740
|
else:
|
|
1645
1741
|
cred = credential.Credential(
|
|
@@ -1651,7 +1747,7 @@ def doRecognizeThaiIDCardOCR(args, parsed_globals):
|
|
|
1651
1747
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1652
1748
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1653
1749
|
)
|
|
1654
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1750
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1655
1751
|
if g_param[OptionsDefine.Language]:
|
|
1656
1752
|
profile.language = g_param[OptionsDefine.Language]
|
|
1657
1753
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1691,7 +1787,10 @@ def doExtractDocMultiPro(args, parsed_globals):
|
|
|
1691
1787
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1692
1788
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1693
1789
|
)
|
|
1694
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1790
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1791
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1792
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1793
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1695
1794
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1696
1795
|
else:
|
|
1697
1796
|
cred = credential.Credential(
|
|
@@ -1703,7 +1802,7 @@ def doExtractDocMultiPro(args, parsed_globals):
|
|
|
1703
1802
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1704
1803
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1705
1804
|
)
|
|
1706
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1805
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1707
1806
|
if g_param[OptionsDefine.Language]:
|
|
1708
1807
|
profile.language = g_param[OptionsDefine.Language]
|
|
1709
1808
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1743,7 +1842,10 @@ def doTableOCR(args, parsed_globals):
|
|
|
1743
1842
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1744
1843
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1745
1844
|
)
|
|
1746
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1845
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1846
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1847
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1848
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1747
1849
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1748
1850
|
else:
|
|
1749
1851
|
cred = credential.Credential(
|
|
@@ -1755,7 +1857,7 @@ def doTableOCR(args, parsed_globals):
|
|
|
1755
1857
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1756
1858
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1757
1859
|
)
|
|
1758
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1860
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1759
1861
|
if g_param[OptionsDefine.Language]:
|
|
1760
1862
|
profile.language = g_param[OptionsDefine.Language]
|
|
1761
1863
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1795,7 +1897,10 @@ def doArithmeticOCR(args, parsed_globals):
|
|
|
1795
1897
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1796
1898
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1797
1899
|
)
|
|
1798
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1900
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1901
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1902
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1903
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1799
1904
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1800
1905
|
else:
|
|
1801
1906
|
cred = credential.Credential(
|
|
@@ -1807,7 +1912,7 @@ def doArithmeticOCR(args, parsed_globals):
|
|
|
1807
1912
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1808
1913
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1809
1914
|
)
|
|
1810
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1915
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1811
1916
|
if g_param[OptionsDefine.Language]:
|
|
1812
1917
|
profile.language = g_param[OptionsDefine.Language]
|
|
1813
1918
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1847,7 +1952,10 @@ def doEstateCertOCR(args, parsed_globals):
|
|
|
1847
1952
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1848
1953
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1849
1954
|
)
|
|
1850
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
1955
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
1956
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
1957
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
1958
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1851
1959
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1852
1960
|
else:
|
|
1853
1961
|
cred = credential.Credential(
|
|
@@ -1859,7 +1967,7 @@ def doEstateCertOCR(args, parsed_globals):
|
|
|
1859
1967
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1860
1968
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1861
1969
|
)
|
|
1862
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
1970
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1863
1971
|
if g_param[OptionsDefine.Language]:
|
|
1864
1972
|
profile.language = g_param[OptionsDefine.Language]
|
|
1865
1973
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -1889,58 +1997,6 @@ def doEstateCertOCR(args, parsed_globals):
|
|
|
1889
1997
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1890
1998
|
|
|
1891
1999
|
|
|
1892
|
-
def doRecognizeValidIDCardOCR(args, parsed_globals):
|
|
1893
|
-
g_param = parse_global_arg(parsed_globals)
|
|
1894
|
-
|
|
1895
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
1896
|
-
cred = credential.CVMRoleCredential()
|
|
1897
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
1898
|
-
cred = credential.STSAssumeRoleCredential(
|
|
1899
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1900
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1901
|
-
)
|
|
1902
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1903
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1904
|
-
else:
|
|
1905
|
-
cred = credential.Credential(
|
|
1906
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
1907
|
-
)
|
|
1908
|
-
http_profile = HttpProfile(
|
|
1909
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
1910
|
-
reqMethod="POST",
|
|
1911
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1912
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1913
|
-
)
|
|
1914
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
1915
|
-
if g_param[OptionsDefine.Language]:
|
|
1916
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
1917
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
1918
|
-
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
1919
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
1920
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
1921
|
-
model = models.RecognizeValidIDCardOCRRequest()
|
|
1922
|
-
model.from_json_string(json.dumps(args))
|
|
1923
|
-
start_time = time.time()
|
|
1924
|
-
while True:
|
|
1925
|
-
rsp = client.RecognizeValidIDCardOCR(model)
|
|
1926
|
-
result = rsp.to_json_string()
|
|
1927
|
-
try:
|
|
1928
|
-
json_obj = json.loads(result)
|
|
1929
|
-
except TypeError as e:
|
|
1930
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
1931
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
1932
|
-
break
|
|
1933
|
-
cur_time = time.time()
|
|
1934
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
1935
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
1936
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
1937
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
1938
|
-
else:
|
|
1939
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
1940
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
1941
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
1942
|
-
|
|
1943
|
-
|
|
1944
2000
|
def doBankCardOCR(args, parsed_globals):
|
|
1945
2001
|
g_param = parse_global_arg(parsed_globals)
|
|
1946
2002
|
|
|
@@ -1951,7 +2007,10 @@ def doBankCardOCR(args, parsed_globals):
|
|
|
1951
2007
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
1952
2008
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
1953
2009
|
)
|
|
1954
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2010
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2011
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2012
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2013
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
1955
2014
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
1956
2015
|
else:
|
|
1957
2016
|
cred = credential.Credential(
|
|
@@ -1963,7 +2022,7 @@ def doBankCardOCR(args, parsed_globals):
|
|
|
1963
2022
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
1964
2023
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
1965
2024
|
)
|
|
1966
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2025
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
1967
2026
|
if g_param[OptionsDefine.Language]:
|
|
1968
2027
|
profile.language = g_param[OptionsDefine.Language]
|
|
1969
2028
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2003,7 +2062,10 @@ def doGetOCRToken(args, parsed_globals):
|
|
|
2003
2062
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2004
2063
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2005
2064
|
)
|
|
2006
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2065
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2066
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2067
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2068
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2007
2069
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2008
2070
|
else:
|
|
2009
2071
|
cred = credential.Credential(
|
|
@@ -2015,7 +2077,7 @@ def doGetOCRToken(args, parsed_globals):
|
|
|
2015
2077
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2016
2078
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2017
2079
|
)
|
|
2018
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2080
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2019
2081
|
if g_param[OptionsDefine.Language]:
|
|
2020
2082
|
profile.language = g_param[OptionsDefine.Language]
|
|
2021
2083
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2055,7 +2117,10 @@ def doEduPaperOCR(args, parsed_globals):
|
|
|
2055
2117
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2056
2118
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2057
2119
|
)
|
|
2058
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2120
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2121
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2122
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2123
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2059
2124
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2060
2125
|
else:
|
|
2061
2126
|
cred = credential.Credential(
|
|
@@ -2067,7 +2132,7 @@ def doEduPaperOCR(args, parsed_globals):
|
|
|
2067
2132
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2068
2133
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2069
2134
|
)
|
|
2070
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2135
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2071
2136
|
if g_param[OptionsDefine.Language]:
|
|
2072
2137
|
profile.language = g_param[OptionsDefine.Language]
|
|
2073
2138
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2107,7 +2172,10 @@ def doEnterpriseLicenseOCR(args, parsed_globals):
|
|
|
2107
2172
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2108
2173
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2109
2174
|
)
|
|
2110
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2175
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2176
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2177
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2178
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2111
2179
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2112
2180
|
else:
|
|
2113
2181
|
cred = credential.Credential(
|
|
@@ -2119,7 +2187,7 @@ def doEnterpriseLicenseOCR(args, parsed_globals):
|
|
|
2119
2187
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2120
2188
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2121
2189
|
)
|
|
2122
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2190
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2123
2191
|
if g_param[OptionsDefine.Language]:
|
|
2124
2192
|
profile.language = g_param[OptionsDefine.Language]
|
|
2125
2193
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2159,7 +2227,10 @@ def doBusinessCardOCR(args, parsed_globals):
|
|
|
2159
2227
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2160
2228
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2161
2229
|
)
|
|
2162
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2230
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2231
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2232
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2233
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2163
2234
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2164
2235
|
else:
|
|
2165
2236
|
cred = credential.Credential(
|
|
@@ -2171,7 +2242,7 @@ def doBusinessCardOCR(args, parsed_globals):
|
|
|
2171
2242
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2172
2243
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2173
2244
|
)
|
|
2174
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2245
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2175
2246
|
if g_param[OptionsDefine.Language]:
|
|
2176
2247
|
profile.language = g_param[OptionsDefine.Language]
|
|
2177
2248
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2211,7 +2282,10 @@ def doIDCardOCR(args, parsed_globals):
|
|
|
2211
2282
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2212
2283
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2213
2284
|
)
|
|
2214
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2285
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2286
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2287
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2288
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2215
2289
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2216
2290
|
else:
|
|
2217
2291
|
cred = credential.Credential(
|
|
@@ -2223,7 +2297,7 @@ def doIDCardOCR(args, parsed_globals):
|
|
|
2223
2297
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2224
2298
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2225
2299
|
)
|
|
2226
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2300
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2227
2301
|
if g_param[OptionsDefine.Language]:
|
|
2228
2302
|
profile.language = g_param[OptionsDefine.Language]
|
|
2229
2303
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2253,110 +2327,6 @@ def doIDCardOCR(args, parsed_globals):
|
|
|
2253
2327
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2254
2328
|
|
|
2255
2329
|
|
|
2256
|
-
def doRecognizeGeneralTextImageWarn(args, parsed_globals):
|
|
2257
|
-
g_param = parse_global_arg(parsed_globals)
|
|
2258
|
-
|
|
2259
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2260
|
-
cred = credential.CVMRoleCredential()
|
|
2261
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2262
|
-
cred = credential.STSAssumeRoleCredential(
|
|
2263
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2264
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2265
|
-
)
|
|
2266
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2267
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2268
|
-
else:
|
|
2269
|
-
cred = credential.Credential(
|
|
2270
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2271
|
-
)
|
|
2272
|
-
http_profile = HttpProfile(
|
|
2273
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2274
|
-
reqMethod="POST",
|
|
2275
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2276
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2277
|
-
)
|
|
2278
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2279
|
-
if g_param[OptionsDefine.Language]:
|
|
2280
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
2281
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2282
|
-
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2283
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
2284
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2285
|
-
model = models.RecognizeGeneralTextImageWarnRequest()
|
|
2286
|
-
model.from_json_string(json.dumps(args))
|
|
2287
|
-
start_time = time.time()
|
|
2288
|
-
while True:
|
|
2289
|
-
rsp = client.RecognizeGeneralTextImageWarn(model)
|
|
2290
|
-
result = rsp.to_json_string()
|
|
2291
|
-
try:
|
|
2292
|
-
json_obj = json.loads(result)
|
|
2293
|
-
except TypeError as e:
|
|
2294
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2295
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2296
|
-
break
|
|
2297
|
-
cur_time = time.time()
|
|
2298
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2299
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2300
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2301
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2302
|
-
else:
|
|
2303
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2304
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2305
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2306
|
-
|
|
2307
|
-
|
|
2308
|
-
def doInstitutionOCR(args, parsed_globals):
|
|
2309
|
-
g_param = parse_global_arg(parsed_globals)
|
|
2310
|
-
|
|
2311
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
2312
|
-
cred = credential.CVMRoleCredential()
|
|
2313
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
2314
|
-
cred = credential.STSAssumeRoleCredential(
|
|
2315
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2316
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2317
|
-
)
|
|
2318
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2319
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2320
|
-
else:
|
|
2321
|
-
cred = credential.Credential(
|
|
2322
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
2323
|
-
)
|
|
2324
|
-
http_profile = HttpProfile(
|
|
2325
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
2326
|
-
reqMethod="POST",
|
|
2327
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2328
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2329
|
-
)
|
|
2330
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
2331
|
-
if g_param[OptionsDefine.Language]:
|
|
2332
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
2333
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
2334
|
-
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
2335
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
2336
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
2337
|
-
model = models.InstitutionOCRRequest()
|
|
2338
|
-
model.from_json_string(json.dumps(args))
|
|
2339
|
-
start_time = time.time()
|
|
2340
|
-
while True:
|
|
2341
|
-
rsp = client.InstitutionOCR(model)
|
|
2342
|
-
result = rsp.to_json_string()
|
|
2343
|
-
try:
|
|
2344
|
-
json_obj = json.loads(result)
|
|
2345
|
-
except TypeError as e:
|
|
2346
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
2347
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
2348
|
-
break
|
|
2349
|
-
cur_time = time.time()
|
|
2350
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
2351
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
2352
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
2353
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
2354
|
-
else:
|
|
2355
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
2356
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
2357
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
2358
|
-
|
|
2359
|
-
|
|
2360
2330
|
def doRecognizeTableAccurateOCR(args, parsed_globals):
|
|
2361
2331
|
g_param = parse_global_arg(parsed_globals)
|
|
2362
2332
|
|
|
@@ -2367,7 +2337,10 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
|
|
|
2367
2337
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2368
2338
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2369
2339
|
)
|
|
2370
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2340
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2341
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2342
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2343
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2371
2344
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2372
2345
|
else:
|
|
2373
2346
|
cred = credential.Credential(
|
|
@@ -2379,7 +2352,7 @@ def doRecognizeTableAccurateOCR(args, parsed_globals):
|
|
|
2379
2352
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2380
2353
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2381
2354
|
)
|
|
2382
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2355
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2383
2356
|
if g_param[OptionsDefine.Language]:
|
|
2384
2357
|
profile.language = g_param[OptionsDefine.Language]
|
|
2385
2358
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2419,7 +2392,10 @@ def doMixedInvoiceDetect(args, parsed_globals):
|
|
|
2419
2392
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2420
2393
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2421
2394
|
)
|
|
2422
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2395
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2396
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2397
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2398
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2423
2399
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2424
2400
|
else:
|
|
2425
2401
|
cred = credential.Credential(
|
|
@@ -2431,7 +2407,7 @@ def doMixedInvoiceDetect(args, parsed_globals):
|
|
|
2431
2407
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2432
2408
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2433
2409
|
)
|
|
2434
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2410
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2435
2411
|
if g_param[OptionsDefine.Language]:
|
|
2436
2412
|
profile.language = g_param[OptionsDefine.Language]
|
|
2437
2413
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2471,7 +2447,10 @@ def doVatRollInvoiceOCR(args, parsed_globals):
|
|
|
2471
2447
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2472
2448
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2473
2449
|
)
|
|
2474
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2450
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2451
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2452
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2453
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2475
2454
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2476
2455
|
else:
|
|
2477
2456
|
cred = credential.Credential(
|
|
@@ -2483,7 +2462,7 @@ def doVatRollInvoiceOCR(args, parsed_globals):
|
|
|
2483
2462
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2484
2463
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2485
2464
|
)
|
|
2486
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2465
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2487
2466
|
if g_param[OptionsDefine.Language]:
|
|
2488
2467
|
profile.language = g_param[OptionsDefine.Language]
|
|
2489
2468
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2523,7 +2502,10 @@ def doQuotaInvoiceOCR(args, parsed_globals):
|
|
|
2523
2502
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2524
2503
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2525
2504
|
)
|
|
2526
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2505
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2506
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2507
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2508
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2527
2509
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2528
2510
|
else:
|
|
2529
2511
|
cred = credential.Credential(
|
|
@@ -2535,7 +2517,7 @@ def doQuotaInvoiceOCR(args, parsed_globals):
|
|
|
2535
2517
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2536
2518
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2537
2519
|
)
|
|
2538
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2520
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2539
2521
|
if g_param[OptionsDefine.Language]:
|
|
2540
2522
|
profile.language = g_param[OptionsDefine.Language]
|
|
2541
2523
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2575,7 +2557,10 @@ def doGeneralHandwritingOCR(args, parsed_globals):
|
|
|
2575
2557
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2576
2558
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2577
2559
|
)
|
|
2578
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2560
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2561
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2562
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2563
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2579
2564
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2580
2565
|
else:
|
|
2581
2566
|
cred = credential.Credential(
|
|
@@ -2587,7 +2572,7 @@ def doGeneralHandwritingOCR(args, parsed_globals):
|
|
|
2587
2572
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2588
2573
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2589
2574
|
)
|
|
2590
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2575
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2591
2576
|
if g_param[OptionsDefine.Language]:
|
|
2592
2577
|
profile.language = g_param[OptionsDefine.Language]
|
|
2593
2578
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2627,7 +2612,10 @@ def doExtractDocBasic(args, parsed_globals):
|
|
|
2627
2612
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2628
2613
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2629
2614
|
)
|
|
2630
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2615
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2616
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2617
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2618
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2631
2619
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2632
2620
|
else:
|
|
2633
2621
|
cred = credential.Credential(
|
|
@@ -2639,7 +2627,7 @@ def doExtractDocBasic(args, parsed_globals):
|
|
|
2639
2627
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2640
2628
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2641
2629
|
)
|
|
2642
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2630
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2643
2631
|
if g_param[OptionsDefine.Language]:
|
|
2644
2632
|
profile.language = g_param[OptionsDefine.Language]
|
|
2645
2633
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2679,7 +2667,10 @@ def doRecognizeOnlineTaxiItineraryOCR(args, parsed_globals):
|
|
|
2679
2667
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2680
2668
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2681
2669
|
)
|
|
2682
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2670
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2671
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2672
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2673
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2683
2674
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2684
2675
|
else:
|
|
2685
2676
|
cred = credential.Credential(
|
|
@@ -2691,7 +2682,7 @@ def doRecognizeOnlineTaxiItineraryOCR(args, parsed_globals):
|
|
|
2691
2682
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2692
2683
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2693
2684
|
)
|
|
2694
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2685
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2695
2686
|
if g_param[OptionsDefine.Language]:
|
|
2696
2687
|
profile.language = g_param[OptionsDefine.Language]
|
|
2697
2688
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2731,7 +2722,10 @@ def doRecognizeTableOCR(args, parsed_globals):
|
|
|
2731
2722
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2732
2723
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2733
2724
|
)
|
|
2734
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2725
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2726
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2727
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2728
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2735
2729
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2736
2730
|
else:
|
|
2737
2731
|
cred = credential.Credential(
|
|
@@ -2743,7 +2737,7 @@ def doRecognizeTableOCR(args, parsed_globals):
|
|
|
2743
2737
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2744
2738
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2745
2739
|
)
|
|
2746
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2740
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2747
2741
|
if g_param[OptionsDefine.Language]:
|
|
2748
2742
|
profile.language = g_param[OptionsDefine.Language]
|
|
2749
2743
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2783,7 +2777,10 @@ def doWaybillOCR(args, parsed_globals):
|
|
|
2783
2777
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2784
2778
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2785
2779
|
)
|
|
2786
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2780
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2781
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2782
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2783
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2787
2784
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2788
2785
|
else:
|
|
2789
2786
|
cred = credential.Credential(
|
|
@@ -2795,7 +2792,7 @@ def doWaybillOCR(args, parsed_globals):
|
|
|
2795
2792
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2796
2793
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2797
2794
|
)
|
|
2798
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2795
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2799
2796
|
if g_param[OptionsDefine.Language]:
|
|
2800
2797
|
profile.language = g_param[OptionsDefine.Language]
|
|
2801
2798
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2835,7 +2832,10 @@ def doHandwritingEssayOCR(args, parsed_globals):
|
|
|
2835
2832
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2836
2833
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2837
2834
|
)
|
|
2838
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2835
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2836
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2837
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2838
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2839
2839
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2840
2840
|
else:
|
|
2841
2841
|
cred = credential.Credential(
|
|
@@ -2847,7 +2847,7 @@ def doHandwritingEssayOCR(args, parsed_globals):
|
|
|
2847
2847
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2848
2848
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2849
2849
|
)
|
|
2850
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2850
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2851
2851
|
if g_param[OptionsDefine.Language]:
|
|
2852
2852
|
profile.language = g_param[OptionsDefine.Language]
|
|
2853
2853
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2887,7 +2887,10 @@ def doHmtResidentPermitOCR(args, parsed_globals):
|
|
|
2887
2887
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2888
2888
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2889
2889
|
)
|
|
2890
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2890
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2891
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2892
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2893
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2891
2894
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2892
2895
|
else:
|
|
2893
2896
|
cred = credential.Credential(
|
|
@@ -2899,7 +2902,7 @@ def doHmtResidentPermitOCR(args, parsed_globals):
|
|
|
2899
2902
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2900
2903
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2901
2904
|
)
|
|
2902
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2905
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2903
2906
|
if g_param[OptionsDefine.Language]:
|
|
2904
2907
|
profile.language = g_param[OptionsDefine.Language]
|
|
2905
2908
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2939,7 +2942,10 @@ def doTollInvoiceOCR(args, parsed_globals):
|
|
|
2939
2942
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2940
2943
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2941
2944
|
)
|
|
2942
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
2945
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
2946
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
2947
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
2948
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2943
2949
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2944
2950
|
else:
|
|
2945
2951
|
cred = credential.Credential(
|
|
@@ -2951,7 +2957,7 @@ def doTollInvoiceOCR(args, parsed_globals):
|
|
|
2951
2957
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
2952
2958
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
2953
2959
|
)
|
|
2954
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
2960
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
2955
2961
|
if g_param[OptionsDefine.Language]:
|
|
2956
2962
|
profile.language = g_param[OptionsDefine.Language]
|
|
2957
2963
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -2991,7 +2997,10 @@ def doClassifyDetectOCR(args, parsed_globals):
|
|
|
2991
2997
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
2992
2998
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
2993
2999
|
)
|
|
2994
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3000
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3001
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3002
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3003
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
2995
3004
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
2996
3005
|
else:
|
|
2997
3006
|
cred = credential.Credential(
|
|
@@ -3003,7 +3012,7 @@ def doClassifyDetectOCR(args, parsed_globals):
|
|
|
3003
3012
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3004
3013
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3005
3014
|
)
|
|
3006
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3015
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3007
3016
|
if g_param[OptionsDefine.Language]:
|
|
3008
3017
|
profile.language = g_param[OptionsDefine.Language]
|
|
3009
3018
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3043,7 +3052,10 @@ def doRecognizeFormulaOCR(args, parsed_globals):
|
|
|
3043
3052
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3044
3053
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3045
3054
|
)
|
|
3046
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3055
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3056
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3057
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3058
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3047
3059
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3048
3060
|
else:
|
|
3049
3061
|
cred = credential.Credential(
|
|
@@ -3055,7 +3067,7 @@ def doRecognizeFormulaOCR(args, parsed_globals):
|
|
|
3055
3067
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3056
3068
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3057
3069
|
)
|
|
3058
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3070
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3059
3071
|
if g_param[OptionsDefine.Language]:
|
|
3060
3072
|
profile.language = g_param[OptionsDefine.Language]
|
|
3061
3073
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3095,7 +3107,10 @@ def doSealOCR(args, parsed_globals):
|
|
|
3095
3107
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3096
3108
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3097
3109
|
)
|
|
3098
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3110
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3111
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3112
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3113
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3099
3114
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3100
3115
|
else:
|
|
3101
3116
|
cred = credential.Credential(
|
|
@@ -3107,7 +3122,7 @@ def doSealOCR(args, parsed_globals):
|
|
|
3107
3122
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3108
3123
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3109
3124
|
)
|
|
3110
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3125
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3111
3126
|
if g_param[OptionsDefine.Language]:
|
|
3112
3127
|
profile.language = g_param[OptionsDefine.Language]
|
|
3113
3128
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3147,7 +3162,10 @@ def doBankSlipOCR(args, parsed_globals):
|
|
|
3147
3162
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3148
3163
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3149
3164
|
)
|
|
3150
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3165
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3166
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3167
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3168
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3151
3169
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3152
3170
|
else:
|
|
3153
3171
|
cred = credential.Credential(
|
|
@@ -3159,7 +3177,7 @@ def doBankSlipOCR(args, parsed_globals):
|
|
|
3159
3177
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3160
3178
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3161
3179
|
)
|
|
3162
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3180
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3163
3181
|
if g_param[OptionsDefine.Language]:
|
|
3164
3182
|
profile.language = g_param[OptionsDefine.Language]
|
|
3165
3183
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3189,7 +3207,7 @@ def doBankSlipOCR(args, parsed_globals):
|
|
|
3189
3207
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3190
3208
|
|
|
3191
3209
|
|
|
3192
|
-
def
|
|
3210
|
+
def doResidenceBookletOCR(args, parsed_globals):
|
|
3193
3211
|
g_param = parse_global_arg(parsed_globals)
|
|
3194
3212
|
|
|
3195
3213
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -3199,7 +3217,10 @@ def doVehicleRegCertOCR(args, parsed_globals):
|
|
|
3199
3217
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3200
3218
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3201
3219
|
)
|
|
3202
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3220
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3221
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3222
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3223
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3203
3224
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3204
3225
|
else:
|
|
3205
3226
|
cred = credential.Credential(
|
|
@@ -3211,18 +3232,18 @@ def doVehicleRegCertOCR(args, parsed_globals):
|
|
|
3211
3232
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3212
3233
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3213
3234
|
)
|
|
3214
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3235
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3215
3236
|
if g_param[OptionsDefine.Language]:
|
|
3216
3237
|
profile.language = g_param[OptionsDefine.Language]
|
|
3217
3238
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3218
3239
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3219
3240
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
3220
3241
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
3221
|
-
model = models.
|
|
3242
|
+
model = models.ResidenceBookletOCRRequest()
|
|
3222
3243
|
model.from_json_string(json.dumps(args))
|
|
3223
3244
|
start_time = time.time()
|
|
3224
3245
|
while True:
|
|
3225
|
-
rsp = client.
|
|
3246
|
+
rsp = client.ResidenceBookletOCR(model)
|
|
3226
3247
|
result = rsp.to_json_string()
|
|
3227
3248
|
try:
|
|
3228
3249
|
json_obj = json.loads(result)
|
|
@@ -3251,7 +3272,10 @@ def doRecognizeTravelCardOCR(args, parsed_globals):
|
|
|
3251
3272
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3252
3273
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3253
3274
|
)
|
|
3254
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3275
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3276
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3277
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3278
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3255
3279
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3256
3280
|
else:
|
|
3257
3281
|
cred = credential.Credential(
|
|
@@ -3263,7 +3287,7 @@ def doRecognizeTravelCardOCR(args, parsed_globals):
|
|
|
3263
3287
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3264
3288
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3265
3289
|
)
|
|
3266
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3290
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3267
3291
|
if g_param[OptionsDefine.Language]:
|
|
3268
3292
|
profile.language = g_param[OptionsDefine.Language]
|
|
3269
3293
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3303,7 +3327,10 @@ def doSubmitExtractDocAgentJob(args, parsed_globals):
|
|
|
3303
3327
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3304
3328
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3305
3329
|
)
|
|
3306
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3330
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3331
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3332
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3333
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3307
3334
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3308
3335
|
else:
|
|
3309
3336
|
cred = credential.Credential(
|
|
@@ -3315,7 +3342,7 @@ def doSubmitExtractDocAgentJob(args, parsed_globals):
|
|
|
3315
3342
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3316
3343
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3317
3344
|
)
|
|
3318
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3345
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3319
3346
|
if g_param[OptionsDefine.Language]:
|
|
3320
3347
|
profile.language = g_param[OptionsDefine.Language]
|
|
3321
3348
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3355,7 +3382,10 @@ def doVerifyOfdVatInvoiceOCR(args, parsed_globals):
|
|
|
3355
3382
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3356
3383
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3357
3384
|
)
|
|
3358
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3385
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3386
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3387
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3388
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3359
3389
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3360
3390
|
else:
|
|
3361
3391
|
cred = credential.Credential(
|
|
@@ -3367,7 +3397,7 @@ def doVerifyOfdVatInvoiceOCR(args, parsed_globals):
|
|
|
3367
3397
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3368
3398
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3369
3399
|
)
|
|
3370
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3400
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3371
3401
|
if g_param[OptionsDefine.Language]:
|
|
3372
3402
|
profile.language = g_param[OptionsDefine.Language]
|
|
3373
3403
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3407,7 +3437,10 @@ def doDriverLicenseOCR(args, parsed_globals):
|
|
|
3407
3437
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3408
3438
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3409
3439
|
)
|
|
3410
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3440
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3441
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3442
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3443
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3411
3444
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3412
3445
|
else:
|
|
3413
3446
|
cred = credential.Credential(
|
|
@@ -3419,7 +3452,7 @@ def doDriverLicenseOCR(args, parsed_globals):
|
|
|
3419
3452
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3420
3453
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3421
3454
|
)
|
|
3422
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3455
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3423
3456
|
if g_param[OptionsDefine.Language]:
|
|
3424
3457
|
profile.language = g_param[OptionsDefine.Language]
|
|
3425
3458
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3459,7 +3492,10 @@ def doFinanBillOCR(args, parsed_globals):
|
|
|
3459
3492
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3460
3493
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3461
3494
|
)
|
|
3462
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3495
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3496
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3497
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3498
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3463
3499
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3464
3500
|
else:
|
|
3465
3501
|
cred = credential.Credential(
|
|
@@ -3471,7 +3507,7 @@ def doFinanBillOCR(args, parsed_globals):
|
|
|
3471
3507
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3472
3508
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3473
3509
|
)
|
|
3474
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3510
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3475
3511
|
if g_param[OptionsDefine.Language]:
|
|
3476
3512
|
profile.language = g_param[OptionsDefine.Language]
|
|
3477
3513
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3511,7 +3547,10 @@ def doMixedInvoiceOCR(args, parsed_globals):
|
|
|
3511
3547
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3512
3548
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3513
3549
|
)
|
|
3514
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3550
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3551
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3552
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3553
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3515
3554
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3516
3555
|
else:
|
|
3517
3556
|
cred = credential.Credential(
|
|
@@ -3523,7 +3562,7 @@ def doMixedInvoiceOCR(args, parsed_globals):
|
|
|
3523
3562
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3524
3563
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3525
3564
|
)
|
|
3526
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3565
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3527
3566
|
if g_param[OptionsDefine.Language]:
|
|
3528
3567
|
profile.language = g_param[OptionsDefine.Language]
|
|
3529
3568
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3563,7 +3602,10 @@ def doRecognizeHealthCodeOCR(args, parsed_globals):
|
|
|
3563
3602
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3564
3603
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3565
3604
|
)
|
|
3566
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3605
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3606
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3607
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3608
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3567
3609
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3568
3610
|
else:
|
|
3569
3611
|
cred = credential.Credential(
|
|
@@ -3575,7 +3617,7 @@ def doRecognizeHealthCodeOCR(args, parsed_globals):
|
|
|
3575
3617
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3576
3618
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3577
3619
|
)
|
|
3578
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3620
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3579
3621
|
if g_param[OptionsDefine.Language]:
|
|
3580
3622
|
profile.language = g_param[OptionsDefine.Language]
|
|
3581
3623
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3615,7 +3657,10 @@ def doImageEnhancement(args, parsed_globals):
|
|
|
3615
3657
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3616
3658
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3617
3659
|
)
|
|
3618
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3660
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3661
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3662
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3663
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3619
3664
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3620
3665
|
else:
|
|
3621
3666
|
cred = credential.Credential(
|
|
@@ -3627,7 +3672,7 @@ def doImageEnhancement(args, parsed_globals):
|
|
|
3627
3672
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3628
3673
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3629
3674
|
)
|
|
3630
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3675
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3631
3676
|
if g_param[OptionsDefine.Language]:
|
|
3632
3677
|
profile.language = g_param[OptionsDefine.Language]
|
|
3633
3678
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3667,7 +3712,10 @@ def doQuestionSplitOCR(args, parsed_globals):
|
|
|
3667
3712
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3668
3713
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3669
3714
|
)
|
|
3670
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3715
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3716
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3717
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3718
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3671
3719
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3672
3720
|
else:
|
|
3673
3721
|
cred = credential.Credential(
|
|
@@ -3679,7 +3727,7 @@ def doQuestionSplitOCR(args, parsed_globals):
|
|
|
3679
3727
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3680
3728
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3681
3729
|
)
|
|
3682
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3730
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3683
3731
|
if g_param[OptionsDefine.Language]:
|
|
3684
3732
|
profile.language = g_param[OptionsDefine.Language]
|
|
3685
3733
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3719,7 +3767,10 @@ def doMLIDCardOCR(args, parsed_globals):
|
|
|
3719
3767
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3720
3768
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3721
3769
|
)
|
|
3722
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3770
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3771
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3772
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3773
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3723
3774
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3724
3775
|
else:
|
|
3725
3776
|
cred = credential.Credential(
|
|
@@ -3731,7 +3782,7 @@ def doMLIDCardOCR(args, parsed_globals):
|
|
|
3731
3782
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3732
3783
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3733
3784
|
)
|
|
3734
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3785
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3735
3786
|
if g_param[OptionsDefine.Language]:
|
|
3736
3787
|
profile.language = g_param[OptionsDefine.Language]
|
|
3737
3788
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3771,7 +3822,10 @@ def doRecognizeMedicalInvoiceOCR(args, parsed_globals):
|
|
|
3771
3822
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3772
3823
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3773
3824
|
)
|
|
3774
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3825
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3826
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3827
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3828
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3775
3829
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3776
3830
|
else:
|
|
3777
3831
|
cred = credential.Credential(
|
|
@@ -3783,7 +3837,7 @@ def doRecognizeMedicalInvoiceOCR(args, parsed_globals):
|
|
|
3783
3837
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3784
3838
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3785
3839
|
)
|
|
3786
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3840
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3787
3841
|
if g_param[OptionsDefine.Language]:
|
|
3788
3842
|
profile.language = g_param[OptionsDefine.Language]
|
|
3789
3843
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3823,7 +3877,10 @@ def doRecognizeTableMultiOCR(args, parsed_globals):
|
|
|
3823
3877
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3824
3878
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3825
3879
|
)
|
|
3826
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3880
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3881
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3882
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3883
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3827
3884
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3828
3885
|
else:
|
|
3829
3886
|
cred = credential.Credential(
|
|
@@ -3835,7 +3892,7 @@ def doRecognizeTableMultiOCR(args, parsed_globals):
|
|
|
3835
3892
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3836
3893
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3837
3894
|
)
|
|
3838
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3895
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3839
3896
|
if g_param[OptionsDefine.Language]:
|
|
3840
3897
|
profile.language = g_param[OptionsDefine.Language]
|
|
3841
3898
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3875,7 +3932,10 @@ def doGeneralFastOCR(args, parsed_globals):
|
|
|
3875
3932
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3876
3933
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3877
3934
|
)
|
|
3878
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3935
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3936
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3937
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3938
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3879
3939
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3880
3940
|
else:
|
|
3881
3941
|
cred = credential.Credential(
|
|
@@ -3887,7 +3947,7 @@ def doGeneralFastOCR(args, parsed_globals):
|
|
|
3887
3947
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3888
3948
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3889
3949
|
)
|
|
3890
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
3950
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3891
3951
|
if g_param[OptionsDefine.Language]:
|
|
3892
3952
|
profile.language = g_param[OptionsDefine.Language]
|
|
3893
3953
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3927,7 +3987,10 @@ def doVatInvoiceOCR(args, parsed_globals):
|
|
|
3927
3987
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3928
3988
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3929
3989
|
)
|
|
3930
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
3990
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
3991
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
3992
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
3993
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3931
3994
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3932
3995
|
else:
|
|
3933
3996
|
cred = credential.Credential(
|
|
@@ -3939,7 +4002,7 @@ def doVatInvoiceOCR(args, parsed_globals):
|
|
|
3939
4002
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3940
4003
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3941
4004
|
)
|
|
3942
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4005
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
3943
4006
|
if g_param[OptionsDefine.Language]:
|
|
3944
4007
|
profile.language = g_param[OptionsDefine.Language]
|
|
3945
4008
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -3969,59 +4032,7 @@ def doVatInvoiceOCR(args, parsed_globals):
|
|
|
3969
4032
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
3970
4033
|
|
|
3971
4034
|
|
|
3972
|
-
def
|
|
3973
|
-
g_param = parse_global_arg(parsed_globals)
|
|
3974
|
-
|
|
3975
|
-
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
3976
|
-
cred = credential.CVMRoleCredential()
|
|
3977
|
-
elif g_param[OptionsDefine.RoleArn.replace('-', '_')] and g_param[OptionsDefine.RoleSessionName.replace('-', '_')]:
|
|
3978
|
-
cred = credential.STSAssumeRoleCredential(
|
|
3979
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
3980
|
-
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
3981
|
-
)
|
|
3982
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION) and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
3983
|
-
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
3984
|
-
else:
|
|
3985
|
-
cred = credential.Credential(
|
|
3986
|
-
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.Token]
|
|
3987
|
-
)
|
|
3988
|
-
http_profile = HttpProfile(
|
|
3989
|
-
reqTimeout=60 if g_param[OptionsDefine.Timeout] is None else int(g_param[OptionsDefine.Timeout]),
|
|
3990
|
-
reqMethod="POST",
|
|
3991
|
-
endpoint=g_param[OptionsDefine.Endpoint],
|
|
3992
|
-
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
3993
|
-
)
|
|
3994
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="HmacSHA256")
|
|
3995
|
-
if g_param[OptionsDefine.Language]:
|
|
3996
|
-
profile.language = g_param[OptionsDefine.Language]
|
|
3997
|
-
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
3998
|
-
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
3999
|
-
client._sdkVersion += ("_CLI_" + __version__)
|
|
4000
|
-
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4001
|
-
model = models.RecognizeForeignPermanentResidentIdCardRequest()
|
|
4002
|
-
model.from_json_string(json.dumps(args))
|
|
4003
|
-
start_time = time.time()
|
|
4004
|
-
while True:
|
|
4005
|
-
rsp = client.RecognizeForeignPermanentResidentIdCard(model)
|
|
4006
|
-
result = rsp.to_json_string()
|
|
4007
|
-
try:
|
|
4008
|
-
json_obj = json.loads(result)
|
|
4009
|
-
except TypeError as e:
|
|
4010
|
-
json_obj = json.loads(result.decode('utf-8')) # python3.3
|
|
4011
|
-
if not g_param[OptionsDefine.Waiter] or search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj) == g_param['OptionsDefine.WaiterInfo']['to']:
|
|
4012
|
-
break
|
|
4013
|
-
cur_time = time.time()
|
|
4014
|
-
if cur_time - start_time >= g_param['OptionsDefine.WaiterInfo']['timeout']:
|
|
4015
|
-
raise ClientError('Request timeout, wait `%s` to `%s` timeout, last request is %s' %
|
|
4016
|
-
(g_param['OptionsDefine.WaiterInfo']['expr'], g_param['OptionsDefine.WaiterInfo']['to'],
|
|
4017
|
-
search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj)))
|
|
4018
|
-
else:
|
|
4019
|
-
print('Inquiry result is %s.' % search(g_param['OptionsDefine.WaiterInfo']['expr'], json_obj))
|
|
4020
|
-
time.sleep(g_param['OptionsDefine.WaiterInfo']['interval'])
|
|
4021
|
-
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4022
|
-
|
|
4023
|
-
|
|
4024
|
-
def doOrgCodeCertOCR(args, parsed_globals):
|
|
4035
|
+
def doDutyPaidProofOCR(args, parsed_globals):
|
|
4025
4036
|
g_param = parse_global_arg(parsed_globals)
|
|
4026
4037
|
|
|
4027
4038
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4031,7 +4042,10 @@ def doOrgCodeCertOCR(args, parsed_globals):
|
|
|
4031
4042
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4032
4043
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4033
4044
|
)
|
|
4034
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4045
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4046
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4047
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4048
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4035
4049
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4036
4050
|
else:
|
|
4037
4051
|
cred = credential.Credential(
|
|
@@ -4043,18 +4057,18 @@ def doOrgCodeCertOCR(args, parsed_globals):
|
|
|
4043
4057
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4044
4058
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4045
4059
|
)
|
|
4046
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4060
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4047
4061
|
if g_param[OptionsDefine.Language]:
|
|
4048
4062
|
profile.language = g_param[OptionsDefine.Language]
|
|
4049
4063
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4050
4064
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4051
4065
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4052
4066
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4053
|
-
model = models.
|
|
4067
|
+
model = models.DutyPaidProofOCRRequest()
|
|
4054
4068
|
model.from_json_string(json.dumps(args))
|
|
4055
4069
|
start_time = time.time()
|
|
4056
4070
|
while True:
|
|
4057
|
-
rsp = client.
|
|
4071
|
+
rsp = client.DutyPaidProofOCR(model)
|
|
4058
4072
|
result = rsp.to_json_string()
|
|
4059
4073
|
try:
|
|
4060
4074
|
json_obj = json.loads(result)
|
|
@@ -4083,7 +4097,10 @@ def doFinanBillSliceOCR(args, parsed_globals):
|
|
|
4083
4097
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4084
4098
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4085
4099
|
)
|
|
4086
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4100
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4101
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4102
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4103
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4087
4104
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4088
4105
|
else:
|
|
4089
4106
|
cred = credential.Credential(
|
|
@@ -4095,7 +4112,7 @@ def doFinanBillSliceOCR(args, parsed_globals):
|
|
|
4095
4112
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4096
4113
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4097
4114
|
)
|
|
4098
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4115
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4099
4116
|
if g_param[OptionsDefine.Language]:
|
|
4100
4117
|
profile.language = g_param[OptionsDefine.Language]
|
|
4101
4118
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4135,7 +4152,10 @@ def doLicensePlateOCR(args, parsed_globals):
|
|
|
4135
4152
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4136
4153
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4137
4154
|
)
|
|
4138
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4155
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4156
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4157
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4158
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4139
4159
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4140
4160
|
else:
|
|
4141
4161
|
cred = credential.Credential(
|
|
@@ -4147,7 +4167,7 @@ def doLicensePlateOCR(args, parsed_globals):
|
|
|
4147
4167
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4148
4168
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4149
4169
|
)
|
|
4150
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4170
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4151
4171
|
if g_param[OptionsDefine.Language]:
|
|
4152
4172
|
profile.language = g_param[OptionsDefine.Language]
|
|
4153
4173
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4187,7 +4207,10 @@ def doExtractDocMulti(args, parsed_globals):
|
|
|
4187
4207
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4188
4208
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4189
4209
|
)
|
|
4190
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4210
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4211
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4212
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4213
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4191
4214
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4192
4215
|
else:
|
|
4193
4216
|
cred = credential.Credential(
|
|
@@ -4199,7 +4222,7 @@ def doExtractDocMulti(args, parsed_globals):
|
|
|
4199
4222
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4200
4223
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4201
4224
|
)
|
|
4202
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4225
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4203
4226
|
if g_param[OptionsDefine.Language]:
|
|
4204
4227
|
profile.language = g_param[OptionsDefine.Language]
|
|
4205
4228
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4239,7 +4262,10 @@ def doGeneralEfficientOCR(args, parsed_globals):
|
|
|
4239
4262
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4240
4263
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4241
4264
|
)
|
|
4242
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4265
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4266
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4267
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4268
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4243
4269
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4244
4270
|
else:
|
|
4245
4271
|
cred = credential.Credential(
|
|
@@ -4251,7 +4277,7 @@ def doGeneralEfficientOCR(args, parsed_globals):
|
|
|
4251
4277
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4252
4278
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4253
4279
|
)
|
|
4254
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4280
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4255
4281
|
if g_param[OptionsDefine.Language]:
|
|
4256
4282
|
profile.language = g_param[OptionsDefine.Language]
|
|
4257
4283
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4291,7 +4317,10 @@ def doAdvertiseOCR(args, parsed_globals):
|
|
|
4291
4317
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4292
4318
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4293
4319
|
)
|
|
4294
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4320
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4321
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4322
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4323
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4295
4324
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4296
4325
|
else:
|
|
4297
4326
|
cred = credential.Credential(
|
|
@@ -4303,7 +4332,7 @@ def doAdvertiseOCR(args, parsed_globals):
|
|
|
4303
4332
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4304
4333
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4305
4334
|
)
|
|
4306
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4335
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4307
4336
|
if g_param[OptionsDefine.Language]:
|
|
4308
4337
|
profile.language = g_param[OptionsDefine.Language]
|
|
4309
4338
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4333,7 +4362,7 @@ def doAdvertiseOCR(args, parsed_globals):
|
|
|
4333
4362
|
FormatOutput.output("action", json_obj, g_param[OptionsDefine.Output], g_param[OptionsDefine.Filter])
|
|
4334
4363
|
|
|
4335
4364
|
|
|
4336
|
-
def
|
|
4365
|
+
def doVehicleRegCertOCR(args, parsed_globals):
|
|
4337
4366
|
g_param = parse_global_arg(parsed_globals)
|
|
4338
4367
|
|
|
4339
4368
|
if g_param[OptionsDefine.UseCVMRole.replace('-', '_')]:
|
|
@@ -4343,7 +4372,10 @@ def doResidenceBookletOCR(args, parsed_globals):
|
|
|
4343
4372
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4344
4373
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4345
4374
|
)
|
|
4346
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4375
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4376
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4377
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4378
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4347
4379
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4348
4380
|
else:
|
|
4349
4381
|
cred = credential.Credential(
|
|
@@ -4355,18 +4387,18 @@ def doResidenceBookletOCR(args, parsed_globals):
|
|
|
4355
4387
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4356
4388
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4357
4389
|
)
|
|
4358
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4390
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4359
4391
|
if g_param[OptionsDefine.Language]:
|
|
4360
4392
|
profile.language = g_param[OptionsDefine.Language]
|
|
4361
4393
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
4362
4394
|
client = mod.OcrClient(cred, g_param[OptionsDefine.Region], profile)
|
|
4363
4395
|
client._sdkVersion += ("_CLI_" + __version__)
|
|
4364
4396
|
models = MODELS_MAP[g_param[OptionsDefine.Version]]
|
|
4365
|
-
model = models.
|
|
4397
|
+
model = models.VehicleRegCertOCRRequest()
|
|
4366
4398
|
model.from_json_string(json.dumps(args))
|
|
4367
4399
|
start_time = time.time()
|
|
4368
4400
|
while True:
|
|
4369
|
-
rsp = client.
|
|
4401
|
+
rsp = client.VehicleRegCertOCR(model)
|
|
4370
4402
|
result = rsp.to_json_string()
|
|
4371
4403
|
try:
|
|
4372
4404
|
json_obj = json.loads(result)
|
|
@@ -4395,7 +4427,10 @@ def doCarInvoiceOCR(args, parsed_globals):
|
|
|
4395
4427
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4396
4428
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4397
4429
|
)
|
|
4398
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4430
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4431
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4432
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4433
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4399
4434
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4400
4435
|
else:
|
|
4401
4436
|
cred = credential.Credential(
|
|
@@ -4407,7 +4442,7 @@ def doCarInvoiceOCR(args, parsed_globals):
|
|
|
4407
4442
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4408
4443
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4409
4444
|
)
|
|
4410
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4445
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4411
4446
|
if g_param[OptionsDefine.Language]:
|
|
4412
4447
|
profile.language = g_param[OptionsDefine.Language]
|
|
4413
4448
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4447,7 +4482,10 @@ def doGetOCRResult(args, parsed_globals):
|
|
|
4447
4482
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4448
4483
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4449
4484
|
)
|
|
4450
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4485
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4486
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4487
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4488
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4451
4489
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4452
4490
|
else:
|
|
4453
4491
|
cred = credential.Credential(
|
|
@@ -4459,7 +4497,7 @@ def doGetOCRResult(args, parsed_globals):
|
|
|
4459
4497
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4460
4498
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4461
4499
|
)
|
|
4462
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4500
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4463
4501
|
if g_param[OptionsDefine.Language]:
|
|
4464
4502
|
profile.language = g_param[OptionsDefine.Language]
|
|
4465
4503
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4499,7 +4537,10 @@ def doFormulaOCR(args, parsed_globals):
|
|
|
4499
4537
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4500
4538
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4501
4539
|
)
|
|
4502
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4540
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4541
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4542
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4543
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4503
4544
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4504
4545
|
else:
|
|
4505
4546
|
cred = credential.Credential(
|
|
@@ -4511,7 +4552,7 @@ def doFormulaOCR(args, parsed_globals):
|
|
|
4511
4552
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4512
4553
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4513
4554
|
)
|
|
4514
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4555
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4515
4556
|
if g_param[OptionsDefine.Language]:
|
|
4516
4557
|
profile.language = g_param[OptionsDefine.Language]
|
|
4517
4558
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4551,7 +4592,10 @@ def doPassportOCR(args, parsed_globals):
|
|
|
4551
4592
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4552
4593
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4553
4594
|
)
|
|
4554
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4595
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4596
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4597
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4598
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4555
4599
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4556
4600
|
else:
|
|
4557
4601
|
cred = credential.Credential(
|
|
@@ -4563,7 +4607,7 @@ def doPassportOCR(args, parsed_globals):
|
|
|
4563
4607
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4564
4608
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4565
4609
|
)
|
|
4566
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4610
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4567
4611
|
if g_param[OptionsDefine.Language]:
|
|
4568
4612
|
profile.language = g_param[OptionsDefine.Language]
|
|
4569
4613
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4603,7 +4647,10 @@ def doShipInvoiceOCR(args, parsed_globals):
|
|
|
4603
4647
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4604
4648
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4605
4649
|
)
|
|
4606
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4650
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4651
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4652
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4653
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4607
4654
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4608
4655
|
else:
|
|
4609
4656
|
cred = credential.Credential(
|
|
@@ -4615,7 +4662,7 @@ def doShipInvoiceOCR(args, parsed_globals):
|
|
|
4615
4662
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4616
4663
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4617
4664
|
)
|
|
4618
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4665
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4619
4666
|
if g_param[OptionsDefine.Language]:
|
|
4620
4667
|
profile.language = g_param[OptionsDefine.Language]
|
|
4621
4668
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4655,7 +4702,10 @@ def doRideHailingTransportLicenseOCR(args, parsed_globals):
|
|
|
4655
4702
|
g_param[OptionsDefine.SecretId], g_param[OptionsDefine.SecretKey], g_param[OptionsDefine.RoleArn.replace('-', '_')],
|
|
4656
4703
|
g_param[OptionsDefine.RoleSessionName.replace('-', '_')], endpoint=g_param["sts_cred_endpoint"]
|
|
4657
4704
|
)
|
|
4658
|
-
elif os.getenv(OptionsDefine.ENV_TKE_REGION)
|
|
4705
|
+
elif os.getenv(OptionsDefine.ENV_TKE_REGION) \
|
|
4706
|
+
and os.getenv(OptionsDefine.ENV_TKE_PROVIDER_ID) \
|
|
4707
|
+
and os.getenv(OptionsDefine.ENV_TKE_WEB_IDENTITY_TOKEN_FILE) \
|
|
4708
|
+
and os.getenv(OptionsDefine.ENV_TKE_ROLE_ARN):
|
|
4659
4709
|
cred = credential.DefaultTkeOIDCRoleArnProvider().get_credentials()
|
|
4660
4710
|
else:
|
|
4661
4711
|
cred = credential.Credential(
|
|
@@ -4667,7 +4717,7 @@ def doRideHailingTransportLicenseOCR(args, parsed_globals):
|
|
|
4667
4717
|
endpoint=g_param[OptionsDefine.Endpoint],
|
|
4668
4718
|
proxy=g_param[OptionsDefine.HttpsProxy.replace('-', '_')]
|
|
4669
4719
|
)
|
|
4670
|
-
profile = ClientProfile(httpProfile=http_profile, signMethod="
|
|
4720
|
+
profile = ClientProfile(httpProfile=http_profile, signMethod="TC3-HMAC-SHA256")
|
|
4671
4721
|
if g_param[OptionsDefine.Language]:
|
|
4672
4722
|
profile.language = g_param[OptionsDefine.Language]
|
|
4673
4723
|
mod = CLIENT_MAP[g_param[OptionsDefine.Version]]
|
|
@@ -4717,10 +4767,11 @@ ACTION_MAP = {
|
|
|
4717
4767
|
"RecognizeStoreName": doRecognizeStoreName,
|
|
4718
4768
|
"MLIDPassportOCR": doMLIDPassportOCR,
|
|
4719
4769
|
"TrainTicketOCR": doTrainTicketOCR,
|
|
4720
|
-
"
|
|
4770
|
+
"RecognizeValidIDCardOCR": doRecognizeValidIDCardOCR,
|
|
4721
4771
|
"InvoiceGeneralOCR": doInvoiceGeneralOCR,
|
|
4722
4772
|
"HKIDCardOCR": doHKIDCardOCR,
|
|
4723
4773
|
"PermitOCR": doPermitOCR,
|
|
4774
|
+
"QuestionSplitLayoutOCR": doQuestionSplitLayoutOCR,
|
|
4724
4775
|
"BusInvoiceOCR": doBusInvoiceOCR,
|
|
4725
4776
|
"EnglishOCR": doEnglishOCR,
|
|
4726
4777
|
"SmartStructuralOCR": doSmartStructuralOCR,
|
|
@@ -4728,7 +4779,6 @@ ACTION_MAP = {
|
|
|
4728
4779
|
"TaxiInvoiceOCR": doTaxiInvoiceOCR,
|
|
4729
4780
|
"DescribeExtractDocAgentJob": doDescribeExtractDocAgentJob,
|
|
4730
4781
|
"RideHailingDriverLicenseOCR": doRideHailingDriverLicenseOCR,
|
|
4731
|
-
"DutyPaidProofOCR": doDutyPaidProofOCR,
|
|
4732
4782
|
"MainlandPermitOCR": doMainlandPermitOCR,
|
|
4733
4783
|
"GeneralBasicOCR": doGeneralBasicOCR,
|
|
4734
4784
|
"RecognizeGeneralInvoice": doRecognizeGeneralInvoice,
|
|
@@ -4744,15 +4794,12 @@ ACTION_MAP = {
|
|
|
4744
4794
|
"TableOCR": doTableOCR,
|
|
4745
4795
|
"ArithmeticOCR": doArithmeticOCR,
|
|
4746
4796
|
"EstateCertOCR": doEstateCertOCR,
|
|
4747
|
-
"RecognizeValidIDCardOCR": doRecognizeValidIDCardOCR,
|
|
4748
4797
|
"BankCardOCR": doBankCardOCR,
|
|
4749
4798
|
"GetOCRToken": doGetOCRToken,
|
|
4750
4799
|
"EduPaperOCR": doEduPaperOCR,
|
|
4751
4800
|
"EnterpriseLicenseOCR": doEnterpriseLicenseOCR,
|
|
4752
4801
|
"BusinessCardOCR": doBusinessCardOCR,
|
|
4753
4802
|
"IDCardOCR": doIDCardOCR,
|
|
4754
|
-
"RecognizeGeneralTextImageWarn": doRecognizeGeneralTextImageWarn,
|
|
4755
|
-
"InstitutionOCR": doInstitutionOCR,
|
|
4756
4803
|
"RecognizeTableAccurateOCR": doRecognizeTableAccurateOCR,
|
|
4757
4804
|
"MixedInvoiceDetect": doMixedInvoiceDetect,
|
|
4758
4805
|
"VatRollInvoiceOCR": doVatRollInvoiceOCR,
|
|
@@ -4769,7 +4816,7 @@ ACTION_MAP = {
|
|
|
4769
4816
|
"RecognizeFormulaOCR": doRecognizeFormulaOCR,
|
|
4770
4817
|
"SealOCR": doSealOCR,
|
|
4771
4818
|
"BankSlipOCR": doBankSlipOCR,
|
|
4772
|
-
"
|
|
4819
|
+
"ResidenceBookletOCR": doResidenceBookletOCR,
|
|
4773
4820
|
"RecognizeTravelCardOCR": doRecognizeTravelCardOCR,
|
|
4774
4821
|
"SubmitExtractDocAgentJob": doSubmitExtractDocAgentJob,
|
|
4775
4822
|
"VerifyOfdVatInvoiceOCR": doVerifyOfdVatInvoiceOCR,
|
|
@@ -4784,14 +4831,13 @@ ACTION_MAP = {
|
|
|
4784
4831
|
"RecognizeTableMultiOCR": doRecognizeTableMultiOCR,
|
|
4785
4832
|
"GeneralFastOCR": doGeneralFastOCR,
|
|
4786
4833
|
"VatInvoiceOCR": doVatInvoiceOCR,
|
|
4787
|
-
"
|
|
4788
|
-
"OrgCodeCertOCR": doOrgCodeCertOCR,
|
|
4834
|
+
"DutyPaidProofOCR": doDutyPaidProofOCR,
|
|
4789
4835
|
"FinanBillSliceOCR": doFinanBillSliceOCR,
|
|
4790
4836
|
"LicensePlateOCR": doLicensePlateOCR,
|
|
4791
4837
|
"ExtractDocMulti": doExtractDocMulti,
|
|
4792
4838
|
"GeneralEfficientOCR": doGeneralEfficientOCR,
|
|
4793
4839
|
"AdvertiseOCR": doAdvertiseOCR,
|
|
4794
|
-
"
|
|
4840
|
+
"VehicleRegCertOCR": doVehicleRegCertOCR,
|
|
4795
4841
|
"CarInvoiceOCR": doCarInvoiceOCR,
|
|
4796
4842
|
"GetOCRResult": doGetOCRResult,
|
|
4797
4843
|
"FormulaOCR": doFormulaOCR,
|